<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Deep analysis in aggressive Mexican tweets</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Simona Frenda</string-name>
          <email>sfrenda@unito.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Somnath Banerjee</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Jadavpur University</institution>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Universitat Politecnica de Valencia</institution>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Turin</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <fpage>108</fpage>
      <lpage>113</lpage>
      <abstract>
        <p>The importance of the detection of aggressiveness in social media is due to real e ects of violence provoked by negative behavior online. Indeed, this kind of legal cases are increasing in the last years. For this reason, the necessity of controlling user-generated contents has become one of the priorities for many Internet companies, although current methodologies are far from solving this problem. Therefore, in this work we propose an innovative approach that combines deep learning framework with linguistic features speci c for this issue. This approach has been evaluated and compared with other ones in the framework of the MEX-A3T shared task at IberEval on aggressiveness analysis in Spanish Mexican tweets. In spite of our novel approach, we obtained low results.</p>
      </abstract>
      <kwd-group>
        <kwd>Aggressiveness Detection Deep Learning Linguistic Analysis</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The opinions expressed online by users are usually uncontrolled and this lack of
control facilitates and supports negative online behaviors such as cyberbullying,
racism, sexism and any form of hate. In the last few years, governments, social
media platforms, Internet companies and communities of citizens are spending
a growing amount of e orts to monitor and contrast such forms of online
aggressive behaviors and attitudes, with the main aim of limiting it. An example
of governmental dedication about this subject is the campaign No Hate Speech
Movement of the Council of Europe for human rights online. On the academic
side, the research interest about this issue is increasing and the approach is
naturally interdisciplinary. Especially in the natural language processing (NLP) eld,
the attention is supported by international and national workshops or campaigns
of evaluation like the competition proposed in the framework of IberEval 2018 by
the organizers of MEX-A3T4 [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] on the aggressiveness analysis in Twitter. This
track proposes to detect the aggressiveness on Mexican Spanish tweets providing
texts containing o ensive messages that disparage or humiliate speci c target.
In this paper we present our participation in this task proposing a new approach
4 https://mexa3t.wixsite.com/home/aggressive-detection-track
2
that combines deep learning with linguistic features.
      </p>
      <p>The remainder of the paper is organized as follows. In Section 2 we describe
synthetically the previous approaches used until today. In Section 3 we present
our proposal followed by the results obtained in the competition (Section 4).
Finally, in Section 5 we draw some conclusions.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        Currently, commercial and simple methods to deal with the automatic detection
of negative online behaviors rely on the use of blacklists , essentially composed
with slurs and swear words. However, ltering the messages in this way does not
provide a su cient remedy because it falls short when user-generated content
is more subtle. Therefore, the research challenges in this eld are oriented at
investigating deeply all dimensions of language and also the communication on
the Web, to envision deeper and more sophisticated solutions exploiting surface
features ([
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]), syntactic features [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], semantic and conceptual features,
polarity information [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], word-embedding techniques ([
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]), world knowledge
information from ontologies [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], or proposing pro le-based approach [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Some
authors focus also on the extraction of meta-information from social platforms
about users (like gender) and on their social activity (like history or
geolocalization of posts) as predictive features [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In addition, some scholars take advantage
of the connection between sentiment analysis and hate speech, bene ting from
sentiment lexicons [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] or using a multi-step approach that combines sentiment
or subjectivity classi ers with systems of hate speech detection ([
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]). This
relation is due to the fact that hate speech expressions mostly exhibit a negative
polarity, although the polarity intensity depends above all on cultural factors.
Indeed, the aggressiveness involves di erent aspects of the user/author of the
message that are di cult to de ne. So, taking into account the literature, we
analyzed linguistically the data and we tried to understand what are the
characteristics of aggressive tweets in the context of the Mexican culture and also
the emotions that arouse this behavior.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Methodology</title>
      <p>
        The common approach to detect aggressiveness online is formulating a prediction
task, and in particular MEX-A3T organizers proposed a classi cation task with
the aim to distinguish aggressive tweet from the non-aggressive [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Considering
the complexity of this task, we needed to analyze the provided data in order to
contemplate the di erent factors involved: linguistic characteristics proper of a
tweet (like shortness or informal language), emotive traits of the aggressiveness
and cultural aspects considering the fact that the provided data are geolocalized
in Mexico. Therefore, we propose in this paper an innovative approach that
incorporates linguistic features into deep learning architecture.
      </p>
      <p>In the next subsections we describe the set of features provided along with the
training data and deep learning architecture operations.</p>
      <sec id="sec-3-1">
        <title>Linguistic Features</title>
        <p>The linguistic features employed aim to cover all the above aspects about the
aggressiveness in the context of a tweet. Textual features As textual features we
take into account the polarity (positive/negative/neutral) of emoticons5, used
especially for giving contextual information to readers.</p>
        <p>Style and writing density We consider also stylistic traits of authors, such as:
the use of speci c abbreviations used in Mexican tweets (hdp, alv), the number
of characters per sentence and word, the use of some elements of punctuation
(question, exclamation marks and sequences of dots) and the uppercase
characters, inspecting if the user writes all in uppercase or just some letters.</p>
        <p>Bag of words In order to understand the importance of some words respect
to others, we extract trigrams of words weighted with tf-idf.</p>
        <p>Lists of aggressive words Considering the fact that the aggressive text aims to
o end, attack, humiliate and hurt an individual or collective target, we created
two lists containing speci cally derogatory adjectives and vulgar expressions like
profanities and insults (chinga a tu madre, vete a la verga).</p>
        <p>Syntactic patterns Another factor involved in aggressive texts is the target,
implicit or explicit, to whom the insults or profanities are addressed.
Therefore, we examined the syntactic combinations of target explicited with mention
(@usuario) or proper name with derogatory adjectives and vulgar expressions.</p>
        <p>
          A ective features Finally, as said above, we take into account the emotions
concerning aggressiveness and we observed that anger and disgust are the
principal emotions that provoke this kind of behavior. For this feature, we used Spanish
Emotion Lexicon (SEL) provided by [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] and [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], considering the words with a
higher Probability Factor of A ective use in Spanish language. In addition, we
increased it with slang words usually used in social networks [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], taking into
consideration also the cases of synonymy.
        </p>
        <p>
          In order to allow our architecture to process these features, we preprocessed
the data deleting symbols and urls that can hinder the process of extraction of
features and pos-tagging the texts using FreeLing [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
3.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Deep Learning Framework</title>
        <p>
          In this section, we describe the deep learning (DL) framework for detecting
the aggressive tweets. The proposed model is inspired by the deep architecture
proposed in [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. They combined the feature engineering with DL and increased
the classi cation accuracy for the code-mixed question classi cation task [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
To understand the e ectiveness of combining feature engineering with the DL
framework, we have experimented with two setups: one with feature engineering
and another without it. Therefore, we have proposed two models: Model-1 is
based on the DL framework with feature engineering and Model-2 is based on DL
5 The annotated list of emoticons used for this work is provided by the Unicode
Consortium: http://www.unicode.org/
4
framework without feature engineering. The deep learning framework is based
on Convolutional Neural Network (CNN).
        </p>
        <p>Embedding layer: Instead of using any pre-trained word embedding scheme,
we have built a vocabulary table which is learned from the training data. The
embedding layer works as a lookup table which maps vocabulary word indices
into low-dimensional vector representations. As the aggressive tweets are of
variable length, we used the zero-padding (i.e., the missing part replaced by zeros)
to maintain the input vector to a xed size L.</p>
        <p>Features: For Model-1, we integrated the features in the embeddings. We
derived a feature set as described in Section 3.1. We combined these features with
DL in Model-1. However, we did not combine the features with DL framework
in Model-2.</p>
        <p>Convolutional layer: Let ti 2 Rk be the k-dimensional vector corresponding
to the i-th word in the tweet. A tweet is represented as t1:n = t1 t2 ::: tn,
where, the tweet contains the words t1; t2; : : : ; tn and is the concatenation
operator.</p>
        <p>Also, let tf1:m = tf1 tf2 ::: tfm be the feature set for the tweet t1:n. After
combining the feature set tf1:m with the vector representation of the tweet t1:n,
the resulting vector is l1:m+n = tf1:m t1:n. Therefore, l1:m+n = l1 l2 ::: lm+n,
where either li 2 tf1:m or li 2 t1:n.</p>
        <p>Let li:i+j refer to the concatenation of li; li+1; : : : ; li+j . In the convolution
operation, the lter w 2 Rhk is applied to a window of h words to produce
new features such as feature si is generated from a window of words li:i+h1
by si = f (w:li:i+h 1 + b), where, b 2 R is a bias term and f is a non-linear
function. A feature map s = [s1; s2; : : : ; snh+1] (where, s 2 Rn h+1) is
produced by applying the aforesaid lter to each possible window of h words (i.e.,
fl1:h; l2:h+1; : : : ; lnh+1:ng) in the tweet. The max-pooling operation is applied to
the feature map s to obtain the maximum value s0 = maxfsg for the particular
lter. The objective of the max pooling is to capture the most important feature
with the highest value for each feature map. However, the proposed architecture
uses multiple lters with varying window sizes to obtain multiple features. Then,
these features are passed to the next layer, i.e., a fully-connected layer.</p>
        <p>Fully-connected layer: The fully-connected layer is also known as the dense
layer. The max-pooling operation selects the best features from each
convolutional kernel. Thus, all the resulting features which are selected from the
maxpooling are combined in the fully-connected layer. The output of fully connected
layer is passed to the output layer.</p>
        <p>Output layer: The nal layer (i.e., the output layer) is made of 2 neurons as
the given tweets are of 2 target classes (i.e., aggressive and non aggressive). The
output layer uses `softmax' as the nonlinear activation function.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Results</title>
      <p>In the framework of the evaluation campaign, we have submitted two runs: the
DL based on CNN with feature engineering (DLF+FE) and a simple DL
framework based on CNN (DLF). In order to evaluate the performance of the systems
in the competition, the organizers use the F-measure of aggressiveness class. In
Table 1, we report the scores obtained along with our position in the ranking for
the aggressive tweets prediction. In spite of the novelty of our approach, the
results are low and the feature engineering does not outperform the deep learning
based model.
In this work, we investigate the automatic detection of aggressive texts by
incorporating linguistic features into deep learning architecture. Considering the
low results, we carry out error analysis that reveals that our systems mainly
fail to classify tweets with orthographic errors and sarcastic or ironic utterances,
such as: \USUARIO #LOS40MeetAndGreet 9. Por q es una mama luchona que
cuida a su bendicion"; \Quiero hablar con el que invento el hecho de \levantarse
temprano" Que xxxxx estaba pensando". Therefore, taking into account these
observations, we will investigate the use of humorous devices to express
negative opinions. Moreover, as future work, in order to make deeper analysis about
the impact of feature engineering on deep learning approach, we would like to
propose this approach in similar research issues.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgement References</title>
      <p>The work of Simona Frenda was partially funded by the Spanish MINECO under
the research project SomEMBED (TIN2015-71147-C2-1-P).</p>
      <p>Frenda et al.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Alvarez-Carmona</surname>
            ,
            <given-names>Miguel A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Guzman-Falcon</surname>
          </string-name>
          ,
          <article-title>Estefan a and Montes-y-</article-title>
          <string-name>
            <surname>Gomez</surname>
          </string-name>
          ,
          <article-title>Manuel and Escalante, Hugo Jair and Villasen~or-Pineda, Luis and Reyes-Meza, Veronica and Rico-Sulayes, Antonio: Overview of MEX-A3T at IberEval 2018: Authorship and aggressiveness analysis in Mexican Spanish tweets</article-title>
          .
          <source>Notebook Papers of 3rd SEPLN Workshop on Evaluation of Human Language Technologies for Iberian Languages (IBEREVAL)</source>
          , Seville, Spain, September (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Banerjee</surname>
          </string-name>
          , Somnath, Sudip Kumar Naskar, Paolo Rosso, and Sivaji Bandyopadhyay:
          <article-title>The First Cross-Script Code-Mixed Question Answering Corpus</article-title>
          . In MultiLingMine@ ECIR, pp.
          <fpage>56</fpage>
          -
          <lpage>65</lpage>
          . (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Banerjee</surname>
          </string-name>
          , Somnath, Sudip Naskar, Paolo Rosso, and Sivaji Bandyopadhyay:
          <article-title>Code mixed cross script factoid question classi cation-A deep learning approach</article-title>
          .
          <source>Journal of Intelligent &amp; Fuzzy Systems</source>
          <volume>34</volume>
          , no.
          <volume>5</volume>
          :
          <fpage>2959</fpage>
          -
          <lpage>2969</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Burnap</surname>
          </string-name>
          , Pete, and
          <string-name>
            <surname>Matthew L. Williams</surname>
          </string-name>
          <article-title>: Us and them: identifying cyber hate on Twitter across multiple protected characteristics</article-title>
          .
          <source>EPJ Data Science</source>
          <volume>5</volume>
          , no.
          <volume>1</volume>
          :
          <fpage>11</fpage>
          . (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Carreras</surname>
          </string-name>
          , Xavier, Isaac Chao, Lluis Padr, and Muntsa Padr:
          <article-title>FreeLing: An OpenSource Suite of Language Analyzers</article-title>
          . In LREC, pp.
          <fpage>239</fpage>
          -
          <lpage>242</lpage>
          . (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Chen</surname>
          </string-name>
          , Ying, Yilu Zhou, Sencun Zhu, and Heng Xu:
          <article-title>Detecting o ensive language in social media to protect adolescent online safety</article-title>
          .
          <source>In Privacy, Security, Risk and Trust (PASSAT)</source>
          ,
          <source>2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom)</source>
          , pp.
          <fpage>71</fpage>
          -
          <lpage>80</lpage>
          . IEEE. (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Dadvar</surname>
          </string-name>
          , Maral, Dolf Trieschnigg, Roeland Ordelman, and Franciska de Jong:
          <article-title>Improving cyberbullying detection with user context</article-title>
          .
          <source>In European Conference on Information Retrieval</source>
          , pp.
          <fpage>693</fpage>
          -
          <lpage>696</lpage>
          . Springer, Berlin, Heidelberg. (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Dinakar</surname>
            , Karthik, Birago Jones, Catherine Havasi,
            <given-names>Henry</given-names>
          </string-name>
          <string-name>
            <surname>Lieberman</surname>
          </string-name>
          , and Rosalind Picard:
          <article-title>Common sense reasoning for detection, prevention, and mitigation of cyberbullying</article-title>
          .
          <source>ACM Transactions on Interactive Intelligent Systems (TiiS) 2</source>
          , no.
          <volume>3</volume>
          :
          <fpage>18</fpage>
          . (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Escalante</surname>
            , Hugo Jair, Esa Villatoro-Tello,
            <given-names>Sara E.</given-names>
          </string-name>
          <string-name>
            <surname>Garza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Pastor</surname>
          </string-name>
          Lpez-Monroy,
          <article-title>Manuel Montes-y-</article-title>
          <string-name>
            <surname>Gmez</surname>
          </string-name>
          , and
          <string-name>
            <surname>Luis</surname>
          </string-name>
          Villaseor-Pineda:
          <article-title>Early detection of deception and aggressiveness using pro le-based representations</article-title>
          .
          <source>Expert Systems with Applications</source>
          <volume>89</volume>
          :
          <fpage>99</fpage>
          -
          <lpage>111</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Gitari</surname>
          </string-name>
          , Njagi Dennis, Zhang Zuping,
          <article-title>Hanyurwimfura Damien, and Jun Long: A lexicon-based approach for hate speech detection</article-title>
          .
          <source>International Journal of Multimedia and Ubiquitous Engineering</source>
          <volume>10</volume>
          , no.
          <volume>4</volume>
          :
          <fpage>215</fpage>
          -
          <lpage>230</lpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Justo</surname>
          </string-name>
          , Raquel, Thomas Corcoran,
          <string-name>
            <surname>Stephanie M. Lukin</surname>
            , Marilyn Walker, and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Ins</surname>
          </string-name>
          <article-title>Torres: Extracting relevant knowledge for the detection of sarcasm and nastiness in the social web</article-title>
          .
          <source>Knowledge-Based Systems</source>
          <volume>69</volume>
          :
          <fpage>124</fpage>
          -
          <lpage>133</lpage>
          . (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Mehdad</surname>
          </string-name>
          , Yashar, and Joel Tetreault:
          <article-title>Do Characters Abuse More Than Words?</article-title>
          .
          <source>In Proceedings of the 17th Annual Meeting of the Special Interest Group on Discourse and Dialogue</source>
          , pp.
          <fpage>299</fpage>
          -
          <lpage>303</lpage>
          . (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Nobata</surname>
            , Chikashi, Joel Tetreault, Achint Thomas,
            <given-names>Yashar</given-names>
          </string-name>
          <string-name>
            <surname>Mehdad</surname>
          </string-name>
          , and
          <article-title>Yi Chang: Abusive language detection in online user content</article-title>
          .
          <source>In Proceedings of the 25th international conference on world wide web</source>
          , pp.
          <fpage>145</fpage>
          -
          <lpage>153</lpage>
          . International World Wide Web Conferences Steering Committee. (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Posadas-Durn</surname>
          </string-name>
          , Juan-Pablo, Ilia Markov, Helena Gmez-Adorno, Grigori Sidorov, Ildar Batyrshin, Alexander Gelbukh, and
          <string-name>
            <surname>Obdulia</surname>
          </string-name>
          Pichardo-Lagunas:
          <article-title>Syntactic ngrams as features for the author pro ling task</article-title>
          .
          <source>Working Notes Papers of the CLEF</source>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Daz</surname>
            <given-names>Rangel</given-names>
          </string-name>
          , Ismael,
          <string-name>
            <given-names>Grigori</given-names>
            <surname>Sidorov</surname>
          </string-name>
          , and Sergio Surez Guerra:
          <article-title>Creacin y evaluacin de un diccionario marcado con emociones y ponderado para el espaol</article-title>
          .
          <source>Onomazein</source>
          <volume>1</volume>
          , no.
          <volume>29</volume>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Samghabadi</surname>
          </string-name>
          ,
          <string-name>
            <surname>Niloofar</surname>
            <given-names>Sa</given-names>
          </string-name>
          , Suraj Maharjan, Alan Sprague,
          <article-title>Raquel Diaz-Sprague, and Thamar Solorio: Detecting Nastiness in Social Media</article-title>
          .
          <source>In Proceedings of the First Workshop on Abusive Language Online</source>
          , pp.
          <fpage>63</fpage>
          -
          <lpage>72</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Sidorov</surname>
            <given-names>Grigori</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miranda-Jimnez</surname>
            <given-names>Sabino</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Viveros-Jimnez</surname>
            <given-names>Francisco</given-names>
          </string-name>
          , Gelbukh Alexander,
          <string-name>
            <surname>Castro-Snchez</surname>
            <given-names>No</given-names>
          </string-name>
          , Velsquez Francisco,
          <string-name>
            <surname>Daz-Rangel</surname>
            <given-names>Ismael</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Surez-Guerra</surname>
            <given-names>Sergio</given-names>
          </string-name>
          ,
          <article-title>Trevio Alejandro and Gordon Juan: Empirical study of opinion mining in Spanish tweets</article-title>
          .
          <source>LNAI 7629</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Van</surname>
            <given-names>Hee</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cynthia</surname>
          </string-name>
          , Els Lefever, Ben Verhoeven, Julie Mennes, Bart Desmet, Guy De Pauw, Walter Daelemans, and Vronique Hoste:
          <article-title>Detection and ne-grained classi cation of cyberbullying events</article-title>
          .
          <source>In International Conference Recent Advances in Natural Language Processing (RANLP)</source>
          , pp.
          <fpage>672</fpage>
          -
          <lpage>680</lpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>