ACL-OCL / Base_JSON /prefixC /json /calcs /2021.calcs-1.16.json
Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "2021",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T13:13:36.710794Z"
},
"title": "Abusive content detection in transliterated Bengali-English social media corpus",
"authors": [
{
"first": "Salim",
"middle": [],
"last": "Sazzed",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Old Dominion University Norfolk",
"location": {
"region": "VA",
"country": "USA"
}
},
"email": "[email protected]"
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "Abusive text detection in low-resource languages such as Bengali is a challenging task due to the inadequacy of resources and tools. The ubiquity of transliterated Bengali comments in social media makes the task even more involved as monolingual approaches cannot capture them. Unfortunately, no transliterated Bengali corpus is publicly available yet for abusive content analysis. Therefore, in this paper, we introduce an annotated corpus of 3000 transliterated Bengali comments categorized into two classes, abusive and non-abusive, 1500 comments for each. For baseline evaluations, we employ several supervised machine learning (ML) and deep learning-based classifiers. We find support vector machine (SVM) classifier shows the highest efficacy for identifying abusive content. We make the annotated corpus publicly available for the researchers to aid abusive content detection in Bengali social media data.",
"pdf_parse": {
"paper_id": "2021",
"_pdf_hash": "",
"abstract": [
{
"text": "Abusive text detection in low-resource languages such as Bengali is a challenging task due to the inadequacy of resources and tools. The ubiquity of transliterated Bengali comments in social media makes the task even more involved as monolingual approaches cannot capture them. Unfortunately, no transliterated Bengali corpus is publicly available yet for abusive content analysis. Therefore, in this paper, we introduce an annotated corpus of 3000 transliterated Bengali comments categorized into two classes, abusive and non-abusive, 1500 comments for each. For baseline evaluations, we employ several supervised machine learning (ML) and deep learning-based classifiers. We find support vector machine (SVM) classifier shows the highest efficacy for identifying abusive content. We make the annotated corpus publicly available for the researchers to aid abusive content detection in Bengali social media data.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "With the popularity of social media, nowadays, user-generated contents are available in many languages. In various social media platforms, such as review forums and social networking sites, users express their feelings, opinions, emotion, etc. Due to the open nature of social media, the presence of abusive, offensive, and hateful comments is common there (Schmidt and Wiegand, 2017; Wang et al., 2014) .",
"cite_spans": [
{
"start": 357,
"end": 384,
"text": "(Schmidt and Wiegand, 2017;",
"ref_id": "BIBREF28"
},
{
"start": 385,
"end": 403,
"text": "Wang et al., 2014)",
"ref_id": "BIBREF29"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "Abusive language refers to the usage of demeaning, insulting, vulgar, or profane expression to attack individuals or groups (Nobata et al., 2016) ; However, there exist inconsistencies in the definitions of abusive language in various literature (Waseem et al., 2017) . For example, Nobata et al. (2016) considered hate speech as a kind of abusive language, while Founta et al. (2018) distinguished it from abusive speech. As the presence of abusive and hatred content inflicts a negative impact on society and individuals (Nobata et al., 2016; Duggan, 2017; Park et al., 2018) , it is important to identify them. While plenty of resources are available for abusive language detection in English (Poletto et al., 2020) , limited research has been performed on abusive content analysis in low resource Bengali language.",
"cite_spans": [
{
"start": 124,
"end": 145,
"text": "(Nobata et al., 2016)",
"ref_id": "BIBREF21"
},
{
"start": 246,
"end": 267,
"text": "(Waseem et al., 2017)",
"ref_id": "BIBREF31"
},
{
"start": 283,
"end": 303,
"text": "Nobata et al. (2016)",
"ref_id": "BIBREF21"
},
{
"start": 364,
"end": 384,
"text": "Founta et al. (2018)",
"ref_id": "BIBREF10"
},
{
"start": 523,
"end": 544,
"text": "(Nobata et al., 2016;",
"ref_id": "BIBREF21"
},
{
"start": 545,
"end": 558,
"text": "Duggan, 2017;",
"ref_id": null
},
{
"start": 559,
"end": 577,
"text": "Park et al., 2018)",
"ref_id": "BIBREF23"
},
{
"start": 696,
"end": 718,
"text": "(Poletto et al., 2020)",
"ref_id": "BIBREF26"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "Code-Mixing (CM) is a natural phenomenon of embedding linguistic units such as phrases, words, or morphemes of one language into an utterance of another (Myers-Scotton, 1993; Muysken et al., 2000) . Transliteration can be considered as a special form of code-mixing where the phonetic transformations of the words from a source language to a target language is performed. The presence of code-mixing and transliterated Bengali (i.e., Bengali text using the Latin alphabet) is a common phenomenon in Bengali, as shown by the previous studies (Barman et al., 2014; Chanda et al., 2016) .",
"cite_spans": [
{
"start": 153,
"end": 174,
"text": "(Myers-Scotton, 1993;",
"ref_id": "BIBREF20"
},
{
"start": 175,
"end": 196,
"text": "Muysken et al., 2000)",
"ref_id": "BIBREF19"
},
{
"start": 541,
"end": 562,
"text": "(Barman et al., 2014;",
"ref_id": "BIBREF2"
},
{
"start": 563,
"end": 583,
"text": "Chanda et al., 2016)",
"ref_id": "BIBREF4"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "The existing research on abusive content or hate speech detection in Bengali mainly investigated text written in Bengali (Kumar et al., 2021; Emon et al., 2019; Eshan and Hasan, 2017; Ishmam and Sharmin, 2019; Karim et al., 2020; Romim et al., 2020) . Although a few works addressed the phenomenon of code-switching in word-level or sentence level (i.e., presence of both English and Bengali words written using the alphabet of the corresponding language), most of them did not consider transliterated Bengali. Only Jahan et al. (2019) utilized a small number of transliterated Bengali comments (around 200 abusive comments) in their study. English is the second language in Bangladesh, the country with the highest number of Bengali native speakers; therefore, transliterated Bengali is ubiquitous in Bengali social media content. Hence, to detect abusive content in Bengali social media, it is essential to consider the transliterated Bengali text. For example, \"Dor besorom mor tui\" is an abusive comment which is written in transliterated Bengali; the corresponding English translation is, \" You are shameless, you die\". The monolingual approaches can not identify it as an abusive comment as the transliterated words neither exist in the Bengali or English dictionary nor available in the monolingual training data.",
"cite_spans": [
{
"start": 121,
"end": 141,
"text": "(Kumar et al., 2021;",
"ref_id": "BIBREF17"
},
{
"start": 142,
"end": 160,
"text": "Emon et al., 2019;",
"ref_id": "BIBREF8"
},
{
"start": 161,
"end": 183,
"text": "Eshan and Hasan, 2017;",
"ref_id": "BIBREF9"
},
{
"start": 184,
"end": 209,
"text": "Ishmam and Sharmin, 2019;",
"ref_id": "BIBREF12"
},
{
"start": 210,
"end": 229,
"text": "Karim et al., 2020;",
"ref_id": "BIBREF15"
},
{
"start": 230,
"end": 249,
"text": "Romim et al., 2020)",
"ref_id": "BIBREF27"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "Supervised ML classifiers are more effective for abusive content detection than the word-list based approaches, as shown in previous studies (Nobata et al., 2016; Park and Fung, 2017) . However, ML classifiers require annotated training data, which are missing for transliterated Bengali text. Therefore, in this work, we develop an annotated corpus for transliterated Bengali for abusive content detection and make them publicly available 1 .",
"cite_spans": [
{
"start": 141,
"end": 162,
"text": "(Nobata et al., 2016;",
"ref_id": "BIBREF21"
},
{
"start": 163,
"end": 183,
"text": "Park and Fung, 2017)",
"ref_id": "BIBREF22"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "We manually annotate around 3000 transliterated Bengali comments collected from YouTube into abusive and non-abusive categories, 1500 for each category. To the best of our knowledge, this is the largest annotated transliterated Bengali corpus for abusive content analysis. We then employ popular ML classifiers, logistic regression (LR), support vector machine (SVM), random forest (RF), and deep learning-based bidirectional long short-term memory (BiLSTM) architecture for baseline evaluations.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "The major contributions of this work can be summarized as follows:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Contributions",
"sec_num": "1.1"
},
{
"text": "\u2022 We introduce a large transliterated Bengali corpus consisting of 3000 comments collected from YouTube.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Contributions",
"sec_num": "1.1"
},
{
"text": "\u2022 We manually annotate the transliterated comments into abusive and non-abusive categories.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Contributions",
"sec_num": "1.1"
},
{
"text": "\u2022 We provide the comparative performances of various supervised ML and deep learningbased classifiers for recognizing abusive content in the transliterated Bengali corpus.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Contributions",
"sec_num": "1.1"
},
{
"text": "Researchers explored code-mixed and transliterated content for tasks like linguistic analysis, Partof-Speech (POS) tagging, and sentiment analysis in various South Asian languages, such as Hindi and Bengali (Choudhury et al., 2010; Jamatia et al., 2015; Patwa et al., 2020) . Mathur et al.",
"cite_spans": [
{
"start": 207,
"end": 231,
"text": "(Choudhury et al., 2010;",
"ref_id": "BIBREF6"
},
{
"start": 232,
"end": 253,
"text": "Jamatia et al., 2015;",
"ref_id": "BIBREF14"
},
{
"start": 254,
"end": 273,
"text": "Patwa et al., 2020)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Related Work",
"sec_num": "2"
},
{
"text": "(2018) introduced a Twitter dataset for the classification of offensive tweets written in the Hindi-English code-switched language. However, such a dataset for abusive content analysis in transliterated Bengali is not available yet.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Related Work",
"sec_num": "2"
},
{
"text": "Emon et al. 2019 As we mentioned earlier, most of the existing works considered only the Bengali text. Although few of them utilized code-switching text, transliterated Bengali is hardly explored. To the best of our knowledge, this is the first work that introduces a large annotated corpus of transliterated Bengali for abusive language detection and provides comparative performances of ML classifiers.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abusive Content Analysis in Bengali Text",
"sec_num": "2.1"
},
{
"text": "The developed corpus contains user-generated transliterated Bengali text regarding several Bengali dramas and celebrities (i.e., opinion data).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Corpus Creation",
"sec_num": "3"
},
{
"text": "Using a web scraping tool, we first download the raw JSON data from YouTube that contains information such as user name, id, timestamp, comments, and like/dislike, etc. Utilizing a parsing script, we extract the viewer's comments from the JSON data.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Data Collection",
"sec_num": "3.1"
},
{
"text": "The comments are written in Bengali, English, transliterated Bengali, or using code-switching words. Since our goal is to create a corpus for transliterated Bengali (i.e., Bengali words in Latin alphabet), we exclude comments written using the Bengali alphabet (i.e., Bengali comments). We utilize a language detection tool 2 to distinguish comments written using the Latin alphabet and Bengali alphabet. However, the tool can not differentiate between English and transliterated Bengali words as both use the Latin alphabet. Since social media contains lots of non-dictionary and misspelled English words (especially when written by non-native speakers), checking the English dictionary is not a feasible option to distinguish English and Transliterated Bengali words. Therefore, we manually inspect all the comments to include them in the corpus. We discard comments which are written using only English words. Comments with both transliterated Bengali and English words are included in the corpus if they contain at least two transliterated Bengali words. Note that, 2 https://github.com/Mimino666/langdetect unlike Bengali or English words, there is not fixed spelling for transliterated Bengali words; thus, the same transliterated word with different spellings can be present in the corpus.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Data Filtering",
"sec_num": "3.2"
},
{
"text": "For assigning the transliterated Bengali comments into abusive or non-abusive categories, we follow a similar guideline of Nobata et al. (2016) . They labeled a piece of text as abusive if it contains either hate speech or derogatory language or profanity.",
"cite_spans": [
{
"start": 123,
"end": 143,
"text": "Nobata et al. (2016)",
"ref_id": "BIBREF21"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Annotation Guideline",
"sec_num": "3.3.1"
},
{
"text": "Based on that, we assign the class of the comments into two categories-",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Annotation Guideline",
"sec_num": "3.3.1"
},
{
"text": "\u2022 Abusive: This class includes hate speech which attacks or demeans a group based on race, ethnic origin, religion, disability, gender, age, disability, etc. Besides, it consists of derogatory or demeaning remarks which attack an individual or a group and profanity towards individuals using sexually offensive and pornographic comments.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Annotation Guideline",
"sec_num": "3.3.1"
},
{
"text": "\u2022 Non-abusive: comments which do not fall into the abusive category. These comments could convey a positive, (non-abusive) negative or neutral opinion or could be objective in nature.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Annotation Guideline",
"sec_num": "3.3.1"
},
{
"text": "Two native Bengali speakers assign the class of the transliterated comments into two categories, abusive and non-abusive. Among the 3764 transliterated comments, both annotators assign 3000 comments into the same class; 323 comments are identified as abusive by the first annotator only, while 141 comments are rated abusive by the second annotator only. We observe a Cohen's kappa score of 0.733 between two annotators, which refers to substantial agreement.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Inter-annotator Agreement",
"sec_num": "3.3.2"
},
{
"text": "The final corpus includes the 3000 comments which are assigned to the same class by both annotators, 1500 from each category. To avoid ambiguity, we exclude the comments in which annotators disagree on class assignment (Awal et al., 2020; Waseem, 2016) . Each comment contains one or multiple sentences and 1-300 words. We purposely make the Figure 1 shows some examples of original transliterated Bengali comments, corresponding English machine translations, and annotations.",
"cite_spans": [
{
"start": 219,
"end": 238,
"text": "(Awal et al., 2020;",
"ref_id": "BIBREF1"
},
{
"start": 239,
"end": 252,
"text": "Waseem, 2016)",
"ref_id": "BIBREF30"
}
],
"ref_spans": [
{
"start": 342,
"end": 350,
"text": "Figure 1",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Corpus Statistics",
"sec_num": "3.4"
},
{
"text": "We manually investigate the presence of English and transliterated Bengali words in the comments by randomly selecting 100 abusive and 100 nonabusive comments. After tokenizing the 100 abusive comments, we find 1720 words. A manual inspection on them identifies 412 English words and 1308 Transliterated Bengali words, which indicates that 76% of the words are transliterated Bengali words. Among the 1088 words in the 100 non-abusive comments, we notice 858 transliterated Bengali and 230 English words, which reveals that nearly 80% of words are transliterated Bengali. As we discard the words written using the Bengali alphabet in the data filtering step, no Bengali words are present in the final corpus.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Word Frequency Distribution",
"sec_num": "3.4.1"
},
{
"text": "Three popular supervised ML classifiers, LR, RF, and SVM are employed to identify abusive comments. We extract unigrams and bigrams from the text and calculate the term frequency-inverse document frequency (TF-IDF) scores for them, which are used as an input for the ML classifiers. TF-IDF is a numerical statistic that aims to reflect the importance of a word to a document in a corpus. We utilize the LR, RF, and SVM implementation of scikit-learn (Pedregosa et al., 2011) library. The default parameter settings of ML classifiers are used.",
"cite_spans": [
{
"start": 450,
"end": 474,
"text": "(Pedregosa et al., 2011)",
"ref_id": "BIBREF25"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Traditional ML Classifiers",
"sec_num": "4.1"
},
{
"text": "Furthermore, we apply the deep learning-based BiLSTM architecture for identifying abusive content. For BiLSTM, we use word embedding of 100-dimensional vectors trained on the transliterated corpus. A dropout rate of 0.25 is applied in the dropout layers; Rectified Linear Unit (ReLU) activation is used in the intermediate layers. In the final layer, softmax activation is employed. As an optimization function, Adam optimizer (Kingma and Ba, 2014), and as a loss function, binary-cross entropy is utilized. We set the batch size to 64, use a learning rate of 0.001, and train the model for 6 epochs. We use the Keras (Chollet et al., 2015) library for implementing BiLSTM model.",
"cite_spans": [
{
"start": 618,
"end": 640,
"text": "(Chollet et al., 2015)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Deep Learning Classifier",
"sec_num": "4.2"
},
{
"text": "We report the precision (P abus ), recall (R abus ) and F1 scores (F 1 abus ) of various classifiers for identifying abusive comments. The T P , F P , and F N values of the abusive class are defined as follows-T P = abusive review classified as abusive F P = non-abusive review classified as abusive F N = abusive review classified as non-abusive R abus = T P T P +F N , P abus = T P T P +F P F 1 abus = 2 * P abus * R abus P abus +R abus",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Results and Discussion",
"sec_num": "5"
},
{
"text": "We perform 10-fold cross-validation on the transliterated corpus. We run each classifier 10 times and provide the range of R abus , P abus and F 1 abus scores. Table 1 shows the performance of various ML classifiers for abusive language detection in the translated Bengali corpus. We observe that among the three traditional ML classifiers, LR and SVM show similar R abus and P abus scores. RF classifier provides a similar R abus score of LR and SVM; however, it attains a lower P abus score. We find both LR and SVM yield lower R abus scores than the P abus scores. BiLSTM, the deep learning-based architecture, obtains a relatively lower F 1 abus score compared to LR and SVM, which could be attributed to the small size (i.e., 3000 comments) of the corpus.",
"cite_spans": [],
"ref_spans": [
{
"start": 160,
"end": 167,
"text": "Table 1",
"ref_id": "TABREF1"
}
],
"eq_spans": [],
"section": "Results and Discussion",
"sec_num": "5"
},
{
"text": "Identifying abusive content in social media is of paramount importance due to its detrimental impact. Not addressing this problem can lead to the increasing growth of harassment and cyberbullying in social media. While there have been few works for abusive speech detection in Bengali social media content, they mostly ignored the presence of transliterated Bengali. In this paper, we present the most comprehensive study of abusive content detection in transliterated Bengali text by providing an annotated corpus and baseline evaluations. Our future works will focus on expanding the size of the transliterated corpus, providing more rigorous analysis, and introducing a customized deep learning model to improve the performance of abusive content detection in transliterated Bengali text.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion and Future Work",
"sec_num": "6"
},
{
"text": "https://github.com/sazzadcsedu/AbusiveCorpus.git",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
}
],
"back_matter": [],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "Detecting abusive comments in discussion threads using na\u00efve bayes",
"authors": [
{
"first": "Md",
"middle": [],
"last": "Abdul Awal",
"suffix": ""
},
{
"first": "Md",
"middle": [],
"last": "Shamimur Rahman",
"suffix": ""
},
{
"first": "Jakaria",
"middle": [],
"last": "Rabbi",
"suffix": ""
}
],
"year": 2018,
"venue": "2018 International Conference on Innovations in Science, Engineering and Technology (ICISET)",
"volume": "",
"issue": "",
"pages": "163--167",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Md Abdul Awal, Md Shamimur Rahman, and Jakaria Rabbi. 2018. Detecting abusive comments in dis- cussion threads using na\u00efve bayes. In 2018 Interna- tional Conference on Innovations in Science, Engi- neering and Technology (ICISET), pages 163-167. IEEE.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "On analyzing annotation consistency in online abusive behavior datasets",
"authors": [
{
"first": "Rui",
"middle": [],
"last": "Md Rabiul Awal",
"suffix": ""
},
{
"first": "Roy Ka-Wei",
"middle": [],
"last": "Cao",
"suffix": ""
},
{
"first": "Sandra",
"middle": [],
"last": "Lee",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Mitrovi\u0107",
"suffix": ""
}
],
"year": 2020,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {
"arXiv": [
"arXiv:2006.13507"
]
},
"num": null,
"urls": [],
"raw_text": "Md Rabiul Awal, Rui Cao, Roy Ka-Wei Lee, and San- dra Mitrovi\u0107. 2020. On analyzing annotation con- sistency in online abusive behavior datasets. arXiv preprint arXiv:2006.13507.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "Code mixing: A challenge for language identification in the language of social media",
"authors": [
{
"first": "Utsab",
"middle": [],
"last": "Barman",
"suffix": ""
},
{
"first": "Amitava",
"middle": [],
"last": "Das",
"suffix": ""
},
{
"first": "Joachim",
"middle": [],
"last": "Wagner",
"suffix": ""
},
{
"first": "Jennifer",
"middle": [],
"last": "Foster",
"suffix": ""
}
],
"year": 2014,
"venue": "Proceedings of the first workshop on computational approaches to code switching",
"volume": "",
"issue": "",
"pages": "13--23",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Utsab Barman, Amitava Das, Joachim Wagner, and Jennifer Foster. 2014. Code mixing: A challenge for language identification in the language of social media. In Proceedings of the first workshop on com- putational approaches to code switching, pages 13- 23.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "Threat and abusive language detection on social media in bengali language",
"authors": [
{
"first": "Puja",
"middle": [],
"last": "Chakraborty",
"suffix": ""
},
{
"first": "Md Hanif",
"middle": [],
"last": "Seddiqui",
"suffix": ""
}
],
"year": 2019,
"venue": "2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)",
"volume": "",
"issue": "",
"pages": "1--6",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Puja Chakraborty and Md Hanif Seddiqui. 2019. Threat and abusive language detection on social me- dia in bengali language. In 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), pages 1-6. IEEE.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "Unraveling the english-bengali code-mixing phenomenon",
"authors": [
{
"first": "Arunavha",
"middle": [],
"last": "Chanda",
"suffix": ""
},
{
"first": "Dipankar",
"middle": [],
"last": "Das",
"suffix": ""
},
{
"first": "Chandan",
"middle": [],
"last": "Mazumdar",
"suffix": ""
}
],
"year": 2016,
"venue": "Proceedings of the Second Workshop on Computational Approaches to Code Switching",
"volume": "",
"issue": "",
"pages": "80--89",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Arunavha Chanda, Dipankar Das, and Chandan Mazumdar. 2016. Unraveling the english-bengali code-mixing phenomenon. In Proceedings of the Second Workshop on Computational Approaches to Code Switching, pages 80-89.",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "Resource creation for training and testing of transliteration systems for indian languages",
"authors": [
{
"first": "Monojit",
"middle": [],
"last": "Choudhury",
"suffix": ""
},
{
"first": "Kalika",
"middle": [],
"last": "Bali",
"suffix": ""
},
{
"first": "Tirthankar",
"middle": [],
"last": "Dasgupta",
"suffix": ""
},
{
"first": "Anupam",
"middle": [],
"last": "Basu",
"suffix": ""
}
],
"year": 2010,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Monojit Choudhury, Kalika Bali, Tirthankar Dasgupta, and Anupam Basu. 2010. Resource creation for training and testing of transliteration systems for in- dian languages. LREC.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "A deep learning approach to detect abusive bengali text",
"authors": [
{
"first": "Shihab",
"middle": [],
"last": "Estiak Ahmed Emon",
"suffix": ""
},
{
"first": "Joti",
"middle": [],
"last": "Rahman",
"suffix": ""
},
{
"first": "Amit",
"middle": [],
"last": "Banarjee",
"suffix": ""
},
{
"first": "Tanni",
"middle": [],
"last": "Kumar Das",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Mittra",
"suffix": ""
}
],
"year": 2019,
"venue": "2019 7th International Conference on Smart Computing & Communications (ICSCC)",
"volume": "",
"issue": "",
"pages": "1--5",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Estiak Ahmed Emon, Shihab Rahman, Joti Banar- jee, Amit Kumar Das, and Tanni Mittra. 2019. A deep learning approach to detect abusive bengali text. In 2019 7th International Conference on Smart Computing & Communications (ICSCC), pages 1-5. IEEE.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "An application of machine learning to detect abusive bengali text",
"authors": [
{
"first": "C",
"middle": [],
"last": "Shahnoor",
"suffix": ""
},
{
"first": "Mohammad S",
"middle": [],
"last": "Eshan",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Hasan",
"suffix": ""
}
],
"year": 2017,
"venue": "20th International Conference of Computer and Information Technology (ICCIT)",
"volume": "",
"issue": "",
"pages": "1--6",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Shahnoor C Eshan and Mohammad S Hasan. 2017. An application of machine learning to detect abusive bengali text. In 2017 20th International Conference of Computer and Information Technology (ICCIT), pages 1-6. IEEE.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "Large scale crowdsourcing and characterization of twitter abusive behavior",
"authors": [
{
"first": "Antigoni",
"middle": [],
"last": "Founta",
"suffix": ""
},
{
"first": "Constantinos",
"middle": [],
"last": "Djouvas",
"suffix": ""
},
{
"first": "Despoina",
"middle": [],
"last": "Chatzakou",
"suffix": ""
},
{
"first": "Ilias",
"middle": [],
"last": "Leontiadis",
"suffix": ""
},
{
"first": "Jeremy",
"middle": [],
"last": "Blackburn",
"suffix": ""
},
{
"first": "Gianluca",
"middle": [],
"last": "Stringhini",
"suffix": ""
},
{
"first": "Athena",
"middle": [],
"last": "Vakali",
"suffix": ""
}
],
"year": 2018,
"venue": "Proceedings of the International AAAI Conference on Web and Social Media",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Antigoni Founta, Constantinos Djouvas, Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Gi- anluca Stringhini, Athena Vakali, Michael Siriv- ianos, and Nicolas Kourtellis. 2018. Large scale crowdsourcing and characterization of twitter abu- sive behavior. In Proceedings of the International AAAI Conference on Web and Social Media, vol- ume 12.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "An approach to detect abusive bangla text",
"authors": [
{
"first": "Tamim",
"middle": [
"Al"
],
"last": "Md Gulzar Hussain",
"suffix": ""
},
{
"first": "Waheda",
"middle": [],
"last": "Mahmud",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Akthar",
"suffix": ""
}
],
"year": 2018,
"venue": "2018 International Conference on Innovation in Engineering and Technology (ICIET)",
"volume": "",
"issue": "",
"pages": "1--5",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Md Gulzar Hussain, Tamim Al Mahmud, and Waheda Akthar. 2018. An approach to detect abusive bangla text. In 2018 International Conference on Innova- tion in Engineering and Technology (ICIET), pages 1-5. IEEE.",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "Hateful speech detection in public facebook pages for the bengali language",
"authors": [
{
"first": "Sadia",
"middle": [],
"last": "Alvi Md Ishmam",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Sharmin",
"suffix": ""
}
],
"year": 2019,
"venue": "18th IEEE International Conference On Machine Learning And Applications (ICMLA)",
"volume": "",
"issue": "",
"pages": "555--560",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Alvi Md Ishmam and Sadia Sharmin. 2019. Hateful speech detection in public facebook pages for the bengali language. In 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), pages 555-560. IEEE.",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "Abusive comments detection in bangla-english code-mixed and transliterated text",
"authors": [
{
"first": "Maliha",
"middle": [],
"last": "Jahan",
"suffix": ""
},
{
"first": "Istiak",
"middle": [],
"last": "Ahamed",
"suffix": ""
},
{
"first": "Swakkhar",
"middle": [],
"last": "Md Rayanuzzaman Bishwas",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Shatabda",
"suffix": ""
}
],
"year": 2019,
"venue": "2019 2nd International Conference on Innovation in Engineering and Technology (ICIET)",
"volume": "",
"issue": "",
"pages": "1--6",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Maliha Jahan, Istiak Ahamed, Md Rayanuzzaman Bishwas, and Swakkhar Shatabda. 2019. Abusive comments detection in bangla-english code-mixed and transliterated text. In 2019 2nd International Conference on Innovation in Engineering and Tech- nology (ICIET), pages 1-6. IEEE.",
"links": null
},
"BIBREF14": {
"ref_id": "b14",
"title": "Part-of-speech tagging for code-mixed english-hindi twitter and facebook chat messages",
"authors": [
{
"first": "Anupam",
"middle": [],
"last": "Jamatia",
"suffix": ""
},
{
"first": "Bj\u00f6rn",
"middle": [],
"last": "Gamb\u00e4ck",
"suffix": ""
},
{
"first": "Amitava",
"middle": [],
"last": "Das",
"suffix": ""
}
],
"year": 2015,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Anupam Jamatia, Bj\u00f6rn Gamb\u00e4ck, and Amitava Das. 2015. Part-of-speech tagging for code-mixed english-hindi twitter and facebook chat messages. Association for Computational Linguistics.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "Classification benchmarks for under-resourced bengali language based on multichannel convolutional-lstm network",
"authors": [
{
"first": "Bharathi",
"middle": [],
"last": "Md Rezaul Karim",
"suffix": ""
},
{
"first": "John",
"middle": [
"P"
],
"last": "Raja Chakravarthi",
"suffix": ""
},
{
"first": "Michael",
"middle": [],
"last": "Mccrae",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Cochez",
"suffix": ""
}
],
"year": 2020,
"venue": "2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA)",
"volume": "",
"issue": "",
"pages": "390--399",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Md Rezaul Karim, Bharathi Raja Chakravarthi, John P McCrae, and Michael Cochez. 2020. Classification benchmarks for under-resourced bengali language based on multichannel convolutional-lstm network. In 2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA), pages 390-399. IEEE.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "Adam: A method for stochastic optimization",
"authors": [
{
"first": "P",
"middle": [],
"last": "Diederik",
"suffix": ""
},
{
"first": "Jimmy",
"middle": [],
"last": "Kingma",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Ba",
"suffix": ""
}
],
"year": 2014,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {
"arXiv": [
"arXiv:1412.6980"
]
},
"num": null,
"urls": [],
"raw_text": "Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980.",
"links": null
},
"BIBREF17": {
"ref_id": "b17",
"title": "Aggressive and offensive language identification in hindi, bangla, and english: A comparative study",
"authors": [
{
"first": "Ritesh",
"middle": [],
"last": "Kumar",
"suffix": ""
},
{
"first": "Bornini",
"middle": [],
"last": "Lahiri",
"suffix": ""
},
{
"first": "Atul Kr",
"middle": [],
"last": "Ojha",
"suffix": ""
}
],
"year": 2021,
"venue": "SN Computer Science",
"volume": "2",
"issue": "1",
"pages": "1--20",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ritesh Kumar, Bornini Lahiri, and Atul Kr Ojha. 2021. Aggressive and offensive language identification in hindi, bangla, and english: A comparative study. SN Computer Science, 2(1):1-20.",
"links": null
},
"BIBREF18": {
"ref_id": "b18",
"title": "Detecting offensive tweets in hindi-english code-switched language",
"authors": [
{
"first": "Puneet",
"middle": [],
"last": "Mathur",
"suffix": ""
},
{
"first": "Rajiv",
"middle": [],
"last": "Shah",
"suffix": ""
},
{
"first": "Ramit",
"middle": [],
"last": "Sawhney",
"suffix": ""
},
{
"first": "Debanjan",
"middle": [],
"last": "Mahata",
"suffix": ""
}
],
"year": 2018,
"venue": "Proceedings of the Sixth International Workshop on Natural Language Processing for Social Media",
"volume": "",
"issue": "",
"pages": "18--26",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Puneet Mathur, Rajiv Shah, Ramit Sawhney, and De- banjan Mahata. 2018. Detecting offensive tweets in hindi-english code-switched language. In Proceed- ings of the Sixth International Workshop on Natural Language Processing for Social Media, pages 18- 26.",
"links": null
},
"BIBREF19": {
"ref_id": "b19",
"title": "Bilingual speech: A typology of code-mixing",
"authors": [
{
"first": "Pieter",
"middle": [],
"last": "Muysken",
"suffix": ""
},
{
"first": "Pieter",
"middle": [],
"last": "Cornelis Muysken",
"suffix": ""
}
],
"year": 2000,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Pieter Muysken, Pieter Cornelis Muysken, et al. 2000. Bilingual speech: A typology of code-mixing. Cam- bridge University Press.",
"links": null
},
"BIBREF20": {
"ref_id": "b20",
"title": "Common and uncommon ground: Social and structural factors in codeswitching",
"authors": [
{
"first": "Carol",
"middle": [],
"last": "Myers-Scotton",
"suffix": ""
}
],
"year": 1993,
"venue": "Language in society",
"volume": "",
"issue": "",
"pages": "475--503",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Carol Myers-Scotton. 1993. Common and uncommon ground: Social and structural factors in codeswitch- ing. Language in society, pages 475-503.",
"links": null
},
"BIBREF21": {
"ref_id": "b21",
"title": "Abusive language detection in online user content",
"authors": [
{
"first": "Chikashi",
"middle": [],
"last": "Nobata",
"suffix": ""
},
{
"first": "Joel",
"middle": [],
"last": "Tetreault",
"suffix": ""
},
{
"first": "Achint",
"middle": [],
"last": "Thomas",
"suffix": ""
},
{
"first": "Yashar",
"middle": [],
"last": "Mehdad",
"suffix": ""
},
{
"first": "Yi",
"middle": [],
"last": "Chang",
"suffix": ""
}
],
"year": 2016,
"venue": "Proceedings of the 25th international conference on world wide web",
"volume": "",
"issue": "",
"pages": "145--153",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Chikashi Nobata, Joel Tetreault, Achint Thomas, Yashar Mehdad, and Yi Chang. 2016. Abusive lan- guage detection in online user content. In Proceed- ings of the 25th international conference on world wide web, pages 145-153.",
"links": null
},
"BIBREF22": {
"ref_id": "b22",
"title": "One-step and twostep classification for abusive language detection on twitter",
"authors": [
{
"first": "Ji",
"middle": [],
"last": "Ho",
"suffix": ""
},
{
"first": "Park",
"middle": [],
"last": "",
"suffix": ""
},
{
"first": "Pascale",
"middle": [],
"last": "Fung",
"suffix": ""
}
],
"year": 2017,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {
"arXiv": [
"arXiv:1706.01206"
]
},
"num": null,
"urls": [],
"raw_text": "Ji Ho Park and Pascale Fung. 2017. One-step and two- step classification for abusive language detection on twitter. arXiv preprint arXiv:1706.01206.",
"links": null
},
"BIBREF23": {
"ref_id": "b23",
"title": "Reducing gender bias in abusive language detection",
"authors": [
{
"first": "Ji",
"middle": [],
"last": "Ho Park",
"suffix": ""
},
{
"first": "Jamin",
"middle": [],
"last": "Shin",
"suffix": ""
},
{
"first": "Pascale",
"middle": [],
"last": "Fung",
"suffix": ""
}
],
"year": 2018,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {
"arXiv": [
"arXiv:1808.07231"
]
},
"num": null,
"urls": [],
"raw_text": "Ji Ho Park, Jamin Shin, and Pascale Fung. 2018. Re- ducing gender bias in abusive language detection. arXiv preprint arXiv:1808.07231.",
"links": null
},
"BIBREF24": {
"ref_id": "b24",
"title": "Thamar Solorio, and Amitava Das. 2020. Semeval-2020 task 9: Overview of sentiment analysis of code-mixed tweets. arXiv e-prints",
"authors": [
{
"first": "Parth",
"middle": [],
"last": "Patwa",
"suffix": ""
},
{
"first": "Gustavo",
"middle": [],
"last": "Aguilar",
"suffix": ""
},
{
"first": "Sudipta",
"middle": [],
"last": "Kar",
"suffix": ""
},
{
"first": "Suraj",
"middle": [],
"last": "Pandey",
"suffix": ""
},
{
"first": "Pykl",
"middle": [],
"last": "Srinivas",
"suffix": ""
},
{
"first": "Bj\u00f6rn",
"middle": [],
"last": "Gamb\u00e4ck",
"suffix": ""
},
{
"first": "Tanmoy",
"middle": [],
"last": "Chakraborty",
"suffix": ""
}
],
"year": null,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Parth Patwa, Gustavo Aguilar, Sudipta Kar, Suraj Pandey, Srinivas PYKL, Bj\u00f6rn Gamb\u00e4ck, Tanmoy Chakraborty, Thamar Solorio, and Amitava Das. 2020. Semeval-2020 task 9: Overview of sentiment analysis of code-mixed tweets. arXiv e-prints, pages arXiv-2008.",
"links": null
},
"BIBREF25": {
"ref_id": "b25",
"title": "Scikit-learn: Machine learning in Python",
"authors": [
{
"first": "F",
"middle": [],
"last": "Pedregosa",
"suffix": ""
},
{
"first": "G",
"middle": [],
"last": "Varoquaux",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Gramfort",
"suffix": ""
},
{
"first": "V",
"middle": [],
"last": "Michel",
"suffix": ""
},
{
"first": "B",
"middle": [],
"last": "Thirion",
"suffix": ""
},
{
"first": "O",
"middle": [],
"last": "Grisel",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Blondel",
"suffix": ""
},
{
"first": "P",
"middle": [],
"last": "Prettenhofer",
"suffix": ""
},
{
"first": "R",
"middle": [],
"last": "Weiss",
"suffix": ""
},
{
"first": "V",
"middle": [],
"last": "Dubourg",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Vanderplas",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Passos",
"suffix": ""
},
{
"first": "D",
"middle": [],
"last": "Cournapeau",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Brucher",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Perrot",
"suffix": ""
},
{
"first": "E",
"middle": [],
"last": "Duchesnay",
"suffix": ""
}
],
"year": 2011,
"venue": "Journal of Machine Learning Research",
"volume": "12",
"issue": "",
"pages": "2825--2830",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Pretten- hofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Pas- sos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825-2830.",
"links": null
},
"BIBREF26": {
"ref_id": "b26",
"title": "Resources and benchmark corpora for hate speech detection: a systematic review",
"authors": [
{
"first": "Fabio",
"middle": [],
"last": "Poletto",
"suffix": ""
},
{
"first": "Valerio",
"middle": [],
"last": "Basile",
"suffix": ""
},
{
"first": "Manuela",
"middle": [],
"last": "Sanguinetti",
"suffix": ""
},
{
"first": "Cristina",
"middle": [],
"last": "Bosco",
"suffix": ""
},
{
"first": "Viviana",
"middle": [],
"last": "Patti",
"suffix": ""
}
],
"year": 2020,
"venue": "Language Resources and Evaluation",
"volume": "",
"issue": "",
"pages": "1--47",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Fabio Poletto, Valerio Basile, Manuela Sanguinetti, Cristina Bosco, and Viviana Patti. 2020. Resources and benchmark corpora for hate speech detection: a systematic review. Language Resources and Evalu- ation, pages 1-47.",
"links": null
},
"BIBREF27": {
"ref_id": "b27",
"title": "Hate speech detection in the bengali language: A dataset and its baseline evaluation",
"authors": [
{
"first": "Nauros",
"middle": [],
"last": "Romim",
"suffix": ""
},
{
"first": "Mosahed",
"middle": [],
"last": "Ahmed",
"suffix": ""
},
{
"first": "Hriteshwar",
"middle": [],
"last": "Talukder",
"suffix": ""
},
{
"first": "Md Saiful",
"middle": [],
"last": "Islam",
"suffix": ""
}
],
"year": 2020,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {
"arXiv": [
"arXiv:2012.09686"
]
},
"num": null,
"urls": [],
"raw_text": "Nauros Romim, Mosahed Ahmed, Hriteshwar Talukder, and Md Saiful Islam. 2020. Hate speech detection in the bengali language: A dataset and its baseline evaluation. arXiv preprint arXiv:2012.09686.",
"links": null
},
"BIBREF28": {
"ref_id": "b28",
"title": "A survey on hate speech detection using natural language processing",
"authors": [
{
"first": "Anna",
"middle": [],
"last": "Schmidt",
"suffix": ""
},
{
"first": "Michael",
"middle": [],
"last": "Wiegand",
"suffix": ""
}
],
"year": 2017,
"venue": "Proceedings of the fifth international workshop on natural language processing for social media",
"volume": "",
"issue": "",
"pages": "1--10",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Anna Schmidt and Michael Wiegand. 2017. A sur- vey on hate speech detection using natural language processing. In Proceedings of the fifth international workshop on natural language processing for social media, pages 1-10.",
"links": null
},
"BIBREF29": {
"ref_id": "b29",
"title": "Cursing in english on twitter",
"authors": [
{
"first": "Wenbo",
"middle": [],
"last": "Wang",
"suffix": ""
},
{
"first": "Lu",
"middle": [],
"last": "Chen",
"suffix": ""
},
{
"first": "Krishnaprasad",
"middle": [],
"last": "Thirunarayan",
"suffix": ""
},
{
"first": "Amit P",
"middle": [],
"last": "Sheth",
"suffix": ""
}
],
"year": 2014,
"venue": "Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing",
"volume": "",
"issue": "",
"pages": "415--425",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Wenbo Wang, Lu Chen, Krishnaprasad Thirunarayan, and Amit P Sheth. 2014. Cursing in english on twit- ter. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, pages 415-425.",
"links": null
},
"BIBREF30": {
"ref_id": "b30",
"title": "Are you a racist or am i seeing things? annotator influence on hate speech detection on twitter",
"authors": [
{
"first": "Zeerak",
"middle": [],
"last": "Waseem",
"suffix": ""
}
],
"year": 2016,
"venue": "Proceedings of the first workshop on NLP and computational social science",
"volume": "",
"issue": "",
"pages": "138--142",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Zeerak Waseem. 2016. Are you a racist or am i seeing things? annotator influence on hate speech detection on twitter. In Proceedings of the first workshop on NLP and computational social science, pages 138- 142.",
"links": null
},
"BIBREF31": {
"ref_id": "b31",
"title": "Understanding abuse: A typology of abusive language detection subtasks",
"authors": [
{
"first": "Zeerak",
"middle": [],
"last": "Waseem",
"suffix": ""
},
{
"first": "Thomas",
"middle": [],
"last": "Davidson",
"suffix": ""
},
{
"first": "Dana",
"middle": [],
"last": "Warmsley",
"suffix": ""
},
{
"first": "Ingmar",
"middle": [],
"last": "Weber",
"suffix": ""
}
],
"year": 2017,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {
"arXiv": [
"arXiv:1705.09899"
]
},
"num": null,
"urls": [],
"raw_text": "Zeerak Waseem, Thomas Davidson, Dana Warmsley, and Ingmar Weber. 2017. Understanding abuse: A typology of abusive language detection subtasks. arXiv preprint arXiv:1705.09899.",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"uris": null,
"type_str": "figure",
"text": "Examples of annotated abusive and non-abusive reviews corpus class-balanced to avoid introducing any bias in the classifier.",
"num": null
},
"TABREF0": {
"html": null,
"content": "<table><tr><td>applied linear support vector</td></tr><tr><td>classifier (LinearSVC), logistic regression (LR),</td></tr><tr><td>multinomial na\u00efve bayes (MNB), random forest</td></tr><tr><td>(RF), artificial neural network (ANN), and re-</td></tr><tr><td>current neural network (RNN) with a long short</td></tr><tr><td>term memory (LSTM) to detect multi-type abu-</td></tr><tr><td>sive Bengali text. They also introduced a stem-</td></tr><tr><td>ming rule to improve the classifier performance.</td></tr><tr><td>Eshan and Hasan (2017) investigated the perfor-</td></tr><tr><td>mance of RF, MNB, SVM classifiers for abusive</td></tr><tr><td>language detection using unigram, bigrams, and</td></tr><tr><td>trigram based feature vectors. They found that the</td></tr><tr><td>SVM classifier with linear kernel and tri-gram fea-</td></tr><tr><td>tures showed the highest accuracy.</td></tr><tr><td>Ishmam and Sharmin (2019) employed tradi-</td></tr><tr><td>tional and deep 2.2 Abusive Content in Transliterated</td></tr><tr><td>Bengali</td></tr><tr><td>In Jahan et al. (2019), the authors utilized</td></tr><tr><td>Bengali-English code-mixed text and translit-</td></tr></table>",
"type_str": "table",
"text": "learning-based ML algorithms for classifying different types of offensive comments collected from Facebook pages. They collected and annotated around 5000 Bengali comments and categorized them into six classes. They obtained the highest accuracy utilizing GRU based model, which is around 70.10%. Hussain et al.(2018)collected 300 comments from Facebook and an online newspaper for abusive content detection. They proposed a weighted-rule based method that utilized labeled data. Awal et al. (2018) employed Na\u00efve Bayes (NB) classifier to detect the abusive content in Bengali; They collected text from YouTube and provided the performance of NB using 10-fold cross-validation.Chakraborty and Seddiqui (2019) employed MNB, SVM, Convolutional Neural Network (CNN) with LSTM classifiers. They leveraged both emoticons and Bengali characters as input. They found SVM with linear kernel performed best with 78% accuracy. , sentiment scores, offensive and threatening words used in the comments. They employed three Machine Learning classifiers, SVM, RF, and Adaboost for abusive speech detection.",
"num": null
},
"TABREF1": {
"html": null,
"content": "<table/>",
"type_str": "table",
"text": "Performance of various classifiers for abusive language detection in the transliterated corpus Classifier R abus P abus F 1 abus SVM 0.790 \u00b10.008 0.865 \u00b10.015 0.827 \u00b10.010 LR 0.779 \u00b10.006 0.876 \u00b10.004 0.823 \u00b10.006 BiLSTM 0.781 \u00b10.031 0.800 \u00b10.036 0.790 \u00b10.031 RF 0.781 \u00b10.013 0.762 \u00b10.028 0.770 \u00b10.020",
"num": null
}
}
}
}