a weakly supervised approach for adaptive detection of
play

A Weakly Supervised Approach for Adaptive Detection of Cyberbullying - PowerPoint PPT Presentation

A Weakly Supervised Approach for Adaptive Detection of Cyberbullying Roles Bert Huang Department of Computer Science Virginia Tech CyberSafety Workshop 10/28/16 Cyberbullying Cyberbullying Cyberbullying: willful and repeated harm


  1. A Weakly Supervised Approach for Adaptive Detection of Cyberbullying Roles Bert Huang Department of Computer Science Virginia Tech CyberSafety Workshop 10/28/16

  2. Cyberbullying

  3. Cyberbullying • Cyberbullying: “willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices”

  4. Cyberbullying • Cyberbullying: “willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices” • Forms of cyberbullying:

  5. Cyberbullying • Cyberbullying: “willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices” • Forms of cyberbullying: • Offensive and negative comments, name calling, rumor spreading, threats, public shaming

  6. Cyberbullying • Cyberbullying: “willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices” • Forms of cyberbullying: • Offensive and negative comments, name calling, rumor spreading, threats, public shaming • Linked to mental health issues, e.g., depression, suicide

  7. Cyberbullying • Cyberbullying: “willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices” • Forms of cyberbullying: • Offensive and negative comments, name calling, rumor spreading, threats, public shaming • Linked to mental health issues, e.g., depression, suicide • Anytime, persistent, public, anonymous

  8. Talk Plan 1. Challenges in Machine Learning for Cyberbullying 2. New Method for Weakly Supervised Learning for Detection 3. Open Problem: Automated Interventions

  9. Collaborators James Hawdon 
 Elaheh Raisi 
 Anthony Peguero Director of the Center for Peace Ph.D. student 
 Associate Professor Studies and Violence Prevention Dept. of Computer Science Dept. of Sociology Dept. of Sociology

  10. -1- Challenges for Machine Learning of Cyberbullying Detectors

  11. bully victim bully victim

  12. Challenges for Detecting Cyberbullying with Machine Learning bully victim bully victim

  13. Challenges for Detecting Cyberbullying with Machine Learning • Social structure is important bully victim bully victim

  14. Challenges for Detecting Cyberbullying with Machine Learning • Social structure is important bully • Need scalable algorithms for massive data victim bully victim

  15. Challenges for Detecting Cyberbullying with Machine Learning • Social structure is important bully • Need scalable algorithms for massive data victim • Language is changing: bully victim

  16. Challenges for Detecting Cyberbullying with Machine Learning • Social structure is important bully • Need scalable algorithms for massive data victim • Language is changing: bully victim • New slang is frequently introduced 
 or old slang becomes outdated

  17. Challenges for Detecting Cyberbullying with Machine Learning • Social structure is important bully • Need scalable algorithms for massive data victim • Language is changing: bully victim • New slang is frequently introduced 
 or old slang becomes outdated • Annotation:

  18. Challenges for Detecting Cyberbullying with Machine Learning • Social structure is important bully • Need scalable algorithms for massive data victim • Language is changing: bully victim • New slang is frequently introduced 
 or old slang becomes outdated • Annotation: • Needs significant consideration of social context

  19. Challenges for Detecting Cyberbullying with Machine Learning • Social structure is important bully • Need scalable algorithms for massive data victim • Language is changing: bully victim • New slang is frequently introduced 
 or old slang becomes outdated • Annotation: • Needs significant consideration of social context • Costs add up for a large-scale data

  20. -2- Participant-Vocabulary Consistency Weakly supervised learning for Cyberbullying Detection

  21. Unlabeled Social Interaction Data Seed Bullying Vocabulary w e a k s u p e r v i s i o n abundant unlabeled data Machine Learning Cyberbullying Model

  22. Labeled interaction p a r t i a l s u p e r v i s i o n data Unlabeled Social Interaction Data Seed Bullying Vocabulary w e a k s u p e r v i s i o n abundant unlabeled data Machine Learning Cyberbullying Model

  23. Unlabeled Social Interaction Data Seed Bullying Vocabulary w e a k s u p e r v i s i o n abundant unlabeled data Machine Learning Cyberbullying Model

  24. Participant-Vocabulary Consistency Model

  25. Participant-Vocabulary Consistency Model • Each user has a bully score and a victim score

  26. Participant-Vocabulary Consistency Model • Each user has a bully score and a victim score • Each n-gram has a vocabulary score

  27. Participant-Vocabulary Consistency Model • Each user has a bully score and a victim score • Each n-gram has a vocabulary score • Expert provides seed set of n-grams that we fix to have harassment score 1.0

  28. Participant-Vocabulary Consistency Model • Each user has a bully score and a victim score • Each n-gram has a vocabulary score • Expert provides seed set of n-grams that we fix to have harassment score 1.0 regularizer for all messages vocabulary score of word 0 1 λ + 1 � 2 || b || 2 + || v || 2 + || w || 2 � X X � � min b s ( m ) + v r ( m ) − w k @ A 2 2 b , v , w m ∈ M k : w k ∈ f ( m ) s.t. w k = 1.0 for k ∈ S bully score of sender victim score of receiver expert-provided seed set for words in message

  29. regularizer for all messages vocabulary score of word 0 1 λ + 1 � 2 || b || 2 + || v || 2 + || w || 2 � X X � � min b s ( m ) + v r ( m ) − w k @ A 2 2 b , v , w m ∈ M k : w k ∈ f ( m ) s.t. w k = 1.0 for k ∈ S bully score of sender victim score of receiver expert-provided seed set for words in message

  30. regularizer for all messages vocabulary score of word 0 1 λ + 1 � 2 || b || 2 + || v || 2 + || w || 2 � X X � � min b s ( m ) + v r ( m ) − w k @ A 2 2 b , v , w m ∈ M k : w k ∈ f ( m ) s.t. w k = 1.0 for k ∈ S bully score of sender victim score of receiver expert-provided seed set for words in message

  31. Alternating Least Squares • Objective J( b , v , w , λ ) isn’t jointly convex • Alternating least squares: • Fix all but one parameter vector at a time • Optimize each parameter vector in isolation (closed form) • Run until convergence

  32. Participant-Vocabulary Consistency Algorithm

  33. Experiments # Users # Messages after preprocessing after preprocessing Ask.fm 260,800 2,863,801 Instagram 3,829,756 9,828,760 Twitter 180,355 296,308 Instagram and ask.fm data from [Hosseinmardi et al., CoRR ’14] noswearing.com 3,461 offensive unigrams and bigrams

  34. Baseline Algorithms

  35. Baseline Algorithms • Seed words : use only seed words as bullying vocabulary

  36. Baseline Algorithms • Seed words : use only seed words as bullying vocabulary • Co-occurrence : add words to bullying vocab. if they appear in messages with seed words

  37. Baseline Algorithms • Seed words : use only seed words as bullying vocabulary • Co-occurrence : add words to bullying vocab. if they appear in messages with seed words • Dynamic query expansion (DQE) [Ramakrishnan, KDD ’14] 1. For every word that co-occurs with current bullying vocabulary, compute its document frequency 2. Add the N highest-scoring keywords to vocabulary 3. Repeat until convergence

  38. Post-Hoc Analysis: Conversations • Each method: extract 100 conversations most likely to be bullying • Three annotators rate as “yes”, “no”, or “uncertain” • Consider each conversation with majority yes votes relevant; compute precision@k

  39. Post-Hoc Analysis: Conversations Twitter

  40. Post-Hoc Analysis: Conversations Twitter Instagram Ask.fm

  41. Post-Hoc Analysis: Key Phrases • Each method: 1000 strongest key phrase indicators • Three annotators rate as “yes”, “no”, or “uncertain” • Consider each key phrase with majority yes votes relevant; 
 compute precision@k

  42. Post-Hoc Analysis: Key Phrases Twitter

  43. Post-Hoc Analysis: Key Phrases Twitter Instagram Ask.fm

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend