{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:09:44Z","timestamp":1770278984969,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T00:00:00Z","timestamp":1732060800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T00:00:00Z","timestamp":1732060800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evolving Systems"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s12530-024-09639-9","type":"journal-article","created":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T02:16:34Z","timestamp":1732068994000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Learning models to forecast toxicity in conversation threads by identifying potential toxic users"],"prefix":"10.1007","volume":"16","author":[{"given":"Snigdha","family":"Ranjith","sequence":"first","affiliation":[]},{"given":"C. Ravindranath","family":"Chowdary","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5497-5733","authenticated-orcid":false,"given":"Paras","family":"Tiwari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,20]]},"reference":[{"key":"9639_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115632","volume":"185","author":"S Agarwal","year":"2021","unstructured":"Agarwal S, Chowdary CR (2021) Combating hate speech using an adaptive ensemble learning model with a case study on covid-19. Expert Syst Appl 185:115632. https:\/\/doi.org\/10.1016\/j.eswa.2021.115632","journal-title":"Expert Syst Appl"},{"key":"9639_CR2","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.knosys.2017.11.021","volume":"141","author":"ZZ Alp","year":"2018","unstructured":"Alp ZZ, \u00d6\u011f\u00fcd\u00fcc\u00fc \u015eG (2018) Identifying topical influencers on twitter based on user behavior and network topology. Knowl-Based Syst 141:211\u2013221. https:\/\/doi.org\/10.1016\/j.knosys.2017.11.021","journal-title":"Knowl-Based Syst"},{"key":"9639_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101584","volume":"105","author":"A Arango","year":"2022","unstructured":"Arango A, P\u00e9rez J, Poblete B (2022) Hate speech detection is not as easy as you may think: a closer look at model validation (extended version). Inf Syst 105:101584. https:\/\/doi.org\/10.1016\/j.is.2020.101584","journal-title":"Inf Syst"},{"key":"9639_CR4","doi-asserted-by":"crossref","unstructured":"Aroyo L, Dixon L, Thain N, Redfield O, Rosen R (2019) Crowdsourcing subjective tasks: the case study of understanding toxicity in online discussions. In: Companion proceedings of the 2019 world wide web conference. WWW \u201919, pp 1100\u20131105. Association for Computing Machinery, New York, NY, USA. 10.1145\/3308560.3317083","DOI":"10.1145\/3308560.3317083"},{"key":"9639_CR5","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.is.2017.12.004","volume":"78","author":"I Bizid","year":"2018","unstructured":"Bizid I, Nayef N, Boursier P, Doucet A (2018) Detecting prominent microblog users over crisis events phases. Inf Syst 78:173\u2013188. https:\/\/doi.org\/10.1016\/j.is.2017.12.004","journal-title":"Inf Syst"},{"key":"9639_CR6","doi-asserted-by":"crossref","unstructured":"Cheng J, Danescu-Niculescu-Mizil C, Leskovec J (2015) Antisocial behavior in online discussion communities. In: Proceedings of the international Aaai conference on web and social media, vol. 9, pp 61\u201370. 10.1609\/icwsm.v9i1.14583","DOI":"10.1609\/icwsm.v9i1.14583"},{"key":"9639_CR7","doi-asserted-by":"crossref","unstructured":"Dahiya S, Sharma S, Sahnan D, Goel V, Chouzenoux E, Elvira V, Majumdar A, Bandhakavi A, Chakraborty T (2021) Would your tweet invoke hate on the fly? Forecasting hate intensity of reply threads on twitter. In: Proceedings of the 27th ACM SIGKDD conference on knowledge discovery & data mining. KDD \u201921, pp 2732\u20132742. Association for Computing Machinery, New York, NY, USA. 10.1145\/3447548.3467150","DOI":"10.1145\/3447548.3467150"},{"key":"9639_CR8","doi-asserted-by":"crossref","unstructured":"ElSherief M, Nilizadeh S, Nguyen D, Vigna G, Belding E (2018) Peer to peer hate: Hate speech instigators and their targets. In: Proceedings of the international AAAI conference on web and social media, vol. 12. 10.1609\/icwsm.v12i1.15038","DOI":"10.1609\/icwsm.v12i1.15038"},{"issue":"4","key":"9639_CR9","doi-asserted-by":"publisher","first-page":"215","DOI":"10.14257\/ijmue.2015.10.4.21","volume":"10","author":"ND Gitari","year":"2015","unstructured":"Gitari ND, Zuping Z, Damien H, Long J (2015) A lexicon-based approach for hate speech detection. Int J Multimed Ubiquitous Eng 10(4):215\u2013230. https:\/\/doi.org\/10.14257\/ijmue.2015.10.4.21","journal-title":"Int J Multimed Ubiquitous Eng"},{"key":"9639_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.csite.2023.103897","volume":"53","author":"M Huang","year":"2024","unstructured":"Huang M, Zhang J, Hu J, Ye Z, Deng Z, Wan N (2024) Nonlinear modeling of temperature-induced bearing displacement of long-span single-pier rigid frame bridge based on dcnn-lstm. Case Stud Thermal Eng 53:103897. https:\/\/doi.org\/10.1016\/j.csite.2023.103897","journal-title":"Case Stud Thermal Eng"},{"key":"9639_CR11","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.knosys.2013.06.020","volume":"51","author":"K Ikeda","year":"2013","unstructured":"Ikeda K, Hattori G, Ono C, Asoh H, Higashino T (2013) Twitter user profiling based on text and community mining for market analysis. Knowl-Based Syst 51:35\u201347. https:\/\/doi.org\/10.1016\/j.knosys.2013.06.020","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"9639_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1115\/1.3662552","volume":"82","author":"RE Kalman","year":"1960","unstructured":"Kalman RE (1960) A new approach to linear filtering and prediction problems. J Basic Eng 82(1):35\u201345. https:\/\/doi.org\/10.1115\/1.3662552","journal-title":"J Basic Eng"},{"key":"9639_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106458","volume":"210","author":"P Kapil","year":"2020","unstructured":"Kapil P, Ekbal A (2020) A deep neural network based multi-task learning approach to hate speech detection. Knowl-Based Syst 210:106458. https:\/\/doi.org\/10.1016\/j.knosys.2020.106458","journal-title":"Knowl-Based Syst"},{"key":"9639_CR14","doi-asserted-by":"crossref","unstructured":"Liu P, Guberman J, Hemphill L, Culotta A (2018) Forecasting the presence and intensity of hostility on instagram using linguistic and social features. In: Proceedings of the international AAAI conference on web and social media, vol. 12. 10.1609\/icwsm.v12i1.15022","DOI":"10.1609\/icwsm.v12i1.15022"},{"key":"9639_CR15","doi-asserted-by":"crossref","unstructured":"Miller C, Cohen S, Klug D, Vasilescu B, KaUstner C (2022) Did you miss my comment or what?\": Understanding toxicity in open source discussions. In: Proceedings of the 44th international conference on software engineering. ICSE 22, pp 710\u2013722. Association for Computing Machinery, New York, NY, USA. 10.1145\/3510003.3510111","DOI":"10.1145\/3510003.3510111"},{"key":"9639_CR16","unstructured":"Munro ER (2011) The protection of children online: a brief scoping review to identify vulnerable groups. Childhood Wellbeing Research Centre"},{"key":"9639_CR17","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1016\/j.neucom.2021.12.035","volume":"491","author":"VP Nemani","year":"2022","unstructured":"Nemani VP, Lu H, Thelen A, Hu C, Zimmerman AT (2022) Ensembles of probabilistic lstm predictors and correctors for bearing prognostics using industrial standards. Neurocomputing 491:575\u2013596. https:\/\/doi.org\/10.1016\/j.neucom.2021.12.035","journal-title":"Neurocomputing"},{"key":"9639_CR18","doi-asserted-by":"crossref","unstructured":"Pavlopoulos J, Sorensen J, Dixon L, Thain N, Androutsopoulos I (2020) Toxicity detection: does context really matter? In: Proceedings of the 58th annual meeting of the association for computational linguistics, pp 4296\u20134305. Association for Computational Linguistics, Online. 10.18653\/v1\/2020.acl-main.396","DOI":"10.18653\/v1\/2020.acl-main.396"},{"key":"9639_CR19","doi-asserted-by":"publisher","first-page":"4087","DOI":"10.1016\/j.egyr.2023.10.076","volume":"10","author":"S Qin","year":"2023","unstructured":"Qin S, Tao J, Zhao Z (2023) Fault diagnosis of wind turbine pitch system based on lstm with multi-channel attention mechanism. Energy Rep 10:4087\u20134096. https:\/\/doi.org\/10.1016\/j.egyr.2023.10.076","journal-title":"Energy Rep"},{"key":"9639_CR20","doi-asserted-by":"crossref","unstructured":"Radfar B, Shivaram K, Culotta A (2020) Characterizing variation in toxic language by social context. In: Proceedings of the international AAAI conference on web and social media, vol. 14, pp 959\u2013963. 10.1609\/icwsm.v14i1.7366","DOI":"10.1609\/icwsm.v14i1.7366"},{"key":"9639_CR21","doi-asserted-by":"crossref","unstructured":"Razavi AH, Inkpen D, Uritsky S, Matwin S (2010) Offensive language detection using multi-level classification. In: Proceedings of the 23rd Canadian conference on advances in artificial intelligence. AI\u201910, pp 16\u201327. Springer, Berlin, Heidelberg. 10.1007\/978-3-642-13059-5_5","DOI":"10.1007\/978-3-642-13059-5_5"},{"key":"9639_CR22","doi-asserted-by":"crossref","unstructured":"Saveski M, Roy B, Roy D (2021) The structure of toxic conversations on twitter. In: Proceedings of the web conference 2021. WWW \u201921, pp 1086\u20131097. ACM, 10.1145\/3442381.3449861","DOI":"10.1145\/3442381.3449861"},{"key":"9639_CR23","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyt.2021.674298","author":"KB Schodt","year":"2021","unstructured":"Schodt KB, Quiroz SI, Wheeler B, Hall DL, Silva YN (2021) Cyberbullying and mental health in adults: the moderating role of social media use and gender. Front Psychiatry. https:\/\/doi.org\/10.3389\/fpsyt.2021.674298","journal-title":"Front Psychiatry"},{"key":"9639_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2024.109876","volume":"157","author":"SF Stefenon","year":"2024","unstructured":"Stefenon SF, Seman LO, Silva LSA, Mariani VC, Coelho LDS (2024) Hypertuned temporal fusion transformer for multi-horizon time series forecasting of dam level in hydroelectric power plants. Int J Electr Power Energy Syst 157:109876. https:\/\/doi.org\/10.1016\/j.ijepes.2024.109876","journal-title":"Int J Electr Power Energy Syst"},{"issue":"3","key":"9639_CR25","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1089\/1094931041291295","volume":"7","author":"J Suler","year":"2004","unstructured":"Suler J (2004) The online disinhibition effect. Cyberpsychol Behav 7(3):321\u2013326","journal-title":"Cyberpsychol Behav"},{"key":"9639_CR26","doi-asserted-by":"crossref","unstructured":"Tiwari P, Chowdary CR (2023) An empirical study on the impact of pre-processing steps for code-mix text. 10.21203\/rs.3.rs-3638675\/v1","DOI":"10.21203\/rs.3.rs-3638675\/v1"},{"key":"9639_CR27","doi-asserted-by":"crossref","unstructured":"Tiwari P, Rai S (2021) Mind your tweet: abusive tweet detection. In: Speech and computer: 23rd international conference, SPECOM 2021, pp 704\u2013715. 10.1007\/978-3-030-87802-3_63","DOI":"10.1007\/978-3-030-87802-3_63"},{"key":"9639_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-023-09707-7","author":"P Tiwari","year":"2024","unstructured":"Tiwari P, Rai S, Chowdary CR (2024) Large scale annotated dataset for code-mix abusive short noisy text. Lang Resour Eval. https:\/\/doi.org\/10.1007\/s10579-023-09707-7","journal-title":"Lang Resour Eval"},{"key":"9639_CR29","unstructured":"Warner W, Hirschberg J (2012) Detecting hate speech on the world wide web. In: Proceedings of the second workshop on language in social media, pp 19\u201326. Association for Computational Linguistics, Montr\u00e9al, Canada https:\/\/aclanthology.org\/W12-2103"},{"key":"9639_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3344294","author":"Z Xiao","year":"2023","unstructured":"Xiao Z, Tong H, Qu R, Xing H, Luo S, Zhu Z, Song F, Feng L (2023) Capmatch: semi-supervised contrastive transformer capsule with feature-based knowledge distillation for human activity recognition. IEEE Trans Neural Netw Learn Syst. https:\/\/doi.org\/10.1109\/TNNLS.2023.3344294","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"9639_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2024.3370219","author":"Z Xiao","year":"2024","unstructured":"Xiao Z, Xu X, Xing H, Zhao B, Wang X, Song F, Qu R, Feng L (2024) Dtcm: deep transformer capsule mutual distillation for multivariate time series classification. IEEE Trans Cognitive Dev Syst. https:\/\/doi.org\/10.1109\/TCDS.2024.3370219","journal-title":"IEEE Trans Cognitive Dev Syst"},{"key":"9639_CR32","doi-asserted-by":"crossref","unstructured":"Yousefi N, Noor NB, Spann B, Agarwal N (2023) Examining toxicity\u2019s impact on reddit conversations. In: International conference on complex networks and their applications, pp 401\u2013411. 10.1007\/978-3-031-53503-1_33 . Springer","DOI":"10.1007\/978-3-031-53503-1_33"}],"container-title":["Evolving Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-024-09639-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12530-024-09639-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-024-09639-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T03:20:26Z","timestamp":1732072826000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12530-024-09639-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,20]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["9639"],"URL":"https:\/\/doi.org\/10.1007\/s12530-024-09639-9","relation":{},"ISSN":["1868-6478","1868-6486"],"issn-type":[{"value":"1868-6478","type":"print"},{"value":"1868-6486","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,20]]},"assertion":[{"value":"20 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"8"}}