{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T14:16:31Z","timestamp":1774880191280,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031545337","type":"print"},{"value":"9783031545344","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54534-4_1","type":"book-chapter","created":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T10:39:18Z","timestamp":1710844758000},"page":"3-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Threatening Expression and Target Identification in Under-Resource Languages Using NLP Techniques"],"prefix":"10.1007","author":[{"given":"Muhammad Shahid Iqbal","family":"Malik","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,12]]},"reference":[{"key":"1_CR1","unstructured":"Chhabra, A., Vishwakarma, D.K.: A literature survey on multimodal and multilingual automatic hate speech identification. Multimed. Syst. 1\u201328 (2023)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Schmidt, A., Wiegand, M.: A survey on hate speech detection using natural language processing. In: Proceedings of the Fifth International Workshop on Natural Language Processing for Social Media (2017)","DOI":"10.18653\/v1\/W17-1101"},{"key":"1_CR3","first-page":"1258","volume":"77","author":"R Delgado","year":"1991","unstructured":"Delgado, R., Stefancic, J.: Images of the outsider in American law and culture: can free expression remedy systemic social ills. Cornell L. Rev. 77, 1258 (1991)","journal-title":"Cornell L. Rev."},{"issue":"4","key":"1_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3232676","volume":"51","author":"P Fortuna","year":"2018","unstructured":"Fortuna, P., Nunes, S.: A survey on automatic detection of hate speech in text. ACM Comput. Surv. (CSUR) 51(4), 1\u201330 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"1_CR5","unstructured":"Youtube. YouTube hate policy. https:\/\/support.google.com\/youtube\/answer\/2801939?hl=en.2019"},{"key":"1_CR6","unstructured":"Twitter. Twitter_Hate Definition. https:\/\/support.twitter.com\/articles\/.2017"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"De Gibert, O., et al.: Hate speech dataset from a white supremacy forum. arXiv preprint arXiv:1809.04444 (2018)","DOI":"10.18653\/v1\/W18-5102"},{"issue":"2","key":"1_CR8","doi-asserted-by":"publisher","first-page":"205","DOI":"10.2478\/ausi-2020-0012","volume":"12","author":"D Andro\u010dec","year":"2020","unstructured":"Andro\u010dec, D.: Machine learning methods for toxic comment classification: a systematic review. Acta Universitatis Sapientiae, Informatica 12(2), 205\u2013216 (2020)","journal-title":"Acta Universitatis Sapientiae, Informatica"},{"issue":"2","key":"1_CR9","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1080\/0952813X.2017.1409284","volume":"30","author":"S Malmasi","year":"2018","unstructured":"Malmasi, S., Zampieri, M.: Challenges in discriminating profanity from hate speech. J. Exp. Theor. Artif. Intell. 30(2), 187\u2013202 (2018)","journal-title":"J. Exp. Theor. Artif. Intell."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Thompson, N.: Social Problems and Social Justice. Bloomsbury Publishing (2017)","DOI":"10.1057\/978-1-137-60362-3"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Chen, Y., et al.: Detecting offensive language in social media to protect adolescent online safety. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing. IEEE (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Ashraf, N., et al.: Individual vs. group violent threats classification in online discussions. In: Companion Proceedings of the Web Conference 2020 (2020)","DOI":"10.1145\/3366424.3385778"},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"104728","DOI":"10.1016\/j.autcon.2022.104728","volume":"147","author":"L Jiang","year":"2023","unstructured":"Jiang, L., et al.: Intelligent control of building fire protection system using digital twins and semantic web technologies. Autom. Constr. 147, 104728 (2023)","journal-title":"Autom. Constr."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Mazari, A.C., Boudoukhani, N., Djeffal, A.: BERT-based ensemble learning for multi-aspect hate speech detection. Cluster Comput. 1\u201315 (2023)","DOI":"10.1007\/s10586-022-03956-x"},{"issue":"6","key":"1_CR15","doi-asserted-by":"publisher","first-page":"102383","DOI":"10.1016\/j.ipm.2020.102383","volume":"57","author":"A Nawaz","year":"2020","unstructured":"Nawaz, A., et al.: Extractive text summarization models for Urdu language. Inf. Process. Manag. 57(6), 102383 (2020)","journal-title":"Inf. Process. Manag."},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"128302","DOI":"10.1109\/ACCESS.2021.3112500","volume":"9","author":"M Amjad","year":"2021","unstructured":"Amjad, M., et al.: Threatening language detection and target identification in Urdu tweets. IEEE Access 9, 128302\u2013128313 (2021)","journal-title":"IEEE Access"},{"key":"1_CR17","unstructured":"Kalraa, S., Agrawala, M., Sharmaa, Y.: Detection of Threat Records by Analyzing the Tweets in Urdu Language Exploring Deep Learning Transformer-Based Models (2021)"},{"key":"1_CR18","unstructured":"Das, M., Banerjee, S., Saha, P.: Abusive and threatening language detection in Urdu using boosting based and BERT based models: a comparative approach. arXiv preprint arXiv:2111.14830 (2021)"},{"key":"1_CR19","unstructured":"Humayoun, M.: Abusive and threatening language detection in Urdu using supervised machine learning and feature combinations. arXiv preprint arXiv:2204.03062 (2022)"},{"issue":"20","key":"1_CR20","doi-asserted-by":"publisher","first-page":"10342","DOI":"10.3390\/app122010342","volume":"12","author":"A Mehmood","year":"2022","unstructured":"Mehmood, A., et al.: Threatening URDU language detection from tweets using machine learning. Appl. Sci. 12(20), 10342 (2022)","journal-title":"Appl. Sci."},{"key":"1_CR21","doi-asserted-by":"publisher","first-page":"e1169","DOI":"10.7717\/peerj-cs.1169","volume":"8","author":"S Hussain","year":"2022","unstructured":"Hussain, S., Malik, M.S.I., Masood, N.: Identification of offensive language in Urdu using semantic and embedding models. PeerJ Computer Science 8, e1169 (2022)","journal-title":"PeerJ Computer Science"},{"key":"1_CR22","unstructured":"Amjad, M., et al.: Automatic abusive language detection in Urdu tweets. Acta Polytechnica Hungarica 1785\u20138860 (2021)"},{"key":"1_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3580476","volume":"22","author":"R Saeed","year":"2023","unstructured":"Saeed, R., et al.: Detection of offensive language and its severity for low resource language. ACM Trans. Asian Low-Resour. Lang. Inf. Process. 22, 1\u201327 (2023)","journal-title":"ACM Trans. Asian Low-Resour. Lang. Inf. Process."},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Malik, M.S.I., Cheema, U., Ignatov, D.I.: Contextual embeddings based on fine-tuned Urdu-BERT for Urdu threatening content and target identification. J. King Saud Univ.-Comput. Inf. Sci. 101606 (2023)","DOI":"10.1016\/j.jksuci.2023.101606"},{"issue":"8","key":"1_CR25","first-page":"101736","volume":"35","author":"MSI Malik","year":"2023","unstructured":"Malik, M.S.I., et al.: Multilingual hope speech detection: a robust framework using transfer learning of fine-tuning RoBERTa model. J. King Saud Univ.-Comput. Inf. Sci. 35(8), 101736 (2023)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Rehan, M., Malik, M.S.I., Jamjoom, M.M.: Fine-tuning transformer models using transfer learning for multilingual threatening text identification. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3320062"},{"key":"1_CR27","unstructured":"Liu, Y., et al.: RoBERTa: a robustly optimized BERT pretraining approach. arXiv preprint arXiv:1907.11692 (2019)"},{"key":"1_CR28","doi-asserted-by":"publisher","first-page":"120236","DOI":"10.1016\/j.eswa.2023.120236","volume":"227","author":"MZ Younas","year":"2023","unstructured":"Younas, M.Z., Malik, M.S.I., Ignatov, D.I.: Automated defect identification for cell phones using language context, linguistic and smoke-word models. Expert Syst. Appl. 227, 120236 (2023)","journal-title":"Expert Syst. Appl."},{"key":"1_CR29","doi-asserted-by":"publisher","first-page":"e1248","DOI":"10.7717\/peerj-cs.1248","volume":"9","author":"MSI Malik","year":"2023","unstructured":"Malik, M.S.I., Imran, T., Mamdouh, J.M.: How to detect propaganda from social media? Exploitation of semantic and fine-tuned language models. PeerJ Comput. Sci. 9, e1248 (2023)","journal-title":"PeerJ Comput. Sci."}],"container-title":["Lecture Notes in Computer Science","Analysis of Images, Social Networks and Texts"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54534-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T10:39:32Z","timestamp":1710844772000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54534-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031545337","9783031545344"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54534-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Analysis of Images, Social Networks and Texts","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yerevan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Armenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aist2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aistconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.62","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Out of the 93 submission, 17 were rejected before being sent to peer review.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}