2021
DOI: 10.1007/s40747-021-00487-7
|View full text |Cite
|
Sign up to set email alerts
|

Hatred and trolling detection transliteration framework using hierarchical LSTM in code-mixed social media text

Abstract: The paper describes the usage of self-learning Hierarchical LSTM technique for classifying hatred and trolling contents in social media code-mixed data. The Hierarchical LSTM-based learning is a novel learning architecture inspired from the neural learning models. The proposed HLSTM model is trained to identify the hatred and trolling words available in social media contents. The proposed HLSTM systems model is equipped with self-learning and predicting mechanism for annotating hatred words in transliteration … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 109 publications
(7 citation statements)
references
References 51 publications
0
7
0
Order By: Relevance
“…The clauses for the fitness tests can also be further modified to check the strength of the keys and make them less vulnerable to attack from intruders. Cheating [ 30 ], Spoofing [ 31 ], and Intrusion [ 32 ] Detection systems are garnering a lot of research interest and will be studied later on. Other domains such as Neural networks, Machine Learning, Blockchain Technology [ 33 ], and Game Theory based Authentication [ 34 ] and their applications in the field of Cryptology will be explored in future endeavours.…”
Section: Discussionmentioning
confidence: 99%
“…The clauses for the fitness tests can also be further modified to check the strength of the keys and make them less vulnerable to attack from intruders. Cheating [ 30 ], Spoofing [ 31 ], and Intrusion [ 32 ] Detection systems are garnering a lot of research interest and will be studied later on. Other domains such as Neural networks, Machine Learning, Blockchain Technology [ 33 ], and Game Theory based Authentication [ 34 ] and their applications in the field of Cryptology will be explored in future endeavours.…”
Section: Discussionmentioning
confidence: 99%
“…Compression after impact (CAI) conduct, the evolution of damage in tubular composite sandwich structures, and the dynamic impact reaction and failure mechanisms of tubular composite frameworks with a Nomex honeycomb core have not received much attention from researchers. Due to the dearth of research in these disciplines, there has become a lack of understanding regarding the grasp of these unique qualities [14]. The PMI Foam Reinforced Kagome Honeycomb Composite Sandwich Systems (PKCSS), a distinctive structure, is made by incorporating PMI foams inside the Kagome honeycomb structure's base cells.…”
Section: Honeycombmentioning
confidence: 99%
“…Hate speech is one of the most commonly trolling techniques that are used for cyberbullying. This kind of aggression-when it happens-in which a social media platform such as Twitter becomes a complex phenomenon, and many collaborative research fields are trying to solve this critical problem [6]. In the literature, many other works also have tried to address these issues, such as cyberbullying [6,7], trolling [8], extremism [9], hate speech [10,11] and racism [12,13].…”
Section: Related Workmentioning
confidence: 99%
“…This kind of aggression-when it happens-in which a social media platform such as Twitter becomes a complex phenomenon, and many collaborative research fields are trying to solve this critical problem [6]. In the literature, many other works also have tried to address these issues, such as cyberbullying [6,7], trolling [8], extremism [9], hate speech [10,11] and racism [12,13]. There are different approaches that could be applicable for feature engineering, including N-gram to generate the vectors from dictionary of hate-related words [14][15][16].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation