{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:45:22Z","timestamp":1771026322023,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:00:00Z","timestamp":1498348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["691025"],"award-info":[{"award-number":["691025"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,25]]},"DOI":"10.1145\/3091478.3091487","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T12:17:13Z","timestamp":1499689033000},"page":"13-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":247,"title":["Mean Birds"],"prefix":"10.1145","author":[{"given":"Despoina","family":"Chatzakou","sequence":"first","affiliation":[{"name":"Aristotle University of Thessaloniki, Thessaloniki, Greece"}]},{"given":"Nicolas","family":"Kourtellis","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]},{"given":"Jeremy","family":"Blackburn","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]},{"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Athena","family":"Vakali","sequence":"additional","affiliation":[{"name":"Aristotle University of Thessaloniki, Thessaloniki, Greece"}]}],"member":"320","published-online":{"date-parts":[[2017,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"goo.gl\/asJgpq","author":"About","year":"2017","unstructured":"About suspended accounts. 2017. ( 2017 ). goo.gl\/asJgpq . About suspended accounts. 2017. (2017). goo.gl\/asJgpq."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187848"},{"key":"e_1_3_2_1_3_1","volume-title":"Statistical Mechanics: Theory and Experiment 10","author":"Blondel V. D.","year":"2011","unstructured":"V. D. Blondel , J. L. Guillaume , R. Lambiotte , and E. Lefebvre . 2011 . The Louvain method for community detection in large networks. Statistical Mechanics: Theory and Experiment 10 (2011). V. D. Blondel, J. L. Guillaume, R. Lambiotte, and E. Lefebvre. 2011. The Louvain method for community detection in large networks. Statistical Mechanics: Theory and Experiment 10 (2011)."},{"key":"e_1_3_2_1_4_1","unstructured":"Cyberbullying Research Center. 2016. (26 November 2016). goo.gl\/7kzSY0.  Cyberbullying Research Center. 2016. (26 November 2016). goo.gl\/7kzSY0."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078714.3078721"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3053890"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACII.2013.68"},{"key":"e_1_3_2_1_8_1","volume-title":"SMOTE: Synthetic Minority Over-sampling Technique. Artificial Intelligence Research 16, 1","author":"Chawla Nitesh V.","year":"2002","unstructured":"Nitesh V. Chawla , Kevin W. Bowyer , Lawrence O. Hall , and W. Philip Kegelmeyer . 2002 . SMOTE: Synthetic Minority Over-sampling Technique. Artificial Intelligence Research 16, 1 (2002). Nitesh V. Chawla, Kevin W. Bowyer, Lawrence O. Hall, and W. Philip Kegelmeyer. 2002. SMOTE: Synthetic Minority Over-sampling Technique. Artificial Intelligence Research 16, 1 (2002)."},{"key":"e_1_3_2_1_9_1","volume-title":"Using random forest to learn imbalanced data","author":"Chen Chao","year":"2004","unstructured":"Chao Chen , Andy Liaw , and Leo Breiman . 2004. Using random forest to learn imbalanced data . University of California , Berkeley ( 2004 ). Chao Chen, Andy Liaw, and Leo Breiman. 2004. Using random forest to learn imbalanced data. University of California, Berkeley (2004)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"C. Chen J. Zhang X. Chen Y. Xiang and W. Zhou. 2015. 6 million spam tweets: A large ground truth for timely Twitter spam detection. In IEEE ICC.  C. Chen J. Zhang X. Chen Y. Xiang and W. Zhou. 2015. 6 million spam tweets: A large ground truth for timely Twitter spam detection. In IEEE ICC.","DOI":"10.1109\/ICC.2015.7249453"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"e_1_3_2_1_12_1","volume-title":"Conor Mc Guckin, and Garry Prentice","author":"Corcoran Lucie","year":"2015","unstructured":"Lucie Corcoran , Conor Mc Guckin, and Garry Prentice . 2015 . Cyberbullying or Cyber Aggression? A Review of Existing Definitions of Cyber-Based Peer-toPeer Aggression. Societies 5, 2 (2015). Lucie Corcoran, Conor Mc Guckin, and Garry Prentice. 2015. Cyberbullying or Cyber Aggression? A Review of Existing Definitions of Cyber-Based Peer-toPeer Aggression. Societies 5, 2 (2015)."},{"key":"e_1_3_2_1_13_1","volume-title":"crowdflower.com","year":"2017","unstructured":"CrowdFlower. 2017. ( 2017 ). crowdflower.com . CrowdFlower. 2017. (2017). crowdflower.com."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Maral Dadvar Dolf Trieschnigg and Franciska Jong. 2014. Experts and machines against bullies: A hybrid approach to detect cyberbullies. In Canadian AI.  Maral Dadvar Dolf Trieschnigg and Franciska Jong. 2014. Experts and machines against bullies: A hybrid approach to detect cyberbullies. In Canadian AI.","DOI":"10.1007\/978-3-319-06483-3_25"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"e_1_3_2_1_16_1","volume-title":"Modeling the detection of Textual Cyberbullying. The Social Mobile Web 11","author":"Dinakar Karthik","year":"2011","unstructured":"Karthik Dinakar , Roi Reichart , and Henry Lieberman . 2011. Modeling the detection of Textual Cyberbullying. The Social Mobile Web 11 ( 2011 ). Karthik Dinakar, Roi Reichart, and Henry Lieberman. 2011. Modeling the detection of Textual Cyberbullying. The Social Mobile Web 11 (2011)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742760"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Maria Giatsoglou Despoina Chatzakou Neil Shah Christos Faloutsos and Athena Vakali. 2015. Reteeting Activity on Twitter: Signs of Deception. In PAKDD.  Maria Giatsoglou Despoina Chatzakou Neil Shah Christos Faloutsos and Athena Vakali. 2015. Reteeting Activity on Twitter: Signs of Deception. In PAKDD.","DOI":"10.1007\/978-3-319-18038-0_10"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1375\/ajgc.20.2.143"},{"key":"e_1_3_2_1_20_1","volume-title":"Donna Denning, and others.","author":"Hanish Laura D.","year":"2004","unstructured":"Laura D. Hanish , Becky Kochenderfer-Ladd , Richard A. Fabes , Carol Lynn Martin , Donna Denning, and others. 2004 . Bullying among young children: The influence of peers and teachers. Bullying in American schools: A social-ecological perspective on prevention and intervention (2004). Laura D. Hanish, Becky Kochenderfer-Ladd, Richard A. Fabes, Carol Lynn Martin, Donna Denning, and others. 2004. Bullying among young children: The influence of peers and teachers. Bullying in American schools: A social-ecological perspective on prevention and intervention (2004)."},{"key":"e_1_3_2_1_21_1","volume-title":"McNeil","author":"Hanley James A.","year":"1982","unstructured":"James A. Hanley and Barbara J . McNeil . 1982 . The meaning and use of the area under a receiver operating characteristic (ROC) curve. Radiology 143, 1 (1982). James A. Hanley and Barbara J. McNeil. 1982. The meaning and use of the area under a receiver operating characteristic (ROC) curve. Radiology 143, 1 (1982)."},{"key":"e_1_3_2_1_22_1","volume-title":"https:\/\/www.hatebase.org\/","author":"Hatebase","year":"2017","unstructured":"Hatebase database. 2017. ( 2017 ). https:\/\/www.hatebase.org\/ . Hatebase database. 2017. (2017). https:\/\/www.hatebase.org\/."},{"key":"e_1_3_2_1_23_1","volume-title":"Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, and Jeremy Blackburn.","author":"Hine Gabriel Emile","year":"2017","unstructured":"Gabriel Emile Hine , Jeremiah Onaolapo , Emiliano De Cristofaro , Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, and Jeremy Blackburn. 2017 . Kek, Cucks , and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web. In ICWSM. Gabriel Emile Hine, Jeremiah Onaolapo, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, and Jeremy Blackburn. 2017. Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web. In ICWSM."},{"key":"e_1_3_2_1_24_1","volume-title":"Towards understanding cyberbullying behavior in a semi-anonymous social network","author":"Hosseinmardi Homa","unstructured":"Homa Hosseinmardi , Richard Han , Qin Lv , Shivakant Mishra , and Amir Ghasemianlangroodi . 2014. Towards understanding cyberbullying behavior in a semi-anonymous social network . In IEEE\/ACM ASONAM. Homa Hosseinmardi, Richard Han, Qin Lv, Shivakant Mishra, and Amir Ghasemianlangroodi. 2014. Towards understanding cyberbullying behavior in a semi-anonymous social network. In IEEE\/ACM ASONAM."},{"key":"e_1_3_2_1_25_1","volume-title":"Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra.","author":"Hosseinmardi Homa","year":"2015","unstructured":"Homa Hosseinmardi , Sabrina Arredondo Mattson , Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015 . Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network. In In SocInfo . Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015. Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network. In In SocInfo."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501025.2501027"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2009.04.009"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741674"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/345966.345982"},{"key":"e_1_3_2_1_30_1","volume-title":"How Reddit's algorithm, governance, and culture support toxic technocultures","author":"Massanari A.","year":"2015","unstructured":"A. Massanari . 2015. # Gamergate and The Fappening : How Reddit's algorithm, governance, and culture support toxic technocultures . New Media & Society ( 2015 ). A. Massanari. 2015. #Gamergate and The Fappening: How Reddit's algorithm, governance, and culture support toxic technocultures. New Media & Society (2015)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1108\/09596110010343666"},{"key":"e_1_3_2_1_32_1","volume-title":"Efficient Estimation of Word Representations in Vector Space. CoRR abs\/1301.3781","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Kai Chen , Greg Corrado , and Jeffrey Dean . 2013. Efficient Estimation of Word Representations in Vector Space. CoRR abs\/1301.3781 ( 2013 ). Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. CoRR abs\/1301.3781 (2013)."},{"key":"e_1_3_2_1_33_1","volume-title":"goo.gl\/n1W6nt. (4","author":"Miller Meagan","year":"2016","unstructured":"Meagan Miller . 2016. goo.gl\/n1W6nt. (4 Oct 2016 ). Meagan Miller. 2016. goo.gl\/n1W6nt. (4 Oct 2016)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29253-8_75"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/375360.375365"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883062"},{"key":"e_1_3_2_1_37_1","volume-title":"goo.gl\/ur1Ind","author":"Swear Words List","year":"2017","unstructured":"List of Swear Words & Curse Words . 2017. ( 2017 ). goo.gl\/ur1Ind . List of Swear Words & Curse Words. 2017. (2017). goo.gl\/ur1Ind."},{"key":"e_1_3_2_1_38_1","unstructured":"Jerrad Arthur Patch. 2015. Detecting bullying on Twitter using emotion lexicons.  Jerrad Arthur Patch. 2015. Detecting bullying on Twitter using emotion lexicons."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/13527266.2013.797778"},{"key":"e_1_3_2_1_40_1","volume-title":"Twitter tries new measures in crackdown on harassment. CNNtech. (7","year":"2017","unstructured":"Pham, Sherisse. 2017. Twitter tries new measures in crackdown on harassment. CNNtech. (7 February 2017 ). goo.gl\/nMi4ZQ. Pham, Sherisse. 2017. Twitter tries new measures in crackdown on harassment. CNNtech. (7 February 2017). goo.gl\/nMi4ZQ."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2013.04.002"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"e_1_3_2_1_43_1","unstructured":"Rozsa Matthew 2016. Twitter trolls are now abusing the company's bottom line. goo.gl\/SryS3k. (2016).  Rozsa Matthew 2016. Twitter trolls are now abusing the company's bottom line. goo.gl\/SryS3k. (2016)."},{"key":"e_1_3_2_1_44_1","volume-title":"Automatic Detection of Cyberbullying from Twitter. IJCSITS 6","author":"Saravanaraj A.","year":"2016","unstructured":"A. Saravanaraj , J. I. Sheeba , and S. Pradeep Devaneyan . 2016. Automatic Detection of Cyberbullying from Twitter. IJCSITS 6 ( 2016 ). A. Saravanaraj, J. I. Sheeba, and S. Pradeep Devaneyan. 2016. Automatic Detection of Cyberbullying from Twitter. IJCSITS 6 (2016)."},{"key":"e_1_3_2_1_45_1","unstructured":"SentiStrength. 2017. http:\/\/sentistrength.wlv.ac.uk\/. (2017).  SentiStrength. 2017. http:\/\/sentistrength.wlv.ac.uk\/. (2017)."},{"key":"e_1_3_2_1_46_1","volume-title":"Cyberbullying: Its nature and impact in secondary school pupils. In Child Psychology and Psychiatry.","author":"Smith P. K.","year":"2008","unstructured":"P. K. Smith , J. Mahdavi , M. Carvalho , S. Fisher , S. Russell , and N. Tippett . 2008 . Cyberbullying: Its nature and impact in secondary school pupils. In Child Psychology and Psychiatry. P. K. Smith, J. Mahdavi, M. Carvalho, S. Fisher, S. Russell, and N. Tippett. 2008. Cyberbullying: Its nature and impact in secondary school pupils. In Child Psychology and Psychiatry."},{"key":"e_1_3_2_1_47_1","unstructured":"stopbullying.gov. 2014. Facts About Bullying. (2014). goo.gl\/in5JJB.  stopbullying.gov. 2014. Facts About Bullying. (2014). goo.gl\/in5JJB."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_49_1","volume-title":"Twitter temporarily limiting users for abusive behaviour. Independent. (16","author":"Sulleyman Aatif","year":"2017","unstructured":"Aatif Sulleyman . 2017. Twitter temporarily limiting users for abusive behaviour. Independent. (16 February 2017 ). goo.gl\/yfJrZn. Aatif Sulleyman. 2017. Twitter temporarily limiting users for abusive behaviour. Independent. (16 February 2017). goo.gl\/yfJrZn."},{"key":"e_1_3_2_1_50_1","unstructured":"The Guardian. 2015. Twitter CEO: We suck at dealing with trolls and abuse. goo.gl\/6CxnwP. (2015).  The Guardian. 2015. Twitter CEO: We suck at dealing with trolls and abuse. goo.gl\/6CxnwP. (2015)."},{"key":"e_1_3_2_1_51_1","unstructured":"The Guardian. 2016. Did trolls cost Twitter 3.5bn and its sale goo.gl\/2IdA5W. (2016).  The Guardian. 2016. Did trolls cost Twitter 3.5bn and its sale goo.gl\/2IdA5W. (2016)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.014"},{"key":"e_1_3_2_1_53_1","volume-title":"https:\/\/inclass.kaggle.com\/c\/si650winter11. (15","author":"Sentiment Classification UMICH","year":"2011","unstructured":"UMICH SI650 - Sentiment Classification . 2011. https:\/\/inclass.kaggle.com\/c\/si650winter11. (15 Apr 2011 ). UMICH SI650 - Sentiment Classification. 2011. https:\/\/inclass.kaggle.com\/c\/si650winter11. (15 Apr 2011)."},{"key":"e_1_3_2_1_54_1","volume-title":"Walter Daelemans, and V\u00e9ronique Hoste.","author":"Hee Cynthia Van","year":"2015","unstructured":"Cynthia Van Hee , Els Lefever , Ben Verhoeven , Julie Mennes , Bart Desmet , Guy De Pauw , Walter Daelemans, and V\u00e9ronique Hoste. 2015 . Automatic detection and prevention of cyberbullying. In Human and Social Analytics . Cynthia Van Hee, Els Lefever, Ben Verhoeven, Julie Mennes, Bart Desmet, Guy De Pauw, Walter Daelemans, and V\u00e9ronique Hoste. 2015. Automatic detection and prevention of cyberbullying. In Human and Social Analytics."},{"key":"e_1_3_2_1_55_1","unstructured":"A. H. Wang. 2010. Don't follow me: Spam detection in Twitter. In SECRYPT.  A. H. Wang. 2010. Don't follow me: Spam detection in Twitter. In SECRYPT."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2346676.2346686"}],"event":{"name":"WebSci '17: ACM Web Science Conference","location":"Troy New York USA","acronym":"WebSci '17","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 2017 ACM on Web Science Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3091478.3091487","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3091478.3091487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:29Z","timestamp":1750217849000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3091478.3091487"}},"subtitle":["Detecting Aggression and Bullying on Twitter"],"short-title":[],"issued":{"date-parts":[[2017,6,25]]},"references-count":56,"alternative-id":["10.1145\/3091478.3091487","10.1145\/3091478"],"URL":"https:\/\/doi.org\/10.1145\/3091478.3091487","relation":{},"subject":[],"published":{"date-parts":[[2017,6,25]]},"assertion":[{"value":"2017-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}