Optimized Twitter Cyberbullying Detection based on Deep Learning
暂无分享,去创建一个
[1] Karolien Poels,et al. Automatic monitoring of cyberbullying on social networking sites: From technological feasibility to desirability , 2015, Telematics Informatics.
[2] Zbigniew Michalewicz,et al. Genetic algorithms + data structures = evolution programs (3rd ed.) , 1996 .
[3] Joemon M. Jose,et al. Building a large-scale corpus for evaluating event detection on twitter , 2013, CIKM.
[4] Zong Woo Geem,et al. A New Heuristic Optimization Algorithm: Harmony Search , 2001, Simul..
[5] Henry Lieberman,et al. Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying , 2012, TIIS.
[6] Xiang Zhang,et al. Character-level Convolutional Networks for Text Classification , 2015, NIPS.
[7] Rashmi Shetgiri. Bullying and victimization among children. , 2013, Advances in pediatrics.
[8] Tong Zhang,et al. Effective Use of Word Order for Text Categorization with Convolutional Neural Networks , 2014, NAACL.
[9] Chaoyi Pang,et al. Semi-supervised Learning for Cyberbullying Detection in Social Networks , 2014, ADC.
[10] Jimmy J. Lin,et al. Quantitative evaluation of passage retrieval algorithms for question answering , 2003, SIGIR.
[11] Amber N. Schroeder,et al. Chapter 14 Cyber Bullying Among College Students: Evidence from Multiple Domains of College Life , 2012 .
[12] Shivakant Mishra,et al. Prediction of Cyberbullying Incidents on the Instagram Social Network , 2015, ArXiv.
[13] Walter Daelemans,et al. Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP) , 2014, EMNLP 2014.
[14] Dolf Trieschnigg,et al. Improving Cyberbullying Detection with User Context , 2013, ECIR.
[15] Peter K. Smith,et al. Cyberbullying: another main type of bullying? , 2008, Scandinavian journal of psychology.
[16] Qianjia Huang,et al. Cyber Bullying Detection Using Social and Textual Analysis , 2014, SAM '14.
[17] Cécile Favre,et al. Event detection, tracking, and visualization in Twitter: a mention-anomaly-based approach , 2015, Social Network Analysis and Mining.
[18] James H. Jones,et al. Detection of Abusive Accounts with Arabic Tweets , 2022 .
[19] Elizabeth F. Churchill,et al. Automatic identification of personal insults on social news sites , 2012, J. Assoc. Inf. Sci. Technol..
[20] R. Donegan. Bullying and Cyberbullying : History , Statistics , Law , Prevention and Analysis , 2012 .
[21] J. I. Sheeba,et al. Online Social Network Bullying Detection Using Intelligence Techniques , 2015 .
[22] Kelly Reynolds,et al. Using Machine Learning to Detect Cyberbullying , 2011, 2011 10th International Conference on Machine Learning and Applications and Workshops.
[23] Abhishek Agrawal,et al. Methods for detection of cyberbullying: A survey , 2015, 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA).
[24] T.G.I. Fernando,et al. A Comparative Study on Nature Inspired Algorithms with Firefly Algorithm , 2014 .
[25] Hila Becker,et al. Beyond Trending Topics: Real-World Event Identification on Twitter , 2011, ICWSM.
[26] Xue Li,et al. An Effective Approach for Cyberbullying Detection , 2013 .
[27] Jeffrey Pennington,et al. GloVe: Global Vectors for Word Representation , 2014, EMNLP.
[28] Abhishek Agrawal,et al. Automatic Monitoring and Prevention of Cyberbullying , 2016 .
[29] Rui Li,et al. TEDAS: A Twitter-based Event Detection and Analysis System , 2012, 2012 IEEE 28th International Conference on Data Engineering.