2019
DOI: 10.17705/1jais.00562
|View full text |Cite
|
Sign up to set email alerts
|

"Brute-Force Sentence Pattern Extortion from Harmful Messages for Cyberbullying Detection"

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 3 publications
0
12
0
Order By: Relevance
“…A known way to avoid over-consolidation is to use the lempos format (lemma with POS tag, e.g., “set NOUN”), as implemented by Akhtar, Sahoo, and Kumar (2017) and Ptaszynski et al . (2019). Moreover, some words require context to determine its true base form or lemma.…”
Section: Commonly Used Text Preprocessing Practicesmentioning
confidence: 99%
See 1 more Smart Citation
“…A known way to avoid over-consolidation is to use the lempos format (lemma with POS tag, e.g., “set NOUN”), as implemented by Akhtar, Sahoo, and Kumar (2017) and Ptaszynski et al . (2019). Moreover, some words require context to determine its true base form or lemma.…”
Section: Commonly Used Text Preprocessing Practicesmentioning
confidence: 99%
“…Both methods suffer from over-consolidation of words-assigning two word forms with clearly different meanings to the same token, such as mapping both "computer" and "computation" to the token "comput" (Jivani 2011). A known way to avoid over-consolidation is to use the lempos format (lemma with POS tag, e.g., "set_NOUN"), as implemented by Akhtar, Sahoo, and Kumar (2017) and Ptaszynski et al (2019). Moreover, some words require context to determine its true base form or lemma.…”
Section: Known Issuesmentioning
confidence: 99%
“…Another one was collected from Wykop 2 , which is a Polish social networking service. As feature selection and feature engineering have been proven to be integral parts of cyberbullying detection [35,59], the entries are provided as such, without additional preprocessing to allow researchers using the datasets apply their own preprocessing methods. The only preprocessing applied to the dataset was done only to mask private information, such as personal information of individuals (usernames, etc.…”
Section: Polish Datasetmentioning
confidence: 99%
“…Machine learning is one popular methodology for studying user‐generated content (Larsen et al ., 2019; Lukyanenko et al ., 2017; Ptaszynski et al ., 2019). Research shows that this method can support companies to recognize applicable content generated by social media (Vermeer et al ., 2019).…”
Section: Data Analysis: Detecting Ai‐enabled Social Bots On Twittermentioning
confidence: 99%