2021
DOI: 10.1016/j.eswa.2021.114762
|View full text |Cite
|
Sign up to set email alerts
|

A probabilistic clustering model for hate speech classification in twitter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 42 publications
(19 citation statements)
references
References 51 publications
0
15
0
Order By: Relevance
“…The first step is to incorporate the Twitter data upon which a comprehensive pre-processing method has been carried out, afterwards extraction of features from the resulting pre-processed tweets has been accomplished. Finally, proposed ensemble methods have been introduced to predict if any unknown test tweet is hateful or nonhateful [29], which means the final decisional outcome is produced based on the ensemble classifiers' output [35][36][37][38][39][40][41][42]. For each tweet we performed the following:…”
Section: Dataset Preparation and Preprocessingmentioning
confidence: 99%
“…The first step is to incorporate the Twitter data upon which a comprehensive pre-processing method has been carried out, afterwards extraction of features from the resulting pre-processed tweets has been accomplished. Finally, proposed ensemble methods have been introduced to predict if any unknown test tweet is hateful or nonhateful [29], which means the final decisional outcome is produced based on the ensemble classifiers' output [35][36][37][38][39][40][41][42]. For each tweet we performed the following:…”
Section: Dataset Preparation and Preprocessingmentioning
confidence: 99%
“…Topic classification for social media aims to detect and track general topics such as “Baseball” or “Fashion”. In previous work, researchers have collected labeled data either by using a single hashtag for each topic ( Lin, Snow & Morgan, 2011 ), a user-defined query for each topic ( Magdy & Elsayed, 2014 ), manual labeling ( Daouadi, Zghal Rebaï & Amous, 2021 ; Ayo et al, 2021 ), or co-training based on the URLs and text of the tweet ( Yang et al, 2014 ). We expand on Lin, Snow & Morgan (2011) ’s work and use a set of hashtags instead of a single hashtag.…”
Section: Related Workmentioning
confidence: 99%
“…One step to make this society more secure is detecting and removing these duplicate profiles. These profiles can induce unethical thinking or activities, such as sexist ideologies [8]. Sometimes, the aim is to detect specific topics in real-time [9].…”
Section: Introductionmentioning
confidence: 99%