{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T20:08:02Z","timestamp":1770754082826,"version":"3.50.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T00:00:00Z","timestamp":1540339200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,24]]},"DOI":"10.1145\/3276954.3276958","type":"proceedings-article","created":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T15:28:39Z","timestamp":1540394919000},"page":"99-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Protecting chatbots from toxic content"],"prefix":"10.1145","author":[{"given":"Guillaume","family":"Baudart","sequence":"first","affiliation":[{"name":"IBM Research, USA"}]},{"given":"Julian","family":"Dolby","sequence":"additional","affiliation":[{"name":"IBM Research, USA"}]},{"given":"Evelyn","family":"Duesterwald","sequence":"additional","affiliation":[{"name":"IBM Research, USA"}]},{"given":"Martin","family":"Hirzel","sequence":"additional","affiliation":[{"name":"IBM Research, USA"}]},{"given":"Avraham","family":"Shinnar","sequence":"additional","affiliation":[{"name":"IBM Research, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/aws.amazon.com\/lambda\/ (Retrieved","year":"2014","unstructured":"Amazon. 2014. Lambda. ( 2014 ). https:\/\/aws.amazon.com\/lambda\/ (Retrieved June 2018). Amazon. 2014. Lambda. (2014). https:\/\/aws.amazon.com\/lambda\/ (Retrieved June 2018)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133850.3133855"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640096"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44202-9_11"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(77)90018-2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/10096-006"},{"key":"e_1_3_2_1_7_1","volume-title":"Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade. In DARPA Information Survivability Conference and Exposition (DISCEX). 119\u2013129","author":"Cowan C.","year":"2000","unstructured":"C. Cowan , F. Waggle , and Calton Pu . 2000 . Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade. In DARPA Information Survivability Conference and Exposition (DISCEX). 119\u2013129 . C. Cowan, F. Waggle, and Calton Pu. 2000. Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade. In DARPA Information Survivability Conference and Exposition (DISCEX). 119\u2013129."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2972206.2972209"},{"key":"e_1_3_2_1_9_1","volume-title":"Conference on Advances in Human Factors in Cybersecurity (AHFE). 237\u2013243","author":"Dutta Saurabh","year":"2017","unstructured":"Saurabh Dutta , Ger Joyce , and Jay Brewer . 2017 . Utilizing Chatbots to Increase the Efficacy of Information Security Practitioners . In Conference on Advances in Human Factors in Cybersecurity (AHFE). 237\u2013243 . Saurabh Dutta, Ger Joyce, and Jay Brewer. 2017. Utilizing Chatbots to Increase the Efficacy of Information Security Practitioners. In Conference on Advances in Human Factors in Cybersecurity (AHFE). 237\u2013243."},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/developers.facebook. com\/docs\/messenger-platform\/ (Retrieved","author":"Platform Messenger","year":"2011","unstructured":"Facebook. 2011. Messenger Platform . ( 2011 ). https:\/\/developers.facebook. com\/docs\/messenger-platform\/ (Retrieved June 2018). Facebook. 2011. Messenger Platform. (2011). https:\/\/developers.facebook. com\/docs\/messenger-platform\/ (Retrieved June 2018)."},{"key":"e_1_3_2_1_11_1","volume-title":"Privacy in Pharmacogenetics: An End-toEnd Case Study of Personalized Warfarin Dosing. In USENIX Security Symposium. 17\u201332","author":"Fredrikson Matthew","year":"2014","unstructured":"Matthew Fredrikson , Eric Lantz , Somesh Jha , Simon Lin , David Page , and Thomas Ristenpart . 2014 . Privacy in Pharmacogenetics: An End-toEnd Case Study of Personalized Warfarin Dosing. In USENIX Security Symposium. 17\u201332 . Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart. 2014. Privacy in Pharmacogenetics: An End-toEnd Case Study of Personalized Warfarin Dosing. In USENIX Security Symposium. 17\u201332."},{"key":"e_1_3_2_1_12_1","volume-title":"Automatically Restructuring Programs for the Web. In Conference on Automated Software Engineering (ASE). 211\u2013222","author":"Graunke Paul T.","year":"2001","unstructured":"Paul T. Graunke , Robert Bruce Findler , Shriram Krishnamurthi , and Matthias Felleisen . 2001 . Automatically Restructuring Programs for the Web. In Conference on Automated Software Engineering (ASE). 211\u2013222 . Paul T. Graunke, Robert Bruce Findler, Shriram Krishnamurthi, and Matthias Felleisen. 2001. Automatically Restructuring Programs for the Web. In Conference on Automated Software Engineering (ASE). 211\u2013222."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001442"},{"key":"e_1_3_2_1_14_1","article-title":"A Programming Model and Foundation for Lineage-Based Distributed Computation","volume":"28","author":"Haller Philipp","year":"2018","unstructured":"Philipp Haller , Heather Miller , and Normen M\u00fcller . 2018 . A Programming Model and Foundation for Lineage-Based Distributed Computation . Journal on Functional Programming (JFP) 28 , e7 (2018). Philipp Haller, Heather Miller, and Normen M\u00fcller. 2018. A Programming Model and Foundation for Lineage-Based Distributed Computation. Journal on Functional Programming (JFP) 28, e7 (2018).","journal-title":"Journal on Functional Programming (JFP)"},{"key":"e_1_3_2_1_15_1","volume-title":"PriBots: Conversational Privacy with Chatbots. In Workshop on the Future of Privacy Indicators (WSF@SOUPS).","author":"Harkous Hamza","year":"2016","unstructured":"Hamza Harkous , Kassem Fawaz , Kang G. Shin , and Karl Aberer . 2016 . PriBots: Conversational Privacy with Chatbots. In Workshop on the Future of Privacy Indicators (WSF@SOUPS). Hamza Harkous, Kassem Fawaz, Kang G. Shin, and Karl Aberer. 2016. PriBots: Conversational Privacy with Chatbots. In Workshop on the Future of Privacy Indicators (WSF@SOUPS)."},{"key":"e_1_3_2_1_16_1","volume-title":"Large Scale Database Scrubbing Using Object Oriented Software Components. In American Medical Informatics Association Annual Symposium (AMIA). 508\u2013512","author":"Robert","unstructured":"Robert L. Herting Jr and Michael R. Barnes. 1998 . Large Scale Database Scrubbing Using Object Oriented Software Components. In American Medical Informatics Association Annual Symposium (AMIA). 508\u2013512 . Robert L. Herting Jr and Michael R. Barnes. 1998. Large Scale Database Scrubbing Using Object Oriented Software Components. In American Medical Informatics Association Annual Symposium (AMIA). 508\u2013512."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Martin Hirzel Louis Mandel Avraham Shinnar J\u00e9r\u00f4me Sim\u00e9on and Mandana Vaziri. 2017. I Can Parse You: Grammars for Dialogs. In Summit oN Advances in Programming Languages (SNAPL). 6:1\u20136:15.  Martin Hirzel Louis Mandel Avraham Shinnar J\u00e9r\u00f4me Sim\u00e9on and Mandana Vaziri. 2017. I Can Parse You: Grammars for Dialogs. In Summit oN Advances in Programming Languages (SNAPL). 6:1\u20136:15.","DOI":"10.1145\/3110253"},{"key":"e_1_3_2_1_18_1","volume-title":"Cloudant NoSQL Database Service. (2008). https:\/\/www.ibm. com\/cloud\/cloudant (Retrieved","author":"IBM.","year":"2018","unstructured":"IBM. 2008. Cloudant NoSQL Database Service. (2008). https:\/\/www.ibm. com\/cloud\/cloudant (Retrieved June 2018 ). IBM. 2008. Cloudant NoSQL Database Service. (2008). https:\/\/www.ibm. com\/cloud\/cloudant (Retrieved June 2018)."},{"key":"e_1_3_2_1_19_1","volume-title":"Cloud Functions. (2016). https:\/\/www.ibm.com\/cloud\/functions (Retrieved","author":"IBM.","year":"2018","unstructured":"IBM. 2016a. Cloud Functions. (2016). https:\/\/www.ibm.com\/cloud\/functions (Retrieved June 2018 ). IBM. 2016a. Cloud Functions. (2016). https:\/\/www.ibm.com\/cloud\/functions (Retrieved June 2018)."},{"key":"e_1_3_2_1_20_1","volume-title":"https:\/\/www.ibm.com\/watson\/ services\/conversation\/ (Retrieved","author":"Watson Assistant IBM.","year":"2016","unstructured":"IBM. 2016b. Watson Assistant . ( 2016 ). https:\/\/www.ibm.com\/watson\/ services\/conversation\/ (Retrieved June 2018). IBM. 2016b. Watson Assistant. (2016). https:\/\/www.ibm.com\/watson\/ services\/conversation\/ (Retrieved June 2018)."},{"key":"e_1_3_2_1_21_1","volume-title":"Watson Tone Analyzer Service. (2016). https:\/\/www.ibm.com\/ watson\/services\/tone-analyzer\/ (Retrieved","author":"IBM.","year":"2018","unstructured":"IBM. 2016c. Watson Tone Analyzer Service. (2016). https:\/\/www.ibm.com\/ watson\/services\/tone-analyzer\/ (Retrieved June 2018 ). IBM. 2016c. Watson Tone Analyzer Service. (2016). https:\/\/www.ibm.com\/ watson\/services\/tone-analyzer\/ (Retrieved June 2018)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.382.0217"},{"key":"e_1_3_2_1_23_1","volume-title":"An Overview of AspectJ. In European Conference for Object-Oriented Programming (ECOOP). 327\u2013354","author":"Kiczales Gregor","unstructured":"Gregor Kiczales , Erik Hilsdale , Jim Hugunin , Mik Kersten , Jeffrey Palm , and William G. Griswold . 2001 . An Overview of AspectJ. In European Conference for Object-Oriented Programming (ECOOP). 327\u2013354 . Gregor Kiczales, Erik Hilsdale, Jim Hugunin, Mik Kersten, Jeffrey Palm, and William G. Griswold. 2001. An Overview of AspectJ. In European Conference for Object-Oriented Programming (ECOOP). 327\u2013354."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592668"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640105"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093157.2093159"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/348941.348985"},{"key":"e_1_3_2_1_28_1","volume-title":"Scarfone","author":"McCallister Erika","year":"2010","unstructured":"Erika McCallister , Timothy Grance , and Karen A . Scarfone . 2010 . Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). National Institute of Standards and Technology Special Publication (NIST-SP) 800-122 (2010). Erika McCallister, Timothy Grance, and Karen A. Scarfone. 2010. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). National Institute of Standards and Technology Special Publication (NIST-SP) 800-122 (2010)."},{"key":"e_1_3_2_1_29_1","volume-title":"Voice Extensible Markup Language (VoiceXML) Version 2.0. (2004). https:\/\/www.w3.org\/TR\/voicexml20\/ (Retrieved","author":"McGlashan Scott","year":"2018","unstructured":"Scott McGlashan , Daniel C. Burnett , Jerry Carter , Peter Danielsen , Jim Ferrans , Andrew Hunt , Bruce Lucas , Brad Porter , Ken Rehor , and Steph Tryphonas . 2004. Voice Extensible Markup Language (VoiceXML) Version 2.0. (2004). https:\/\/www.w3.org\/TR\/voicexml20\/ (Retrieved June 2018 ). Scott McGlashan, Daniel C. Burnett, Jerry Carter, Peter Danielsen, Jim Ferrans, Andrew Hunt, Bruce Lucas, Brad Porter, Ken Rehor, and Steph Tryphonas. 2004. Voice Extensible Markup Language (VoiceXML) Version 2.0. (2004). https:\/\/www.w3.org\/TR\/voicexml20\/ (Retrieved June 2018)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/505282.505285"},{"key":"e_1_3_2_1_31_1","volume-title":"Bot Framework Documentation. (2015). https:\/\/azure. microsoft.com\/en-us\/services\/bot-service\/ (Retrieved","year":"2018","unstructured":"Microsoft. 2015. Bot Framework Documentation. (2015). https:\/\/azure. microsoft.com\/en-us\/services\/bot-service\/ (Retrieved June 2018 ). Microsoft. 2015. Bot Framework Documentation. (2015). https:\/\/azure. microsoft.com\/en-us\/services\/bot-service\/ (Retrieved June 2018)."},{"key":"e_1_3_2_1_32_1","volume-title":"Azure Functions. (2016). https:\/\/functions.azure.com\/ (Retrieved","year":"2018","unstructured":"Microsoft. 2016. Azure Functions. (2016). https:\/\/functions.azure.com\/ (Retrieved June 2018 ). Microsoft. 2016. Azure Functions. (2016). https:\/\/functions.azure.com\/ (Retrieved June 2018)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_35_1","volume-title":"Building Microservices: Designing Fine Grained Systems. O\u2019Reilly.","author":"Newman Sam","year":"2015","unstructured":"Sam Newman . 2015 . Building Microservices: Designing Fine Grained Systems. O\u2019Reilly. Sam Newman. 2015. Building Microservices: Designing Fine Grained Systems. O\u2019Reilly."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Amit Patil K. Marimuthu and R. Niranchana. 2017. Comparative Study of Cloud Platforms to Develop a Chatbot. International Journal of Engineering &amp; Technology 6 3 (2017) 57\u201361.  Amit Patil K. Marimuthu and R. Niranchana. 2017. Comparative Study of Cloud Platforms to Develop a Chatbot. International Journal of Engineering &amp; Technology 6 3 (2017) 57\u201361.","DOI":"10.14419\/ijet.v6i3.7628"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1863543.1863568"},{"key":"e_1_3_2_1_38_1","volume-title":"Block Sensitive Data in Chats. (2016). https: \/\/releasenotes.docs.salesforce.com\/en-us\/winter16\/release-notes\/rn_ live_agent_block_sensitive_data.htm (Retrieved","year":"2018","unstructured":"Salesforce. 2016. Block Sensitive Data in Chats. (2016). https: \/\/releasenotes.docs.salesforce.com\/en-us\/winter16\/release-notes\/rn_ live_agent_block_sensitive_data.htm (Retrieved June 2018 ). Salesforce. 2016. Block Sensitive Data in Chats. (2016). https: \/\/releasenotes.docs.salesforce.com\/en-us\/winter16\/release-notes\/rn_ live_agent_block_sensitive_data.htm (Retrieved June 2018)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866331"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302457"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509554"},{"key":"e_1_3_2_1_42_1","volume-title":"USENIX Security Symposium. 601\u2013618","author":"Tram\u00e8r Florian","year":"2016","unstructured":"Florian Tram\u00e8r , Fan Zhang , Ari Juels , Michael K. Reiter , and Thomas Ristenpart . 2016 . Stealing Machine Learning Models via Prediction APIs . In USENIX Security Symposium. 601\u2013618 . Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction APIs. In USENIX Security Symposium. 601\u2013618."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133850.3133864"},{"key":"e_1_3_2_1_44_1","volume-title":"Programming Perl","author":"Wall Larry","unstructured":"Larry Wall , Tom Christiansen , and Jon Orwant . 2000. Programming Perl ( third ed.). O\u2019Reilly . Larry Wall, Tom Christiansen, and Jon Orwant. 2000. Programming Perl (third ed.). O\u2019Reilly."},{"key":"e_1_3_2_1_45_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/Tay_(bot) (Retrieved","author":"Tay","year":"2016","unstructured":"Wikipedia. 2016. Tay (bot). ( 2016 ). https:\/\/en.wikipedia.org\/wiki\/Tay_(bot) (Retrieved June 2018). Wikipedia. 2016. Tay (bot). (2016). https:\/\/en.wikipedia.org\/wiki\/Tay_(bot) (Retrieved June 2018)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"}],"event":{"name":"SPLASH '18: Conference on Systems, Programming, Languages, and Applications: Software for Humanity","location":"Boston MA USA","acronym":"SPLASH '18","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 2018 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3276954.3276958","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3276954.3276958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:41Z","timestamp":1750208261000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3276954.3276958"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,24]]},"references-count":46,"alternative-id":["10.1145\/3276954.3276958","10.1145\/3276954"],"URL":"https:\/\/doi.org\/10.1145\/3276954.3276958","relation":{},"subject":[],"published":{"date-parts":[[2018,10,24]]},"assertion":[{"value":"2018-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}