{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T06:09:00Z","timestamp":1744870140769,"version":"3.29.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10724896","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Hate Speech Detection using Machine Learning Techniques"],"prefix":"10.1109","author":[{"given":"Anchal","family":"Rawat","sequence":"first","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India"}]},{"given":"Santosh","family":"Kumar","sequence":"additional","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India"}]},{"given":"Surender Singh","family":"Samant","sequence":"additional","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India"}]}],"member":"263","reference":[{"article-title":"E-JASL: The Electronic Journal of Academic and Special Librarianship Library 2.0 and the Problem of Hate Speech Library 2.0 and the Problem of Hate Speech","year":"1999","author":"Brown-Sica","key":"ref1"},{"key":"ref2","first-page":"36","article-title":"False Information on Web and Social Media: A Survey","author":"Kumar","year":"2018","journal-title":"IEEE Computer Society"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.deveng.2017.11.001"},{"article-title":"A Deep Learning Approach for Multimodal Deception Detection","year":"2018","author":"Krishnamurthy","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.2015.145052010082"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-016-0072-6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14257\/ijmue.2015.10.4.21"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v27i1.8539","article-title":"Locate the Hate: Detecting Tweets against Blacks","author":"Kwok","year":"2013"},{"article-title":"Degree based Classification of Harmful Speech using Twitter Data","year":"2018","author":"Sharma","key":"ref9"},{"author":"Cavnar","key":"ref10","article-title":"N-Gram-Based Text Categorization"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.18653\/v1\/N16-2013","article-title":"Hateful Symbols or Hateful People? Predictive Features for Hate Speech Detection on Twitter","author":"Waseem","year":"2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883062"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.26615\/978-954-452-049-6_062","article-title":"Detecting Hate Speech in Social Media","author":"Malmasi","year":"2017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"article-title":"Discussing the Value of Automatic Hate Speech Detection in Online Debates","year":"2018","author":"Koeffer","key":"ref15"},{"article-title":"Offensive Language and Hate Speech Detection for Danish","year":"2020","author":"Sigurbergsson","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14704\/web\/v18si05\/web18272"},{"key":"ref18","article-title":"A Survey on Hate Speech Detection using Natural Language Processing","author":"Schmidt","year":"2017","journal-title":"Association for Computational Linguistics"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2020.0110861"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ic2pct60090.2024.10486236"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TEECCON59234.2023.10335808"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS57279.2023.10113060"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2024,6,24]]},"location":"Kamand, India","end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10724896.pdf?arnumber=10724896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T06:56:25Z","timestamp":1732690585000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10724896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10724896","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}