{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:28:10Z","timestamp":1771025290933,"version":"3.50.1"},"reference-count":62,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersa.2019.8899669","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T18:18:43Z","timestamp":1574705923000},"page":"1-8","source":"Crossref","is-referenced-by-count":21,"title":["A Comparison of Machine Learning Approaches for Detecting Misogynistic Speech in Urban Dictionary"],"prefix":"10.1109","author":[{"given":"Theo","family":"Lynn","sequence":"first","affiliation":[{"name":"Irish Institute of Digital Business, Dublin City University,Dublin,Ireland"}]},{"given":"Patricia Takako","family":"Endo","sequence":"additional","affiliation":[{"name":"Irish Institute of Digital Business, Dublin City University,Dublin,Ireland"}]},{"given":"Pierangelo","family":"Rosati","sequence":"additional","affiliation":[{"name":"Irish Institute of Digital Business, Dublin City University,Dublin,Ireland"}]},{"given":"Ivanovitch","family":"Silva","sequence":"additional","affiliation":[{"name":"Digital Metropolis Institute, Federal University of Rio Grande do Norte,Natal,Brazil"}]},{"given":"Guto Leoni","family":"Santos","sequence":"additional","affiliation":[{"name":"Federal University of Pernambuco,Recife,Brazil"}]},{"given":"Debbie","family":"Ging","sequence":"additional","affiliation":[{"name":"Institute for Future Media and Journalism, Dublin City University,Dublin,Ireland"}]}],"member":"263","reference":[{"key":"ref39","first-page":"41","article-title":"A comparison of event models for naive bayes text classification","volume":"752","author":"mccallum","year":"0","journal-title":"AAAI-98 Workshop on Learning for Text Categorization"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/10485252.2017.1404598"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"273","DOI":"10.3390\/s17020273","article-title":"Learning to monitor machine health with convolutional bi-directional LSTM networks","volume":"17","author":"zhao","year":"2017","journal-title":"SENSORS"},{"key":"ref32","first-page":"2067","article-title":"Gated feedback recurrent neural networks","author":"junyoung","year":"0","journal-title":"Proceedings of the 32nd International Conference on International Conference on Machine Learning - Volume 37 ser ICML'15"},{"key":"ref31","author":"chung","year":"2014","journal-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling"},{"key":"ref30","author":"heaton","year":"2016","journal-title":"Deep learning in finance"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.187"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2584050"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8079960"},{"key":"ref34","volume":"1","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref60","article-title":"Automatic misogyny identification using neural networks","author":"goenaga","year":"2018","journal-title":"Proceedings of the Third Workshop on Evaluation of Human Language Technologies for Iberian Languages (IberEval 2018) co-located with 34th Conference of the Spanish Society for Natural Language Processing (SEPLN 2018) CEUR Workshop Proceedings CEUR-WS org"},{"key":"ref62","author":"frenda","year":"0","journal-title":"The role of sarcasm in hate speech a multilingual perspective"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.4000\/books.aaccademia.4698"},{"key":"ref28","article-title":"LSTM neural networks for language modeling","author":"sundermeyer","year":"0","journal-title":"Thirteenth Annual Conference of the International Speech Communication Association"},{"key":"ref27","article-title":"Long short-term memory recurrent neural network architectures for large scale acoustic modeling","author":"sak","year":"0","journal-title":"Fifteenth Annual Conference of the International Speech Communication Association"},{"key":"ref29","first-page":"802","article-title":"Convolutional LSTM network: A machine learning approach for precipitation nowcasting","author":"xingjian","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/hypa.12398"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10982-017-9297-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1504\/IJBET.2017.087722"},{"key":"ref22","author":"lynn","year":"2018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2017.04.005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-018-0118-3"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2017.2767063"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2582924"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2018.2840738"},{"key":"ref51","author":"reddi","year":"2018","journal-title":"On the Convergence of Adam and Beyond"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.4000\/books.aaccademia.4497"},{"key":"ref58","author":"de smedt","year":"2018","journal-title":"Multilingual cross-domain perspectives on online hate speech"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.01.002"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.02.082"},{"key":"ref55","first-page":"1228","article-title":"Automatic fall detection of human in video using combination of features","author":"wang","year":"0","journal-title":"Bioinformatics and Biomedicine (BIBM) 2016 IEEE International Conference on"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1038\/ki.2009.92"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/COASE.2017.8256202"},{"key":"ref52","author":"kingma","year":"2014","journal-title":"Adam A method for stochastic optimization"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3078714.3078723"},{"key":"ref11","year":"2018","journal-title":"Toxic twitter - a toxic place for women"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-003-0098-9"},{"key":"ref12","article-title":"Misogynistic language on twitter and sexual violence","author":"fulper","year":"0","journal-title":"Proceedings of the ACM Web Science Workshop on Computational Approaches to Social Modeling (ChASM)"},{"key":"ref13","author":"duggan","year":"2017","journal-title":"Online harassment 2017"},{"key":"ref14","author":"solon","year":"2017","journal-title":"Google's bad week Youtube loses millions as advertising row reaches us"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67256-4_32"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543163"},{"key":"ref17","year":"2018","journal-title":"Get wordy"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1515\/semi.2004.031"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.07.040"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190604981.001.0001"},{"key":"ref3","author":"johnson","year":"2000","journal-title":"The Blackwell Dictionary of Sociology A User's Guide to Sociological Language"},{"key":"ref6","year":"2018","journal-title":"Hate crime"},{"key":"ref5","author":"mullany","year":"2018","journal-title":"Misogyny hate crime evaluation report"},{"key":"ref8","article-title":"Misogyny on twitter","author":"bartlett","year":"2014","journal-title":"Demos"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1353\/fem.2013.0039","article-title":"Gendertrolling: Misogyny adapts to new media","volume":"39","author":"mantilla","year":"2013","journal-title":"Feminist Studies"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-6127"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/22041451.2016.1155338"},{"key":"ref46","first-page":"503","article-title":"Naive bayes for text classification with unbalanced classes","author":"frank","year":"0","journal-title":"European Conference on Principles of Data Mining and Knowledge Discovery"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2004.842481"},{"key":"ref48","author":"seger","year":"2018","journal-title":"An investigation of categorical variable encoding techniques in machine learning binary versus one-hot and feature hashing"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401936"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1198\/004017007000000245"},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.1002\/9781118548387","volume":"398","author":"hosmer","year":"2013","journal-title":"Applied Logistic Regression"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.01.029"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"}],"event":{"name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","location":"Oxford, UK","start":{"date-parts":[[2019,6,3]]},"end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892713\/8899350\/08899669.pdf?arnumber=8899669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:21:25Z","timestamp":1755800485000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8899669\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2019.8899669","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}