{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:43:50Z","timestamp":1730321030870,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308558.3313431","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"2771-2777","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Context-Sensitive Malicious Spelling Error Correction"],"prefix":"10.1145","author":[{"given":"Hongyu","family":"Gong","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Yuchen","family":"Li","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Suma","family":"Bhat","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Pramod","family":"Viswanath","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. AbiWord. Available at: https:\/\/www.abisource.com. 2018. AbiWord. Available at: https:\/\/www.abisource.com."},{"key":"e_1_3_2_1_2_1","unstructured":"2018. Google Search Engine. Available at: https:\/\/www.google.com. 2018. Google Search Engine. Available at: https:\/\/www.google.com."},{"volume-title":"Deep Learning for Detecting Cyberbullying Across Multiple Social Media Platforms. In European Conference on Information Retrieval. Springer, 141-153","year":"2018","author":"Agrawal Sweta","key":"e_1_3_2_1_3_1","unstructured":"Sweta Agrawal and Amit Awekar . 2018 . Deep Learning for Detecting Cyberbullying Across Multiple Social Media Platforms. In European Conference on Information Retrieval. Springer, 141-153 . Sweta Agrawal and Amit Awekar. 2018. Deep Learning for Detecting Cyberbullying Across Multiple Social Media Platforms. In European Conference on Information Retrieval. Springer, 141-153."},{"key":"e_1_3_2_1_4_1","first-page":"183 13","volume-title":"Proceedings of the Seventeenth Conference on Computational Natural Language Learning. Association for Computational Linguistics","author":"Al-Rfou Rami","year":"2013","unstructured":"Rami Al-Rfou , Bryan Perozzi , and Steven Skiena . 2013 . Polyglot: Distributed Word Representations for Multilingual NLP . In Proceedings of the Seventeenth Conference on Computational Natural Language Learning. Association for Computational Linguistics , Sofia, Bulgaria , 183 - 192 . http:\/\/www.aclweb.org\/anthology\/W 13 - 3520 Rami Al-Rfou, Bryan Perozzi, and Steven Skiena. 2013. Polyglot: Distributed Word Representations for Multilingual NLP. In Proceedings of the Seventeenth Conference on Computational Natural Language Learning. Association for Computational Linguistics, Sofia, Bulgaria, 183-192. http:\/\/www.aclweb.org\/anthology\/W13-3520"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S17-2126"},{"key":"e_1_3_2_1_6_1","unstructured":"Noah Coad. 2018. Google Spell Check. Available at: https:\/\/github.com\/noahcoad\/google-spell-check. Noah Coad. 2018. Google Spell Check. Available at: https:\/\/github.com\/noahcoad\/google-spell-check."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/363958.363994"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Noura Farra Nadi Tomeh Alla Rozovskaya and Nizar Habash. 2014. Generalized Character-Level Spelling Error Correction.. In ACL (2). 161-167. Noura Farra Nadi Tomeh Alla Rozovskaya and Nizar Habash. 2014. Generalized Character-Level Spelling Error Correction.. In ACL (2). 161-167.","DOI":"10.3115\/v1\/P14-2027"},{"key":"e_1_3_2_1_9_1","unstructured":"Shaona Ghosh and Per Ola Kristensson. 2017. Neural Networks for Text Correction and Completion in Keyboard Decoding. arXiv preprint arXiv:1709.06429(2017). Shaona Ghosh and Per Ola Kristensson. 2017. Neural Networks for Text Correction and Completion in Keyboard Decoding. arXiv preprint arXiv:1709.06429(2017)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Hongyu Gong Suma Bhat and Pramod Viswanath. 2017. Geometry of Compositionality. Hongyu Gong Suma Bhat and Pramod Viswanath. 2017. Geometry of Compositionality.","DOI":"10.1609\/aaai.v31i1.10990"},{"key":"e_1_3_2_1_11_1","unstructured":"Jigsaw Google. 2017. Perspective. Available at: https:\/\/www.perspectiveapi.com\/. Jigsaw Google. 2017. Perspective. Available at: https:\/\/www.perspectiveapi.com\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Sergey Gubanov Irina Galinskaya and Alexey Baytin. 2014. Improved Iterative Correction for Distant Spelling Errors.. In ACL (2). 168-173. Sergey Gubanov Irina Galinskaya and Alexey Baytin. 2014. Improved Iterative Correction for Distant Spelling Errors.. In ACL (2). 168-173.","DOI":"10.3115\/v1\/P14-2028"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTUS.2017.8285996"},{"key":"e_1_3_2_1_14_1","unstructured":"Hany Hassan and Arul Menezes. 2013. Social Text Normalization using Contextual Graph Random Walks.. In ACL (1). 1577-1586. Hany Hassan and Arul Menezes. 2013. Social Text Normalization using Contextual Graph Random Walks.. In ACL (1). 1577-1586."},{"key":"e_1_3_2_1_15_1","unstructured":"Hossein Hosseini Sreeram Kannan Baosen Zhang and Radha Poovendran. 2017. Deceiving Google's Perspective API Built for Detecting Toxic Comments. arXiv preprint arXiv:1702.08138(2017). Hossein Hosseini Sreeram Kannan Baosen Zhang and Radha Poovendran. 2017. Deceiving Google's Perspective API Built for Detecting Toxic Comments. arXiv preprint arXiv:1702.08138(2017)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(08)70053-9"},{"volume-title":"Speech and language processing","author":"Jurafsky Dan","key":"e_1_3_2_1_17_1","unstructured":"Dan Jurafsky and James H Martin . 2014. Speech and language processing . Vol. 3 . Pearson London . Dan Jurafsky and James H Martin. 2014. Speech and language processing. Vol. 3. Pearson London."},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Distributed Representations of Words and Phrases and their Compositionality","volume":"5","author":"Jurafsky Daniel","year":"2017","unstructured":"Daniel Jurafsky and James H. Martin . 2017 . Distributed Representations of Words and Phrases and their Compositionality . In Speech and Language Processing. Chapter 5 , 1 - 12 . Daniel Jurafsky and James H. Martin.2017. Distributed Representations of Words and Phrases and their Compositionality. In Speech and Language Processing. Chapter 5, 1-12.","journal-title":"Speech and Language Processing. Chapter"},{"key":"e_1_3_2_1_19_1","unstructured":"Ryan Kelly. 2015. PyEnchant. Available at: https:\/\/github.com\/rfk\/pyenchant. Ryan Kelly. 2015. PyEnchant. Available at: https:\/\/github.com\/rfk\/pyenchant."},{"volume-title":"Soviet physics doklady","author":"Levenshtein Vladimir I","key":"e_1_3_2_1_20_1","unstructured":"Vladimir I Levenshtein . 1966. Binary codes capable of correcting deletions, insertions, and reversals . In Soviet physics doklady , Vol. 10 . 707-710. Vladimir I Levenshtein. 1966. Binary codes capable of correcting deletions, insertions, and reversals. In Soviet physics doklady, Vol. 10. 707-710."},{"volume-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies: short papers-Volume 2. Association for Computational Linguistics, 71-76","year":"2011","author":"Liu Fei","key":"e_1_3_2_1_21_1","unstructured":"Fei Liu , Fuliang Weng , Bingqing Wang , and Yang Liu . 2011 . Insertion, deletion, or substitution?: normalizing text messages without pre-categorization nor supervision . In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies: short papers-Volume 2. Association for Computational Linguistics, 71-76 . Fei Liu, Fuliang Weng, Bingqing Wang, and Yang Liu. 2011. Insertion, deletion, or substitution?: normalizing text messages without pre-categorization nor supervision. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies: short papers-Volume 2. Association for Computational Linguistics, 71-76."},{"volume-title":"Advances in Neural Information Processing Systems 26","author":"Mikolov Tomas","key":"e_1_3_2_1_22_1","unstructured":"Tomas Mikolov , Ilya Sutskever , Kai Chen , Greg S Corrado , and Jeff Dean . 2013. Distributed Representations of Words and Phrases and their Compositionality . In Advances in Neural Information Processing Systems 26 , C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger (Eds.). Curran Associates, Inc. , 3111-3119. Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. 2013. Distributed Representations of Words and Phrases and their Compositionality. In Advances in Neural Information Processing Systems 26, C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 3111-3119."},{"volume-title":"Conference on. IEEE, 1-8.","year":"2017","author":"Modupe Abiodun","key":"e_1_3_2_1_23_1","unstructured":"Abiodun Modupe , Turgay Celik , Vukosi Marivate , and Melvin Diale . 2017 . Semi-supervised probabilistics approach for normalising informal short text messages. In Information Communication Technology and Society (ICTAS) , Conference on. IEEE, 1-8. Abiodun Modupe, Turgay Celik, Vukosi Marivate, and Melvin Diale. 2017. Semi-supervised probabilistics approach for normalising informal short text messages. In Information Communication Technology and Society (ICTAS), Conference on. IEEE, 1-8."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/362007.362033"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Thien Huu Nguyen and Ralph Grishman. 2014. Employing Word Representations and Regularization for Domain Adaptation of Relation Extraction.. In ACL (2). 68-74. Thien Huu Nguyen and Ralph Grishman. 2014. Employing Word Representations and Regularization for Domain Adaptation of Relation Extraction.. In ACL (2). 68-74.","DOI":"10.3115\/v1\/P14-2012"},{"volume-title":"Impact Of Content Features For Automatic Online Abuse Detection. In International Conference on Computational Linguistics and Intelligent Text Processing.","year":"2017","author":"Papegnies Etienne","key":"e_1_3_2_1_26_1","unstructured":"Etienne Papegnies , Vincent Labatut , Richard Dufour , and Georges Linares . 2017 . Impact Of Content Features For Automatic Online Abuse Detection. In International Conference on Computational Linguistics and Intelligent Text Processing. Etienne Papegnies, Vincent Labatut, Richard Dufour, and Georges Linares. 2017. Impact Of Content Features For Automatic Online Abuse Detection. In International Conference on Computational Linguistics and Intelligent Text Processing."},{"key":"e_1_3_2_1_27_1","first-page":"1","article-title":"Detecting Discourse-Independent Negated Forms of Public Textual Cyberbullying","volume":"1","author":"Power Aurelia","year":"2018","unstructured":"Aurelia Power , Anthony Keane , Brian Nolan , and Brian O'Neill . 2018 . Detecting Discourse-Independent Negated Forms of Public Textual Cyberbullying . Journal of Computer-Assisted Linguistic Research2 , 1 (2018), 1 - 20 . Aurelia Power, Anthony Keane, Brian Nolan, and Brian O'Neill. 2018. Detecting Discourse-Independent Negated Forms of Public Textual Cyberbullying. Journal of Computer-Assisted Linguistic Research2, 1 (2018), 1-20.","journal-title":"Journal of Computer-Assisted Linguistic Research2"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2700648.2809850"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.682181"},{"volume-title":"Revealing non-alphabetical guises of spam-trigger vocables. Dyna80, 182","year":"2013","author":"Rojas-Galeano Sergio A","key":"e_1_3_2_1_30_1","unstructured":"Sergio A Rojas-Galeano . 2013. Revealing non-alphabetical guises of spam-trigger vocables. Dyna80, 182 ( 2013 ), 15-24. Sergio A Rojas-Galeano. 2013. Revealing non-alphabetical guises of spam-trigger vocables. Dyna80, 182 (2013), 15-24."},{"key":"e_1_3_2_1_31_1","first-page":"977","article-title":"A Word Embedding Approach to Predicting the Compositionality of Multiword Expressions","author":"Salehi Bahar","year":"2015","unstructured":"Bahar Salehi , Paul Cook , and Timothy Baldwin . 2015 . A Word Embedding Approach to Predicting the Compositionality of Multiword Expressions .. In HLT-NAACL. 977 - 983 . Bahar Salehi, Paul Cook, and Timothy Baldwin. 2015. A Word Embedding Approach to Predicting the Compositionality of Multiword Expressions.. In HLT-NAACL. 977-983.","journal-title":"HLT-NAACL."},{"volume-title":"Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on. IEEE, 1095-1100","year":"2015","author":"Saxena Manish","key":"e_1_3_2_1_32_1","unstructured":"Manish Saxena and PM Khan . 2015 . Spamizer: An approach to handle web form Spam . In Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on. IEEE, 1095-1100 . Manish Saxena and PM Khan. 2015. Spamizer: An approach to handle web form Spam. In Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on. IEEE, 1095-1100."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/N15-1035"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2013"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553516"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2017.8244677"},{"volume-title":"Non-words Spell Corrector of Social Media Data in Message Filtering Systems.Journal of Digital Information Management16, 2","year":"2018","author":"Wint Zar Zar","key":"e_1_3_2_1_37_1","unstructured":"Zar Zar Wint , The\u00b4o Ducros , and Masayoshi Aritsugi . 2018. Non-words Spell Corrector of Social Media Data in Message Filtering Systems.Journal of Digital Information Management16, 2 ( 2018 ). Zar Zar Wint, The\u00b4o Ducros, and Masayoshi Aritsugi. 2018. Non-words Spell Corrector of Social Media Data in Message Filtering Systems.Journal of Digital Information Management16, 2 (2018)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2014.7009101"}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco CA USA","acronym":"WWW '19"},"container-title":["The World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308558.3313431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T06:18:40Z","timestamp":1681798720000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313431"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":38,"alternative-id":["10.1145\/3308558.3313431","10.1145\/3308558"],"URL":"https:\/\/doi.org\/10.1145\/3308558.3313431","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}