{"id":"https://openalex.org/W4416799470","doi":"https://doi.org/10.1109/snpd65828.2025.11252553","title":"Towards Safer Online Platforms: Explainable and Adversarial-Resistant Toxic Comment Detection","display_name":"Towards Safer Online Platforms: Explainable and Adversarial-Resistant Toxic Comment Detection","publication_year":2025,"publication_date":"2025-06-25","ids":{"openalex":"https://openalex.org/W4416799470","doi":"https://doi.org/10.1109/snpd65828.2025.11252553"},"language":null,"primary_location":{"id":"doi:10.1109/snpd65828.2025.11252553","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snpd65828.2025.11252553","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sujani Chandrashekar","orcid":null},"institutions":[{"id":"https://openalex.org/I75381157","display_name":"Wilfrid Laurier University","ror":"https://ror.org/00fn7gb05","country_code":"CA","type":"education","lineage":["https://openalex.org/I75381157"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Sujani Chandrashekar","raw_affiliation_strings":["Wilfrid Laurier University,Waterloo,Canada"],"affiliations":[{"raw_affiliation_string":"Wilfrid Laurier University,Waterloo,Canada","institution_ids":["https://openalex.org/I75381157"]}]},{"author_position":"last","author":{"id":null,"display_name":"Yang Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I75381157","display_name":"Wilfrid Laurier University","ror":"https://ror.org/00fn7gb05","country_code":"CA","type":"education","lineage":["https://openalex.org/I75381157"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Yang Liu","raw_affiliation_strings":["Wilfrid Laurier University,Waterloo,Canada"],"affiliations":[{"raw_affiliation_string":"Wilfrid Laurier University,Waterloo,Canada","institution_ids":["https://openalex.org/I75381157"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I75381157"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19208459,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"692","last_page":"697"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.0010999999940395355,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.0010999999940395355,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6428999900817871},{"id":"https://openalex.org/keywords/safer","display_name":"SAFER","score":0.5999000072479248},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.44020000100135803},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4018999934196472},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.39809998869895935},{"id":"https://openalex.org/keywords/symbol","display_name":"Symbol (formal)","score":0.38019999861717224},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.35679998993873596}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6633999943733215},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6428999900817871},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.5999000072479248},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.44020000100135803},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.430400013923645},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42080000042915344},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4018999934196472},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.39809998869895935},{"id":"https://openalex.org/C134400042","wikidata":"https://www.wikidata.org/wiki/Q2372244","display_name":"Symbol (formal)","level":2,"score":0.38019999861717224},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.35679998993873596},{"id":"https://openalex.org/C2779405079","wikidata":"https://www.wikidata.org/wiki/Q356040","display_name":"Jigsaw","level":2,"score":0.3546000123023987},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3544999957084656},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3504999876022339},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3418000042438507},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.3262999951839447},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.3158999979496002},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.2955999970436096},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.2955000102519989},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2750999927520752},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.26429998874664307},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.2597000002861023}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/snpd65828.2025.11252553","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snpd65828.2025.11252553","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1596157974","https://openalex.org/W2516809705","https://openalex.org/W2760103715","https://openalex.org/W2791170418","https://openalex.org/W3105604018"],"related_works":[],"abstract_inverted_index":{"Toxic":[0,132],"content":[1],"on":[2,129],"online":[3],"platforms\u2014such":[4],"as":[5],"hate":[6],"speech,":[7],"harassment,":[8],"and":[9,15,27,43,125,146],"discrimination\u2014continues":[10],"to":[11,69,99,148],"threaten":[12],"the":[13,29,120,130],"safety":[14],"inclusivity":[16],"of":[17],"digital":[18],"spaces.":[19],"These":[20],"harmful":[21],"interactions":[22],"negatively":[23],"impact":[24],"user":[25],"experience":[26],"highlight":[28,65],"need":[30],"for":[31,48],"automated,":[32],"reliable":[33],"moderation":[34],"tools.":[35],"In":[36],"this":[37],"study,":[38],"we":[39,60,75,94],"present":[40],"a":[41,53,70,96],"robust":[42],"interpretable":[44],"machine":[45],"learning":[46],"framework":[47],"toxic":[49,81],"comment":[50],"classification":[51],"using":[52],"fine-tuned":[54],"BERT":[55],"model.":[56],"To":[57,72],"enhance":[58],"transparency,":[59],"integrate":[61],"SHAP-based":[62],"explanations":[63],"that":[64,88,137],"which":[66],"words":[67],"contribute":[68],"classification.":[71],"improve":[73],"robustness,":[74],"incorporate":[76],"adversarial":[77,149],"training":[78],"with":[79,119],"obfuscated":[80],"samples":[82],"(e.g.,":[83],"misspellings":[84],"or":[85],"symbol":[86],"substitutions)":[87],"mimic":[89],"real-world":[90],"evasion":[91],"tactics.":[92],"Additionally,":[93],"implement":[95],"rule-based":[97],"filter":[98],"flag":[100],"borderline":[101],"cases\u2014especially":[102],"those":[103],"involving":[104],"ambiguous":[105],"terms\u2014for":[106],"manual":[107],"review,":[108],"reducing":[109],"false":[110],"positives.":[111],"A":[112],"user-friendly":[113],"Streamlit":[114],"interface":[115],"allows":[116],"real-time":[117],"interaction":[118],"model,":[121],"providing":[122],"both":[123],"predictions":[124],"visual":[126],"explanations.":[127],"Experiments":[128],"Jigsaw":[131],"Comment":[133],"Classification":[134],"datasets":[135],"show":[136],"our":[138],"approach":[139],"outperforms":[140],"standard":[141],"baselines":[142],"in":[143],"accuracy,":[144],"interpretability,":[145],"resilience":[147],"input.":[150]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-11-28T00:00:00"}
