TY - GEN
T1 - Identifying suspected cybermob on Tieba
AU - Shi, Shumin
AU - Zhou, Xinyu
AU - Zhao, Meng
AU - Huang, Heyan
N1 - Publisher Copyright:
© Springer International Publishing AG 2016.
PY - 2016
Y1 - 2016
N2 - This paper describes an approach to identify suspected cybermob on social media. Many researches involve making predictions of group emotion on Internet (such as quantifying sentiment polarity), but this paper instead focuses on the origin of information diffusion, namely back to its makers and contributors. According our previous findings that have shown, at the level of Tieba’s contents, the negative information or emotions spread faster than positive ones, we centre on the maker of negative message in this paper, so-called cybermobs who post aggressive, provocative or insulting remarks on social websites. We explore the different characteristics between suspected cybermobs and general netizens and then extract relative unique features of suspected cybermobs. We construct real system to identify suspected cybermob automatically using machine learning method with above features, including other common features like user/content-based ones. Empirical results show that our approach can detect suspected cybermob correctly and efficiently as we evaluate it with benchmark models, and apply it to actual cases.
AB - This paper describes an approach to identify suspected cybermob on social media. Many researches involve making predictions of group emotion on Internet (such as quantifying sentiment polarity), but this paper instead focuses on the origin of information diffusion, namely back to its makers and contributors. According our previous findings that have shown, at the level of Tieba’s contents, the negative information or emotions spread faster than positive ones, we centre on the maker of negative message in this paper, so-called cybermobs who post aggressive, provocative or insulting remarks on social websites. We explore the different characteristics between suspected cybermobs and general netizens and then extract relative unique features of suspected cybermobs. We construct real system to identify suspected cybermob automatically using machine learning method with above features, including other common features like user/content-based ones. Empirical results show that our approach can detect suspected cybermob correctly and efficiently as we evaluate it with benchmark models, and apply it to actual cases.
KW - Machine learning
KW - Netizen identification
KW - Social reviews
KW - Support vector machine
KW - Suspected cybermob
UR - http://www.scopus.com/inward/record.url?scp=84992493126&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-47674-2_31
DO - 10.1007/978-3-319-47674-2_31
M3 - Conference contribution
AN - SCOPUS:84992493126
SN - 9783319476735
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 375
EP - 386
BT - Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data - 15th China National Conference, CCL 2016 and 4th International Symposium, NLP-NABD 2016, Proceedings
A2 - Sun, Maosong
A2 - Liu, Zhiyuan
A2 - Liu, Yang
A2 - Lin, Hongfei
A2 - Huang, Xuanjing
PB - Springer Verlag
T2 - 15th China National Conference on Chinese Computational Linguistics, CCL 2016 and 4th International Symposium on Natural Language Processing Based on Naturally Annotated Big Data, NLP-NABD 2016
Y2 - 15 October 2016 through 16 October 2016
ER -