{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:29:55Z","timestamp":1730233795176,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,6]]},"DOI":"10.1109\/icccnt56998.2023.10306709","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T18:54:40Z","timestamp":1700765680000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["HSDH: Detection of Hate Speech on social media with an effective deep neural network for code-mixed Hinglish data"],"prefix":"10.1109","author":[{"given":"Rohit","family":"Kumar Kaliyar","sequence":"first","affiliation":[{"name":"Bennett University,School of Computer Science Engineering and Technology,India"}]},{"given":"Anurag","family":"Goswami","sequence":"additional","affiliation":[{"name":"Bennett University,School of Computer Science Engineering and Technology,India"}]},{"given":"Ujali","family":"Sharma","sequence":"additional","affiliation":[{"name":"Bennett University,School of Computer Science Engineering and Technology,India"}]},{"given":"Kanika","family":"Kanojia","sequence":"additional","affiliation":[{"name":"Indira Gandhi Delhi Technical University for Women,School of AI-DS,India"}]},{"given":"Mohit","family":"Agrawal","sequence":"additional","affiliation":[{"name":"Bennett University,School of Computer Science Engineering and Technology,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5118"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-1105"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-3013"},{"key":"ref4","first-page":"19","article-title":"Detecting hate speech on the world wide web","volume-title":"Proceedings of the second workshop on language in social media","author":"Warner"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107186"},{"article-title":"Resource creation for training and testing of transliteration systems for indian languages","volume-title":"Proceedings of the Seventh International Conference on Language Resources and Evaluation (LREC & 39;10)","author":"Sowmya","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.080"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-05817-y"},{"key":"ref9","first-page":"1","article-title":"Benchmarking aggression identification in social media","volume-title":"Proceedings of the first workshop on trolling, aggression and cyberbullying (TRAC-2018)","author":"Kumar"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT53264.2022.9716428"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3368567.3368584"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15038"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1474"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S19-2007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5118"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/info12010005"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v10i4.3107"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC51459.2021.9415218"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62582-5_20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.36548\/jucct.2020.3.006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3270101.3270103"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2013"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100311"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2011\u20130054"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/RAIT.2016.7507974"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W19-3509"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph8093528"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-3067-5_8"},{"key":"ref31","first-page":"149","article-title":"Machine translation of bilingual hindi-english (hinglish) text","volume-title":"Proceedings of Machine Translation Summit X: Papers","author":"Sinha"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.4000\/books.aaccademia.3085"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-3504"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3614442"},{"key":"ref35","first-page":"1","article-title":"Detection of harassment on web 2.0","volume-title":"Proceedings of the Content Analysis in the WEB","volume":"2","author":"Yin"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2014.01.016"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77116-8_30"},{"key":"ref38","first-page":"115","article-title":"The emergence of grammat-icality in connectionist networks","author":"Allen","year":"1999","journal-title":"The emergence of language"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00290"},{"article-title":"Measuring the reliability of hate speech annotations: The case of the european refugee crisis","year":"2017","author":"Ross","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-5618"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2013"},{"key":"ref43","first-page":"1058","article-title":"Smokey: Automatic recognition of hostile messages","author":"Spertus","year":"1997","journal-title":"Aaai\/iaai"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-3907"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/w16-5805"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20650-4_10"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.4018\/IJDSST.286680"}],"event":{"name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2023,7,6]]},"location":"Delhi, India","end":{"date-parts":[[2023,7,8]]}},"container-title":["2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10306338\/10306339\/10306709.pdf?arnumber=10306709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T01:56:56Z","timestamp":1710381416000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10306709\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,6]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/icccnt56998.2023.10306709","relation":{},"subject":[],"published":{"date-parts":[[2023,7,6]]}}}