ACL-OCL / Base_JSON /prefixS /json /stoc /2020.stoc-1.3.json
Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "2020",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T15:45:32.498190Z"
},
"title": "Analysis of Online Conversations to Detect Cyberpredators Using Recurrent Neural Networks",
"authors": [
{
"first": "Jinhwa",
"middle": [],
"last": "Kim",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "University of California Irvine Yongin South Korea",
"location": {
"settlement": "Seoul South Korea, Irvine",
"region": "CA",
"country": "USA"
}
},
"email": ""
},
{
"first": "Jo",
"middle": [],
"last": "Yoon",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "University of California Irvine Yongin South Korea",
"location": {
"settlement": "Seoul South Korea, Irvine",
"region": "CA",
"country": "USA"
}
},
"email": ""
},
{
"first": "Mitra",
"middle": [],
"last": "Kim",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "University of California Irvine Yongin South Korea",
"location": {
"settlement": "Seoul South Korea, Irvine",
"region": "CA",
"country": "USA"
}
},
"email": ""
},
{
"first": "Ian",
"middle": [
"G"
],
"last": "Behzadi",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "University of California Irvine Yongin South Korea",
"location": {
"settlement": "Seoul South Korea, Irvine",
"region": "CA",
"country": "USA"
}
},
"email": "mbehzadi@uci.edu"
},
{
"first": "",
"middle": [],
"last": "Harris",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "University of California Irvine Yongin South Korea",
"location": {
"settlement": "Seoul South Korea, Irvine",
"region": "CA",
"country": "USA"
}
},
"email": "harris@ics.uci.edu"
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "We present an automated approach to analyze the text of an online conversation and determine whether one of the participants is a cyberpredator who is preying on another participant. The task is divided into two stages, 1) the classification of each message, and 2) the classification of the entire conversation. Each stage uses a Recurrent Neural Network (RNN) to perform the classification task.",
"pdf_parse": {
"paper_id": "2020",
"_pdf_hash": "",
"abstract": [
{
"text": "We present an automated approach to analyze the text of an online conversation and determine whether one of the participants is a cyberpredator who is preying on another participant. The task is divided into two stages, 1) the classification of each message, and 2) the classification of the entire conversation. Each stage uses a Recurrent Neural Network (RNN) to perform the classification task.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "Online cyberpredators are a serious threat against children who increasingly use social networking and messaging services to interact with strangers.Our study also found that one in nine teens will received unwanted online solicitations (Madigan et al., 2018) . Parents are advised to monitor their children's use of social media, but this is extremely difficult in practice given the variety of networking services and access methods that a child can choose from. Several software tools are available to observe children's online behavior (FlexiSPY, 2019; Easemon Inc., 2019; Cocospy, 2019) . However, existing products are limited to recording data for later examination, or providing a \"keyword alert\" when a particular word has been used in text. These tools do not attempt to understand the semantics of the conversation, so the majority of the burden of identifying cyberpredators is left to the parent's manual effort. Automated approaches which employ natural language understanding could be of tremendous benefit. We present an approach to automatically monitor communications with a child in order to determine if a communication partner is a cyberpredator. Machine learning approaches, specifically artificial neural networks (ANNs), are generally well suited to this type of classification problem because they can theoretically approximate continuous functions, given a few assumptions. An ANN could be used to classify a conversation as either predatory or non-predatory, however there are several practical difficulties in the application of ANNs to this problem. One issue is the importance of context in understanding the meaning of a conversation. Attempting to infer the intent of a conversation by examining utterances individually will generally produce poor results because sentences in dialogs are meant to be understood in the context of all messages in the dialog. The dependence on extended context requires that the input to the classification process must be a large block of utterances which must be classified as a whole. Another difficulty is the high dimensionality of the input space of the problem, which must capture entire conversations with hundreds of messages. We address the high dimensionality by dividing the problem into two stages. The first stage classifies the intent of individual messages, and the second stage uses the results of the first stage to classify the entire conversation. The first stage generates a concise summary of the individual messages, allowing the second stage to efficiently consider the meaning of the entire conversation. We address the context in two ways. When classifying individual messages, the first stage also considers the a window of 5 messages which comprise local context. When classifying the entire conversation, the second stage considers the classifications of all messages uttered by the potential attacker in the conversation.",
"cite_spans": [
{
"start": 237,
"end": 259,
"text": "(Madigan et al., 2018)",
"ref_id": "BIBREF12"
},
{
"start": 540,
"end": 556,
"text": "(FlexiSPY, 2019;",
"ref_id": null
},
{
"start": 557,
"end": 576,
"text": "Easemon Inc., 2019;",
"ref_id": null
},
{
"start": 577,
"end": 591,
"text": "Cocospy, 2019)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "Much of the existing research in detection of cyberpredators is based on the chat log transcripts provided by Perverted Justice (Perverted Justice Foundation, 2019), a community of volunteers who posed as children in chat rooms in order to lure predators. The efforts of the Perverted Justice community has been credited with resulting in the conviction of 623 cyber-predators to date. Chats with predators have been transcribed and made available to the public. The linguistic properties of the Perverted Justice dataset have been explored in several studies (Black et al., 2015; Chiu et al., 2018) . The International Competition for Sexual Predator Identification was held and the PAN 2012 workshop (Inches and Crestani, 2012b) , catalyzing interest in the problem. To support the competition, the PAN 2012 dataset was created using the Perverted Justice dataset and enhancing it with adult-to-adult sexual conversations from a repository of Omegle conversations and a set of IRC chat logs (Inches and Crestani, 2012c) . Almost all existing approaches use machine learning approaches to detect predatory text. Many machine learning techniques have been used including Support Vector Machines (Pendar, 2007; Morris and Hirst, 2012; Parapar et al., 2012; Peersman et al., 2012; Villatoro-Tello et al., 2012; Escalante et al., 2013; Vartapetiance and Gillam, 2014; Cheong et al., 2015 ), Decision Trees (McGhee et al., 2011a Miah et al., 2011; Kontostathis et al., 2012; Vartapetiance and Gillam, 2014; Cheong et al., 2015) , Naive Bayes (Miah et al., 2011; Bogdanova et al., 2012; Vartapetiance and Gillam, 2014; Cheong et al., 2015), k-Nearest Neighbor (Pendar, 2007; Cheong et al., 2015) , logistic regression (Miah et al., 2011; Cheong et al., 2015) , Maximum Entropy (Eriksson and Karlgren, 2012) , and Multilayer Perceptron (MLP) Neural Networks (Villatoro-Tello et al., 2012; Escalante et al., 2013; Cheong et al., 2015) . A rulebased heuristic was presented (McGhee et al., 2011a; Kontostathis et al., 2012) and shown to outperform a decision tree approach. All approaches, other than those based on Neural Networks, require the explicit definition of set of features used to represent the conversation. All of these approaches have used lexical features, unigrams and bigrams which are associated with speech acts commonly performed by attackers. Words are grouped into dictionaries which are assumed to indicate the conversational goals of a predator. Examples of lexical features include the number of desensitization verbs (e.g. kiss, suck) and the number of reframing verbs (e.g. teach, practice) (McGhee et al., 2011a; Kontostathis et al., 2012) . Several approaches use Linguistic Inquiry and Word Count (LIWC) (Pennebaker et al., 2011) features which associate words with cognitive and emotional states. Some approaches use conversational/behavioral features which model properties of the overall dialog such as the number of conversation participants, the length of the conversation (Eriksson and Karlgren, 2012) , the number of initiations, and the number of questions (Morris and Hirst, 2012) . Several previous approaches have employed MLP neural networks to identify predators (Villatoro-Tello et al., 2012; Escalante et al., 2013; Cheong et al., 2015) . Neural networks do not require an explicit set of features. Instead, these previous approaches use a bag-of-words representation which summarizes a conversation as the number of occurrences of each word in the vocabulary, regardless of sequence.",
"cite_spans": [
{
"start": 560,
"end": 580,
"text": "(Black et al., 2015;",
"ref_id": "BIBREF0"
},
{
"start": 581,
"end": 599,
"text": "Chiu et al., 2018)",
"ref_id": "BIBREF5"
},
{
"start": 702,
"end": 730,
"text": "(Inches and Crestani, 2012b)",
"ref_id": "BIBREF9"
},
{
"start": 993,
"end": 1021,
"text": "(Inches and Crestani, 2012c)",
"ref_id": "BIBREF10"
},
{
"start": 1195,
"end": 1209,
"text": "(Pendar, 2007;",
"ref_id": "BIBREF22"
},
{
"start": 1210,
"end": 1233,
"text": "Morris and Hirst, 2012;",
"ref_id": "BIBREF17"
},
{
"start": 1234,
"end": 1255,
"text": "Parapar et al., 2012;",
"ref_id": "BIBREF20"
},
{
"start": 1256,
"end": 1278,
"text": "Peersman et al., 2012;",
"ref_id": "BIBREF21"
},
{
"start": 1279,
"end": 1308,
"text": "Villatoro-Tello et al., 2012;",
"ref_id": "BIBREF26"
},
{
"start": 1309,
"end": 1332,
"text": "Escalante et al., 2013;",
"ref_id": "BIBREF8"
},
{
"start": 1333,
"end": 1364,
"text": "Vartapetiance and Gillam, 2014;",
"ref_id": "BIBREF25"
},
{
"start": 1365,
"end": 1384,
"text": "Cheong et al., 2015",
"ref_id": "BIBREF4"
},
{
"start": 1385,
"end": 1424,
"text": "), Decision Trees (McGhee et al., 2011a",
"ref_id": null
},
{
"start": 1425,
"end": 1443,
"text": "Miah et al., 2011;",
"ref_id": "BIBREF15"
},
{
"start": 1444,
"end": 1470,
"text": "Kontostathis et al., 2012;",
"ref_id": "BIBREF11"
},
{
"start": 1471,
"end": 1502,
"text": "Vartapetiance and Gillam, 2014;",
"ref_id": "BIBREF25"
},
{
"start": 1503,
"end": 1523,
"text": "Cheong et al., 2015)",
"ref_id": "BIBREF4"
},
{
"start": 1538,
"end": 1557,
"text": "(Miah et al., 2011;",
"ref_id": "BIBREF15"
},
{
"start": 1558,
"end": 1581,
"text": "Bogdanova et al., 2012;",
"ref_id": "BIBREF1"
},
{
"start": 1582,
"end": 1599,
"text": "Vartapetiance and",
"ref_id": "BIBREF25"
},
{
"start": 1655,
"end": 1669,
"text": "(Pendar, 2007;",
"ref_id": "BIBREF22"
},
{
"start": 1670,
"end": 1690,
"text": "Cheong et al., 2015)",
"ref_id": "BIBREF4"
},
{
"start": 1713,
"end": 1732,
"text": "(Miah et al., 2011;",
"ref_id": "BIBREF15"
},
{
"start": 1733,
"end": 1753,
"text": "Cheong et al., 2015)",
"ref_id": "BIBREF4"
},
{
"start": 1772,
"end": 1801,
"text": "(Eriksson and Karlgren, 2012)",
"ref_id": "BIBREF7"
},
{
"start": 1852,
"end": 1882,
"text": "(Villatoro-Tello et al., 2012;",
"ref_id": "BIBREF26"
},
{
"start": 1883,
"end": 1906,
"text": "Escalante et al., 2013;",
"ref_id": "BIBREF8"
},
{
"start": 1907,
"end": 1927,
"text": "Cheong et al., 2015)",
"ref_id": "BIBREF4"
},
{
"start": 1966,
"end": 1988,
"text": "(McGhee et al., 2011a;",
"ref_id": "BIBREF13"
},
{
"start": 1989,
"end": 2015,
"text": "Kontostathis et al., 2012)",
"ref_id": "BIBREF11"
},
{
"start": 2610,
"end": 2632,
"text": "(McGhee et al., 2011a;",
"ref_id": "BIBREF13"
},
{
"start": 2633,
"end": 2659,
"text": "Kontostathis et al., 2012)",
"ref_id": "BIBREF11"
},
{
"start": 2726,
"end": 2751,
"text": "(Pennebaker et al., 2011)",
"ref_id": "BIBREF23"
},
{
"start": 3000,
"end": 3029,
"text": "(Eriksson and Karlgren, 2012)",
"ref_id": "BIBREF7"
},
{
"start": 3087,
"end": 3111,
"text": "(Morris and Hirst, 2012)",
"ref_id": "BIBREF17"
},
{
"start": 3198,
"end": 3228,
"text": "(Villatoro-Tello et al., 2012;",
"ref_id": "BIBREF26"
},
{
"start": 3229,
"end": 3252,
"text": "Escalante et al., 2013;",
"ref_id": "BIBREF8"
},
{
"start": 3253,
"end": 3273,
"text": "Cheong et al., 2015)",
"ref_id": "BIBREF4"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Related Work",
"sec_num": "2."
},
{
"text": "Early work in the study of online child exploitation presented a set of conversational goals of predators and categorized the utterances of a predator based on the goal being achieved. A typology is presented by O'Connell (O'Connell, 2003) which describes 5 stages on conversation: friendship forming, relationship forming, risk assessment, exclusivity, and sexual. An alternate classification is presented by Olson (Olson et al., 2007) which contains 3 main classes: grooming, isolation, and approach. Researchers in (McGhee et al., 2011a) present a classification of cyberpredator intents and a tool, ChatCoder2, which uses a rule-based approach to classify messages according to their classification. We use the classification presented in (McGhee et al., 2011a) because it has been shown to be effective, and because we can use the ChatCoder2 tool to generate a labeled dataset which we use for training. Each message is placed in one of the following 4 classes.",
"cite_spans": [
{
"start": 222,
"end": 239,
"text": "(O'Connell, 2003)",
"ref_id": "BIBREF19"
},
{
"start": 410,
"end": 436,
"text": "Olson (Olson et al., 2007)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Cyberpredator Intent Classification",
"sec_num": "3."
},
{
"text": "\u2022 Exchange of personal information (200) -This includes questions about semi-personal information which might be exchanged between new friends. Topics include age, gender, location, boyfriends/girlfriends, and likes/dislikes. The cyberpredator uses this to initiate a trust relationship.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Cyberpredator Intent Classification",
"sec_num": "3."
},
{
"text": "\u2022 Grooming (600) -This involves the use of sexual terminology, regardless of context. Cyberpredators often use this to desensitize the victim to sexual discussions.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Cyberpredator Intent Classification",
"sec_num": "3."
},
{
"text": "\u2022 Approach (900) -This describes when the cyberpredator is either gathering information to arrange a meeting, or encouraging the victim to keep their relationship secret.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Cyberpredator Intent Classification",
"sec_num": "3."
},
{
"text": "\u2022 Non-predatory (000) -These are all messages not in one of the previous classes. The overall structure of our approach is illustrated in Figure 1. Our approach is divided into two stages. The first stage is Message Labeling which labels each of the message from the potential attacker with its intent classification. The second stage is Conversation Classification which evaluates the entire sequence of messages from the potential attacker and determines if the potential attacker is a predator or not. The input to the Conversation Classification stage is not a sequence of messages. Instead, it is the sequence of sentence labels produced by the Message Labeling stage.",
"cite_spans": [],
"ref_spans": [
{
"start": 138,
"end": 144,
"text": "Figure",
"ref_id": null
}
],
"eq_spans": [],
"section": "Cyberpredator Intent Classification",
"sec_num": "3."
},
{
"text": "Message Labeling During the Message Labeling stage, each message from the potential attacker in a dialogue is categorized by its intent classification. For categorizing each message, we train the mapping pattern between a message and the categories. Because the messages are written in natural language, each message must be converted in to the form of a vector to be used by the training model. In order to capture the meaning of each message, we must consider not only the words in the message and their sequence, but also the preceding messages which comprise the context in the conversation. We use two different methods to represent the meaning of a message, one method to represent meaning in a single message, and a second method to consider the impact of context. We generate message encodings using the Universal Sentence Encoder (Cer et al., 2018a) approach to generate a message vector. This is in contrast to other traditional methods such as word2vec embeddings (Mikolov et al., 2013) or bag-of-words model. Word embeddings have been shown to perform well at capturing the meaning of individual words. However, the bag-of-words model loses meaning information because it ignores the ordering of words in the message. The Universal Sentence Encoding approach uses an LSTM (Long Short-Term Memory models) model to understand the relationship between each word. For this reason, Universal Sentence Encoding is more suitable and we employ it using its TensorFlow (Cer et al., 2018b) implementation.",
"cite_spans": [
{
"start": 839,
"end": 858,
"text": "(Cer et al., 2018a)",
"ref_id": null
},
{
"start": 975,
"end": 997,
"text": "(Mikolov et al., 2013)",
"ref_id": "BIBREF16"
},
{
"start": 1472,
"end": 1491,
"text": "(Cer et al., 2018b)",
"ref_id": "BIBREF3"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "System Architecture",
"sec_num": "4."
},
{
"text": "In addition, the meaning of a message is determined in part by the context which precedes it. Though two statements look similar, they could have different meanings depends on their preceding contexts. The message \"Call me\" could be a message from the two close friends while it could be one that a predator leads a victim to call him or her. In this case, it is hard to identify where it would belong to with only one message. For this reason, when classifying a message, we consider the 4 messages preceding the message in question. So classification is performed by examining a window of 5 messages in order to consider conversational context. Figure 2 is the structure of our training model for Message Labeling. The window of 5 messages, ending with the message being classified, are input to a layer which uses Universal Sentence Encoding to generate a 1*512 dimension vector for each message. The vectors from the encoding layer become the input of the succeeding LSTM and then Dense layer. By considering the window of 5 vectors at the LSTM/Dense layers, our approach can infer local context.",
"cite_spans": [],
"ref_spans": [
{
"start": 647,
"end": 655,
"text": "Figure 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "System Architecture",
"sec_num": "4."
},
{
"text": "After labeling each message, each conversation is represented as a sequence of labeled statements. These label values are used as the value of the vector for input to the Conversation Classification stage. Figure 3 shows the structure of our model of the Conversation Classification stage. The sequence of message labels is padded to ensure that the length of the input vector is constant. However, the padded labels must not be considered as the labels of the conversation. Therefore, we use the Masking layer, which is used to ignore padded labels. We use an LSTM layer to train the corresponding pattern of labels and then a Dense layer for final classification of the conversation.",
"cite_spans": [],
"ref_spans": [
{
"start": 206,
"end": 214,
"text": "Figure 3",
"ref_id": null
}
],
"eq_spans": [],
"section": "Conversation Classification",
"sec_num": null
},
{
"text": "We present two sets of results. The first set of results evaluate the Message Labeling stage alone by presenting the precision and recall of the message labeling process. The second set of results evaluates both the Message Labeling and Conversation Classification stages together by presenting the precision and recall of the classification of a set of conversations.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Experiments",
"sec_num": "5."
},
{
"text": "To evaluate the Message Labeling stage, we use chatlog data from both ChatCoder2 (McGhee et al., 2011b) and PAN2012 (Inches and Crestani, 2012a) . ChatCoder2 provides conversations extracted from the Perverted-Justice (PJ) website (Perverted Justice Foundation, 2019). All of the conversations in the ChatCoder2 dataset are predatory, while the PAN2012 dataset if a mix of predatory and nonpredatory conversations. ChatCoder2 is an heuristic tool which automatically labels each message with its intent classification ('000', '200', '600', and '900'). We use Chat-Coder2 to automatically classify the messages in each conversation. Table 2 : Dataset used to evaluate Conversation Classification datasets. Our goal was to use the same number of messages in each predatory intent ('200', '600', and '900'), so we extracted 626 of each type of message from the Chat-Coder2 dataset, and we selected another 626 messages with non-predatory intents ('000') from the ChatCoder2 dataset for balance. The number 626 was chosen because that is the largest number of messages that we could select while maintaining balance in each intent. In other words, 626 is the minimum of the number of messages in each class in the ChatCoder2 dataset. In total, 2504 (626 * 4) messages are selected from the ChatCoder2 dataset. We expect that using non-predatory messages ('000') only from the ChatCoder2 dataset would result in a biased classification because all of the non-predatory sentences would be taken from predatory conversations. For this reason, we selected another 2504 non-predatory messages from the PAN2012 dataset as well.",
"cite_spans": [
{
"start": 116,
"end": 144,
"text": "(Inches and Crestani, 2012a)",
"ref_id": null
}
],
"ref_spans": [
{
"start": 632,
"end": 639,
"text": "Table 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "Dataset",
"sec_num": "5.1."
},
{
"text": "To evaluate the Conversation Classification stage, we use only the PAN2012 dataset for training and test. We use only conversations with more than 130 messages. The sequence of labeled messages from the output of Message Labeling are used as input for Conversation Classification. Conversations in the PAN2012 dataset are pre-labeled as predatory and non-predatory. Table 2 describes the properties of the dataset to evaluate Conversation Classification.",
"cite_spans": [],
"ref_spans": [
{
"start": 366,
"end": 373,
"text": "Table 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "Dataset",
"sec_num": "5.1."
},
{
"text": "For training the network used for Message Labeling, we use 10 epochs use a batch size of 32. We use 80% of the dataset for training and 20% for testing. ",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Results of Message Labeling",
"sec_num": "5.2."
},
{
"text": "Conversation Classification was evaluated by using Message Labeling to label each message in the PAN2012 dataset, and using the resulting message label sequences to classify each conversation. Table 4 shows the number of sentences with each label in the PAN 2012 dataset, as derived using the trained model for Message Labeling. Figure 4 shows the distribution of different message labels in both predatory and non-predatory conversations. In non-predatory conversations, the vast majority of messages, 88%, are classified in set '000' as clearly non-malicious. In predatory conversations, the percentage of '000' messages is lower, 53%, and the other potentially predatory message classes are much more common.",
"cite_spans": [],
"ref_spans": [
{
"start": 193,
"end": 200,
"text": "Table 4",
"ref_id": "TABREF3"
},
{
"start": 329,
"end": 337,
"text": "Figure 4",
"ref_id": null
}
],
"eq_spans": [],
"section": "Results of Conversation Classification",
"sec_num": "5.3."
},
{
"text": "Label 000 200 600 900 of messages 59142 7060 6262 5666 When training the model for Conversation Classification, we set the maximum length of the sequence as 200 and the input whose length is lower than 200 is padded. We use 10 epochs and set batch size to 32. We use 80%(384) of the dataset for training and 20%(96) for the test. Our model yields precision of 0.9063, recall of 0.9355, F1 score of 0.9148, and F0.5 score of 0.9058. Table 5 shows the detail of the performance results. We compare our results to those presented at the PAN2012 cyberpredator detection competition (Inches and Crestani, 2012b) , although our dataset included ChatCoder2 data, in addition to the PAN2012 data used in the competition. Compared to the 16 competitors used for official evaluation, our results place us first with respect to recall, first with respect to F1 score, third with respect to F0.5 score, and fifth with respect to precision. We argue that recall is the most important measure for this problem because it indicates the fraction of predators who would go undetected. We expect that a parent would be more willing to accept a small number of false alarms rather than risking the possibility of missing a predator.",
"cite_spans": [
{
"start": 578,
"end": 606,
"text": "(Inches and Crestani, 2012b)",
"ref_id": "BIBREF9"
}
],
"ref_spans": [
{
"start": 432,
"end": 439,
"text": "Table 5",
"ref_id": "TABREF4"
}
],
"eq_spans": [],
"section": "Results of Conversation Classification",
"sec_num": "5.3."
},
{
"text": "We have presented an approach to the detection of predatory conversations which first classifies individual messages and uses those results to classify entire conversations.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusions",
"sec_num": "6."
},
{
"text": "RNNs are used to perform each stage and are trained using messages labeled by the ChatCoder2 tool and existing prelabeled conversations. Limited context is considered in the labeling of individual messages by considering the previous 4 messages when classifying a message. Our approach provides better recall than previous approaches.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusions",
"sec_num": "6."
},
{
"text": "Our contribution is focused on helping to protect children from cyberpredators. We do not foresee any malicious use of this technology.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Ethical Considerations",
"sec_num": "7."
}
],
"back_matter": [
{
"text": "This material is based upon work supported by the National Science Foundation under Grant No. 1813858. This research was also supported by a generous gift from the Herman P. & Sophia Taubman Foundation.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Acknowledgements",
"sec_num": "8."
}
],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "A linguistic analysis of grooming strategies of online child sex offenders: Implications for our understanding of predatory sexual behavior in an increasingly computer-mediated world",
"authors": [
{
"first": "P",
"middle": [
"J"
],
"last": "Black",
"suffix": ""
},
{
"first": "M",
"middle": [
"A"
],
"last": "Wollis",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Woodworth",
"suffix": ""
},
{
"first": "J",
"middle": [
"T"
],
"last": "Hancock",
"suffix": ""
}
],
"year": 2015,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Black, P. J., Wollis, M. A., Woodworth, M., and Hancock, J. T. (2015). A linguistic analysis of grooming strategies of online child sex offenders: Implications for our under- standing of predatory sexual behavior in an increasingly computer-mediated world. Child abuse & neglect, 44.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "On the impact of sentiment and emotion based features in detecting online sexual predators",
"authors": [
{
"first": "D",
"middle": [],
"last": "Bogdanova",
"suffix": ""
},
{
"first": "P",
"middle": [],
"last": "Rosso",
"suffix": ""
},
{
"first": "T",
"middle": [],
"last": "Solorio",
"suffix": ""
}
],
"year": 2012,
"venue": "Proceedings of the 3rd Workshop in Computational Approaches to Subjectivity and Sentiment Analysis",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Bogdanova, D., Rosso, P., and Solorio, T. (2012). On the impact of sentiment and emotion based features in de- tecting online sexual predators. In Proceedings of the 3rd Workshop in Computational Approaches to Subjec- tivity and Sentiment Analysis, WASSA '12.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "Universal sentence encoder for English",
"authors": [
{
"first": "D",
"middle": [],
"last": "Cer",
"suffix": ""
},
{
"first": "Y",
"middle": [],
"last": "Yang",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Yi Kong",
"suffix": ""
},
{
"first": "N",
"middle": [],
"last": "Hua",
"suffix": ""
},
{
"first": "N",
"middle": [],
"last": "Limtiaco",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "St",
"suffix": ""
},
{
"first": "R",
"middle": [],
"last": "John",
"suffix": ""
},
{
"first": "N",
"middle": [],
"last": "Constant",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Guajardo-C\u00e9spedes",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Yuan",
"suffix": ""
},
{
"first": "C",
"middle": [],
"last": "Tar",
"suffix": ""
},
{
"first": "Y",
"middle": [
"H"
],
"last": "Sung",
"suffix": ""
},
{
"first": "B",
"middle": [],
"last": "Strope",
"suffix": ""
},
{
"first": "R",
"middle": [],
"last": "Kurzweil",
"suffix": ""
}
],
"year": 2018,
"venue": "EMNLP 2018 -Conference on Empirical Methods in Natural Language Processing: System Demonstrations, Proceedings",
"volume": "",
"issue": "",
"pages": "169--174",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Cer, D., Yang, Y., yi Kong, S., Hua, N., Limtiaco, N., St. John, R., Constant, N., Guajardo-C\u00e9spedes, M., Yuan, S., Tar, C., Sung, Y. H., Strope, B., and Kurzweil, R. (2018b). Universal sentence encoder for English. EMNLP 2018 -Conference on Empirical Methods in Natural Language Processing: System Demonstrations, Proceedings, pages 169-174.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "Detecting predatory behavior in game chats",
"authors": [
{
"first": "Y",
"middle": [],
"last": "Cheong",
"suffix": ""
},
{
"first": "A",
"middle": [
"K"
],
"last": "Jensen",
"suffix": ""
},
{
"first": "E",
"middle": [
"R"
],
"last": "Guonadottir",
"suffix": ""
},
{
"first": "B",
"middle": [],
"last": "Bae",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Togelius",
"suffix": ""
}
],
"year": 2015,
"venue": "IEEE Transactions on Computational Intelligence and AI in Games",
"volume": "7",
"issue": "3",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Cheong, Y., Jensen, A. K., Guonadottir, E. R., Bae, B., and Togelius, J. (2015). Detecting predatory behavior in game chats. IEEE Transactions on Computational In- telligence and AI in Games, 7(3), Sep.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "Exploring detection of contact vs. fantasy online sexual offenders in chats with minors: Statistical discourse analysis of self-disclosure and emotion words",
"authors": [
{
"first": "M",
"middle": [
"M"
],
"last": "Chiu",
"suffix": ""
},
{
"first": "K",
"middle": [
"C"
],
"last": "Seigfried-Spellar",
"suffix": ""
},
{
"first": "T",
"middle": [
"R"
],
"last": "Ringenberg",
"suffix": ""
}
],
"year": 2018,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Chiu, M. M., Seigfried-Spellar, K. C., and Ringenberg, T. R. (2018). Exploring detection of contact vs. fantasy online sexual offenders in chats with minors: Statistical discourse analysis of self-disclosure and emotion words. Child abuse & neglect, 81.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "Features for modelling characteristics of conversations: Notebook for pan at clef 2012",
"authors": [
{
"first": "G",
"middle": [],
"last": "Eriksson",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Karlgren",
"suffix": ""
}
],
"year": 2012,
"venue": "CLEF (Online Working Notes/Labs/Workshop)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Eriksson, G. and Karlgren, J. (2012). Features for modelling characteristics of conversations: Notebook for pan at clef 2012. In CLEF (Online Working Notes/Labs/Workshop).",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "Overview of the International Sexual Predator Identification Competitin at PAN-2012",
"authors": [
{
"first": "H",
"middle": [
"J"
],
"last": "Escalante",
"suffix": ""
},
{
"first": "E",
"middle": [],
"last": "Villatoro-Tello",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Ju\u00e1rez",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Montes-Y G\u00f3mez",
"suffix": ""
},
{
"first": "L",
"middle": [],
"last": "Villase\u00f1or",
"suffix": ""
}
],
"year": 2012,
"venue": "Proceedings of the 4th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Escalante, H. J., Villatoro-Tello, E., Ju\u00e1rez, A., Montes-y G\u00f3mez, M., and Villase\u00f1or, L. (2013). Sexual predator detection in chats with chained classifiers. In Proceed- ings of the 4th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis, June. FlexiSPY. (2019). FlexiSPY. https://www.flexispy.com. Inches, G. and Crestani, F. (2012a). Overview of the In- ternational Sexual Predator Identification Competitin at PAN-2012. Working Notes Papers of the CLEF 2012 Evaluation Labs, (May).",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "Overview of the international sexual predator identification competition at pan-2012",
"authors": [
{
"first": "G",
"middle": [],
"last": "Inches",
"suffix": ""
},
{
"first": "F",
"middle": [],
"last": "Crestani",
"suffix": ""
}
],
"year": 2012,
"venue": "CLEF (Online Working Notes/Labs/Workshop)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Inches, G. and Crestani, F. (2012b). Overview of the international sexual predator identification com- petition at pan-2012. In CLEF (Online Working Notes/Labs/Workshop).",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "Overview of the international sexual predator identification competition at pan-2012",
"authors": [
{
"first": "G",
"middle": [],
"last": "Inches",
"suffix": ""
},
{
"first": "F",
"middle": [],
"last": "Crestani",
"suffix": ""
}
],
"year": 2012,
"venue": "CLEF",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Inches, G. and Crestani, F. (2012c). Overview of the in- ternational sexual predator identification competition at pan-2012. In CLEF.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "Identifying predators using chatcoder 2.0",
"authors": [
{
"first": "A",
"middle": [],
"last": "Kontostathis",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Garron",
"suffix": ""
},
{
"first": "K",
"middle": [],
"last": "Reynolds",
"suffix": ""
},
{
"first": "W",
"middle": [],
"last": "West",
"suffix": ""
},
{
"first": "L",
"middle": [],
"last": "Edwards",
"suffix": ""
}
],
"year": 2012,
"venue": "CLEF (Online Working Notes/Labs/Workshop)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Kontostathis, A., Garron, A., Reynolds, K., West, W., and Edwards, L. (2012). Identifying preda- tors using chatcoder 2.0. In CLEF (Online Working Notes/Labs/Workshop).",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "The prevalence of unwanted online sexual exposure and solicitation among youth: A meta-analysis",
"authors": [
{
"first": "S",
"middle": [],
"last": "Madigan",
"suffix": ""
},
{
"first": "V",
"middle": [],
"last": "Villani",
"suffix": ""
},
{
"first": "C",
"middle": [],
"last": "Azzopardi",
"suffix": ""
},
{
"first": "D",
"middle": [],
"last": "Laut",
"suffix": ""
},
{
"first": "T",
"middle": [],
"last": "Smith",
"suffix": ""
},
{
"first": "J",
"middle": [
"R"
],
"last": "Temple",
"suffix": ""
},
{
"first": "D",
"middle": [],
"last": "Browne",
"suffix": ""
},
{
"first": "G",
"middle": [],
"last": "Dimitropoulos",
"suffix": ""
}
],
"year": 2018,
"venue": "Journal of Adolescent Health",
"volume": "63",
"issue": "2",
"pages": "133--141",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Madigan, S., Villani, V., Azzopardi, C., Laut, D., Smith, T., Temple, J. R., Browne, D., and Dimitropoulos, G. (2018). The prevalence of unwanted online sexual ex- posure and solicitation among youth: A meta-analysis. Journal of Adolescent Health, 63(2):133 -141.",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "Learning to identify internet sexual predation",
"authors": [
{
"first": "I",
"middle": [],
"last": "Mcghee",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Bayzick",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Kontostathis",
"suffix": ""
},
{
"first": "L",
"middle": [],
"last": "Edwards",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Mcbride",
"suffix": ""
},
{
"first": "E",
"middle": [],
"last": "Jakubowski",
"suffix": ""
}
],
"year": 2011,
"venue": "International Journal of Electronic Commerce",
"volume": "15",
"issue": "3",
"pages": "103--122",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "McGhee, I., Bayzick, J., Kontostathis, A., Edwards, L., McBride, A., and Jakubowski, E. (2011a). Learning to identify internet sexual predation. International Journal of Electronic Commerce, 15(3):103-122.",
"links": null
},
"BIBREF14": {
"ref_id": "b14",
"title": "Learning to identify Internet sexual predation",
"authors": [
{
"first": "I",
"middle": [],
"last": "Mcghee",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Bayzick",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Kontostathis",
"suffix": ""
},
{
"first": "L",
"middle": [],
"last": "Edwards",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Mcbride",
"suffix": ""
},
{
"first": "E",
"middle": [],
"last": "Jakubowski",
"suffix": ""
}
],
"year": 2011,
"venue": "International Journal of Electronic Commerce",
"volume": "15",
"issue": "3",
"pages": "103--122",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "McGhee, I., Bayzick, J., Kontostathis, A., Edwards, L., McBride, A., and Jakubowski, E. (2011b). Learning to identify Internet sexual predation. International Journal of Electronic Commerce, 15(3):103-122.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "Detection of child exploiting chats from a mixed chat dataset as a text classification task",
"authors": [
{
"first": "M",
"middle": [
"W R"
],
"last": "Miah",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Yearwood",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Kulkarni",
"suffix": ""
}
],
"year": 2011,
"venue": "Proceedings of the Australasian Language Technology Association Workshop 2011",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Miah, M. W. R., Yearwood, J., and Kulkarni, S. (2011). Detection of child exploiting chats from a mixed chat dataset as a text classification task. In Proceedings of the Australasian Language Technology Association Work- shop 2011, December.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "Linguistic regularities in continuous spaceword representations. NAACL HLT 2013 -2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Proceedings of the Main Conference",
"authors": [
{
"first": "T",
"middle": [],
"last": "Mikolov",
"suffix": ""
},
{
"first": "W",
"middle": [
"T"
],
"last": "Yih",
"suffix": ""
},
{
"first": "G",
"middle": [],
"last": "Zweig",
"suffix": ""
}
],
"year": 2013,
"venue": "",
"volume": "",
"issue": "",
"pages": "746--751",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Mikolov, T., Yih, W. T., and Zweig, G. (2013). Linguis- tic regularities in continuous spaceword representations. NAACL HLT 2013 -2013 Conference of the North Amer- ican Chapter of the Association for Computational Lin- guistics: Human Language Technologies, Proceedings of the Main Conference, pages 746-751.",
"links": null
},
"BIBREF17": {
"ref_id": "b17",
"title": "Identifying sexual predators by svm classification with lexical and behavioral features",
"authors": [
{
"first": "C",
"middle": [],
"last": "Morris",
"suffix": ""
},
{
"first": "G",
"middle": [],
"last": "Hirst",
"suffix": ""
}
],
"year": 2012,
"venue": "CLEF (Online Working Notes/Labs/Workshop)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Morris, C. and Hirst, G. (2012). Identifying sexual preda- tors by svm classification with lexical and behavioral fea- tures. In CLEF (Online Working Notes/Labs/Workshop).",
"links": null
},
"BIBREF18": {
"ref_id": "b18",
"title": "Entrapping the innocent: Toward a theory of child sexual predators' luring communication",
"authors": [
{
"first": "L",
"middle": [
"N"
],
"last": "Olson",
"suffix": ""
},
{
"first": "J",
"middle": [
"L"
],
"last": "Daggs",
"suffix": ""
},
{
"first": "B",
"middle": [
"L"
],
"last": "Ellevold",
"suffix": ""
},
{
"first": "T",
"middle": [
"K K"
],
"last": "Rogers",
"suffix": ""
}
],
"year": 2007,
"venue": "Communication Theory",
"volume": "",
"issue": "3",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Olson, L. N., Daggs, J. L., Ellevold, B. L., and Rogers, T. K. K. (2007). Entrapping the innocent: Toward a theory of child sexual predators' luring communication. Com- munication Theory, 17(3).",
"links": null
},
"BIBREF19": {
"ref_id": "b19",
"title": "A typology of child cybersexploitation and online grooming practices. Preston: University of Central Lancashire",
"authors": [
{
"first": "R",
"middle": [
"L"
],
"last": "O'connell",
"suffix": ""
}
],
"year": 2003,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "O'Connell, R. L. (2003). A typology of child cybersex- ploitation and online grooming practices. Preston: Uni- versity of Central Lancashire, Cybersex Research Unit.",
"links": null
},
"BIBREF20": {
"ref_id": "b20",
"title": "A learning-based approach for the identification of sexual predators in chat logs",
"authors": [
{
"first": "J",
"middle": [],
"last": "Parapar",
"suffix": ""
},
{
"first": "D",
"middle": [
"E"
],
"last": "Losada",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Barreiro",
"suffix": ""
}
],
"year": 2012,
"venue": "CLEF (Online Working Notes/Labs/Workshop)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Parapar, J., Losada, D. E., and Barreiro, A. (2012). A learning-based approach for the identification of sex- ual predators in chat logs. In CLEF (Online Working Notes/Labs/Workshop).",
"links": null
},
"BIBREF21": {
"ref_id": "b21",
"title": "Conversation level constraints on pedophile detection in chat rooms",
"authors": [
{
"first": "C",
"middle": [],
"last": "Peersman",
"suffix": ""
},
{
"first": "F",
"middle": [],
"last": "Vaassen",
"suffix": ""
},
{
"first": "V",
"middle": [],
"last": "Van Asch",
"suffix": ""
},
{
"first": "W",
"middle": [],
"last": "Daelemans",
"suffix": ""
}
],
"year": 2012,
"venue": "CLEF (Online Working Notes/Labs/Workshop)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Peersman, C., Vaassen, F., Van Asch, V., and Daelemans, W. (2012). Conversation level constraints on pedophile detection in chat rooms. In CLEF (Online Working Notes/Labs/Workshop).",
"links": null
},
"BIBREF22": {
"ref_id": "b22",
"title": "Toward spotting the pedophile telling victim from predator in text chats",
"authors": [
{
"first": "N",
"middle": [],
"last": "Pendar",
"suffix": ""
}
],
"year": 2007,
"venue": "International Conference on Semantic Computing (ICSC 2007)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Pendar, N. (2007). Toward spotting the pedophile telling victim from predator in text chats. In International Con- ference on Semantic Computing (ICSC 2007), Sep.",
"links": null
},
"BIBREF23": {
"ref_id": "b23",
"title": "The development and psychometric properties of liwc2007",
"authors": [
{
"first": "J",
"middle": [
"W"
],
"last": "Pennebaker",
"suffix": ""
},
{
"first": "C",
"middle": [
"K"
],
"last": "Chung",
"suffix": ""
},
{
"first": "M",
"middle": [
"E"
],
"last": "Ireland",
"suffix": ""
},
{
"first": "A",
"middle": [
"L"
],
"last": "Gonzales",
"suffix": ""
},
{
"first": "R",
"middle": [
"J"
],
"last": "Booth",
"suffix": ""
}
],
"year": 2011,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Pennebaker, J. W., Chung, C. K., Ireland, M. E., Gonzales, A. L., and Booth, R. J. (2011). The development and psychometric properties of liwc2007.",
"links": null
},
"BIBREF24": {
"ref_id": "b24",
"title": "Perverted Justice. www.perverted-justice",
"authors": [],
"year": 2019,
"venue": "",
"volume": "",
"issue": "",
"pages": "2019--2030",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Perverted Justice Foundation. (2019). Perverted Justice. www.perverted-justice.com. Accessed: 2019- 11-08.",
"links": null
},
"BIBREF25": {
"ref_id": "b25",
"title": "our little secret\": pinpointing potential predators",
"authors": [
{
"first": "A",
"middle": [],
"last": "Vartapetiance",
"suffix": ""
},
{
"first": "L",
"middle": [],
"last": "Gillam",
"suffix": ""
}
],
"year": 2014,
"venue": "Security Informatics",
"volume": "3",
"issue": "1",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Vartapetiance, A. and Gillam, L. (2014). \"our little se- cret\": pinpointing potential predators. Security Infor- matics, 3(1):3, Sep.",
"links": null
},
"BIBREF26": {
"ref_id": "b26",
"title": "A two-step approach for effective detection of misbehaving users in chats",
"authors": [
{
"first": "E",
"middle": [],
"last": "Villatoro-Tello",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Ju\u00e1rez-Gonz\u00e1lez",
"suffix": ""
},
{
"first": "H",
"middle": [
"J"
],
"last": "Escalante",
"suffix": ""
},
{
"first": "M",
"middle": [
"M"
],
"last": "G\u00f3mez",
"suffix": ""
},
{
"first": "L",
"middle": [
"V"
],
"last": "Pineda",
"suffix": ""
}
],
"year": 2012,
"venue": "CLEF (Online Working Notes/Labs/Workshop)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Villatoro-Tello, E., Ju\u00e1rez-Gonz\u00e1lez, A., Escalante, H. J., y G\u00f3mez, M. M., and Pineda, L. V. (2012). A two-step approach for effective detection of misbehaving users in chats. In CLEF (Online Working Notes/Labs/Workshop).",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"type_str": "figure",
"uris": null,
"num": null,
"text": "Figure 1: Overall Structure"
},
"FIGREF1": {
"type_str": "figure",
"uris": null,
"num": null,
"text": "Structure of Message Labeling Structure of Conversation Classification Distributions of each label in conversations from either predator or non-predator 2.3GHz clock rate, with a Tesla K80 GPU, within Google Colaboratory. The entire training process is performed in 1 minute and 12 seconds. Sentence embedding requires 29 seconds of the total time."
},
"TABREF0": {
"content": "<table><tr><td>Total Dataset</td><td>Number</td></tr><tr><td>of Conversations</td><td>119</td></tr><tr><td>of Total Messages</td><td>5008</td></tr><tr><td>of Messages in Category '000'</td><td>3130</td></tr><tr><td>of Messages in Category '200'</td><td>626</td></tr><tr><td>of Messages in Category '600'</td><td>626</td></tr><tr><td>of Messages in Category '900'</td><td>626</td></tr><tr><td colspan=\"2\">Table 1: Dataset used to evaluate Message Labeling</td></tr><tr><td>Total Dataset</td><td>Number</td></tr><tr><td>of Conversations</td><td>480</td></tr><tr><td>of Predatory Conversations</td><td>128</td></tr><tr><td>of Non-Predatory Conversations</td><td>352</td></tr><tr><td>of Total Messages</td><td>78130</td></tr></table>",
"type_str": "table",
"html": null,
"num": null,
"text": "describes the set of messages used to evaluate the Message Labeling stage. A total of 5008 messages are used and are taken from both the ChatCoder2 and PAN2012"
},
"TABREF1": {
"content": "<table><tr><td>shows the preci-</td></tr></table>",
"type_str": "table",
"html": null,
"num": null,
"text": ""
},
"TABREF2": {
"content": "<table/>",
"type_str": "table",
"html": null,
"num": null,
"text": ""
},
"TABREF3": {
"content": "<table><tr><td>Predicted</td><td>Actual</td><td/></tr><tr><td/><td colspan=\"2\">Predatory Non-predatory</td></tr><tr><td>Predatory</td><td>29(TP)</td><td>3(FP)</td></tr><tr><td>Non-predatory</td><td>2(FN)</td><td>62(TN)</td></tr></table>",
"type_str": "table",
"html": null,
"num": null,
"text": "Number of PAN 2012 messages in each class"
},
"TABREF4": {
"content": "<table/>",
"type_str": "table",
"html": null,
"num": null,
"text": "Performance results of categorization conversations"
}
}
}
}