{"id":"https://openalex.org/W4404032197","doi":"https://doi.org/10.1109/icccnt61001.2024.10724214","title":"Empowering Abusive Language Detection in Low-Resource Scenarios: A Dynamic LSTM-Based Abusive Content Detection with Attention Mechanism","display_name":"Empowering Abusive Language Detection in Low-Resource Scenarios: A Dynamic LSTM-Based Abusive Content Detection with Attention Mechanism","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404032197","doi":"https://doi.org/10.1109/icccnt61001.2024.10724214"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10724214","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10724214","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114511944","display_name":"Sanjib Bora","orcid":null},"institutions":[{"id":"https://openalex.org/I64128412","display_name":"Dibrugarh University","ror":"https://ror.org/045kfbt16","country_code":"IN","type":"education","lineage":["https://openalex.org/I64128412"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sanjib Bora","raw_affiliation_strings":["DUIET, Dibrugarh University,Computer Science and Engineering,Dibrugarh,India"],"affiliations":[{"raw_affiliation_string":"DUIET, Dibrugarh University,Computer Science and Engineering,Dibrugarh,India","institution_ids":["https://openalex.org/I64128412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062431070","display_name":"Nomi Baruah","orcid":"https://orcid.org/0000-0003-4965-9933"},"institutions":[{"id":"https://openalex.org/I64128412","display_name":"Dibrugarh University","ror":"https://ror.org/045kfbt16","country_code":"IN","type":"education","lineage":["https://openalex.org/I64128412"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nomi Baruah","raw_affiliation_strings":["DUIET, Dibrugarh University,Computer Science and Engineering,Dibrugarh,India"],"affiliations":[{"raw_affiliation_string":"DUIET, Dibrugarh University,Computer Science and Engineering,Dibrugarh,India","institution_ids":["https://openalex.org/I64128412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056649511","display_name":"D.C. Baruah","orcid":"https://orcid.org/0000-0002-8235-2354"},"institutions":[{"id":"https://openalex.org/I64128412","display_name":"Dibrugarh University","ror":"https://ror.org/045kfbt16","country_code":"IN","type":"education","lineage":["https://openalex.org/I64128412"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debajani Baruah","raw_affiliation_strings":["DUIET, Dibrugarh University,Computer Science and Engineering,Dibrugarh,India"],"affiliations":[{"raw_affiliation_string":"DUIET, Dibrugarh University,Computer Science and Engineering,Dibrugarh,India","institution_ids":["https://openalex.org/I64128412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110708482","display_name":"Sinki Barman","orcid":null},"institutions":[{"id":"https://openalex.org/I64128412","display_name":"Dibrugarh University","ror":"https://ror.org/045kfbt16","country_code":"IN","type":"education","lineage":["https://openalex.org/I64128412"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Swarnangka Barman","raw_affiliation_strings":["DUIET, Dibrugarh University,Computer Science and Engineering,Dibrugarh,India"],"affiliations":[{"raw_affiliation_string":"DUIET, Dibrugarh University,Computer Science and Engineering,Dibrugarh,India","institution_ids":["https://openalex.org/I64128412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113234773","display_name":"Mandira Neog","orcid":"https://orcid.org/0000-0002-3440-8149"},"institutions":[{"id":"https://openalex.org/I64128412","display_name":"Dibrugarh University","ror":"https://ror.org/045kfbt16","country_code":"IN","type":"education","lineage":["https://openalex.org/I64128412"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mandira Neog","raw_affiliation_strings":["DUIET, Dibrugarh University,Computer Science and Engineering,Dibrugarh,India"],"affiliations":[{"raw_affiliation_string":"DUIET, Dibrugarh University,Computer Science and Engineering,Dibrugarh,India","institution_ids":["https://openalex.org/I64128412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5114511944"],"corresponding_institution_ids":["https://openalex.org/I64128412"],"apc_list":null,"apc_paid":null,"fwci":0.3637,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.68476512,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.932200014591217,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6754657030105591},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.5660112500190735},{"id":"https://openalex.org/keywords/abusive-supervision","display_name":"Abusive supervision","score":0.5158723592758179},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.42475682497024536},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3798221945762634},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.20689794421195984},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.14617469906806946},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.1319885551929474}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6754657030105591},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.5660112500190735},{"id":"https://openalex.org/C2779264998","wikidata":"https://www.wikidata.org/wiki/Q22906141","display_name":"Abusive supervision","level":2,"score":0.5158723592758179},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.42475682497024536},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3798221945762634},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.20689794421195984},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.14617469906806946},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.1319885551929474},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10724214","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10724214","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.4399999976158142,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W346733163","https://openalex.org/W2963790884","https://openalex.org/W2971057992","https://openalex.org/W2972774660","https://openalex.org/W3003618396","https://openalex.org/W3032237992","https://openalex.org/W3087777115","https://openalex.org/W3105113320","https://openalex.org/W3132746979","https://openalex.org/W3146366485","https://openalex.org/W3169973903","https://openalex.org/W3185092723","https://openalex.org/W3194774163","https://openalex.org/W4229561643","https://openalex.org/W4280604215","https://openalex.org/W4312894902","https://openalex.org/W4361222796","https://openalex.org/W4386311190","https://openalex.org/W4386969889","https://openalex.org/W4388950971","https://openalex.org/W4394910530","https://openalex.org/W4399199182","https://openalex.org/W6803100245","https://openalex.org/W7026590004"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W3119340874","https://openalex.org/W3046181767","https://openalex.org/W2882451670","https://openalex.org/W2798065907","https://openalex.org/W4388997354","https://openalex.org/W2469085914","https://openalex.org/W2517707186"],"abstract_inverted_index":{"In":[0],"India,":[1],"with":[2,92],"its":[3],"rich":[4],"linguistic":[5],"landscape,":[6],"abusive":[7,63,132],"social":[8,69],"media":[9],"remarks":[10,64],"that":[11,59],"attack":[12],"individuals":[13],"or":[14],"communities":[15],"based":[16],"on":[17,68,136],"protected":[18],"attributes":[19],"provide":[20],"serious":[21],"difficulty.":[22],"Research":[23],"in":[24,66,134],"this":[25,43,48,53,146],"area":[26],"is":[27,50],"hampered":[28],"by":[29,55,76,104],"the":[30,78,98,129,141],"lack":[31],"of":[32,47,81,97,131,143],"digital":[33],"resources":[34],"for":[35],"low-resource":[36,144],"Indian":[37],"languages":[38],"like":[39],"Assamese,":[40],"which":[41],"exacerbates":[42],"complexity.":[44],"The":[45,71,95,114],"goal":[46],"research":[49,147],"to":[51,112,127,152],"close":[52],"gap":[54],"creating":[56],"a":[57,154],"system":[58],"can":[60],"accurately":[61],"identify":[62],"made":[65],"Assamese":[67,135],"media.":[70],"experiment":[72],"produced":[73],"promising":[74],"results":[75,115],"leveraging":[77],"highlighted":[79],"capabilities":[80],"deep":[82,122],"learning":[83,123],"techniques,":[84],"namely":[85],"Long":[86],"Short-Term":[87],"Memory":[88],"(LSTM)":[89],"networks":[90],"enhanced":[91],"attention":[93,106,119],"mechanisms.":[94],"accuracy":[96],"LSTM":[99],"model":[100],"was":[101,109],"71.97%;":[102],"however,":[103],"incorporating":[105],"processes,":[107],"performance":[108],"dramatically":[110],"increased":[111],"75.22%.":[113],"demonstrate":[116],"how":[117],"well":[118],"mechanisms":[120],"and":[121],"techniques":[124],"work":[125],"together":[126],"enhance":[128],"detection":[130],"comments":[133],"web-based":[137],"platforms.":[138],"Particularly":[139],"given":[140],"limitations":[142],"languages,":[145],"provides":[148],"important":[149],"insights":[150],"meant":[151],"foster":[153],"more":[155],"safe":[156],"online":[157],"environment.":[158]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
