Abusive Language Detection and Characterization of Twitter Behavior
Dincy Davis1 , Reena Murali2 , Remesh Babu K.R.3
Section:Research Paper, Product Type: Journal Paper
Volume-8 ,
Issue-7 , Page no. 155-161, Jul-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i7.155161
Online published on Jul 31, 2020
Copyright © Dincy Davis, Reena Murali, Remesh Babu K.R. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Dincy Davis, Reena Murali, Remesh Babu K.R., “Abusive Language Detection and Characterization of Twitter Behavior,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.7, pp.155-161, 2020.
MLA Citation
MLA Style Citation: Dincy Davis, Reena Murali, Remesh Babu K.R. "Abusive Language Detection and Characterization of Twitter Behavior." International Journal of Computer Sciences and Engineering 8.7 (2020): 155-161.
APA Citation
APA Style Citation: Dincy Davis, Reena Murali, Remesh Babu K.R., (2020). Abusive Language Detection and Characterization of Twitter Behavior. International Journal of Computer Sciences and Engineering, 8(7), 155-161.
BibTex Citation
BibTex Style Citation:
@article{Davis_2020,
author = {Dincy Davis, Reena Murali, Remesh Babu K.R.},
title = {Abusive Language Detection and Characterization of Twitter Behavior},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2020},
volume = {8},
Issue = {7},
month = {7},
year = {2020},
issn = {2347-2693},
pages = {155-161},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5182},
doi = {https://doi.org/10.26438/ijcse/v8i7.155161}
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i7.155161}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5182
TI - Abusive Language Detection and Characterization of Twitter Behavior
T2 - International Journal of Computer Sciences and Engineering
AU - Dincy Davis, Reena Murali, Remesh Babu K.R.
PY - 2020
DA - 2020/07/31
PB - IJCSE, Indore, INDIA
SP - 155-161
IS - 7
VL - 8
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
267 | 464 downloads | 204 downloads |




Abstract
Abusive language refers to an insult or vulgarity which harass or deceive the target. Social media is a famous platform for the people to express their opinions publicly and to interact with other people in the world. Some of them may misuse their freedom of speech to bully others through abusive language. This will leads to the need for detecting abusive speech. Otherwise, it may severely impact the user?s online experience. It may be a time-consuming task if the detection and removal of such offensive material are done manually. Also, human supervision is unable to deal with large quantities of data. Therefore automatic abusive speech detection has become essential to be addressed effectively. For detecting abusive speech, context accompanying abusive speech is very useful. In this work, abusive language detection in online content is performed using Bidirectional Recurrent Neural Network (BiRNN) method. Here the main objective is to focus on various forms of abusive behaviors on Twitter and to detect whether a speech is abusive or not. The results are compared for various abusive behaviors in social media, with Convolutional Neural Netwrok (CNN) and Recurrent Neural Network (RNN) methods and proved that the proposed BiRNN is a better deep learning model for automatic abusive speech detection
Key-Words / Index Term
text classification, abusive language, BiRNN, deep learning, natural language processing
References
[1] A.M. Founta, C. Djouvas, D. Chatzakou, I. Leontiadis, J. Blackburn, G. Stringhini, A. Vakali, M. Sirivianos and N. Kourtellis, "Large scale crowdsourcing and characterization of twitter abusive behavior?, In Twelfth International AAAI Conference on Web and Social Media, USA, 2018
[2] P. Badjatiya, S. Gupta, M. Gupta, and V. Varma, ?Deep learning for hate speech detection in tweets?, In Proceedings of the 26th International Conference on World Wide Web Companion, Australia, pp. 759-760, 2017.
[3] B. Gamback, and U.K. Sikdar, ?Using convolutional neural networks to classify hate-speech?, In Proceedings of the first workshop on abusive language online, Canada, pp. 85-90, 2017. ISBN 978-1-945626-66-1.
[4] J.H. Park, and P. Fung, ?One-step and two-step classification for abusive language detection on twitter?, In Proceedings of the First Workshop on Abusive Language Online, Canada, pp. 41?45, 2017.
[5] J. Pavlopoulos, P. Malakasiotis, and I. Androutsopoulos, ?Deep learning for user comment moderation?, In Proceedings of the First Workshop on Abusive Language Online, Canada, pp, 25?35, 2017.
[6] D. Kumar, R. Cohen, and L. Golab, 2019, ?Online abuse detection: the value of preprocessing and neural attention models?, In Proceedings of the Tenth Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis, USA, pp. 16-24, 2019.
[7] Y. Lee, S. Yoon, and K. Jung, ?Comparative Studies of Detecting Abusive Language on Twitter?, Proceedings of the Second Workshop on Abusive Language Online, Belgium, pp. 101?106, 2018.
[8] F.J. Ordonez, and D. Roggen, ?Deep convolutional and lstm recurrent neural networks for multimodal wearable activity recognition?, Sensors, Vol.16(1), pp. 115, 2016.
[9] A. Anand, T. Chakraborty, and N. Park, ?We used neural networks to detect clickbaits: You won?t believe what happened next!?, In European Conference on Information Retrieval, Springer, Berlin, pp. 541-547, 2017.
[10] J. Pennington, R. Socher, and C.D. Manning, ?Glove: Global vectors for word representation?, In Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), Qatar, pp. 1532-1543, 2014.
[11] T. Mikolov, K. Chen, G. Corrado, and J. Dean, ?Efficient estimation of word representations in vector space?, International Conference on Learning Representations (ICLR), USA, 2013.
[12] W. McKinney, ?pandas: a foundational Python library for data analysis and statistics?, Python for High Performance and Scientific Computing, San Francisco, pp. 1-9, 2011.
[13] C. D. Manning, M. Surdeanu, J. Bauer, J. R. Finkel, S. Bethard, and D. McClosky, ?The Stanford CoreNLP natural language processing toolkit.?, In Proceedings of 52nd annual meeting of the association for computational linguistics: system demonstrations, Maryland, pp. 55-60, 2014.
[14] K.M. Hermann, T. Kocisky, E. Grefenstette, L. Espeholt, W. Kay, M. Suleyman, and P. Blunsom, ?Teaching machines to read and comprehend?, In Advances in neural information processing systems, Canada, pp. 1693-1701, 2015.
[15] D.P. Kingma, and L.J. Ba, ?Adam: A method for stochastic optimization?, International Conference on Learning Representations (ICLR), USA, 2015.
[16] G. E. Hinton, N. Srivastava, A. Krizhevsky, I. Sutskever, and R. R. Salakhutdinov, ?Improving neural networks by preventing co-adaptation of feature detectors?, CoRR, abs/1207.0580, 2012.