暂无分享,去创建一个
Aleksander Smywinski-Pohl | Michal Ptaszynski | Fumito Masui | Michal Wroczynski | Juuso Kalevi Kristian Eronen | Gniewosz Leliwa | Fumito Masui | Aleksander Smywinski-Pohl | M. Ptaszynski | J. Eronen | Gniewosz Leliwa | Michal Wroczynski | Aleksander Smywiński-Pohl
[1] Pawel Dybala,et al. In the Service of Online Order: Tackling Cyber-Bullying with Machine Learning and Affect Analysis , 2010 .
[2] Jaideep Yadav,et al. Cyberbullying Detection using Pre-Trained BERT Model , 2020, 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC).
[3] Hamid R. Arabnia,et al. Improving cyberbullying detection using Twitter users' psychological features and machine learning , 2020, Comput. Secur..
[4] Anbumani Subramanian,et al. Measures of Complexity for Large Scale Image Datasets , 2020, 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).
[5] Linguistic Complexity , 2020, Linguistics.
[6] Oren Etzioni,et al. Green AI , 2019, Commun. ACM.
[7] Kai Eckert,et al. Cyberbullying Detection in Social Networks Using Deep Learning Based Models; A Reproducibility Study , 2018, DaWaK.
[8] Omer Levy,et al. RoBERTa: A Robustly Optimized BERT Pretraining Approach , 2019, ArXiv.
[9] Andrew McCallum,et al. Energy and Policy Considerations for Deep Learning in NLP , 2019, ACL.
[10] Ricardo Ribeiro,et al. Automatic cyberbullying detection: A systematic review , 2019, Comput. Hum. Behav..
[11] Wenhu Chen,et al. How Large a Vocabulary Does Text Classification Need? A Variational Approach to Vocabulary Selection , 2019, NAACL.
[12] Regina Barzilay,et al. Cross-Lingual Alignment of Contextual Word Embeddings, with Applications to Zero-shot Dependency Parsing , 2019, NAACL.
[13] Anders Søgaard,et al. A Survey of Cross-lingual Word Embedding Models , 2017, J. Artif. Intell. Res..
[14] M. Apple,et al. Developing writing fluency and lexical complexity with blogs , 2006, The JALT CALL Journal.
[15] Kenji Araki,et al. Brute - Force Sentence Pattern Extortion from Harmful Messages for Cyberbullying Detection , 2019, J. Assoc. Inf. Syst..
[16] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[17] Jayme G. A. Barbedo,et al. Impact of dataset size and variety on the effectiveness of deep learning and transfer learning for plant disease classification , 2018, Comput. Electron. Agric..
[18] Aleksander Smywinski-Pohl,et al. Cyberbullying Detection - Technical Report 2/2018, Department of Computer Science AGH, University of Science and Technology , 2018, ArXiv.
[19] Amit Awekar,et al. Deep Learning for Detecting Cyberbullying Across Multiple Social Media Platforms , 2018, ECIR.
[20] Mark Steedman,et al. Predicting accuracy on large datasets from smaller pilot data , 2018, ACL.
[21] Marcin Blachnik,et al. Instance Selection for Classifier Performance Estimation in Meta Learning , 2017, Entropy.
[22] M. P. S. Bhatia,et al. Content based approach to find the credibility of user in social networks: an application of cyberbullying , 2015, International Journal of Machine Learning and Cybernetics.
[23] Tomas Mikolov,et al. Bag of Tricks for Efficient Text Classification , 2016, EACL.
[24] Fumito Masui,et al. Learning Deep on Cyberbullying is Always Better Than Brute Force , 2017, LaCATODA@IJCAI.
[25] Suresh Manandhar,et al. Dependency Based Embeddings for Sentence Classification Tasks , 2016, NAACL.
[26] Kenji Araki,et al. Sustainable cyberbullying detection with category-maximized relevance of harmful phrases and double-filtered automatic optimization , 2016, Int. J. Child Comput. Interact..
[27] Michal Ptaszynski,et al. Statistical Analysis of Automatic Seed Word Acquisition to Improve Harmful Expression Extraction in Cyberbullying Detection , 2016 .
[28] Tianqi Chen,et al. XGBoost: A Scalable Tree Boosting System , 2016, KDD.
[29] Ryan Cotterell,et al. Morphological Word-Embeddings , 2019, NAACL.
[30] Hai Zhao,et al. Part-of-Speech Tagging with Bidirectional Long Short-Term Memory Recurrent Neural Network , 2015, ArXiv.
[31] Kenji Araki,et al. Brute Force Works Best Against Bullying , 2015, CPCR+ITWP@IJCAI.
[32] A. Madabhushi,et al. Predicting Classifier Performance with Limited Training Data: Applications to Computer-Aided Diagnosis in Breast and Prostate Cancer , 2015, PloS one.
[33] J. M. Sforcin,et al. Nitric Oxide and Brazilian Propolis Combined Accelerates Tissue Repair by Modulating Cell Migration, Cytokine Production and Collagen Deposition in Experimental Leishmaniasis , 2015, PloS one.
[34] Kenji Araki,et al. Extracting Patterns of Harmful Expressions for Cyberbullying Detection , 2015 .
[35] Arzucan Özgür,et al. Improving Named Entity Recognition for Morphologically Rich Languages Using Word Embeddings , 2014, 2014 13th International Conference on Machine Learning and Applications.
[36] Yoon Kim,et al. Convolutional Neural Networks for Sentence Classification , 2014, EMNLP.
[37] Omer Levy,et al. Dependency-Based Word Embeddings , 2014, ACL.
[38] Senén Barro,et al. Do we need hundreds of classifiers to solve real world classification problems? , 2014, J. Mach. Learn. Res..
[39] Jun Zhao,et al. A Weakly Supervised Bayesian Model for Violence Detection in Social Media , 2013, IJCNLP.
[40] Kenji Araki,et al. Detecting Cyberbullying Entries on Informal School Websites Based on Category Relevance Maximization , 2013, IJCNLP.
[41] Kelly Reynolds,et al. Detecting cyberbullying: query terms and techniques , 2013, WebSci.
[42] Mark D. Johnson,et al. The effect of planning sub-processes on L2 writing fluency, grammatical complexity, and lexical complexity , 2012 .
[43] Henry Lieberman,et al. Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying , 2012, TIIS.
[44] J. Pyżalski. From cyberbullying to electronic aggression: typology of the phenomenon , 2012 .
[45] Nitish Srivastava,et al. Improving neural networks by preventing co-adaptation of feature detectors , 2012, ArXiv.
[46] Elizabeth F. Churchill,et al. Automatic identification of personal insults on social news sites , 2012, J. Assoc. Inf. Sci. Technol..
[47] Klaus-Robert Müller,et al. Efficient BackProp , 2012, Neural Networks: Tricks of the Trade.
[48] Kelly Reynolds,et al. Using Machine Learning to Detect Cyberbullying , 2011, 2011 10th International Conference on Machine Learning and Applications and Workshops.
[49] Glen Bull,et al. The Always-Connected Generation. , 2010 .
[50] Sven Behnke,et al. Evaluation of Pooling Operations in Convolutional Architectures for Object Recognition , 2010, ICANN.
[51] Justin W. Patchin,et al. Bullying, Cyberbullying, and Suicide , 2010, Archives of suicide research : official journal of the International Academy for Suicide Research.
[52] Anant Madabhushi,et al. Predicting classifier performance with a small training set: Applications to computer-aided diagnosis and prognosis , 2010, 2010 IEEE International Symposium on Biomedical Imaging: From Nano to Macro.
[53] Pawel Dybala,et al. Machine Learning and Affect Analysis Against Cyber-Bullying , 2010 .
[54] Xiaofei Lu,et al. Automatic analysis of syntactic complexity in second language writing , 2010 .
[55] Banu Diri,et al. Investigating the effect of dataset size, metrics sets, and feature selection techniques on software fault prediction problem , 2009, Inf. Sci..
[56] Justin W. Patchin,et al. Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying , 2008 .
[57] Jason Weston,et al. A unified architecture for natural language processing: deep neural networks with multitask learning , 2008, ICML '08.
[58] P. Roy,et al. Exploring the impact of size of training sets for the development of predictive QSAR models , 2008 .
[59] Sue Abell,et al. Bullying , 2006 .
[60] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[61] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[62] Michael L. Littman,et al. Unsupervised Learning of Semantic Orientation from a Hundred-Billion-Word Corpus , 2002, ArXiv.
[63] Nitesh V. Chawla,et al. SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..
[64] Hilan Bensusan,et al. Estimating the Predictive Accuracy of a Classifier , 2001, ECML.
[65] Trevor Hastie,et al. The Elements of Statistical Learning , 2001 .
[66] Susana M. Sotillo. Discourse Functions and Syntactic Complexity in Synchronous and Asynchronous Communication , 2000 .
[67] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1997, EuroCOLT.
[68] João Gama,et al. Characterization of Classification Algorithms , 1995, EPIA.
[69] David J. Spiegelhalter,et al. Machine Learning, Neural and Statistical Classification , 2009 .
[70] F. Ferreira. Effects of length and syntactic complexity on initiation times for prepared utterances , 1991 .
[71] K. Rayner,et al. Lexical complexity and fixation times in reading: Effects of word frequency, verb complexity, and lexical ambiguity , 1986, Memory & cognition.
[72] Anne Cutler,et al. Lexical complexity and sentence processing , 1983 .
[73] G. Schwarz. Estimating the Dimension of a Model , 1978 .
[74] H. Akaike. A new look at the statistical model identification , 1974 .