Learning Deep on Cyberbullying is Always Better Than Brute Force
暂无分享,去创建一个
Fumito Masui | Michal Ptaszynski | Juuso Kalevi Kristian Eronen | Fumito Masui | M. Ptaszynski | J. Eronen
[1] Walter Daelemans,et al. Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP) , 2014, EMNLP 2014.
[2] Kenji Araki,et al. Extracting Patterns of Harmful Expressions for Cyberbullying Detection , 2015 .
[3] Sven Behnke,et al. Evaluation of Pooling Operations in Convolutional Architectures for Object Recognition , 2010, ICANN.
[4] Myrna E. Morales. Cyberbullying , 2011 .
[5] William W. Cohen. Fast Effective Rule Induction , 1995, ICML.
[6] Glen Bull,et al. The Always-Connected Generation. , 2010 .
[7] Henry Lieberman,et al. Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying , 2012, TIIS.
[8] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[9] Robert Zheng,et al. Evolving Psychological and Educational Perspectives on Cyber Behavior , 2012 .
[10] Elizabeth F. Churchill,et al. Automatic identification of personal insults on social news sites , 2012, J. Assoc. Inf. Sci. Technol..
[11] Kenji Araki,et al. Detecting Cyberbullying Entries on Informal School Websites Based on Category Relevance Maximization , 2013, IJCNLP.
[12] J. Pyżalski,et al. Empathy and Moral Disengagement in Adolescent Cyberbullying: Implications for Educational Intervention and Pedagogical Practice , 2012 .
[13] D. Ruppert. The Elements of Statistical Learning: Data Mining, Inference, and Prediction , 2004 .
[14] Justin W. Patchin,et al. Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying , 2008 .
[15] D. Mant. Prevention , 1994, The Lancet.
[16] Kelly Reynolds,et al. Detecting cyberbullying: query terms and techniques , 2013, WebSci.
[17] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[18] Wiley Interscience. Journal of the American Society for Information Science and Technology , 2013 .
[19] Pawel Dybala,et al. In the Service of Online Order: Tackling Cyber-Bullying with Machine Learning and Affect Analysis , 2010 .
[20] D. Rutter. Communicating by telephone , 1987 .
[21] Kenji Araki,et al. Brute Force Works Best Against Bullying , 2015, CPCR+ITWP@IJCAI.
[22] Graham Neubig,et al. Language Resource Addition: Dictionary or Corpus? , 2014, LREC.
[23] A. Sourander,et al. Psychosocial risk factors associated with cyberbullying among adolescents: a population-based study. , 2010, Archives of general psychiatry.
[24] Leslie Haddon,et al. Comparing children’s online opportunities and risks across Europe: cross-national comparisons for EU Kids Online , 2008 .
[25] M. P. S. Bhatia,et al. Content based approach to find the credibility of user in social networks: an application of cyberbullying , 2015, International Journal of Machine Learning and Cybernetics.
[26] Yuji Matsumoto,et al. Japanese Dependency Analysis using Cascaded Chunking , 2002, CoNLL.
[27] J. van Leeuwen,et al. Neural Networks: Tricks of the Trade , 2002, Lecture Notes in Computer Science.
[28] Jason Weston,et al. A unified architecture for natural language processing: deep neural networks with multitask learning , 2008, ICML '08.
[29] Robin M. Kowalski,et al. Electronic bullying among middle school students. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[30] Kenji Araki,et al. Sustainable cyberbullying detection with category-maximized relevance of harmful phrases and double-filtered automatic optimization , 2016, Int. J. Child Comput. Interact..
[31] Justin W. Patchin,et al. Bullying, Cyberbullying, and Suicide , 2010, Archives of suicide research : official journal of the International Academy for Suicide Research.
[32] Peter D. Turney. Thumbs Up or Thumbs Down? Semantic Orientation Applied to Unsupervised Classification of Reviews , 2002, ACL.
[33] D. Cross,et al. Australian covert bullying prevalence study , 2009 .
[34] Jun Zhao,et al. A Weakly Supervised Bayesian Model for Violence Detection in Social Media , 2013, IJCNLP.
[35] J. Pyżalski. From cyberbullying to electronic aggression: typology of the phenomenon , 2012 .