{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:53:43Z","timestamp":1726034023453},"reference-count":97,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1016\/j.eswa.2021.114762","type":"journal-article","created":{"date-parts":[[2021,2,24]],"date-time":"2021-02-24T04:26:32Z","timestamp":1614140792000},"page":"114762","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":32,"special_numbering":"C","title":["A probabilistic clustering model for hate speech classification in twitter"],"prefix":"10.1016","volume":"173","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-8889-5985","authenticated-orcid":false,"given":"Femi Emmanuel","family":"Ayo","sequence":"first","affiliation":[]},{"given":"Olusegun","family":"Folorunso","sequence":"additional","affiliation":[]},{"given":"Friday Thomas","family":"Ibharalu","sequence":"additional","affiliation":[]},{"given":"Idowu Ademola","family":"Osinuga","sequence":"additional","affiliation":[]},{"given":"Adebayo","family":"Abayomi-Alli","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2021.114762_b0005","doi-asserted-by":"crossref","first-page":"1078","DOI":"10.1016\/j.ins.2019.10.031","article-title":"A comparative study of machine translation for multilingual sentence-level sentiment analysis","volume":"512","author":"Ara\u00fajo","year":"2020","journal-title":"Information Sciences"},{"issue":"1","key":"10.1016\/j.eswa.2021.114762_b0010","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1111\/coin.12017","article-title":"A survey of techniques for event detection in twitter","volume":"31","author":"Atefeh","year":"2015","journal-title":"Computational Intelligence"},{"key":"10.1016\/j.eswa.2021.114762_b0015","first-page":"337","article-title":"Disambiguating sentiment: An ensemble of humour, sarcasm, and hate speech features for sentiment classification","volume":"2019","author":"Badlani","year":"2019","journal-title":"W-NUT"},{"key":"10.1016\/j.eswa.2021.114762_b0020","series-title":"International Conference of the Italian Association for Artificial Intelligence","first-page":"403","article-title":"Detecting Inappropriate Comments to News","author":"Bellan","year":"2018"},{"key":"10.1016\/j.eswa.2021.114762_b0025","first-page":"45","article-title":"Social big data: Recent achievements and new challenges","volume":"28","author":"Bello-Orgaz","year":"2016","journal-title":"Information FusionElsevier BV. Netherlands"},{"key":"10.1016\/j.eswa.2021.114762_b0030","series-title":"Sentiment knowledge discovery in twitter streaming data","first-page":"1","author":"Bifet","year":"2010"},{"key":"10.1016\/j.eswa.2021.114762_b0035","series-title":"Recent trends in image and signal processing in computer vision","first-page":"243","article-title":"Detection of hate speech and offensive language in twitter data using LSTM model","author":"Bisht","year":"2020"},{"issue":"1","key":"10.1016\/j.eswa.2021.114762_b0040","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1080\/1369118X.2015.1093532","article-title":"Understanding the value of networked publics in radio: Employing digital methods and social network analysis to understand the Twitter publics of two Italian national radio stations","volume":"19","author":"Bonini","year":"2016","journal-title":"Information, Communication & Society, Taylor & Francis"},{"key":"10.1016\/j.eswa.2021.114762_b0045","doi-asserted-by":"crossref","unstructured":"Bosco, C., Felice, D. O., Poletto, F., Sanguinetti, M., & Maurizio, T. (2018). Overview of the EVALITA 2018 hate speech detection task. InEVALITA 2018-Sixth Evaluation Campaign of Natural Language Processing and Speech Tools for Italian(Vol. 2263, pp. 1-9). CEUR.","DOI":"10.4000\/books.aaccademia.4503"},{"key":"10.1016\/j.eswa.2021.114762_b0050","series-title":"Proceedings of the fifth international AAAI conference on weblogs and social","first-page":"458","article-title":"Who should I follow? Recommending people in directed social networks","author":"Brzozowski","year":"2011"},{"issue":"2","key":"10.1016\/j.eswa.2021.114762_b0055","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1002\/poi3.85","article-title":"Cyber hate speech on twitter: An application of machine classification and statistical modeling for policy and decision making","volume":"7","author":"Burnap","year":"2015","journal-title":"Policy & Internet"},{"key":"10.1016\/j.eswa.2021.114762_b0060","doi-asserted-by":"crossref","unstructured":"Castillo, C., Mendoza, M., & Poblete, B. (2011). Information credibility on twitter. InProceedings of the 20th international conference on World wide web, WWW \u201911, ACM, New York, NY, pp. 675\u2013684.","DOI":"10.1145\/1963405.1963500"},{"key":"10.1016\/j.eswa.2021.114762_b0065","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ijinfomgt.2017.11.001","article-title":"Social media analytics: Extracting and visualizing Hilton hotel ratings and reviews from TripAdvisor","volume":"48","author":"Chang","year":"2019","journal-title":"International Journal of Information Management"},{"issue":"1","key":"10.1016\/j.eswa.2021.114762_b0070","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.ijhcs.2006.08.009","article-title":"Mining communities and their relationships in blogs: A study of online hate groups","volume":"65","author":"Chau","year":"2007","journal-title":"International Journal of Human-Computer Studies"},{"key":"10.1016\/j.eswa.2021.114762_b0075","doi-asserted-by":"crossref","unstructured":"Cho, K., Van Merri\u00ebnboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., & Bengio, Y. (2014). Learning phrase representations using RNN encoder\u2013decoder for statistical machine translation. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pages 1724\u20131734, Doha, Qatar. ACL.","DOI":"10.3115\/v1\/D14-1179"},{"key":"10.1016\/j.eswa.2021.114762_b0080","unstructured":"Chung, J., Gulcehre, C., Cho, K., & Bengio, Y. (2014). Empirical evaluation of gated recurrent neural networks on sequence modeling. In NIPS 2014 Workshop on Deep Learning, arXiv preprint arXiv:1412.3555."},{"key":"10.1016\/j.eswa.2021.114762_b0085","doi-asserted-by":"crossref","unstructured":"Cimino, A., De Mattei, L., & Dell\u2019Orletta, F. (2018). Multi-task learning in deep neural networks at evalita 2018.Proceedings of the 6th evaluation campaign of Natural Language Processing and Speech tools for Italian (EVALITA\u201918), Turin, Italy. CEUR.org, pp.86-95.","DOI":"10.4000\/books.aaccademia.4527"},{"key":"10.1016\/j.eswa.2021.114762_b0090","unstructured":"Corazza, M., Menini, S., Arslan, P., Sprugnoli, R., Cabrio, E., Tonelli, S., & Villata, S. (2018). Inriafbk at germeval 2018: Identifying offensive tweets using recurrent neural networks."},{"issue":"2","key":"10.1016\/j.eswa.2021.114762_b0095","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3377323","article-title":"A multilingual evaluation for online hate speech detection","volume":"20","author":"Corazza","year":"2020","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"issue":"2","key":"10.1016\/j.eswa.2021.114762_b0100","doi-asserted-by":"crossref","first-page":"102034","DOI":"10.1016\/j.ipm.2019.04.002","article-title":"An evaluation of document clustering and topic modelling in two online social networks: Twitter and Reddit","volume":"57","author":"Curiskis","year":"2020","journal-title":"Information Processing & Management, Elsevier Ltd., United Kingdom"},{"issue":"4","key":"10.1016\/j.eswa.2021.114762_b0105","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MIS.2009.105","article-title":"A lexicon-enhanced method for sentiment classification: An experiment on online product reviews","volume":"25","author":"Dang","year":"2009","journal-title":"IEEE Intelligent Systems"},{"key":"10.1016\/j.eswa.2021.114762_b0110","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.eswa.2016.11.022","article-title":"Company event popularity for financial markets using Twitter and sentiment analysis","volume":"71","author":"Daniel","year":"2017","journal-title":"Expert Systems with Applications, Elsevier"},{"key":"10.1016\/j.eswa.2021.114762_b0115","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1609\/icwsm.v11i1.14955","article-title":"Automated hate speech detection and the problem of offensive language","author":"Davidson","year":"2017","journal-title":"Eleventh International AAAI Conference on Web and Social Media"},{"key":"10.1016\/j.eswa.2021.114762_b0120","doi-asserted-by":"crossref","unstructured":"de Gibert, O., Perez, N., Garc\u00eda-Pablos, A., & Cuadros, M. (2018). Hate speech dataset from a white supremacy forum.arXiv preprint arXiv:1809.04444.","DOI":"10.18653\/v1\/W18-5102"},{"key":"10.1016\/j.eswa.2021.114762_b0125","doi-asserted-by":"crossref","unstructured":"Earl, J., & Garrett, R. K. (2016). The new information frontier: toward a more nuanced view of social movement communication.Social Movement Studies, Taylor & Francis, pp.1-15.","DOI":"10.1080\/14742837.2016.1192028"},{"issue":"12","key":"10.1016\/j.eswa.2021.114762_b0135","doi-asserted-by":"crossref","first-page":"4180","DOI":"10.3390\/app10124180","article-title":"Time of your hate: The challenge of time in hate speech detection on social media","volume":"10","author":"Florio","year":"2020","journal-title":"Applied Sciences"},{"issue":"4","key":"10.1016\/j.eswa.2021.114762_b0140","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1080\/15536548.2016.1257680","article-title":"Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach","volume":"12","author":"Folorunso","year":"2016","journal-title":"Journal of Information Privacy and Security"},{"key":"10.1016\/j.eswa.2021.114762_b0145","series-title":"Proceedings of the Third Workshop on Abusive Language Online","first-page":"94","article-title":"A hierarchically-labeled Portuguese hate speech dataset","author":"Fortuna","year":"2019"},{"key":"10.1016\/j.eswa.2021.114762_b0150","series-title":"Proceedings of the 10th ACM Conference on Web Science","first-page":"105","article-title":"A unified deep learning architecture for abuse detection","author":"Founta","year":"2019"},{"key":"10.1016\/j.eswa.2021.114762_b0155","series-title":"Twelfth International AAAI Conference on Web and Social Media","article-title":"Large scale crowdsourcing and characterization of twitter abusive behavior","author":"Founta","year":"2018"},{"key":"10.1016\/j.eswa.2021.114762_b0160","unstructured":"Full\u00e9r, R., Hassanein, H., & Ali, A. N. (1996). Neural fuzzy systems: towards IMT-advanced networks.\u00c5bo: \u00c5boakademi xxvii, 275 p. ISBN 95-165-0624-0."},{"issue":"4","key":"10.1016\/j.eswa.2021.114762_b0165","first-page":"215","article-title":"A lexicon-based approach for hate speech detection","volume":"10","author":"Gitari","year":"2015","journal-title":"International Journal of Multimedia and Ubiquitous Engineering, Science and Engineering Research Support Society, South Korea"},{"key":"10.1016\/j.eswa.2021.114762_b0170","unstructured":"Go, A., Bhayani, R., & Huang, L. (2009). Twitter sentiment classification using distant supervision.CS224N project report, Stanford,1(12), 2009."},{"key":"10.1016\/j.eswa.2021.114762_b0175","unstructured":"Greenwood, M. A., Bakir, M. E., Gorrell, G., Song, X., Roberts, I., & Bontcheva, K. (2019). Online Abuse of UK MPs from 2015 to 2019. pp. 1\u201318."},{"key":"10.1016\/j.eswa.2021.114762_b0180","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1016\/j.techfore.2018.09.009","article-title":"Polarization and acculturation in US Election 2016 outcomes\u2013Can twitter analytics predict changes in voting preferences","volume":"145","author":"Grover","year":"2019","journal-title":"Technological Forecasting and Social Change, Elsevier BV, Netherlands"},{"key":"10.1016\/j.eswa.2021.114762_b0185","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1016\/j.procs.2017.11.293","article-title":"Applying fuzzy logic for sentiment analysis of social media network data in marketing","volume":"120","author":"Howells","year":"2017","journal-title":"Procedia Computer science"},{"key":"10.1016\/j.eswa.2021.114762_b0190","unstructured":"Huang, X., Xing, L., Dernoncourt, F., & Paul, M. J. (2020). Multilingual twitter corpus and baselines for evaluating demographic bias in hate speech recognition. arXiv preprint arXiv:2002.10361."},{"key":"10.1016\/j.eswa.2021.114762_b0195","doi-asserted-by":"crossref","unstructured":"Hurlock, J., & Wilson, M. L. (2011). Searching Twitter: Separating the Tweet from the Chaff. In International AAAI Conference on Weblogs and Social Media, Barcelona, Spain, pp. 161\u2013168.","DOI":"10.1609\/icwsm.v5i1.14117"},{"key":"10.1016\/j.eswa.2021.114762_b0200","series-title":"Proceedings of the Third Workshop on Abusive Language Online","first-page":"46","article-title":"Multi-label hate speech and abusive language detection in Indonesian twitter","author":"Ibrohim","year":"2019"},{"key":"10.1016\/j.eswa.2021.114762_b0205","series-title":"Proceedings of the 13th International Workshop on Semantic Evaluation","first-page":"460","article-title":"Multilingual detection of hate speech against immigrants and women in Twitter at SemEval-2019 Task 5: Frequency analysis interpolation for hate in speech detection","author":"i-Orts","year":"2019"},{"issue":"11","key":"10.1016\/j.eswa.2021.114762_b0210","doi-asserted-by":"crossref","first-page":"2169","DOI":"10.1002\/asi.21149","article-title":"Twitter power: Tweets as electronic word of mouth","volume":"60","author":"Jansen","year":"2009","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"10.1016\/j.eswa.2021.114762_b0215","unstructured":"Jiang, L., Yu, M., Zhou, M., Liu, X., & Zhao, T. (2011). Target-dependent twitter sentiment classification. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, 1, 151\u201360. Stroudsburg, PA: Association for Computational Linguistics."},{"issue":"1","key":"10.1016\/j.eswa.2021.114762_b0220","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.bushor.2009.09.003","article-title":"Users of the world, unite! The challenges and opportunities of Social Media","volume":"53","author":"Kaplan","year":"2010","journal-title":"Business Horizons, Elsevier"},{"key":"10.1016\/j.eswa.2021.114762_b0225","series-title":"International Conference on Communications (ICC)","first-page":"1","article-title":"Combining hidden Markov models for anomaly detection","author":"Khreich","year":"2009"},{"key":"10.1016\/j.eswa.2021.114762_b0230","doi-asserted-by":"crossref","unstructured":"Kwak, H., Lee, C., Park, H., & Moon, S. (2010). What is Twitter, a social network or a news media? In Proceedings of the 19th international conference on World wide web, New York, NY, ACM, pp. 591\u2013600.","DOI":"10.1145\/1772690.1772751"},{"key":"10.1016\/j.eswa.2021.114762_b0235","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1609\/aaai.v27i1.8539","article-title":"Locate the hate: Detecting tweets against blacks","author":"Kwok","year":"2013","journal-title":"Twenty-seventh AAAI Conference on Artificial Intelligence"},{"key":"10.1016\/j.eswa.2021.114762_b0240","doi-asserted-by":"crossref","first-page":"106188","DOI":"10.1016\/j.chb.2019.106188","article-title":"Is the message the medium? How politicians\u2019 Twitter blunders affect perceived authenticity of Twitter communication","volume":"104","author":"Lee","year":"2020","journal-title":"Computers in Human Behavior, Elsevier Ltd, United Kingdom"},{"key":"10.1016\/j.eswa.2021.114762_b0245","unstructured":"Lee, K., Eoff, B. D., & Caverlee, J. (2011). Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter. In International AAAI Conference on Weblogs and Social Media, Barcelona, Spain."},{"key":"10.1016\/j.eswa.2021.114762_b0250","series-title":"Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence","article-title":"Emoticon smoothed language models for Twitter sentiment analysis","author":"Liu","year":"2012"},{"key":"10.1016\/j.eswa.2021.114762_b0255","series-title":"Twelfth International AAAI Conference on Web and Social Media","article-title":"Forecasting the presence and intensity of hostility on Instagram using linguistic and social features","author":"Liu","year":"2018"},{"issue":"2","key":"10.1016\/j.eswa.2021.114762_b0260","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1007\/s11069-017-3155-1","article-title":"Online communication behavior at the onset of a catastrophe: An exploratory study of the 2008 Wenchan earthquake in China","volume":"91","author":"Lu","year":"2018","journal-title":"Natural Hazards, Netherlands, Springer"},{"key":"10.1016\/j.eswa.2021.114762_b0265","series-title":"System Sciences (HICSS), 2014 47th Hawaii International Conference on IEEE","first-page":"1715","article-title":"Government and social media: A case study of 31 informational world cities","author":"Mainka","year":"2014"},{"key":"10.1016\/j.eswa.2021.114762_b0270","doi-asserted-by":"crossref","unstructured":"Maynard, D., & Funk, A. (2012). Automatic detection of political opinions in tweets. In R. Gar\u0107 \u0131a-Castro, D. Fensel, and Antoniou, G. (eds.), The Semantic Web: ESWC 2011 Workshops, Lecture Notes in Computer Science, 7117, 88\u201399. Berlin\/Heidelberg: Springer.","DOI":"10.1007\/978-3-642-25953-1_8"},{"key":"10.1016\/j.eswa.2021.114762_b0275","doi-asserted-by":"crossref","unstructured":"Medina, R. Z., & Diaz, J. C. L. (2016). Social Media Use in Crisis Communication Management: An Opportunity for Local Communities? Social Media and Local Governments. Springer International Publishing, pp. 321\u2013335.","DOI":"10.1007\/978-3-319-17722-9_17"},{"issue":"4","key":"10.1016\/j.eswa.2021.114762_b0280","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1093\/ijl\/3.4.235","article-title":"Introduction to WordNet: An on-line lexical database","volume":"3","author":"Miller","year":"1990","journal-title":"International Journal of Lexicography, Oxford University Press"},{"key":"10.1016\/j.eswa.2021.114762_b0285","series-title":"Proceedings of the Third Workshop on Abusive Language Online","first-page":"111","article-title":"L-HSAB: A Levantine Twitter dataset for hate speech and abusive language","author":"Mulki","year":"2019"},{"key":"10.1016\/j.eswa.2021.114762_b0290","doi-asserted-by":"crossref","unstructured":"Nejad, M. Y., Delghandi, M. S., Bali, A. O., & Hosseinzadeh, M. (2020). Using Twitter to raise the profile of childhood cancer awareness month. Network Modeling Analysis in Health Informatics and Bioinformatics, 9(3), 1\u20135. Springer Nature, United States.","DOI":"10.1007\/s13721-019-0206-4"},{"key":"10.1016\/j.eswa.2021.114762_b0295","doi-asserted-by":"crossref","unstructured":"Nip, J. Y., & Fu, K. W. (2016). Networked framing between source posts and their reposts: an analysis of public opinion on China's microblogs. Information, Communication & Society, 19(8), 1127\u20131149.","DOI":"10.1080\/1369118X.2015.1104372"},{"issue":"6","key":"10.1016\/j.eswa.2021.114762_b0300","first-page":"380","article-title":"Using of Jaccard coefficient for keywords similarity","volume":"1","author":"Niwattanakul","year":"2013","journal-title":"Proceedings of the International Multiconference of Engineers and Computer Scientists"},{"key":"10.1016\/j.eswa.2021.114762_b0305","unstructured":"Nockleby, J. T. (2000). Hate speech.In Encyclopedia of the American Constitution (2nd ed., edited by Leonard W. Levy, Kenneth L. Karst et al.). New York: Macmillan, 3, 1277\u20131279."},{"key":"10.1016\/j.eswa.2021.114762_b0310","unstructured":"Pak, A., & Paroubek, P. (2010). Twitter as a corpus for sentiment analysis and opinion mining. In N. C. C. Chair, K. Choukri, B. Maegaard, J. Mariani, J. Odijk, Sentiment analysis in Twitter 27 S, Piperidis, M. Rosner, and D. Tapias (eds.), In Proceedings of the Seventh Conference on International Language Resources and Evaluation (LREC\u201910), Valletta, Malta; ELRA, European Language Resources Association. pp. 19\u201321."},{"key":"10.1016\/j.eswa.2021.114762_b0320","doi-asserted-by":"crossref","unstructured":"Pang, B., & Lee, L. (2008). Opinion mining and sentiment analysis.Foundations and Trends\u00ae in Information Retrieval,Hanover, MA, USA, 2(1\u20132), 1-135.","DOI":"10.1561\/1500000011"},{"key":"10.1016\/j.eswa.2021.114762_b0325","doi-asserted-by":"crossref","unstructured":"Park, J. H., Shin, J., & Fung, P. (2018). Reducing gender bias in abusive language detection. In Proceedings of the 2018 Conference on EMNLP, pp. 2799\u20132804.","DOI":"10.18653\/v1\/D18-1302"},{"issue":"2","key":"10.1016\/j.eswa.2021.114762_b0330","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3371276","article-title":"MANDOLA: A big-data processing and visualization platform for monitoring and detecting online hate speech","volume":"20","author":"Paschalides","year":"2020","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"10.1016\/j.eswa.2021.114762_b0335","unstructured":"Pitsilis, G. K., Ramampiaro, H., & Langseth, H. (2018). Detecting offensive language in tweets using deep learning.arXiv preprint arXiv:1801.04433. pp. 1\u201317."},{"key":"10.1016\/j.eswa.2021.114762_b0340","unstructured":"Polignano, M., Basile, P., de Gemmis, M., & Semeraro, G. (2019). Hate Speech Detection through AlBERTo Italian Language Understanding Model. In 3rd Workshop on Natural Language for Artificial Intelligence (NL4AI) at the 18th International Conference of the Italian Association for Artificial Intelligence, NL4AI@ AI* IA. Rende, Italy, pp. 1\u201313."},{"key":"10.1016\/j.eswa.2021.114762_b0345","unstructured":"Ptaszynski, M., Pieciukiewicz, A., & Dyba\u0142a, P. (2019). Results of the PolEval 2019 Shared Task 6: First dataset and open shared task for automatic cyberbullying detection in Polish Twitter.Proceedings of the PolEval 2019 Workshop, 89p."},{"key":"10.1016\/j.eswa.2021.114762_b0350","doi-asserted-by":"crossref","unstructured":"Ribeiro, A., & Silva, N. (2019). INF-HatEval at SemEval-2019 Task 5: Convolutional neural networks for hate speech detection against women and immigrants on Twitter. InProceedings of the 13th International Workshop on Semantic Evaluation(pp. 420-425).","DOI":"10.18653\/v1\/S19-2074"},{"key":"10.1016\/j.eswa.2021.114762_b0355","first-page":"676","article-title":"Characterizing and detecting hateful users on twitter","author":"Ribeiro","year":"2018","journal-title":"Twelfth International AAAI Conference on Web and Social Media"},{"key":"10.1016\/j.eswa.2021.114762_b0360","doi-asserted-by":"crossref","unstructured":"Sakaki, T., Okazaki, M., & Matsuo, Y. 2010. Earthquake shakes Twitter users: real-time event detection by social sensors. InProceedings of the 19th international conference on World wide web, WWW \u201910, New York, NY: ACM, pp. 851\u2013860.","DOI":"10.1145\/1772690.1772777"},{"key":"10.1016\/j.eswa.2021.114762_b0365","unstructured":"Sanguinetti, M., Poletto, F., Bosco, C., Patti, V., & Stranisci, M. (2018). An italian twitter corpus of hate speech against immigrants. InProceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018)."},{"key":"10.1016\/j.eswa.2021.114762_b9000","series-title":"Proceedings of the 17th acm sigspatial international conference on advances in geographic information systems, ACM","first-page":"42","article-title":"Twitterstand: news in tweets","author":"Sankaranarayanan","year":"2009"},{"key":"10.1016\/j.eswa.2021.114762_b0370","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.ijnurstu.2016.02.004","article-title":"Using Twitter\u2122 to drive research impact: A discussion of strategies, opportunities and challenges","volume":"59","author":"Schnitzler","year":"2016","journal-title":"International Journal of Nursing Studies"},{"key":"10.1016\/j.eswa.2021.114762_b0375","doi-asserted-by":"crossref","unstructured":"Schwartz, R., Imai, T., Kubala, F., Nguyen, L., & Makhoul, J. (1997). A maximum likelihood model for topic classification of broadcast news. In Proc.Fifth European Conference on Speech Communication and Technology, Rhodes, Greece, 3, pp. 1455\u20131458.","DOI":"10.21437\/Eurospeech.1997-422"},{"key":"10.1016\/j.eswa.2021.114762_b0380","series-title":"Proceedings of the First Workshop on Abusive Language Online","first-page":"36","article-title":"Class-based prediction errors to detect hate speech with out-of-vocabulary words","author":"Serra","year":"2017"},{"key":"10.1016\/j.eswa.2021.114762_b0385","doi-asserted-by":"crossref","unstructured":"Setyadi, N. A., Nasrun, M., & Setianingsih, C. (2018). Text analysis for hate speech detection using backpropagation neural network. In 2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC) (pp. 159\u2013165). IEEE.","DOI":"10.1109\/ICCEREC.2018.8712109"},{"key":"10.1016\/j.eswa.2021.114762_b0390","series-title":"Proceedings of the 13th International Workshop on Semantic Evaluation","first-page":"365","article-title":"Kdehateval at semeval-2019 task 5: A neural network model for detecting hate speech in twitter","author":"Siddiqua","year":"2019"},{"issue":"1","key":"10.1016\/j.eswa.2021.114762_b0395","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/951787.951766","article-title":"On the construction of effective vocabularies for information retrieval","volume":"10","author":"Salton","year":"1973","journal-title":"ACM Sigplan Notices"},{"issue":"2-3","key":"10.1016\/j.eswa.2021.114762_b0400","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1080\/00437956.1954.11659520","article-title":"Distributional structure","volume":"10","author":"Harris","year":"1954","journal-title":"Word"},{"issue":"1","key":"10.1016\/j.eswa.2021.114762_b0405","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1108\/eb026526","article-title":"A statistical interpretation of term specificity and its application in retrieval","volume":"28","author":"Jones","year":"1972","journal-title":"Journal of Documentation"},{"issue":"1","key":"10.1016\/j.eswa.2021.114762_b0410","first-page":"525","article-title":"A comparison of document clustering techniques","volume":"400","author":"Steinbach","year":"2000","journal-title":"KDD Workshop on Text Mining, Boston, MA"},{"issue":"2","key":"10.1016\/j.eswa.2021.114762_b0415","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.adengl.2016.01.002","article-title":"e-Dermatology: Social networks and other web based tools","volume":"107","author":"Taberner","year":"2016","journal-title":"Actas Dermo-Sifiliogr\u00e1ficas (English Edition), Elsevier"},{"key":"10.1016\/j.eswa.2021.114762_b0420","series-title":"Proceedings of the 5th International Conference on Language Resources and Evaluation (LREC)","first-page":"427","article-title":"Creating semantic orientation dictionaries","author":"Taboada","year":"2006"},{"key":"10.1016\/j.eswa.2021.114762_b0425","doi-asserted-by":"crossref","unstructured":"Tian, D., Gledson, A., Antoniades, A., Aristodimou, A., Dimitrios, N., Sahay, R., & Keane, J. (2013). A Bayesian association rule mining algorithm. In Systems, Man, and Cybernetics (SMC): IEEE International Conference, pp. 3258\u20133264.","DOI":"10.1109\/SMC.2013.555"},{"key":"10.1016\/j.eswa.2021.114762_b0430","unstructured":"Wang, L. X. (1994). Adaptive fuzzy systems and control. Design and stability analysis. Englewood Cliffs, N.J: Prentice Hall, 1994, xxvii, 275 p. ISBN 978-013-1471-092."},{"key":"10.1016\/j.eswa.2021.114762_b0435","series-title":"International conference on social computing, behavioral-cultural modeling, and prediction, SBP\u201912","first-page":"231","article-title":"Automatic crime prediction using events extracted from twitter posts","author":"Wang","year":"2012"},{"key":"10.1016\/j.eswa.2021.114762_b0440","unstructured":"Warner, W., & Hirschberg, J. (2012). Detecting hate speech on the World Wide Web. In Proceedings of the second workshop on language in social media. Association for Computational Linguistics. pp. 19\u201326."},{"key":"10.1016\/j.eswa.2021.114762_b0445","series-title":"Proceedings of the NAACL student research workshop","first-page":"88","article-title":"Hateful symbols or hateful people? Predictive features for hate speech detection on twitter","author":"Waseem","year":"2016"},{"issue":"1","key":"10.1016\/j.eswa.2021.114762_b0450","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.chb.2011.09.001","article-title":"A social network as information: The effect of system generated reports of connectedness on credibility on Twitter","volume":"28","author":"Westerman","year":"2012","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.eswa.2021.114762_b0455","series-title":"Proceedings of the 13th International Workshop on Semantic Evaluation","first-page":"782","article-title":"UHH-LT at SemEval-2019 task 6: Supervised vs. unsupervised transfer learning for offensive language detection","author":"Wiedemann","year":"2019"},{"key":"10.1016\/j.eswa.2021.114762_b0460","unstructured":"Wiegand, M., Siegel, M., & Ruppenhofer, J. (2018). Overview of the germeval 2018 shared task on the identification of offensive language."},{"key":"10.1016\/j.eswa.2021.114762_b0465","series-title":"Proceedings of the 13th International Workshop on Semantic Evaluation","first-page":"431","article-title":"Know-center at SemEval-2019 Task 5: Multilingual hate speech detection on Twitter using CNNs","author":"Winter","year":"2019"},{"key":"10.1016\/j.eswa.2021.114762_b0470","series-title":"Proceedings of the 26th International Conference on World Wide Web","first-page":"1391","article-title":"Ex machina: Personal attacks seen at scale","author":"Wulczyn","year":"2017"},{"issue":"3","key":"10.1016\/j.eswa.2021.114762_b0475","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","article-title":"Fuzzy sets","volume":"8","author":"Zadeh","year":"1965","journal-title":"Information and Control"},{"issue":"1","key":"10.1016\/j.eswa.2021.114762_b0480","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/0020-0255(75)90017-1","article-title":"The concept of a linguistic variable and its application to approximate reasoning-III","volume":"9","author":"Zadeh","year":"1975","journal-title":"Information sciences"},{"key":"10.1016\/j.eswa.2021.114762_b0485","doi-asserted-by":"crossref","unstructured":"Zampieri, M., Malmasi, S., Nakov, P., Rosenthal, S., Farra, N., & Kumar, R. (2019). Semeval-2019 task 6: Identifying and categorizing offensive language in social media (offenseval).arXiv preprint arXiv:1903.08983.","DOI":"10.18653\/v1\/S19-2010"},{"key":"10.1016\/j.eswa.2021.114762_b0490","unstructured":"Zhang, L., Ghosh, R., Dekhil, M., Hsu, M., & Liu, B. 2011. Combining lexicon-based and learning-based methods for Twitter sentiment analysis. Technical Report HPL-2011-89."}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417421002037?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417421002037?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T03:43:01Z","timestamp":1714534981000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417421002037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":97,"alternative-id":["S0957417421002037"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2021.114762","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2021,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A probabilistic clustering model for hate speech classification in twitter","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2021.114762","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"114762"}}