<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Forum for Information Retrieval Evaluation, Dec</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Fine-tuning Pre-Trained Transformer based model for Hate Speech and Ofensive Content Identification in English, Indo-Aryan and Code-Mixed (English-Hindi) languages</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Supriya Chanda</string-name>
          <email>supriyachanda.rs.cse18@itbhu.ac.in</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>S Ujjwal</string-name>
          <email>sujjwal.cse18@itbhu.ac.in</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Shayak Das</string-name>
          <email>shayakdas.cse18@itbhu.ac.in</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sukomal Pal</string-name>
          <email>spal.cse@itbhu.ac.in</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science and Engineering, Indian Institute of Technology (BHU)</institution>
          ,
          <addr-line>Varanasi, INDIA, 221005</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>1</volume>
      <fpage>3</fpage>
      <lpage>17</lpage>
      <abstract>
        <p>Hate Speech and Ofensive Content Identification is one of the most challenging problem in the natural language processing field, being imposed by the rising presence of this phenomenon in online social media. This paper describes our Transformer-based solutions for identifying ofensive language on Twitter in three languages (i.e., English, Hindi, and Marathi) and one code mixed (English-Hindi) language, which was employed in Subtask 1A, Subtask 1B and Subtask 2 of the HASOC 2021 shared task. Finally, the highest-scoring models were used for our submissions in the competition, which ranked our IRLab@IITBHU team 16th of 56, 18th of 37, 13th of 34, 7th of 24, 12th of 25 and 6th of 16 for English Subtask 1A, English Subtask 1B, Hindi Subtask 1A, Hindi Subtask 1B, Marathi Subtask 1A, and English-Hindi Code-Mix Subtask 2 respectively.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>With the ease of access to the internet these days, a large number of people from various ethnic
and educational backgrounds interact on social media. Individuals and groups are demonized
by using hateful and insulting language for communicating their ideas and disapproval.
Usergenerated content on social media, especially, has been a hotbed of harsh language and hate
speech. As a result, people’s morale is lowered, and mental anguish and trauma are inevitable.
As a response, information extraction from social media data and possible ofensive language
identification are considered essential. There are regulations against abusive language on almost
all social networking sites, but identifying them might be dificult. It is not possible to keep an
eye on the situation manually or with a static set of rules. Using natural language processing
(NLP) tools to search for ofensive content in textual data is possible because hate speech and
ofensive language belong to natural language.</p>
      <p>
        For a country like India, people tend to use regional language for texting or tweeting. Around
half of the population speaks Hindi1. Grover et al. (2017) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] studied English-Hindi
codeswitching and swearing pattern on social networks for multilingual users. They tested the
swearing behaviour of multilingual users on a large scale using monolingual Hindi and English
tweets as well as code-switched tweets from Indian users. These findings revealed strong
language preference among bilinguals, although profanity and swearing can be powerful
motivators for code-switching.
      </p>
      <p>The Hate Speech and Ofensive Content Identification (HASOC) shared tasks of 2021 focused
on Indo-Aryan languages in three diferent languages: English, Hindi, and Marathi. The shared
tasks have two sub-tasks: Subtask-1 and Subtask-2. Again Subtask-1 has two parts: Subtask-1A,
a coarse-grained binary classification, and Subtask-1B, a fine-grained classification. The main
focus of Subtask-2 is to identify Conversational Hate-Speech in Code-Mixed Languages (ICHCL).
In a conversational thread, the comments sometimes do not express any sentiment by themselves,
but it is expressed in the context of the main post or parent comments. However, in our study,
we take all comments as a standalone tweet. The Subtasks-2 dataset contains English, Hindi,
and code-mixed Hindi tweets. Therefore, it gave us an opportunity to address the multilingual
issues associated with social media posts. To solve this, we used publically accessible pre-trained
transformer-based neural network (BERT) models, which allow for fine-tuning for specific tasks.
In addition to this, its multilingual feature allows us to analyze sentiment for the comments
with multiple language words and sentences. We participated in both Subtasks, and all three
languages, and one Code-Mixed language.</p>
      <sec id="sec-1-1">
        <title>1.1. HASOC SubTask</title>
        <p>
          The aim of HASOC 2021[
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] was to provide a testbed facilitating testing of systems that can
detect hate speech and ofensive content automatically from social media posts. There were
three subtasks in HASOC. They are described below with examples in Table 1.
• Subtask A: Hate and Ofensive language Identification
        </p>
        <p>Subtask A is a coarse-grained binary classification that classifies tweets into two main
categories.</p>
        <p>– Non Hate-Ofensive (NOT) - This post contains no hate speech, profanity, or
objectionable content.
– Hate and Ofensive (HOF) - This post contains information that is hateful,
ofensive, and vulgar.
• Subtask B: Type of Hate and Ofensive post</p>
        <p>Subtask B is a classification task with multiple classes. After a post is categorised as HOF
in Subtask A, it is further categorised into one of three types:
– Hate speech (HATE): - The post is directed towards a group or a member of a
group who is aware that he or she is a member of that group. Any comments that
are hostile due to their political beliefs, sexual orientation, gender, socioeconomic
standing, health condition, or something similar.
1https://www.censusindia.gov.in/Census_Data_2001/Census_Data_Online/Language/Statement4.htm
– Ofensive (OFFN): - The post contains ofensive contents like dehumanizing,
insulting an individual or threatening someone.</p>
        <p>– Profane (PRFN): - The post contains swearwords. (Fuck etc.)
सवाल यह नही क वो मुझे वेश्या कहता है सवाल तो यह है क मुझे वेश्या बनाया
कसने ? -नवनीत
धवन मदरचोद ंदा है मर गया
A</p>
        <p>SubTask-1</p>
        <p>B
NOT
HOF
HOF
HOF
HOF
NOT
SubTask-2</p>
        <p>NONE
HATE
OFFN
PRFN
NONE
OFFN
HATE
PRFN
NONE</p>
        <p>The remaining of the paper is structured as follows. In Section 2, we briefly outline some
previous attempts. The dataset description are presented in section 3. Our computational
methods, models description and evaluation methodology are presented in Section 4, followed
by results and discussion in Section 5 and conclusion in Section 6.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        Over the last few years, there have been several studies on computational method to identify hate
and ofensive speech. Some prior works have studied blogs, micro-blogs, and social networks
like twitter data [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] as well as Facebook post and Wikipedia comments.
      </p>
      <p>
        A couple of studies like [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] have been published where they focused on
detecting whether a post contains hate speech or not, only two-way classification. Dinakar et
al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] proposed an idea where they classify the posts based on the frequency of ofensive or
socially non-acceptable words. Machine learning algorithms using TF-IDF characteristics are
being utilised in social media to identify and categorise hate speech and ofensive language [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>
        Because of the scarcity of relevant corpora, the vast majority of studies on abusive language
have focused on English data. However, a few research works have recently looked into abusive
language detection in diferent languages. Mubarak et al. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] deal with abusive language
detection on Arabic social media, whereas Su et al. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] ofer a method for detecting and
reverting profanity in Chinese. Hate speech and abusive language datasets for German and
Slovene have recently been annotated by Ross et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and Fiser et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] respectively, which
paved the way for future work in languages other than English. Also many workshops have
been organised to identify hate speech. The SemEval-2019 Task 6: Identifying and Categorizing
Ofensive Language in Social Media (OfensEval 2019) [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] was the first competition towards
detecting ofensive language in social media (Twitter) only on English language. The
SemEval2020 Task 12: Multilingual Ofensive Language Identification in Social Media (OfensEval
2020) [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] organised for the same proposes with four other languages Arabic, Danish, Greek,
and Turkish. Germeval Task 2, 2019 2 - Shared Task on the Identification of Ofensive Language,
Hate Speech and Ofensive Content Identification in Indo-European Languages (HASOC 2019) 3,
(HASOC 2020) 4 try to identify Hate speech on English, Hindi and German language.
      </p>
      <p>
        There have been some work exploring diferent aspects of ofensive content like abusive
language ([
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]), cyber-aggression [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], cyber-bullying [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and toxic comments or hate speech
([
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]).
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Dataset</title>
      <p>The HASOC 2021 dataset5 [20] was sampled from Twitter for multilingual research with three
languages together, i.e., English [21], Hindi [21], Marathi [22] and one Code-Mix
(EnglishHindi) [23] language. The corpus collection and class distribution is shown in Table 2.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Methodology</title>
      <sec id="sec-4-1">
        <title>4.1. Preprocessing</title>
        <p>The primary preprocessing phase is carried out using the BERT-specific tokenizer, which divides
a phrase into tokens in a WordPiece way. It operates by dividing words into their complete
forms (e.g., one word becomes one token) or into word pieces (e.g., one word can be broken
down into many tokens). As a example s n o w b o a r d i n g is a word, which will be tokenize by
WordPiece tokenizer like [s n o w ] [# # b o a r d ] [# # i n g ].</p>
        <p>The majority of the data collected from Twitter contains Hashtags and emoticons. As a result,
two Twitter-specific stages were completed initially.</p>
        <sec id="sec-4-1-1">
          <title>2https://projects.fzai.h-da.de/iggsa/ 3https://hasocfire.github.io/hasoc/2019/index.html 4https://hasocfire.github.io/hasoc/2020/index.html 5https://hasocfire.github.io/hasoc/2021/dataset.html</title>
          <p>• Using the d e m o j i and e k p h r a s i s Python package, replace the emoticons with the equivalent
textual representation.
• Normalizing hashtags (for example, “#IndiansDyingModiEnjoying” is segmented into
“Indians”, “Dying”, “Modi”, and “Enjoying”).</p>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Implementation</title>
        <p>Each subtask can be represented as a text classification issue. Our submission models were
developed by fine-tuning a pre-trained language model on shared task data. Because of its
recent success and public availability in several languages, we selected BERT [24] as our
pretrained language model. After performing preprocessing steps, we experimented with the
bert-base-cased and bert-base-uncased models for both subtasks of the English language. In
addition, we submitted a run without performing any preprocessing procedures. We tried with
the bert-base-multilingual-cased model for both subtasks of the Hindi language. We applied
the same bert-multilingual-cased model for the Marathi subtask. We made use of the BERT
implementation included in pytorch-transfomers6 library. Figure 1 demonstrates our fine-tuned
model. On our dataset, we trained the full pre-trained model and fed the result to a softmax
layer. The error is back-propagated through the entire architecture in this scenario, and the
model’s pre-trained weights were adjusted depending on the new dataset. The complete model
was fine-tuned.</p>
        <p>6https://github.com/huggingface/transformers</p>
        <p>In the model described in Figure 1, the input is a sequence of words representing a sentence.
The subtokens are generated by appending special tokens, CLS at the beginning and SEP at
the end. This is then fed into the BERT model, which produces the embeddings for each word
R  , and the R vector corresponding to the CLS token for classification. BERT employs
Transformer, an attention mechanism that learns contextual associations between words (or
sub-words) in a text. In its basic form, the transformer includes two mechanisms: an encoder
that reads the text input and a decoder that provides a job forecast. Because BERT’s goal is to
build a language model, just the encoder approach is necessary. The R vector is then passed
through a neural network-based classifier, which gives us the probability distribution of the
tokens, thereby corresponding to each class. The number of classes depends on the subproblem
at hand.</p>
        <p>HuggingFace’s transformers library was leveraged for the implementation. HuggingFace
transformers is a Python library that provides pre-trained and customizable transformer models
that may be used for a range of NLP tasks. It includes the pre-trained and multilingual BERT
models, as well as alternative models suited for downstream tasks. We employ the PyTorch
library, which enables GPU processing, as the implementation environment. Google Colab was
used to run the BERT models. Based on our experiments, we trained our classifier with a batch
size of 32 for 5 to 10 epochs. The dropout value is set to 0.1, and the AdamW optimizer with a
learning rate of 2e-5 is applied. For tokenization, we applied the hugging face transformers’
pre-trained BERT tokenizer. During finetuning and sequence classification, we utilized the
HuggingFace library’s BertForSequenceClassification module. We have submitted all the diferent
submissions for each subtask. The descriptions of all the runs are following.</p>
        <p>NLP-CIC
IRLab@IITBHU (1)</p>
        <p>WLV-RIT
IRLab@IITBHU (1)
IRLab@IITBHU (2)</p>
        <sec id="sec-4-2-1">
          <title>MIDAS-IIITD</title>
          <p>IRLab@IITBHU (1)
1. ENSA_submission_1: BERT multilingual cased (mBERT), 20 epochs without replacing
emojis and hashtags, Maximum sequence length of 128 tokens, and batch size of 32.
(Macro F1: 0.7579)
2. ENSA_submission_2: mBERT, 20 epochs using emoji and hashtag substitution,
Maximum sequence length of 128 tokens, and batch size of 32. (Macro F1: 0.7581)
3. ENSA_submission_3: mBERT, 25 epochs using emoji and hashtag substitution,
replacing commonly occuring short-forms like (it’s-&gt;it is, don’t-&gt;do not, hahaha-&gt;ha etc.),
Maximum sequence length of 128 tokens, and batch size of 32. (Macro F1: 0.7812)
4. ENSA_submission_4: BERT Large Cased, 25 epochs using emoji, hashtags substitution,</p>
          <p>Maximum sequence length of 128 tokens, and batch size of 32.(Macro F1: 0.7886)
5. ENSA_submission_5: BERT Large Cased, 25 epochs using emoji and hashtags
substitution, Maximum sequence length of 128 tokens, and batch size of 16 (Macro F1: 0.7976)
6. ENSB_submission_1: BERT Large Cased, 20 epochs using emoji and hashtags
substitution, Maximum sequence length of 128 tokens, and batch size of 16 (Macro F1: 0.6093)
7. HISA_submission_1: mBERT, 25 without preprocessing, Maximum sequence length of
128 tokens, and batch size of 32 (Macro F1: 0.7471)</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Results and Discussion</title>
      <p>We validated our model on the training and development sets since we lacked test labels.
As our submission for each subtask, we chose the top models from each evaluation. Every
system is evaluated using a Macro  1 score. The overall system’s macro  1 score is the average
of the diferent classes’  1 scores. Table 3 shows the best performing team and our oficial
performances on the test data as shared by the organizers vis-a-vis the best performing team
for all shared tasks of English, Hindi, Marathi, and code mixed Hindi-English language pair.</p>
      <p>For the binary classification, the best-performed model for English subtask-1A was
bert-largecased with preprocessed data (Submission 5). For the system constraints, we took the maximum
sequence length of 128 tokens for few sentences whose tokenized length was more than 128.
So, we had to truncate it; that could be a reason for some low performance. The best-performed
model for Hindi subtask-1A was bert-base-multilingual-cased with preprocessed data. Here
also we had to truncate the sequence length up to 256. Although the model gives a comparative
score, some of the NOT are still misclassified as HOF. The probable reason could be normalizing
the Hashtags, like ResignModi to Resign Modi, which is classified as an attack towards a person.
It is possible that the occurance of any curse words or hate words biases the model towards
predicting the speech as HOF. The overall meaning of the sentence may still be non-hatred and
this is very hard to deduce and requires the overall context to be discovered. Furthermore, for
Marathi, preprocessing does not work as expected. It also misclassifies some NOT as HOF. It
can be seen in subfigures 4(d) for the multiclass classification on Hindi language submission 1
that the model could not predict PRFN class.</p>
      <p>Table 4 shows some of the situations that our best model identified as inaccurate predictions.
The expected sentiment, as provided in the gold standard dataset, is compared to the ones
predicted by our algorithm in the table’s Gold column. It seems that our predicted sentiment
was correct.
(d) Submission 4 for Subtask 1A
(e) Submission 5 for Subtask 1A
(f) Submission 1 for Subtask 1B
(d) Submission 1 for Subtask 1B
(e) Submission 2 for Subtask 1B</p>
      <p>Sample Tweets from dataset Gold
Saw her shag rug and said ““I can wear that”” HOF
@bosco_rosco Mate I’m the life and soul of them because I’m not a twat. NOT
Just had a phone call from the NHS National immunisation recall centre wanting to
discuss my ““ #CovidVaccine plans”” - what the heck are they doing with my phone number ??? HOF
Predicted
NOT
HOF
NOT</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>In this paper, we have presented the system submitted by the IRLab@IITBHU team to the HASOC
2021 - Hate Speech and Ofensive Content Identification in English and Indo-Aryan Languages
shared task at FIRE 2021. Our system is based on fine-tuning monolingual and multilingual
transformer networks to categorize social media postings in three distinct languages and an
English-Hindi code mixed language for hate speech, ofensive, and objectionable content. We
have shown from the overview paper of the HASOC track at FIRE 2020 that the best results
are achieved with state-of-the-art transformer models. Pre-trained bi-directional encoder
representations using transformers (BERT) outperform all the traditional machine learning
models. Thatswhy we have used only BERT model with some pre-processing. In Subtask 2:
Identification of Conversational Hate-Speech in Code-Mixed Languages (ICHCL), we take all
comments as a standalone tweet. In the future, we will like to solve this subtask using a graph.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Acknowledgements</title>
      <p>We’d want to express our gratitude to the HASOC organisers for organising this interesting
shared task and for immediately responding to all of our questions. We’d also like to express
our gratitude to the anonymous reviewers for their insightful comments.
[20] S. Modha, T. Mandl, G. K. Shahi, H. Madhu, S. Satapara, T. Ranasinghe, M. Zampieri,
Overview of the HASOC Subtrack at FIRE 2021: Hate Speech and Ofensive Content
Identification in English and Indo-Aryan Languages and Conversational Hate Speech, in:
FIRE 2021: Forum for Information Retrieval Evaluation, Virtual Event, 13th-17th December
2021, ACM, 2021.
[21] T. Mandl, S. Modha, G. K. Shahi, H. Madhu, S. Satapara, P. Majumder, J. Schäfer, T.
Ranasinghe, M. Zampieri, D. Nandini, A. K. Jaiswal, Overview of the HASOC subtrack at FIRE
2021: Hate Speech and Ofensive Content Identification in English and Indo-Aryan
Languages, in: Working Notes of FIRE 2021 - Forum for Information Retrieval Evaluation,
CEUR, 2021. URL: http://ceur-ws.org/.
[22] S. Gaikwad, T. Ranasinghe, M. Zampieri, C. M. Homan, Cross-lingual ofensive language
identification for low resource languages: The case of marathi, in: Proceedings of RANLP,
2021.
[23] S. Satapara, S. Modha, T. Mandl, H. Madhu, P. Majumder, Overview of the HASOC Subtrack
at FIRE 2021: Conversational Hate Speech Detection in Code-mixed language , in: Working
Notes of FIRE 2021 - Forum for Information Retrieval Evaluation, CEUR, 2021.
[24] J. Devlin, M.-W. Chang, K. Lee, K. Toutanova, BERT: Pre-training of deep bidirectional
transformers for language understanding, in: Proceedings of the 2019 Conference of
the North American Chapter of the Association for Computational Linguistics: Human
Language Technologies, Volume 1 (Long and Short Papers), Association for Computational
Linguistics, Minneapolis, Minnesota, 2019, pp. 4171–4186. URL: https://aclanthology.org/
N19-1423. doi:1 0 . 1 8 6 5 3 / v 1 / N 1 9 - 1 4 2 3 .</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Grover</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Agarwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sikka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Rudra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Choudhury</surname>
          </string-name>
          ,
          <article-title>I may talk in english but gaali toh hindi mein hi denge: A study of english-hindi code-switching and swearing pattern on social networks</article-title>
          ,
          <source>IEEE</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Modha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Mandl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Majumder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Patel</surname>
          </string-name>
          ,
          <article-title>Overview of the HASOC track at FIRE 2019: Hate Speech and Ofensive Content Identification in Indo-European Languages</article-title>
          , in: FIRE '
          <fpage>19</fpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>J.-M. Xu</surname>
            ,
            <given-names>K.-S.</given-names>
          </string-name>
          <string-name>
            <surname>Jun</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          <string-name>
            <surname>Zhu</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Bellmore</surname>
          </string-name>
          ,
          <article-title>Learning from bullying traces in social media, in: Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL HLT '12, Association for Computational Linguistics</article-title>
          , USA,
          <year>2012</year>
          , p.
          <fpage>656</fpage>
          -
          <lpage>666</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>P.</given-names>
            <surname>Burnap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. L.</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <article-title>Cyber hate speech on twitter: An application of machine classification and statistical modeling for policy and decision making</article-title>
          ,
          <source>Policy &amp; Internet</source>
          <volume>7</volume>
          (
          <year>2015</year>
          )
          <fpage>223</fpage>
          -
          <lpage>242</lpage>
          . URL: https://onlinelibrary.wiley.com/doi/abs/10.1002/poi3.85.
          <article-title>doi:1 0 . 1 0 0 2 / p o i 3 . 8 5 . a r X i v : h t t p s : / / o n l i n e l i b r a r y</article-title>
          . w i l e y .
          <source>c o m / d o i / p d f / 1 0 . 1 0 0 2 / p o i 3 . 8 5 .</source>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Wiegand</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Siegel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ruppenhofer</surname>
          </string-name>
          ,
          <article-title>Overview of the germeval 2018 shared task on the identification of ofensive language</article-title>
          ,
          <source>Proceedings of GermEval 2018, 14th Conference on Natural Language Processing (KONVENS</source>
          <year>2018</year>
          ), Vienna, Austria - September 21,
          <year>2018</year>
          , Austrian Academy of Sciences, Vienna, Austria,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . URL: http://nbn-resolving. de/urn:nbn:de:bsz:
          <fpage>mh39</fpage>
          -
          <lpage>84935</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>T.</given-names>
            <surname>Davidson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Warmsley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. W.</given-names>
            <surname>Macy</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Weber</surname>
          </string-name>
          ,
          <article-title>Automated hate speech detection and the problem of ofensive language</article-title>
          ,
          <source>CoRR abs/1703</source>
          .04009 (
          <year>2017</year>
          ). URL: http://arxiv.org/abs/ 1703.04009.
          <article-title>a r X i v : 1 7 0 3 . 0 4 0 0 9</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Ojha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Malmasi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zampieri</surname>
          </string-name>
          ,
          <article-title>Benchmarking aggression identification in social media</article-title>
          ,
          <source>in: Proceedings of the First Workshop on Trolling, Aggression and Cyberbullying (TRAC-2018)</source>
          ,
          <article-title>Association for Computational Linguistics</article-title>
          , Santa Fe, New Mexico, USA,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          . URL: https://www.aclweb.org/anthology/W18-4401.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>N.</given-names>
            <surname>Djuric</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Morris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Grbovic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Radosavljevic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Bhamidipati</surname>
          </string-name>
          ,
          <article-title>Hate speech detection with comment embeddings</article-title>
          ,
          <source>in: Proceedings of the 24th International Conference on World Wide Web, WWW '15 Companion</source>
          , Association for Computing Machinery, New York, NY, USA,
          <year>2015</year>
          , p.
          <fpage>29</fpage>
          -
          <lpage>30</lpage>
          . URL: https://doi.org/10.1145/2740908.2742760.
          <source>doi:1 0 . 1 1</source>
          <volume>4 5 / 2 7 4 0 9 0 8 . 2 7 4 2 7 6 0 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>I.</given-names>
            <surname>Kwok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Locate the hate: Detecting tweets against blacks</article-title>
          ,
          <source>in: Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence</source>
          , AAAI'
          <fpage>13</fpage>
          , AAAI Press,
          <year>2013</year>
          , p.
          <fpage>1621</fpage>
          -
          <lpage>1622</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>C.</given-names>
            <surname>Nobata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Tetreault</surname>
          </string-name>
          , A. Thomas,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Mehdad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <article-title>Abusive language detection in online user content</article-title>
          ,
          <source>in: Proceedings of the 25th International Conference on World Wide Web, WWW '16, International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE</source>
          ,
          <year>2016</year>
          , p.
          <fpage>145</fpage>
          -
          <lpage>153</lpage>
          . URL: https://doi.org/10.1145/ 2872427.2883062.
          <source>doi:1 0 . 1 1</source>
          <volume>4 5 / 2 8 7 2 4 2 7 . 2 8 8 3 0 6 2 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>K.</given-names>
            <surname>Dinakar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Reichart</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Lieberman</surname>
          </string-name>
          ,
          <article-title>Modeling the detection of textual cyberbullying</article-title>
          ,
          <source>in: The Social Mobile Web, Papers from the 2011 ICWSM Workshop</source>
          , Barcelona, Catalonia, Spain, July
          <volume>21</volume>
          ,
          <year>2011</year>
          , volume WS-
          <volume>11</volume>
          -02 of AAAI Workshops, AAAI,
          <year>2011</year>
          . URL: http://www. aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/view/3841.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Saroj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chanda</surname>
          </string-name>
          , S. Pal, IRlab@IITV at SemEval-2020 task 12:
          <article-title>Multilingual ofensive language identification in social media using SVM</article-title>
          ,
          <source>in: Proceedings of the Fourteenth Workshop on Semantic Evaluation</source>
          , International Committee for Computational Linguistics,
          <source>Barcelona (online)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>2012</fpage>
          -
          <lpage>2016</lpage>
          . URL: https://aclanthology.org/
          <year>2020</year>
          .semeval-
          <volume>1</volume>
          .
          <fpage>265</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>H.</given-names>
            <surname>Mubarak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Darwish</surname>
          </string-name>
          , W. Magdy,
          <article-title>Abusive language detection on Arabic social media</article-title>
          ,
          <source>in: Proceedings of the First Workshop on Abusive Language Online</source>
          , Association for Computational Linguistics, Vancouver, BC, Canada,
          <year>2017</year>
          , pp.
          <fpage>52</fpage>
          -
          <lpage>56</lpage>
          . URL: https://www. aclweb.
          <source>org/anthology/W17-3008. doi:1 0 . 1 8</source>
          <volume>6 5 3</volume>
          / v 1 / W 1 7
          <article-title>- 3 0 0 8</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>H.-P.</given-names>
            <surname>Su</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.-J.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.-T.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.-J. Lin</surname>
          </string-name>
          ,
          <article-title>Rephrasing profanity in Chinese text</article-title>
          ,
          <source>in: Proceedings of the First Workshop on Abusive Language Online</source>
          , Association for Computational Linguistics, Vancouver, BC, Canada,
          <year>2017</year>
          , pp.
          <fpage>18</fpage>
          -
          <lpage>24</lpage>
          . URL: https://www.aclweb.
          <source>org/anthology/W17-3003. doi:1 0 . 1 8</source>
          <volume>6 5 3</volume>
          / v 1 / W 1 7
          <article-title>- 3 0 0 3</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B.</given-names>
            <surname>Ross</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rist</surname>
          </string-name>
          , G. Carbonell, B.
          <string-name>
            <surname>Cabrera</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Kurowsky</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>Wojatzki, Measuring the reliability of hate speech annotations: The case of the european refugee crisis</article-title>
          ,
          <source>CoRR abs/1701</source>
          .08118 (
          <year>2017</year>
          ). URL: http://arxiv.org/abs/1701.08118.
          <article-title>a r X i v : 1 7 0 1 . 0 8 1 1 8</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>D.</given-names>
            <surname>Fišer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Erjavec</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ljubešić</surname>
          </string-name>
          ,
          <article-title>Legal framework, dataset and annotation schema for socially unacceptable online discourse practices in Slovene</article-title>
          ,
          <source>in: Proceedings of the First Workshop on Abusive Language Online</source>
          , Association for Computational Linguistics, Vancouver, BC, Canada,
          <year>2017</year>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>51</lpage>
          . URL: https://www.aclweb.
          <source>org/anthology/W17-3007. doi:1 0 . 1 8</source>
          <volume>6 5 3</volume>
          / v 1 / W 1 7
          <article-title>- 3 0 0 7</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zampieri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Malmasi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Nakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rosenthal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Farra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          , Semeval
          <article-title>-2019 task 6: Identifying and categorizing ofensive language in social media (ofenseval)</article-title>
          ,
          <source>in: Proceedings of the 13th International Workshop on Semantic Evaluation</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>75</fpage>
          -
          <lpage>86</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zampieri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Nakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rosenthal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Atanasova</surname>
          </string-name>
          , G. Karadzhov,
          <string-name>
            <given-names>H.</given-names>
            <surname>Mubarak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Derczynski</surname>
          </string-name>
          ,
          <string-name>
            <surname>Z</surname>
          </string-name>
          . Pitenis, c. Çöltekin, SemEval-2020
          <source>Task</source>
          <volume>12</volume>
          :
          <article-title>Multilingual Ofensive Language Identification in Social Media (OfensEval 2020)</article-title>
          , in: Proceedings of SemEval,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dadvar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Trieschnigg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ordelman</surname>
          </string-name>
          , F. de Jong,
          <article-title>Improving cyberbullying detection with user context</article-title>
          , in: P. Serdyukov,
          <string-name>
            <given-names>P.</given-names>
            <surname>Braslavski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kamps</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rüger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Agichtein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Segalovich</surname>
          </string-name>
          , E. Yilmaz (Eds.),
          <source>Advances in Information Retrieval</source>
          , Springer Berlin Heidelberg, Berlin, Heidelberg,
          <year>2013</year>
          , pp.
          <fpage>693</fpage>
          -
          <lpage>696</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>