{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T18:36:46Z","timestamp":1770143806504,"version":"3.49.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T00:00:00Z","timestamp":1735257600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T00:00:00Z","timestamp":1735257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Soc Sc"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s42001-024-00349-5","type":"journal-article","created":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T07:35:34Z","timestamp":1735284934000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Detecting toxic comments on social media: an extensive evaluation of machine learning techniques"],"prefix":"10.1007","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9424-4636","authenticated-orcid":false,"given":"Dharil","family":"Patel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9438-9309","authenticated-orcid":false,"given":"Pijush Kanti Dutta","family":"Pramanik","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3352-0095","authenticated-orcid":false,"given":"Chaitanya","family":"Suryawanshi","sequence":"additional","affiliation":[]},{"given":"Preksha","family":"Pareek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,27]]},"reference":[{"key":"349_CR1","doi-asserted-by":"crossref","unstructured":"Aken, B., Risch. J., Krestel, R. & L\u00f6ser, A. (2018). \"Challenges for toxic comment classification: An in-depth error analysis.\" Proceedings of the 2nd Workshop on Abusive Language Online (ALW2), Brussels, Belgium.","DOI":"10.18653\/v1\/W18-5105"},{"key":"349_CR2","doi-asserted-by":"publisher","first-page":"8631","DOI":"10.3390\/app10238631","volume":"10","author":"V Maslej-Kre\u0161\u0148\u00e1kov\u00e1","year":"2020","unstructured":"Maslej-Kre\u0161\u0148\u00e1kov\u00e1, V., Sarnovsk\u00fd, M.,\u00a0Butka, P. &\u00a0Machov\u00e1, K.\u00a0(2020). \"Comparison of deep learning models and various text pre-processing techniques for the toxic comments classification.\"\u00a0Applied Sciences, 10, 8631.","journal-title":"Applied Sciences"},{"key":"349_CR3","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Zhang, Z. & Hopfgartner, F. (2021). \"A comparative study of using pre-trained language models for toxic comment classification.\" Companion Proceedings of the Web Conference, Ljubljana Slovenia.","DOI":"10.1145\/3442442.3452313"},{"key":"349_CR4","unstructured":"Villanes, A., Serra, X. (2018). \"Text classification for hate speech detection: A comparison of CNN and RNN,\" Proceedings of the 11th International Conference on Human System Interaction (HSI), 261\u2013267."},{"key":"349_CR5","doi-asserted-by":"crossref","unstructured":"Georgakopoulos, S. V., Tasoulis, S. K., Vrahatis, A. & Plagianakos, P. V. (2018). \"Convolutional neural networks for toxic comment classification.\" Proceedings of the 10th Hellenic conference on artificial intelligence, Patras Greece.","DOI":"10.1145\/3200947.3208069"},{"key":"349_CR6","doi-asserted-by":"crossref","unstructured":"Ibrahim, M., Torki, M., El-Makky, N. (2018). \"Imbalanced toxic comments classification using data augmentation and deep learning\", Proceedings of the 17th IEEE International Conference on Machine Learning and Applications (ICMLA), Orlando, FL, USA.","DOI":"10.1109\/ICMLA.2018.00141"},{"key":"349_CR7","doi-asserted-by":"publisher","first-page":"78621","DOI":"10.1109\/ACCESS.2021.3083638","volume":"9","author":"V Rupapara","year":"2021","unstructured":"Rupapara, V.,\u00a0Rustam, F.,\u00a0Shazad, H. F.,\u00a0Mehmood, A.,\u00a0Ashrah, I. & Choi, A. G. S.\u00a0(2021). Impact of SMOTE on imbalanced text features for toxic comments classification using RVVC model. IEEE Access, 9, 78621\u201378634.","journal-title":"IEEE Access"},{"key":"349_CR8","unstructured":"Akash, G., Kumar, H., Bharathi, D. (2021). \"Toxic comment classification using transformers.\" Proceedings of the 11th Annual International Conference on Industrial Engineering and Operations Management, Singapore."},{"key":"349_CR9","doi-asserted-by":"crossref","unstructured":"Dubey, K. Nair, R., Khan, U., Shaikh, S. (2020). \"Toxic comment detection using LSTM.\" Proceedings of Third International Conference on Advances in Electronics, Computers and Communications (ICAECC), Bengaluru, India.","DOI":"10.1109\/ICAECC50550.2020.9339521"},{"key":"349_CR10","doi-asserted-by":"crossref","unstructured":"Ravi, P., Batta, H. N., Greeshma, S. & Yaseen, S. (2019). \"Toxic comment classification.\" International Journal of Trend in Scientific Research and Development (IJTSRD), 3(4), 24-27.","DOI":"10.31142\/ijtsrd23464"},{"key":"349_CR11","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-22523-3","author":"A Abbasi","year":"2022","unstructured":"Abbasi, A., Javed, A. R., Iqbal, F., Kryvinska, N., & Jalil, Z. (2022). Deep learning for religious and continent-based toxic content detection and classification. Scientific Reports, vol. 12,\u00a0Article number: 17478.","journal-title":"Scientific Reports"},{"key":"349_CR12","doi-asserted-by":"crossref","unstructured":"Ashish, Rani, A., & Shyan, H. (2023). \u201cA comparative study and analysis on toxic comment Classification\u201d. Proceedings of International Conference on Sustainable Computing and Smart Systems (ICSCSS), Coimbatore, India.","DOI":"10.1109\/ICSCSS57650.2023.10169771"},{"issue":"9","key":"349_CR13","first-page":"70","volume":"12","author":"P Vidyullatha","year":"2021","unstructured":"Vidyullatha, P. (2021). Identification and classification of toxic comment using machine learning methods\u201d. Turkish Journal of Computer and Mathematics Education, 12(9), 70\u201374.","journal-title":"Turkish Journal of Computer and Mathematics Education"},{"key":"349_CR14","doi-asserted-by":"crossref","unstructured":"Carta, S., Corriga, A., Mulas, R., Recupero, D. R., & Saia, R. (2019). \u201cA Supervised Multi-class Multi-label Word Embeddings Approach for Toxic Comment Classification\u201d, in Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, Vienna, Austria, 105-112,","DOI":"10.5220\/0008110901050112"},{"key":"349_CR15","doi-asserted-by":"publisher","unstructured":"Rokach, L., Maimon, O. (2005). Decision trees. In: Maimon, O., Rokach, L. (eds) Data Mining and Knowledge Discovery Handbook. Springer, Boston, MA. https:\/\/doi.org\/10.1007\/0-387-25465-X_9","DOI":"10.1007\/0-387-25465-X_9"},{"key":"349_CR16","doi-asserted-by":"crossref","unstructured":"Guo, G., Wang, H., Bell, D., Bi, Y., Greer, K. (2003). KNN model-based approach in classification. In: Meersman, R., Tari, Z., Schmidt, D.C. (eds) On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE. OTM 2003. Lecture Notes in Computer Science, 2888. Springer, Berlin.","DOI":"10.1007\/978-3-540-39964-3_62"},{"issue":"1","key":"349_CR17","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L. (2001). Random forests. Machine Learning, 45(1), 5\u201332.","journal-title":"Machine Learning"},{"issue":"4","key":"349_CR18","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"MA Hearst","year":"1998","unstructured":"Hearst, M. A., Dumais, S. T., Osuna, E., Platt, J., & Scholkopf, B. (1998). Support vector machines. IEEE Intelligent Systems and their Applications, 13(4), 18\u201328.","journal-title":"IEEE Intelligent Systems and their Applications"},{"issue":"5","key":"349_CR19","first-page":"771","volume":"14","author":"Y Freund","year":"1999","unstructured":"Freund, Y., & Schapire, R. E. (1999). A short introduction to boosting. Journal of Japanese Society for Artificial Intelligence, 14(5), 771\u2013780.","journal-title":"Journal of Japanese Society for Artificial Intelligence"},{"key":"349_CR20","unstructured":"He, Z., Lin, D., Lau, T. & Wu, M. (2019). \"Gradient boosting machine: a survey\", arXiv: 1908.06951v1."},{"key":"349_CR21","doi-asserted-by":"crossref","unstructured":"Hastie, T., Tibshirani R., & Friedman, J. (2009). The elements of statistical learning: data mining, inference, and prediction, Springer-Verlag.","DOI":"10.1007\/978-0-387-84858-7"},{"key":"349_CR22","unstructured":"Vikramkumar, Vijaykumar B. & Trilochan. (2014). \"Bayes and Naive Bayes Classifier\", arXiv: 1404.0933."},{"key":"349_CR23","doi-asserted-by":"crossref","unstructured":"Chen, T. & Guestrin, C. (2016). \"XGBoost: a scalable tree boosting system.\" Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 785\u2013794.","DOI":"10.1145\/2939672.2939785"}],"container-title":["Journal of Computational Social Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42001-024-00349-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42001-024-00349-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42001-024-00349-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T05:28:19Z","timestamp":1739597299000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42001-024-00349-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,27]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["349"],"URL":"https:\/\/doi.org\/10.1007\/s42001-024-00349-5","relation":{},"ISSN":["2432-2717","2432-2725"],"issn-type":[{"value":"2432-2717","type":"print"},{"value":"2432-2725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,27]]},"assertion":[{"value":"27 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"20"}}