{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T03:38:22Z","timestamp":1777001902153,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T00:00:00Z","timestamp":1629849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["201908510140"],"award-info":[{"award-number":["201908510140"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,25]]},"DOI":"10.1145\/3465336.3475102","type":"proceedings-article","created":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T21:11:41Z","timestamp":1629925901000},"page":"217-223","source":"Crossref","is-referenced-by-count":12,"title":["Cross-lingual Capsule Network for Hate Speech Detection in Social Media"],"prefix":"10.1145","author":[{"given":"Aiqi","family":"Jiang","sequence":"first","affiliation":[{"name":"Queen Mary University of London, London, United Kingdom"}]},{"given":"Arkaitz","family":"Zubiaga","sequence":"additional","affiliation":[{"name":"Queen Mary University of London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2021,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Hate speech detection is not as easy as you may think: A closer look at model validation (extended version). Information Systems","author":"Arango Aym\u00e9","year":"2020"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00288"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","first-page":"206","DOI":"10.4000\/books.aaccademia.4734","article-title":"CrotoneMilano for AMI at Evalita2018. A performant, cross-lingual misogyny detection system","volume":"12","author":"Basile Angelo","year":"2018","journal-title":"EVALITA Evaluation of NLP and Speech Tools for Italian"},{"key":"e_1_3_2_1_4_1","volume-title":"5th Italian Conference on Computational Linguistics, CLiC-it","volume":"2253","author":"Bassignana Elisa","year":"2018"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-016-0072-6"},{"key":"e_1_3_2_1_6_1","volume-title":"2010 AAAI Fall Symposium Series.","author":"Cambria Erik","year":"2010"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics","author":"Chen Xilun","year":"2019"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers). Association for Computational Linguistics","author":"Chen Yanqing","year":"2014"},{"key":"e_1_3_2_1_9_1","volume-title":"Emoji-Powered Representation Learning for Cross-Lingual Sentiment Classification. In The World Wide Web Conference, WWW 2019","author":"Chen Zhenpeng","year":"2019"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.747"},{"key":"e_1_3_2_1_12_1","volume-title":"Support-vector networks. Machine learning","author":"Cortes Corinna","year":"1995"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Third Workshop on Abusive Language Online. Association for Computational Linguistics","author":"Davidson Thomas","year":"2019"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","volume":"1","author":"Devlin Jacob","year":"2019"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics","author":"Faruqui Manaal"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Elisabetta Fersini Debora Nozza and Paolo Rosso. 2018a. Overview of the Evalita 2018 Task on Automatic Misogyny Identification (AMI).. In EVALITA@ CLiC-it.  Elisabetta Fersini Debora Nozza and Paolo Rosso. 2018a. Overview of the Evalita 2018 Task on Automatic Misogyny Identification (AMI).. In EVALITA@ CLiC-it.","DOI":"10.4000\/books.aaccademia.4497"},{"key":"e_1_3_2_1_17_1","volume-title":"Overview of the Task on Automatic Misogyny Identification at IberEval","author":"Fersini Elisabetta","year":"2018"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3232676"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 28th International Conference on Computational Linguistics. International Committee on Computational Linguistics, Barcelona, Spain (Online), 6350--6365","author":"Glavavs Goran","year":"2020"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC","author":"Grave Edouard","year":"2018"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"e_1_3_2_1_22_1","volume-title":"6th International Conference on Learning Representations, ICLR","author":"Hinton Geoffrey E.","year":"2018"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_2_1_24_1","volume-title":"6th International Conference on Learning Representations, ICLR","author":"Lample Guillaume","year":"2018"},{"key":"e_1_3_2_1_25_1","unstructured":"Binny Mathew Navish Kumar Pawan Goyal Animesh Mukherjee etal 2018. Analyzing the hate and counter speech accounts on twitter. arXiv preprint arXiv:1812.02712 (2018).  Binny Mathew Navish Kumar Pawan Goyal Animesh Mukherjee et al. 2018. Analyzing the hate and counter speech accounts on twitter. arXiv preprint arXiv:1812.02712 (2018)."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP)","author":"Ousidhoum Nedjma","year":"1865"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102360"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics: Student Research Workshop. Association for Computational Linguistics","author":"Pamungkas Endang Wahyu","year":"2019"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP). Association for Computational Linguistics, Online, 5838--5844","author":"Ranasinghe Tharindu","year":"2020"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 18th International Conference on Advances in Mobile Computing & Multimedia. 3--10","author":"Rezvani Nabi","year":"2020"},{"key":"e_1_3_2_1_31_1","volume-title":"Dynamic Routing Between Capsules. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017","author":"Sabour Sara","year":"2017"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-1101"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the Third Workshop on Abusive Language Online. Association for Computational Linguistics","author":"Srivastava Saurabh","year":"2019"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the First Workshop on Trolling, Aggression and Cyberbullying (TRAC-2018)","author":"Srivastava Saurabh","year":"2018"},{"key":"e_1_3_2_1_35_1","volume-title":"Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017","author":"Vaswani Ashish","year":"2017"},{"key":"e_1_3_2_1_36_1","first-page":"1","article-title":"Directions in Abusive Language Training Data: Garbage In","volume":"15","author":"Vidgen Bertie","year":"2021","journal-title":"Garbage Out. PLOS ONE"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-5618"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2013"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.598"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics","author":"Zhao Wei","year":"2018"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Association for Computational Linguistics","author":"Zhou Xinjie","year":"2016"}],"event":{"name":"HT '21: 32nd ACM Conference on Hypertext and Social Media","location":"Virtual Event USA","acronym":"HT '21","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 32st ACM Conference on Hypertext and Social Media"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465336.3475102","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:12Z","timestamp":1750191432000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465336.3475102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,25]]},"references-count":41,"alternative-id":["10.1145\/3465336.3475102","10.1145\/3465336"],"URL":"https:\/\/doi.org\/10.1145\/3465336.3475102","relation":{},"subject":[],"published":{"date-parts":[[2021,8,25]]}}}