{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:06:12Z","timestamp":1774541172852,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031379390","type":"print"},{"value":"9783031379406","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37940-6_20","type":"book-chapter","created":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T20:23:00Z","timestamp":1690057380000},"page":"241-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detecting Toxic Comments Using FastText, CNN, and LSTM Models"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5820-1380","authenticated-orcid":false,"given":"Hetvi","family":"Gandhi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0644-4522","authenticated-orcid":false,"given":"Rounak","family":"Bachwani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2886-5810","authenticated-orcid":false,"given":"Archana","family":"Nanade","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,23]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Website. https:\/\/backlinko.com\/social-media-users. Accessed 19 Mar 2023","DOI":"10.4324\/9781003351962-3"},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"2707","DOI":"10.3390\/su12072707","volume":"12","author":"J Jung","year":"2020","unstructured":"Jung, J., Petkanic, P., Nan, D., Kim, J.H.: When a girl awakened the world: a user and social message analysis of Greta Thunberg. Sustainability 12, 2707 (2020). https:\/\/doi.org\/10.3390\/su12072707","journal-title":"Sustainability"},{"key":"20_CR3","unstructured":"Amedie, J.: The Impact of Social Media on Society (2015)"},{"key":"20_CR4","unstructured":"Duggan, M.: Online harassment. Pew Research Center (2014)"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1002\/poi3.265","volume":"13","author":"D Konikoff","year":"2021","unstructured":"Konikoff, D.: Gatekeepers of toxicity: reconceptualizing Twitter\u2019s abuse and hate speech policies. Policy Internet 13, 502\u2013521 (2021). https:\/\/doi.org\/10.1002\/poi3.265","journal-title":"Policy Internet"},{"key":"20_CR6","unstructured":"Minar, M.R., Naher, J.: Recent Advances in Deep Learning: An Overview (2018)"},{"key":"20_CR7","unstructured":"Di, W., Bhardwaj, A., Wei, J.: Deep Learning Essentials, January 2018"},{"key":"20_CR8","doi-asserted-by":"publisher","unstructured":"Santos, I., Nedjah, N., de Macedo Mourelle, L.: Sentiment analysis using convolutional neural network with fastText embeddings. In: 2017 IEEE Latin American Conference on Computational Intelligence (LA-CCI), pp. 1\u20135 (2017). https:\/\/doi.org\/10.1109\/LA-CCI.2017.8285683","DOI":"10.1109\/LA-CCI.2017.8285683"},{"key":"20_CR9","unstructured":"Website. https:\/\/medium.com\/techiepedia\/binary-image-classifier-cnn-usingtensorflow-a3f5d6746697. Accessed 19 Mar 2023"},{"key":"20_CR10","unstructured":"Website. https:\/\/colah.github.io\/posts\/2015-08-Understanding-LSTMs\/. Accessed 19 Mar 2023"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Manning, C.D., Raghavan, P., Sch\u00fctze, H.: Introduction to Information Retrieval. Cambridge University Press (2008)","DOI":"10.1017\/CBO9780511809071"},{"key":"20_CR12","unstructured":"Plisson, J., Lavrac, N., Mladenic, D.: A rule based approach to word lemmatization. In: Proceedings of IS, vol. 3 (2004)"},{"key":"20_CR13","doi-asserted-by":"publisher","unstructured":"Husnain, M., Khalid, A., Shafi, N.: A novel preprocessing technique for toxic comment classification. In: 2021 International Conference on Artificial Intelligence (ICAI), pp. 22\u201327 (2021). https:\/\/doi.org\/10.1109\/ICAI52203.2021.9445252","DOI":"10.1109\/ICAI52203.2021.9445252"},{"key":"20_CR14","doi-asserted-by":"publisher","unstructured":"Mestry, S., Singh, H., Chauhan, R., Bisht, V., Tiwari, K.: Automation in social networking comments with the help of robust fastText and CNN. In: 2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT), pp. 1\u20134 (2019). https:\/\/doi.org\/10.1109\/ICIICT1.2019.8741503","DOI":"10.1109\/ICIICT1.2019.8741503"},{"key":"20_CR15","doi-asserted-by":"publisher","unstructured":"Rahul, Kajla, H., Hooda, J., Saini, G.: Classification of online toxic comments using machine learning algorithms. In: 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 1119\u20131123 (2020). https:\/\/doi.org\/10.1109\/ICICCS48265.2020.9120939","DOI":"10.1109\/ICICCS48265.2020.9120939"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"78621","DOI":"10.1109\/ACCESS.2021.3083638","volume":"9","author":"V Rupapara","year":"2021","unstructured":"Rupapara, V., Rustam, F., Shahzad, H.F., Mehmood, A., Ashraf, I., Choi, G.S.: Impact of SMOTE on imbalanced text features for toxic comments classification using RVVC model. IEEE Access 9, 78621\u201378634 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3083638","journal-title":"IEEE Access"},{"key":"20_CR17","doi-asserted-by":"publisher","unstructured":"Zhang, J., Li, Y., Tian, J., Li, T.: LSTM-CNN hybrid model for text classification. In: 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 1675\u20131680 (2018). https:\/\/doi.org\/10.1109\/IAEAC.2018.8577620","DOI":"10.1109\/IAEAC.2018.8577620"},{"key":"20_CR18","doi-asserted-by":"publisher","unstructured":"Sumanth, P., Samiuddin, S., Jamal, K., Domakonda, S., Shivani, P.: Toxic speech classification using machine learning algorithms. In: 2022 International Conference on Electronic Systems and Intelligent Computing (ICESIC), pp. 257\u2013263 (2022). https:\/\/doi.org\/10.1109\/ICESIC53714.2022.9783475","DOI":"10.1109\/ICESIC53714.2022.9783475"},{"key":"20_CR19","doi-asserted-by":"publisher","unstructured":"Dubey, K., Nair, R., Khan, M.U., Shaikh, P.S.: Toxic comment detection using LSTM. In: 2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC), pp. 1\u20138 (2020). https:\/\/doi.org\/10.1109\/ICAECC50550.2020.9339521","DOI":"10.1109\/ICAECC50550.2020.9339521"},{"key":"20_CR20","doi-asserted-by":"publisher","unstructured":"Vichare, M., Thorat, S., Uberoi, C.S., Khedekar, S., Jaikar, S.: Toxic comment analysis for online learning. In: 2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS), pp. 130\u2013135 (2021). https:\/\/doi.org\/10.1109\/ACCESS51619.2021.9563344","DOI":"10.1109\/ACCESS51619.2021.9563344"},{"key":"20_CR21","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1007\/978-981-33-4305-4_65","volume-title":"Inventive Computation and Information Technologies","author":"MI Pavel","year":"2021","unstructured":"Pavel, M.I., Razzak, R., Sengupta, K., Niloy, M.D.K., Muqith, M.B., Tan, S.Y.: Toxic comment classification implementing CNN combining word embedding technique. In: Smys, S., Balas, V.E., Kamel, K.A., Lafata, P. (eds.) Inventive Computation and Information Technologies. LNNS, vol. 173, pp. 897\u2013909. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-33-4305-4_65"},{"issue":"4","key":"20_CR22","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1108\/IJICC-04-2021-0069","volume":"14","author":"R Varma","year":"2021","unstructured":"Varma, R., Verma, Y., Vijayvargiya, P., Churi, P.P.: A systematic survey on deep learning and machine learning approaches of fake news detection in the pre- and post- COVID-19 pandemic. Int. J. Intell. Comput. Cybern. 14(4), 617\u2013646 (2021). https:\/\/doi.org\/10.1108\/IJICC-04-2021-0069","journal-title":"Int. J. Intell. Comput. Cybern."}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37940-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,17]],"date-time":"2023-12-17T15:54:05Z","timestamp":1702828445000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37940-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031379390","9783031379406"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37940-6_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"23 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair & Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"464","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}