Open Access   Article Go Back

Abusive Language Detection and Characterization of Twitter Behavior

Dincy Davis1 , Reena Murali2 , Remesh Babu K.R.3

Section:Research Paper, Product Type: Journal Paper
Volume-8 , Issue-7 , Page no. 155-161, Jul-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i7.155161

Online published on Jul 31, 2020

Copyright © Dincy Davis, Reena Murali, Remesh Babu K.R. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Dincy Davis, Reena Murali, Remesh Babu K.R., “Abusive Language Detection and Characterization of Twitter Behavior,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.7, pp.155-161, 2020.

MLA Style Citation: Dincy Davis, Reena Murali, Remesh Babu K.R. "Abusive Language Detection and Characterization of Twitter Behavior." International Journal of Computer Sciences and Engineering 8.7 (2020): 155-161.

APA Style Citation: Dincy Davis, Reena Murali, Remesh Babu K.R., (2020). Abusive Language Detection and Characterization of Twitter Behavior. International Journal of Computer Sciences and Engineering, 8(7), 155-161.

BibTex Style Citation:
@article{Davis_2020,
author = {Dincy Davis, Reena Murali, Remesh Babu K.R.},
title = {Abusive Language Detection and Characterization of Twitter Behavior},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2020},
volume = {8},
Issue = {7},
month = {7},
year = {2020},
issn = {2347-2693},
pages = {155-161},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5182},
doi = {https://doi.org/10.26438/ijcse/v8i7.155161}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i7.155161}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5182
TI - Abusive Language Detection and Characterization of Twitter Behavior
T2 - International Journal of Computer Sciences and Engineering
AU - Dincy Davis, Reena Murali, Remesh Babu K.R.
PY - 2020
DA - 2020/07/31
PB - IJCSE, Indore, INDIA
SP - 155-161
IS - 7
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
222 375 downloads 140 downloads
  
  
           

Abstract

Abusive language refers to an insult or vulgarity which harass or deceive the target. Social media is a famous platform for the people to express their opinions publicly and to interact with other people in the world. Some of them may misuse their freedom of speech to bully others through abusive language. This will leads to the need for detecting abusive speech. Otherwise, it may severely impact the user?s online experience. It may be a time-consuming task if the detection and removal of such offensive material are done manually. Also, human supervision is unable to deal with large quantities of data. Therefore automatic abusive speech detection has become essential to be addressed effectively. For detecting abusive speech, context accompanying abusive speech is very useful. In this work, abusive language detection in online content is performed using Bidirectional Recurrent Neural Network (BiRNN) method. Here the main objective is to focus on various forms of abusive behaviors on Twitter and to detect whether a speech is abusive or not. The results are compared for various abusive behaviors in social media, with Convolutional Neural Netwrok (CNN) and Recurrent Neural Network (RNN) methods and proved that the proposed BiRNN is a better deep learning model for automatic abusive speech detection

Key-Words / Index Term

text classification, abusive language, BiRNN, deep learning, natural language processing

References

[1] A.M. Founta, C. Djouvas, D. Chatzakou, I. Leontiadis, J. Blackburn, G. Stringhini, A. Vakali, M. Sirivianos and N. Kourtellis, "Large scale crowdsourcing and characterization of twitter abusive behavior?, In Twelfth International AAAI Conference on Web and Social Media, USA, 2018
[2] P. Badjatiya, S. Gupta, M. Gupta, and V. Varma, ?Deep learning for hate speech detection in tweets?, In Proceedings of the 26th International Conference on World Wide Web Companion, Australia, pp. 759-760, 2017.
[3] B. Gamback, and U.K. Sikdar, ?Using convolutional neural networks to classify hate-speech?, In Proceedings of the first workshop on abusive language online, Canada, pp. 85-90, 2017. ISBN 978-1-945626-66-1.
[4] J.H. Park, and P. Fung, ?One-step and two-step classification for abusive language detection on twitter?, In Proceedings of the First Workshop on Abusive Language Online, Canada, pp. 41?45, 2017.
[5] J. Pavlopoulos, P. Malakasiotis, and I. Androutsopoulos, ?Deep learning for user comment moderation?, In Proceedings of the First Workshop on Abusive Language Online, Canada, pp, 25?35, 2017.
[6] D. Kumar, R. Cohen, and L. Golab, 2019, ?Online abuse detection: the value of preprocessing and neural attention models?, In Proceedings of the Tenth Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis, USA, pp. 16-24, 2019.
[7] Y. Lee, S. Yoon, and K. Jung, ?Comparative Studies of Detecting Abusive Language on Twitter?, Proceedings of the Second Workshop on Abusive Language Online, Belgium, pp. 101?106, 2018.
[8] F.J. Ordonez, and D. Roggen, ?Deep convolutional and lstm recurrent neural networks for multimodal wearable activity recognition?, Sensors, Vol.16(1), pp. 115, 2016.
[9] A. Anand, T. Chakraborty, and N. Park, ?We used neural networks to detect clickbaits: You won?t believe what happened next!?, In European Conference on Information Retrieval, Springer, Berlin, pp. 541-547, 2017.
[10] J. Pennington, R. Socher, and C.D. Manning, ?Glove: Global vectors for word representation?, In Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), Qatar, pp. 1532-1543, 2014.
[11] T. Mikolov, K. Chen, G. Corrado, and J. Dean, ?Efficient estimation of word representations in vector space?, International Conference on Learning Representations (ICLR), USA, 2013.
[12] W. McKinney, ?pandas: a foundational Python library for data analysis and statistics?, Python for High Performance and Scientific Computing, San Francisco, pp. 1-9, 2011.
[13] C. D. Manning, M. Surdeanu, J. Bauer, J. R. Finkel, S. Bethard, and D. McClosky, ?The Stanford CoreNLP natural language processing toolkit.?, In Proceedings of 52nd annual meeting of the association for computational linguistics: system demonstrations, Maryland, pp. 55-60, 2014.
[14] K.M. Hermann, T. Kocisky, E. Grefenstette, L. Espeholt, W. Kay, M. Suleyman, and P. Blunsom, ?Teaching machines to read and comprehend?, In Advances in neural information processing systems, Canada, pp. 1693-1701, 2015.
[15] D.P. Kingma, and L.J. Ba, ?Adam: A method for stochastic optimization?, International Conference on Learning Representations (ICLR), USA, 2015.
[16] G. E. Hinton, N. Srivastava, A. Krizhevsky, I. Sutskever, and R. R. Salakhutdinov, ?Improving neural networks by preventing co-adaptation of feature detectors?, CoRR, abs/1207.0580, 2012.