{"id":"https://openalex.org/W3146058909","doi":"https://doi.org/10.1109/asonam49781.2020.9381473","title":"Graph-Based Methods to Detect Hate Speech Diffusion on Twitter","display_name":"Graph-Based Methods to Detect Hate Speech Diffusion on Twitter","publication_year":2020,"publication_date":"2020-12-07","ids":{"openalex":"https://openalex.org/W3146058909","doi":"https://doi.org/10.1109/asonam49781.2020.9381473","mag":"3146058909"},"language":"en","primary_location":{"id":"doi:10.1109/asonam49781.2020.9381473","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asonam49781.2020.9381473","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070794859","display_name":"Matthew Beatty","orcid":null},"institutions":[{"id":"https://openalex.org/I136199984","display_name":"Harvard University","ror":"https://ror.org/03vek6s52","country_code":"US","type":"education","lineage":["https://openalex.org/I136199984"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Matthew Beatty","raw_affiliation_strings":["Department of Computer Science, Harvard University, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Harvard University, Cambridge, MA","institution_ids":["https://openalex.org/I136199984"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5070794859"],"corresponding_institution_ids":["https://openalex.org/I136199984"],"apc_list":null,"apc_paid":null,"fwci":0.822,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.80069749,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"502","last_page":"506"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10557","display_name":"Social Media and Politics","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/3315","display_name":"Communication"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9682000279426575,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7864606380462646},{"id":"https://openalex.org/keywords/voice-activity-detection","display_name":"Voice activity detection","score":0.6086812615394592},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5764590501785278},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4526141285896301},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.4397292733192444},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42812204360961914},{"id":"https://openalex.org/keywords/speech-processing","display_name":"Speech processing","score":0.2990034520626068},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.14438113570213318}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864606380462646},{"id":"https://openalex.org/C204201278","wikidata":"https://www.wikidata.org/wiki/Q1332614","display_name":"Voice activity detection","level":3,"score":0.6086812615394592},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5764590501785278},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4526141285896301},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.4397292733192444},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42812204360961914},{"id":"https://openalex.org/C61328038","wikidata":"https://www.wikidata.org/wiki/Q3358061","display_name":"Speech processing","level":2,"score":0.2990034520626068},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.14438113570213318}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asonam49781.2020.9381473","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asonam49781.2020.9381473","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1219135468","https://openalex.org/W2008857988","https://openalex.org/W2028055861","https://openalex.org/W2145446394","https://openalex.org/W2347010348","https://openalex.org/W2473555522","https://openalex.org/W2595653137","https://openalex.org/W2613977835","https://openalex.org/W2785615365","https://openalex.org/W2790166049","https://openalex.org/W2794585602","https://openalex.org/W2962993339","https://openalex.org/W2963505958","https://openalex.org/W2963549959","https://openalex.org/W3103061166","https://openalex.org/W6735121960","https://openalex.org/W6748037105","https://openalex.org/W6750410993"],"related_works":["https://openalex.org/W191108438","https://openalex.org/W3135230428","https://openalex.org/W2904739811","https://openalex.org/W249088392","https://openalex.org/W2101357962","https://openalex.org/W2152158029","https://openalex.org/W2012540220","https://openalex.org/W2131711534","https://openalex.org/W2559837139","https://openalex.org/W1151175420"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,130],"investigate":[4],"models":[5,89],"to":[6,73,97],"detect":[7,98],"the":[8,20,45,64,114,133,139],"spread":[9],"of":[10,28,66,100,120,135,141],"hate":[11,34,57,69,101,116,142],"speech":[12,35,58,70,102,117,143],"on":[13,16,44],"Twitter":[14],"based":[15,42],"its":[17],"diffusion":[18],"in":[19,138,150],"network":[21],"graph.":[22],"We":[23,61,107],"experiment":[24],"with":[25,126],"a":[26],"dataset":[27],"10,000":[29],"tweets":[30],"manually":[31],"labelled":[32],"as":[33],"or":[36],"not":[37,83],"and":[38,55,76,94,122,145],"show":[39],"that":[40,78,103,109],"classification":[41],"solely":[43],"sharing":[46,140],"graph":[47,110],"yields":[48],"strong":[49],"F1":[50,118],"scores":[51],"for":[52],"our":[53,80,151],"task":[54],"high":[56],"detection":[59,71,92],"precision.":[60],"also":[62,131],"highlight":[63],"vulnerability":[65],"existing":[67],"textual":[68],"methods":[72,81],"adversarial":[74],"attacks":[75],"demonstrate":[77],"while":[79],"do":[82],"outperform":[84],"state-of-the-art":[85],"text":[86,105],"models,":[87],"graph-based":[88],"provide":[90],"robust":[91],"mechanisms":[93],"are":[95,148],"able":[96],"instances":[99],"fool":[104],"classifiers.":[106],"find":[108,123,146],"convolutional":[111],"networks":[112],"produce":[113],"strongest":[115],"score":[119],"0.58":[121],"other":[124],"success":[125],"kernel":[127],"methods.":[128],"Finally,":[129],"consider":[132],"effects":[134],"automated":[136],"bots":[137],"content":[144],"they":[147],"insignificant":[149],"experiments.":[152]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-08T08:50:53.379069","created_date":"2025-10-10T00:00:00"}
