Conversational Networks for Automatic Online Moderation

01/31/2019 ∙ by Etienne Papegnies, et al. ∙ 0

Moderation of user-generated content in an online community is a challenge that has great socio-economical ramifications. However, the costs incurred by delegating this work to human agents are high. For this reason, an automatic system able to detect abuse in user-generated content is of great interest. There are a number of ways to tackle this problem, but the most commonly seen in practice are word filtering or regular expression matching. The main limitations are their vulnerability to intentional obfuscation on the part of the users, and their context-insensitive nature. Moreover, they are language-dependent and may require appropriate corpora for training. In this paper, we propose a system for automatic abuse detection that completely disregards message content. We first extract a conversational network from raw chat logs and characterize it through topological measures. We then use these as features to train a classifier on our abuse detection task. We thoroughly assess our system on a dataset of user comments originating from a French Massively Multiplayer Online Game. We identify the most appropriate network extraction parameters and discuss the discriminative power of our features, relatively to their topological and temporal nature. Our method reaches an F-measure of 83.89 when using the full feature set, improving on existing approaches. With a selection of the most discriminative features, we dramatically cut computing time while retaining most of the performance (82.65).



There are no comments yet.


page 1

page 18

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

I Introduction

Online communities have acquired an indisputable importance in today’s society. From modest beginnings as places to trade ideas around specific topics, they have grown into important focuses of attention for companies to advertise products or governments interested in monitoring public discourse. They also have a strong social effect, by heavily impacting public and interpersonal communications.

However, the Internet grants a degree of anonymity, and because of that, online communities are often confronted with users exhibiting abusive behaviors. The notion of abuse varies depending on the community, but there is almost always a common core of rules stating that users should not personally attack others or discriminate them based on race, religion or sexual orientation. It can also include more community-specific aspects, e.g. not posting advertisement or external URLs. For community maintainers, it is often necessary to act on abusive behaviors: if they do not, abusive users can poison the community, make important community members leave, and, in some countries, trigger legal issues [1, 2].

When users break the community rules, sanctions can then be applied. This process, called moderation, is mainly done by humans. Since this manual work is expensive, companies have a vested interest in automating the process. In this work, we consider the classification problem consisting in automatically determining if a user message is abusive or not. This task is at the core of automated moderation, and it is difficult for several reasons. First, the amount of noise in the content (typos, grammatical errors, uncommon abbreviations, out-of-vocabulary words…) of messages posted on the Internet is usually quite high. Furthermore, as illustrated in Figure 1, while some of this noise is unwittingly produced by fast typing or poor language skills, a good part of it is voluntarily introduced as a means to defeat automated badword checks.

<User1> Pls d1e you f8 ck
Fig. 1: Example of an abusive message with intentional noise.

Then, even with a noiseless message, it is sometimes necessary to perform advanced natural language analysis to detect abuse in a message. Figure 2 gives a fictional example of a message containing no obvious indicators of abuse such as straight insults, while still being very abusive indeed.

<User2> Would you like to meet your maker? I
        can arrange that.
Fig. 2: Example of a noiseless but abusive message.

Finally, even advanced natural language processing approaches may not be able to detect abuse from a message only without looking at its context. This context can take various forms. For instance, in the case of a “Yo mama joke”, it is the continuation of the conversation. But it can also include external knowledge, which makes it harder to handle. For example, in Figure 

3, the message from User4 has no abuse markers at all until one considers both the messages that came before and historical knowledge.

<User3> Theyve been discriminated against
<User3> Six millions of them were killed
        during the holocaust
<User4> @User3: that didnt actually happen.
Fig. 3: Example of a message that is abusive only in a more general context.

To address these issues, we propose, as our main contribution in this paper, an approach that completely ignores the content of the messages and models conversations under the form of conversational graphs. By doing so, we aim to create a model that is not vulnerable to text-based obfuscation. We characterize these graphs through a number of topological measures which are then used as features, in order to train and test a classifier. Our second contribution is to apply our method to a corpus of chat logs originating from the community of the French massively multiplayer online game SpaceOrigin111 Our third contribution is to investigate the relative importance of the classification features, as well as the parameters of the graph extraction process, with regard to our classification task –the detection of abusive messages.

This paper is a significantly extended version of our preliminary work started in [3]. In comparison, we propose and experiment with several variations of our network extraction method, and vastly expand the array of features that we consider. We also adapt our approach to greatly increase the efficiency of our system with regard to necessary computational resources, and make it more versatile to possible use cases.

The rest of this paper is organized as follows. In Section II, we review related work on abuse detection and previous approaches dedicated to network extraction from various types of conversation logs. We describe the methods used throughout our pipeline in Section III, including the approach proposed to extract conversational networks, and the topological features that we compute to characterize them. In Section IV, we present our dataset, as well as the overall experimental setup for the classification task. We then provide a discussion and a qualitative study of the performance of our approach, with a focus on the contributions of the considered features. Because some of them are computed from information that is not yet available at the instant some messages are posted, we also examine the performances of the system based only on information available at the time (i.e. as a prediction task). Finally, we summarize our contributions in Section V and present some perspectives for this work.

Ii Related Work

In this section, we first review general approaches related to the problem of abuse detection (Section II-A), and then focus on techniques that have been previously used to extract graph-based representations of conversation logs (Section II-B).

Ii-a Abuse Detection

One can distinguish two main categories of works related to abuse detection: those using the content of the targeted messages only, and those focusing on their context (user metadata, content of surrounding messages…). Some hybrid works also propose to combine both categories.

Content-Based Approaches

The work initiated by Spertus in [4] constitutes a first attempt to create a classifier for hostile messages. Abusive messages often contain hostility, so this task is related to ours. However, the notion of abuse is more general, as it can take a non-hostile form. Spertus uses static rules to extract linguistic markers for each message: Imperative Statement, Profanity, Condescension, Insult, Politeness and Praise. These are then used as features in a binary classifier. This approach obtains good results, except in specific cases like hostility through sarcasm. However, manually defining all the linguistic rules related to an abusive message is a severe limitation and appears impossible, in practice. Also, its application to another language would require to transpose it to other grammar rules and idioms.

Chen et al[5] seek to detect offensive language in social media so that it can be filtered out to protect adolescents. Like before, this task is more specific than ours, as using offensive language is just one type of abuse. Chen et al. developed a system that uses lexical and syntactical features as well as user modeling, to predict the offensiveness value of a comment. They note that the presence of a word tagged as offensive in a message is not a definite indication that the message itself is offensive. For instance, while “You are stupid” is clearly offensive, “This is stupid xD” is not. They further show that lack of context can be somewhat mitigated by looking at word -grams instead of unigrams (i.e.

single words). The method relies on manually constituted language-dependent resources though, such as a lexicon of offensive terms, which also makes it difficult to transpose to another language.

Dinakar et al[6] use features, a static list of badwords, and of widely used sentences containing verbal abuse, to detect cyberbullying in Youtube comments. Bullying is mainly characterized by its persistent and repetitive nature, and it can therefore be considered as a very specific type of abuse. Like before, the proposed model shows good results except when sarcasm is used. It is worth noting that sarcasm can be considered as a form of natural language obfuscation that is especially hard to detect in written communications, because of the lack of inflexion clues.

In [7]

, Chavan & Shylaja review machine learning (ML) approaches to detect cyberbullying in online social networks. They show that pronoun occurrences, usually neglected in text classification, are very important to detect online bullying. They use skip-gram features to mitigate the sentence-level context issues by taking into account distant words. These new features allow them to boost the accuracy of a classifier detecting bullying by

percent points. The approach is however still vulnerable to involuntary misspellings and word-level obfuscation. It uses a language-dependent list of badwords during preprocessing.

In their recent article, Mubarak et al[8] work on the detection of offensive language in Arabic media, by introducing the interesting possibility of dynamically generating and expanding a list of bad words. They extract a corpus of tweets that is divided into two classes (obscene / not obscene

) based on static rules. They then perform a log odds ratio analysis to detect the words favoring documents from the obscene class. Such an approach could be very useful in an online classification setting, but inherently requires a dataset where the number of samples in the obscene class is large. Still, they show that a list of words dynamically generated using that method contains

of new obscene words, and the process can be iterated over. Relatively to our problem of interest, the main limitation of this article is its focus on obscene words, which are just one specific type of abuse.

In [9], Razavi et al. focus on a wider spectrum of types of abuse than the previously cited works, which they call inflammatory comments

. It ranges from impoliteness to insult, and includes rants and taunts. To detect them, they stack three levels of Naive-Bayes classifier variants, fed with features related to the presence, frequency, and strength of offensive expressions. These are computed based on a manually constituted lexicon of offensive expressions and insults, which makes the method relatively corpus-specific. The resulting system shows high precision and has the useful characteristics of being updatable online. It is however vulnerable to the text-based obfuscation techniques we have previously mentioned.

With recent developments in GPU architecture and hardware availability, more computationally expansive techniques have been used. In [10], Djuric et al. detect hate speech in Twitter data. They adopt a two-step approach consisting in first learning a low-dimensional representation of the tweets, and then applying a classifier to discriminate them based on this representation. They note that jointly using message- and word-embeddings instead of simple bag-of-words boosts the performance. Park & Fung [11]

also work on tweets using neural networks, but they focus only on sexism- and racism-related cases. They propose a two-step framework consisting in first training a Convolutional Neural Network (CNN) to identify the absence/presence of abuse, and then performing a simple logistic regression to further discriminate between sexism and racism. Both of these approaches are inherently portable, however they require a lot of data.

In [12], Pavlopoulos et al

. develop an automatic moderation system for comments posted by users on Websites. It is based on a Recurrent Neural Network (RNN) operating on word-embeddings, with an attention mechanism. They apply it to two large corpus extracted from a Greek sports website and the English Wikipedia. The proposed system outperforms CNN and other more mainstream classifiers. However, it is worth noticing that these tasks are slightly different, as the the Greek corpus is annotated for general moderation, whereas the English one focuses on personal attacks.

It is worth noting that all these ML-based approaches perform better when a large dataset is available for training. However text-based approaches are usually language-dependent, which means that models have to be trained on a dataset of the specific language. This is usually not an issue when classifying English messages because of the wealth of publicly-available data, but is problematic in our case, since our messages come from low resource language communities.

Content-based text classification usually makes for a good baseline. However, such methods have severe limitations. First, abuse can be spread over a succession of messages. Some messages can even reference a shared history between two users. Second, it is very common for users to voluntarily obfuscate message content to work around badwords detection. Indeed, abusers can bypass automatic systems by making the abusive content difficult to detect: for instance, they can intentionally modify the spelling of a forbidden word.

Hosseini et al. [13] demonstrate such an attack against the Google Perspective API222 Adversarial attacks based on word-level obfuscation are nothing new, and approaches exist to counter them. For instance, Lee et al[14]

experiment with spam de-obfuscation using a Hidden Markov Model that incorporates lexical information. Such an approach yields good results for de-obfuscation, but it is computationally expensive and requires a dataset of obfuscated words for training. More recently, Rojas

et al[15] describe a more compact approach based on a dynamic programming sequence alignment algorithm. It has a different set of limitations, the main one being that it does not allow for one character to be used as an obfuscated version of several distinct original characters (it uses a one-to-one character mapping).

Context-Based Approaches

Because the reactions of other users to an abuse case are completely beyond the control of the abuser, some works consider the content of messages around the targeted message, instead of the content of the targeted message only.

For instance, Yin et al. [16] use features derived from the sentences neighboring a given message to detect harassment on the Web. Harassment implies repetition, and can be considered as a specific type of abuse. Their goal is to spot conversations going off-topic, and use that as an indicator. Their combined content/context approach shows good results when used against multi-participant chat logs. They also note that sentiment features seem to constitute mostly noise due to the high misspelling rate. This lack of discriminative power from sentiment features is something we have also noticed while experimenting with content-based techniques on our data in [17].

In [18], Cheng et al. do not try to perform automatic moderation. Instead, they conduct a comprehensive study of antisocial behavior in online discussion communities, and use its results to build user behavior models. We include this work in our review, because it provides some insight into the devolution of abusive users over time in a community, regarding both the quality of their contributions and their reactions towards other members of the community. A critical result of this analysis is that instances of antisocial messages usually generate a bigger response from the community, compared to normal messages. In our own work, we build upon this observation and compare classification performances obtained when considering or ignoring messages published right after the classified message.

Balci & Salah in [19] take advantage of user features to detect abuse in the community of an online game. These features include information such as gender, number of friends, financial investment, avatars, and general rankings. The goal is to help human moderators dealing with abuse reports, and the approach yields sufficiently good results to achieve this. One important difference with our work is that in our case, the user data necessary to replicate this approach are not available. As a practical consideration the availability of that data will always depend on the type of the community.

In our own previous work [17], we tackle the same problem as in this article, i.e. detect abuse in chat messages in the context of an online game. However, unlike the method proposed presently, we use a wide array of language features (bag-of-words, - scores, sentiment scores…) as well as context features derived from the language models of other users. We also experiment with several advanced preprocessing approaches. This method allows us to reach a performance of in terms of -measure on our abusive message detection task.

Of all the approaches of the literature described in this section, only our previous work [17] as well as Balci & Salah’s [19] aim at solving the same problem as us. The others focus on tasks which are related to abuse detection, but still different, and generally more specific, e.g. insult or cyberbullying detection. The work of Balci & Salah differs from ours in the way they solve the problem, as they focus on the users’ profiles and behaviors: these data are not available in our case, so we only use the published messages. Our previous work [17]

is completely based on the textual content of the messages, whereas the one presented here ignores it, and relies only on a graph-based modeling of the conversation, which is completely new in this context. Another important methodological difference with the literature is that almost all content-based methods rely on manually constituted linguistic resources, which makes them difficult to transpose to another context (different language or online community). By comparison, our present approach is completely language independent, as it does not use the textual content (apart from user names). The third difference is that almost all methods from the literature consider messages independently, when we use sequences of messages forming conversations. Finally, we use a classic classifier to determine if a message is abusive, which means that our approach requires much less training data than the deep learning methods that we mentioned earlier.

Ii-B Network Extraction from Conversation Logs

Although a major part of the methods proposed to address the abuse detection problem focus on the content of the exchanged messages, it appears that a user with previous exposure to automatic moderation techniques can easily circumvent them [13]. To avoid this issue, a solution would be not to focus on the textual content, but rather on the interactions between the users through these messages. For instance, the number of respondents to a given message appears frequently as a classification feature in the literature, e.g. as in [18]. But graphs constitute a more natural paradigm to model such relational information, under the form of so-called conversational networks, which represent the flow of the conversation between users. Such networks have the advantage of including the mentioned feature (number of respondents), but also much more information regarding the way users interact. We adopted this approach in our previous work [3], which is the first attempt at using such graph-based conversation models to solve a general abuse detection problem. Our present work is an extension of this method, essentially on two aspects: we experiment with several variations of our graph-extraction process, and we consider much more graph-based features.

This section reviews methods proposed in the literature for the extraction of conversational networks. We do not narrow it to the abuse detection context, as our previous work [3] would be the only one concerned. Even so, there are not many works dealing with the extraction of conversational networks. This may be due to the fact that the task can be far from trivial, depending on the nature of the available raw data: it is much harder for chat logs than for structured messages board or Web forums, for instance. In a multi-participant chat log it is frequent to see multiple disjointed conversations overlapping. There is no fixed topic although some chatrooms have a general purpose. There is also no built-in mechanism to specify the message someone is responding to. Finally, in most IRC (Internet Relay Chat) chat logs, there is no enforcement mechanism to ensure that users have only one nickname.

In [20], Mutton proposes a strategy to extract such a network from IRC chat logs. The goal is to build a tool to visualize user interactions in an IRC chat room over time. The author uses a simple set of rules based on direct referencing (i.e. when a user addresses another one by using his nickname), as well as temporal proximity and temporal density of the messages. In our own work, we adapt and expend on some of these rules, whereas certain cannot be applied. Specifically, while in a regular IRC channel timestamps are indeed useful to determine intended recipients of a message, in our case they are basically irrelevant.

Osesina et al. in [21] build on the work of Mutton using Response Time Analysis, which assumes that both temporal proximity and the cyclical nature of conversations can be used to perform edge prediction. The authors also use the content of the communications to build a word network, and then assign edges between users based on the keywords they use and the presence of these keywords in word clusters. Finally, by combining these two approaches with direct addressing, they achieve impressive performance in edge prediction with regard to a manually extracted network, both in terms of edge existence and edge strength. It is worth noticing the significant computational requirement for large chat logs. Besides the targeted task itself, the main difference with our approach is that this one is strongly content-based.

In [22], Gruzd et al. push the usage of direct referencing further by developing methods of name discovery. The data they work on come from a bulletin board which shares some similarities with regular chat: linear stream of messages with possibly intertwined discussion threads. By comparing a network extracted through their name discovery method, to a chain network based on temporal proximity, they show that their approach is better suited to detect social network links. Useful takeaways of their method are: the use of neighboring words (for instance, Dr., Pr., Jr, are often seen in proximity of person names, whereas Street, Ave are often near location names), capitalization, and the position of words within the document (e.g. their sample of posts often end with a user’s signature because a bulletin board does not have the ephemeral nature of chatrooms). However, these difference between the two media also makes this method unsuitable to our data.

Camtepe et al. in [23]

experiment on the detection of groups of users in chat logs, collected from three different chatrooms in the Undernet IRC network. They first build a matrix containing the numbers of messages posted by each user at each considered time step. It can be considered as a low-resolution view of the logs –it retains information about temporal proximity but looses sequential information. They then perform Singular-Value-Decomposition (SVD) on this matrix, in order to ease the identification of clusters of interacting users (

i.e. conversations). They extract an approximation of the conversational network from this partition, by representing each cluster by a clique. They validate their approach by manually extracting the actual conversational network directly from the logs, and comparing their structures. The main difference with our situation is that the conversational graph is only seen as a way to validate the user group detection method: we want to use it as a model of the interactions.

Forestier et al. in [24] tackle the extraction of networks from online forums. While the structure of conversations is explicitly represented on certain platforms, this it not the case there: a thread is represented as a flat sequence of messages. This makes it challenging to determine the intended recipient of a message. The authors show that, by using a combination of grammatical analysis and Levenshtein distance computation for substrings, they can often ascertain who talks to whom. The resulting network can then be used to analyze the role of users in the community. The main difference with our method is that we ignore the content of messages.

Travassoli et al. in [25] explore different methods to extract representative networks from group psychotherapy chat logs. One of them includes fuzzy referencing to mitigate effects of misspelled nicknames, and rules for representing one-to-all messages. The bulk of the methods uses static patterns of exchanges to predict a receiver. Their system shows a good agreement score with a human annotator. It is worth noting, though, that these logs are substantially different from ours: the psychotherapy sessions have well defined boundaries and a limited number of participants. This prevent the transposition of this approach to our problem.

Sinha & Rajasingh in [26] use only direct referencing, but with the same fuzzy matching strategy as in [25], in order to extract a network representing the activity in the #ubuntu IRC support channel. This method manages to expose high level components of the Ubuntu social network, which in turn allows for the qualification of user behaviors into specific classes such as beginner or expert. This method of building user models can be very interesting when the data describing the users are scarce, as is the case on IRC where everyone can join and there is no requirement to register. While it does not allow for the direct classification of individual messages, the behavior information can be useful as a supporting feature in a text classification task.

Anwar & Abulaish in [27] build a framework allowing to query user groups and communities of interest, based on the data extracted from the computers of suspects during a criminal investigation. They use a social graph extraction method that relies both on the presence of communication between users and the overlap between the content of the messages they exchange, in order to assign weights to the edges of the network. They then experiment with various forms of community detection (i.e. graph partitioning) to identify groups of users in this network. However, this method assumes that the corpus contains a variety of topics allowing to discriminate the groups, which is not necessarily the case for us, since our logs are thematically dominated by the video game hosting the chatroom.

An interesting task where conversational networks can be used is the detection of controversial discussions. In [28], Garimella et al. show that the predefined types of interactions allowed by Twitter can be used to build networks that highlight the presence of polarized groups of users. They extract all tweets matching a given hashtag around the time a specific event happens, then detect an endorsement link thanks to Twitter’s retweet feature. The resulting graph is then partitioned and analyzed using a controversy measure. In our context it is difficult to adopt this approach, as endorsement information is not immediately available and would have to be inferred from message content.

The methods proposed in the literature mainly rely on the content of the exchanged messages. By comparison, our method only focuses on the presence/absence of communication between the users, i.e. on the dynamics of the conversation and its structure. Some methods also rely on specific functionalities of the studied platforms (e.g. answers explicitly addressed to a user), which are absent from our own data.

Iii Methods

In this section, we describe the methods that we propose to compute the features later used in the classification task to separate abusive and non-abusive messages. We first present how we extract conversational networks from series of raw chat messages (Section III-A), before describing the topological measures that we use to characterize these networks (Section III-B).

Iii-a Network Extraction

We extract networks representing conversations between users through a textual discussion channel. They take the form of weighted graphs, in which the vertices and edges represent the users and the communication between them, respectively. An edge weight corresponds to a score estimating the intensity of the communication between both connected users. We propose two variants of our method, allowing to extract

undirected vs. directed networks. In the latter case, the edge direction represents the information flow between the considered users. Note that each network is defined relatively to a targeted message, since the goal of this operation is to provide features used to classify the said message.

The method that we use to extract the networks representing the conversations in which each message occurs has three steps, that we describe in detail in this section. First, we identify the subset of messages that we will use to extract the network (Section III-A1). Second, we select as nodes a subset of users which are likely receivers of each individual message (Section III-A2). Third, we add edges and revise their weights depending on the potential receivers (Section III-A3). We describe and discuss the resulting conversational graphs in Section III-A4

Iii-A1 Context period

Our first step is to determine which messages to use in order to extract the network. For this purpose, we define the context period, as a sequence of messages. Figure 4 shows an example of context period, representing each message as a vertical rectangle. Note that time flows from left to right in the figure. This sequence is centered on the targeted message (in red), and spans symmetrically before (left side) and after (right side) its occurrence. Put differently: we consider the same number of past and future messages. The networks extracted from the context period contain only the vertices representing the users which posted at least once on this channel, during this period.

Targeted message

Context period

Past messages

Future messages

Current message

Sliding window
Fig. 4: Sequence of messages (represented by vertical rectangles) illustrating the various concepts used in our conversational network extraction process. Figure available at 10.6084/m9.figshare.7442273 under CC-BY license.

Besides the network extracted over the whole context period (before and after the targeted message), which we call the Full network, we also consider two additional networks. We split the period in the middle, right on the targeted message, and extract one network over the messages published in the first half (Past messages), called Before network, and one over the other half (Future messages), called After network. Both of those smaller networks also contain the targeted message. For a prediction task, i.e. when using only past information to classify the targeted message, one would only be able to use the Before network. However, in a more general setting, all three networks (Before, After and Full) can be used.

Iii-A2 Sliding Window

In order to extract a network, we apply an iterative process, consisting in sliding a window over the whole context period, one message at a time, and updating the edges and their weights according to the process described next. The size of this sliding window is expressed in terms of number of messages, and it is fixed. It can be viewed as a focus on a part of the conversation taking place at some given time. It is shown as a thick black frame in Figure 4. We call current message the last message of the window taken at a given time (represented in blue), and current author the author of the current message.

The use of such a fixed-length sliding window is a methodological choice justified by four properties of the user interface of the considered discussion channel: 1) At any given time, the user can see only up to preceding messages without scrolling; 2) when a user joins a channel, the server sends him only the last messages posted on the channel; 3) it is impossible for a user to scroll back the history further than lines; and 4) the user interface masks join and part events by default, whereas in typical chat clients the arrival and departure of users are shown by default. Thus, at some given time, a user only has access to a limited knowledge regarding who is participating in the conversation. As explained later, we use this value of messages as an upper bound, and experiment with different sliding window sizes.

Iii-A3 Weight Assignment

Our assumption is that the current message is destined to the authors of the other messages present in the considered sliding window. Based on this hypothesis, we update the edges and weights in the following way. We start by listing the authors of the messages currently present in the sliding window, and ordering them by their last posted message. Only the edges towards the users in that list will receive weight. This choice is also due to the user interface constraints: a priori, a user cannot reliably know which users will receive a given message. Furthermore, the data we have do not allow us to directly determine channel occupancy at the time a message is posted.

Sliding window









Fig. 5: Example of sliding window (left) and computation of the corresponding receivers’ scores (right). Each color represents a specific user. On the left, each message in the window is filled with the color of its author, whereas the small squares represent direct references to users. On the right, the , , columns represent the different steps of the computation (see text). Figure available at 10.6084/m9.figshare.7442273 under CC-BY license.

The left part of Figure 5 displays an example of sliding window, in which the colors of the messages (vertical rectangles) represent their authors. So, in this specific case, different users participate in the conversation. Ordered from latest to earliest, these are: blue (author of the current message, i.e. the rightmost in the window), green, orange and red. This list of users is noted in the right part of the figure. Obviously, a user is not writing to himself, so we remove the current author from the list, resulting in list . The use of such an ordered list is justified by the assumption of Temporal Proximity, which appears commonly in the literature concerned with the extraction of conversational networks ([20, 21, 23]). It states that the most recent a message, the most likely its author to be the recipient of the current message.

The user interface allows us to explicitly mention users in a message by their name, and moreover the game prevents the users from changing their name: we need to take these properties into account. It is also a common assumption that the presence of direct referencing increases the likelihood that the referred person is the intended recipient of the message. To reflect this in our process, we move the users directly referenced in the current message at the top of the list. If some users are directly referenced although they have not posted any message in the considered window, they are simply inserted at the top of the list. In Figure 5, direct references are represented as small colored squares located in the current message. There are two of them in our example, referring to the purple and cyan users. The former has one post in the window, so he is moved from the third to the first rank in the list. The latter did not post anything in the window, so he is inserted at the first position. This results in what we call the list of receivers, which appears as list in the figure.

We now want to connect the current author to the receivers constituting our ordered list. Our choice to create or update edges towards all users in the window even in case of direct referencing is based on several considerations. First, directly referencing a user does not imply that he is part of the conversation or that the message is directed towards him: for instance, his name could just be mentioned as an object of the sentence. Second, there can be multiple direct references in a single message (as in our example). Third, in online public discourse, directly addressing someone does not mean he is the sole intended recipient of the message. For instance when discussing politics, a question directed towards someone can have as a secondary objective to have the target expose his stance on an issue to the other participants.

We also want to adjust the strength of each of these connections depending on the rank of the concerned receivers: the higher the rank, the stronger the interaction. For this purpose, each receiver is assigned a score, which is a decreasing function of both his rank in the list and of the length of this list (as reflected by the number of signs in Figure 5). We propose three different scoring functions, defined so that the assigned weights sum to unity:

  • Uniform: Each receiver gets the same weight, defined as:

  • Linear: The score decreases as a linear function of the rank:

  • Recursive: The first receiver gets of the total weight, and the rest of them share the remaining using the same recursive split scheme:


As an illustration, Figure 6 displays the scores assigned by these three strategies for , as functions of the receiver’s rank. The Uniform strategy (in red) assumes that the content of the communication is not really important, and that the goal of the current author is just to have the message seen by as much people as possible. It therefore places very little importance on temporal proximity or direct referencing. The Recursive approach (in blue) gives the most importance to direct referencing and temporal proximity, with scores dropping fast when the receiver is not directly referenced or the author of the immediately preceding message. Finally, the Linear approach (in green) also places the most importance on temporal proximity and direct referencing, but in a less contrasted way, since it assigns higher scores (compared to ) to receivers located at the bottom of the list. We later compare these strategies during our experiments, in order to determine whether it is worth exploring more advanced scoring functions, or if the difference in performance is not significant enough to justify this.

Fig. 6: Scores assigned by our scoring functions , and for a receiver list containing users.

We can then update the graph by creating an edge between the current author and each user in the receiver list. We consider two possible approaches, leading to an undirected vs. a directed network. In the latter case, the edge is directed from the current author towards the receiver, in order to model the communication flow. Each newly created edge is assigned a weight corresponding to the receiver’s score. If this edge already exists, we increase its current weight by the said score. Figure 7 shows the result of this update based on our previous example from Figure 5, for the extraction of an undirected network. The first graph represents the network before the update. It already contains some edges though, resulting from some previous processing. The remaining graphs of the figure represent the changes corresponding to the ranks appearing in the receiver list: first position (purple and cyan users), second position (green) and third position (orange). Red edges represent the edges being modified or created. If we were extracting a directed graph, then the new edges would be directed outward from the central blue vertex.




Fig. 7: Update of the edges and weights of the conversational graph corresponding to our ongoing example. The first graph displays the state before the update, and each remaining one corresponds to one rank in the receiver list. Figure available at 10.6084/m9.figshare.7442273 under CC-BY license.

Once the iterative process has been applied for the whole context period, we get what we call the Full network. As mentioned before, for testing matters we also process lesser networks based on the same context: the Before and After networks are extracted using only the messages preceding and following the targeted message, respectively, as well as the targeted message itself.

Iii-A4 Extracted Networks

Figure 8 shows a real-world example of the three conversational networks obtained by applying our extraction method to an abusive comment belonging to our dataset. They are obtained based on a context period of messages, a sliding window of messages, and are undirected. The isolates (disconnected vertices) present in the Before and After networks correspond to users present in the context period, but active only after or before the targeted message, respectively. The red vertex corresponds to the author of the targeted message, which we call the targeted user. One can see that the users involved in the conversation, as well as the location of the targeted user in this conversation, undergo some dramatic changes after the abuse.

Fig. 8: Example of the types of conversational networks extracted for a given context period: Before (left), After (center), and Full (right). The author of the targeted message is represented in red. For readability reasons, weights and directions have been omitted. Figure available at 10.6084/m9.figshare.7442273 under CC-BY license.

Generally speaking, two vertices are connected in our networks if they are supposed to have a direct interaction. Thus, if only one conversation occurs during the considered context period, we expect the network to be rather cliquish. It seems possible to have several communities, i.e. several loosely connected dense subgraphs, if certain users completely ignore some other ones, for some reason. However, the smoothing induced by our use of a sliding window is likely to hide this type of behavior, especially if the window is large. The presence of a community structure could also occur if several distinct conversations take place during the considered context period. However, this can happen only if the number of common users between the conversations is small compared to the network size (otherwise, the communities will be indistinguishable). Due to the relatively dense nature of the networks (when ignoring isolates), we think weights are likely to be an important information, allowing to separate accidental edges from relevant ones. The edge direction allows distinguishing unilateral and bilateral interactions, so it could help identify certain types of conversations with atypical structure (e.g. one-way communication).

Iii-B Features

The classification features that we consider in this work are all based on topological measures allowing to characterize graphs in various ways. We process all the features for each of the types of networks (Before, After, and Full) described in Section III-A.

Scale Scope Name Ref. Wght. Dir.
Graph Macro Weak Components U
Strong Components D
Adhesion/Cohesion [29] D
Articulation Points U
Diameter U/W U/D
Radius U U/I/O
Average Distance U U/D
Meso Clique Count
Communities U D
Modularity [30] U/W U
Micro Edges/Vertices
Global Transitivity [31] U U
Reciprocity [32] D
Degree Assortativity [33] U/D
Vertex Macro Eigenvector Centrality [34] U/W U/D
Hub/Authority Scores [35] U/W D
Alpha Centrality [36] U/W D
Power Centrality [37] U D
PageRank Centrality [38] U/W U/D
Subgraph Centrality [39] U U
Betweenness Centrality [40] U/W U/D
Closeness Centrality [41] U/W U/I/O
Eccentricity [42] U U/I/O
Articulation Point [42] U
Meso Coreness Score [43] U/I/O
Participation Coefficient [44] U U/I/O
Internal Intensity [44] U U/I/O
External Intensity [45] U U/I/O
Diversity [45] U U/I/O
Heterogeneity [45] U U/I/O
Micro Degree Centrality [46] U U/I/O
Strength Centrality [47] W U/I/O
Local Transitivity [48] U/W U
Burt’s Constraint [49] U/W
TABLE I: List of the features used to characterize the conversational networks. The letters in the Wght. (Weights) and Dir. (Directions) columns stand for: Unweighted or Undirected (U), Weighted (W), Directed (D), Incoming (I) and Outgoing (O). In addition, each vertex-centered feature is averaged over the vertex set to get a corresponding graph-centered feature.

We adopt an exploratory approach and consider a large range of topological measures, focusing on the most widespread in the literature. Our selection is listed in Table I. Some of these measures can optionally handle edge directions or edge weights: we consider all practically available variants, in order to assess how informative these aspects of the graph are relatively to our classification problem.

One can distinguish topological measures in terms of scale and scope. The scale depends on the nature of the characterized entity: vertex, subgraph or graph. In our case, we focus only on vertex- and graph-focused measures: the former allows focusing on the author of the targeted message, whereas the latter describes the whole conversation, but we do not have any subgraph to characterize. The scope corresponds to the nature of the information used to characterize the entity: microscopic (interconnection between a vertex and its direct neighborhood), mesoscopic (structure of a subgraph and its direct neighborhood), and macroscopic (structure of the whole graph).

In the rest of this section, we describe these measures briefly: first the vertex-focused ones (Section III-B1), then the graph-focused ones (Section III-B2). For each measure, we give a generic, graph-theoretical definition, before explaining how it can be interpreted in the context of our conversational networks.

Iii-B1 Vertex-Focused Topological Measures

These measures allows characterizing only a single vertex. We compute them all for the vertex corresponding to the author of the targeted message (represented in red in Figure 8).

Microscopic Measures

We start with the measures which describe a vertex depending on its direct neighborhood. In our context, this amounts to characterizing the position of some user depending on its direct interlocutors. In the case of a conversation involving a very small number of persons, it is likely all of them interact directly, and so these measures can also help describing the conversation itself.

The Degree Centrality is a normalized version of the standard degree [46, 50], which corresponds itself to the number of direct neighbors of the considered vertex. In a directed graph, one can distinguish an incoming and an outgoing Degree Centrality, focusing only on the incoming and outgoing edges of the vertex, respectively. In our case, it can be interpreted as the number of users that have exchanged (undirected version), received (outgoing) or sent (incoming) messages to the author, respectively. We use both undirected and directed variants of the Degree Centrality.

The generalization of the degree to weighted networks is called the strength [47]. The Strength Centrality is based on the sum of the weights of the edges attached to the considered vertex. Like the Degree, it is possible to use incoming and outgoing versions if the network is directed. In our conversational graph, compared to the degree, the strength takes into account the frequency of the interactions. This allows accounting for certain situations ignored by the Degree Centrality. For instance, a user can have a few interlocutors, but still be central if he exchanges a lot with them. We use both undirected and directed variants of the Strength Centrality.

The Local Transitivity (or Clustering Coefficient[48] corresponds to the proportion of edges between the considered vertex’s neighbors, relatively to what this number could be if all of them were interconnected. It ranges from (no inter-neighbor edge at all) to (the vertex and its neighborhood form a clique). In our context, a high transitivity indicates that the user belongs to a single conversation, in which most protagonists exchange messages. On the contrary, a low transitivity denotes some form of segmentation: either the user participates in several distinct conversations, or some of his interlocutors ignore each other. We use the unweighted original version and the weighted variant presented in [47].

Burt’s Constraint [49] measures how redundant the neighbors of the vertex of interest are. It is based on the idea that a vertex located at the interface between several independent groups holds a position of power. Burt’s Constraints measures this level of independence through a non-linear combination of the number of connections between the neighbors. A high value indicates how embedded the vertex is in its neighborhood. In our case, this can help distinguishing users depending on the number of conversations they are involved in, if we suppose a conversation corresponds to a clique-like structure. We use both unweighted and weighted variants of Burt’s Constraint.

Macroscopic Measures

The measures harnessing the entirety of the graph structure form the largest group. In our context, they allow characterizing the position of a vertex relatively to the whole context period (Full) or to one of its halves (Before and After).

So-called spectral measures are based on the spectrum of the graph adjacency matrix, or of a related matrix. The Eigenvector Centrality [34] can be considered as a generalization of the degree, in which instead of just counting the neighbors, one also takes into account their own centrality: a central neighbor increases the centrality of the vertex of interest more than a peripheral one. Central vertices tend to be embedded in dense subgraphs. We use the (un)weighted and (un)directed variants of the measure (so: variants in total).

One limitation of the Eigenvector Centrality is that if the graph is directed and not strongly connected, certain vertices systematically get a zero centrality, whatever their position. Several modifications have been proposed to handle this situation. The Hub and Authority Scores [35] are two complementary measures processed through the HITS algorithm (Hyperlink-Induced Topic Search). They solve the issue by splitting the centrality value into two parts: one for the incoming influence (Authority), and the other for the outgoing one (Hub). We use the (un)weighted directed variants of both Hub and Authority scores.

The Alpha Centrality (or Katz Centrality) [36, 51] solves the same problem by assigning a minimal positive centrality value to all vertices. Additionally, it allows attenuating the influence of distant vertices during the computation. We use the (un)weighted directed variants of this measure. The Power Centrality [37] generalizes both the Eigenvector and Alpha Centralities. In particular, it allows a negative attenuation. The implementation we use only works for unweighted directed graphs.

The PageRank Centrality [38] can be seen as a variant of the Katz Centrality. One limitation of the later is that when a central vertex has many outgoing edges, all of them receive all its influence, as if they were its only recipient. The PageRank Centrality includes a normalization allowing to model the dilution of this influence. We use the (un)weighted and (un)directed variants of this measure.

Compared to the other spectral measures, the SubGraph Centrality [39] defines the notion of reachability based on closed walks rather than simple walks. Put differently, the other spectral measures consider that the vertex of interest influences (resp. is influenced by) some other vertex if a walk exists to go to (resp. come from) this vertex. The Subgraph Centrality requires both, and it uses an attenuation coefficient to give less importance to longer walks. The implementation we use only deals with undirected unweighted graphs.

In our conversational graph, we expect that a user participating a lot in the conversation will be central, and even more so if there are several conversations and he is participating in the main one. It is difficult to predict which ones of these slightly different spectral measures will be the most appropriate to our case, which is why we included all of the available ones.

Another group of macroscopic measures is based on the notions of shortest path or geodesic distance (i.e. the length of the shortest path).

The Betweenness Centrality [40] is related to the number of shortest paths going through the considered vertex. In communication networks such as ours, it can be interpreted as the level of control that the user of interest has over information transmission. We use the (un)weighted and/or (un)directed variants of this measure.

The Closeness Centrality [41] is related to the reciprocal of the total geodesic distance between the vertex of interest and the other vertices. It is generally considered that it measures the efficiency of the vertex to spread a message over the graph, and its independence from the other vertices in terms of communication. The Eccentricity [42] is related to the Closeness Centrality, but it is not a centrality measure. On the contrary, it quantifies how peripheral the vertex of interest is, by considering the distance to its farthest vertex. By comparison to the Closeness Centrality, there is no reciprocal involved, and it uses the maximum operator instead of the sum. In our case, both measures indicate how involved the considered user is in the conversation(s), as they directly depend on how directly connected he is to the other users. In particular, we expect important changes in the Before and After graphs to reflect a significant modification of the user’s role in the conversation. For the Closeness Centrality, we use the (un)weighted and (un)directed variants, but for the Eccentricity, we only have access to the unweighted (un)directed variants.

The last group of macroscopic measures is based on the notion of connectivity, i.e. whether or not a path exists between certain parts of the graph.

An Articulation Point (or Cut Vertex) is a vertex whose removal makes the graph disconnected, i.e. split it into several separate components [42]. We define a binary nodal feature indicating if the vertex of interest is an articulation point () or not (). It could help describing whether the targeted user is bridging two separate groups of users in the conversation, possibly indicating that he caused a topic shift or that some of the users have left the conversation.

Mesoscopic Measures

Mesoscopic measures rely on an intermediate structure to characterize a vertex. In our case, such a subgraph corresponds to a tightly knit group of users, and is likely to represent a conversation. So, this type of measure would allow characterizing the position of a vertex relatively to the various conversations taking place in the considered context period (provided there are several of them).

The Coreness Score [43] is based on the notion of -core, which is a maximal induced subgraph whose all vertices have a degree of at least . The Coreness Score of a vertex is the value of the -core of maximal degree to which it belongs. In our context, the Coreness Score is related to the number of participants of the largest conversation involving the user of interest. We use an undirected version of the Coreness Score, as well as two variants focusing on incoming and outgoing edges in directed networks.

We also take advantage of the Within-Module Degree and Participation Coefficient, a pair of complementary measures defined relatively to the community structure of the graph [44]. We detect the community structure through the InfoMap method [52]. These measures aim at characterizing the position of a vertex at this intermediate level. The Within-Module Degree (or Internal Intensity) assesses the internal connectivity. It evaluates how the degree of a vertex within his community relates to those of the other vertices from the same community. For us, it is an indicator of how involved the user is in his current conversation. The Participation Coefficient is concerned with the external connectivity: it is based on the number and quality of the connections that the vertex has outside of his own community. In our case, a high value could indicate either someone holding a mediation position, in the case of a single conversation involving several groups of users, or someone participating in several conversations. We use the original undirected variants of these measures, as well as the directed variants proposed in [53] to focus on incoming and outgoing edges.

One limitation of the Participation Coefficient is that it mixes several aspects of the external connectivity: the number of external connections, the number of concerned external communities, and the distribution of these connections over these communities. To solve this issue, three measures were proposed in [45] to separately assess these three properties. They are respectively called External Intensity, Diversity, and Heterogeneity. The available variants are all unweighted, but allow handling undirected, incoming and outgoing edges.

Iii-B2 Graph-Focused Topological Measures

A simple way to obtain graph-focused measures is to consider a vertex-focused measure and compute some statistic over the vertex set of the graph. This is what we do for all of the measures described in the previous section, by averaging them over the whole graph. This also holds for all the variants (weighted and/or directed) of these measures. But there are also measures defined specifically for the graph scale: like before, we distinguish them based on their scope.

Microscopic Measures

First, we use very classic statistics describing the graph size: the Vertex and Edge Counts. We also compute the Density, which corresponds to the ratio of the number of existing edges to the number of edges in a complete graph containing the same number of vertices. In other words, the density corresponds to the proportion of existing edges, compared to the maximal possible number for the considered graph. In our context, these measures allow assessing the number of users considered in a context period (Vertex Count), and the general intensity of their communication during this period (Edge Count). The Density can be viewed as a normalized Edge Count that is more likely to be useful when comparing graphs of different sizes.

The Global Transitivity (or Global Clustering Coefficient [31] is the graph-focused counterpart of the Local Transitivity. It corresponds to the proportion of closed triads among connected ones, where a closed triad is a -clique (i.e. a triangle) and a connected triad is a subgraph of vertices containing at least edges. This proportion measures the prevalence of triadic closure in the graph. In our context, it assesses how likely two users communicating with the same person are to directly exchange messages themselves. We only have access to the undirected unweighted version of this measure.

The Reciprocity [32] is defined only for directed graphs. It corresponds to the proportion of bilateral edges over all pairs of vertices. In our networks, a low reciprocity would indicate that certain users do not respond to others.

The Degree Assortativity (or Assortativity for short) [33] measures the homophily of the graph relatively to the vertex degree. The homophily is the tendency for vertices to be connected to other similar vertices (in this case: of similar degree). It is based on the correlation between the series constituted of all pairs of connected vertices. We use both directed and undirected variants of this measure. In our conversational networks, this measure could help detect situations where users do not participate to the conversation at the same level.

Macroscopic Measures

A number of macroscopic measures are connectivity-based. The Weak Component Count corresponds to the number of maximally connected subgraphs. In such a subgraph, there is a path to connect any pair of vertices. For our conversational networks, this could correspond to a conversation, whose participant do not necessarily talk directly to each other. However, due to the use of a sliding window, we expect our graphs to be connected (i.e. only one weak component), even if by very weak edges. In this case, a conversation is more likely to correspond to other substructures based on more relaxed definitions, such as cliques or communities. For directed graphs, we also consider the Strong Component Count: a strong component is similar to a weak one, except it is based on directed paths. We suppose that, in our networks, we are more likely to get several strong components, since users do not necessarily exchange in a bilateral way.

The Cohesion (or Vertex Connectivity) of a graph corresponds to the minimal number of vertices one needs to remove in order to make the graph disconnected (i.e. have several components) [29]. The Adhesion (or Edge Connectivity) is similar, but for edges. In our conversational networks, these measures can be related to the level of participation to the considered conversation: the higher their values, and the higher this level. But high values can also denote the presence of several distinct conversations in the context period. Both measures are defined for directed networks.

As mentioned before when describing the nodal measures, we check whether the targeted user is an articulation point. We also compute the Articulation Point Count, i.e. the total number of articulation points in the graph. This measure is related to the Cohesion, since there are no articulation point if the Cohesion is larger than . The implementation we use handles only undirected graphs. In our context, the number of articulation points could be related to the presence of several conversations (articulation points corresponding to gateway users between them). It could also reflect situations where a conversation lasts a very long time, and some groups of users loose interest and get disconnected from the active users. Another possibility is the occurrence of a flood-type situation: a user sends a flurry of messages into the channel to kill a conversation, then leave, and a different group of users later takes possession of the channel to start its own conversation.

We also use three distance-related measures. The first is the Diameter, which corresponds to the largest distance found in the graph, i.e. the length of the longest shortest path. It also corresponds to the largest Eccentricity over all vertices. We use (un)weighted and (un)directed variants. The second is the radius, which is the smallest Eccentricity over all vertices. We use its undirected, incoming and outgoing variants. The third is the Average Distance, which is the average length of the shortest paths processed over all pairs of vertices. We use its unweighted (un)directed variants. In our networks, the distance is related to the separation between users, in terms of interaction. A large Diameter means that a user can be many intermediaries away from exchanging directly with another user. This could be caused, for instance, by the occurrence of several distinct conversations in the considered context period, or by a very long conversation loosing and gaining users through time. This observation also holds for the Radius and Average Distance, which provide a slightly different perspective on the same aspect of the graph.

Mesoscopic Measures

We process the total Clique Count in the network, where a clique is a complete induced subgraph. As mentioned before, this can be related to the number of conversations occurring in the context period, or to number of subgroups of users participating in the same conversation.

Like before with vertex-focused measures, we use the InfoMap algorithm to detect the community structure [52]. Based on this partition, we compute two measures: the Community Count and the Modularity [30]. The latter assesses the quality of the detected community structure, i.e. how internally cohesive and externally disconnected the communities are. We use both weighted and unweighted variants of the Modularity.

Iv Experiments

This section describes our experimental setup and results regarding the automatic detection of abusive messages in chat logs. In Section IV-A, we present our dataset and the general architecture of our classification system. Because we expect some of our features to be redundant, we conduct a correlation study of our feature set in Section IV-B. We present general results and the effect of our various graph extraction parameters in Section IV-C. In Section IV-D

, we investigate the temporal aspects of the system –specifically what happens when we train our models based on the features extracted from only one of the three graphs (

Before, After of Full), or some of their combinations. We then examine the importance of weight and directionality in Section IV-E

, before investigating the potential for computational optimization through feature selection in Section 

IV-F. Finally, in Section IV-G, we compare the performance obtained using the best configuration of our framework with the selected baselines.

Iv-a Experimental Setup

We have access to a database of messages that were exchanged by the users of the browser-based multi-player game SpaceOrigin, a French-language Massively Multiplayer Online Game. In this database, messages have been flagged by one or more users as being abusive, and subsequently confirmed as abusive by the human game moderators: they constitute our Abuse class. Each message belongs to a unique communication channel. A total of distinct users have authored these abusive messages. We further extract messages at random from the messages not confirmed as abusive, to constitute the Non-abuse class. Note that all the results we discuss in this article are relative to the Abuse class.

We previously experimented with this dataset in [17, 3]. However, since then we have detected certain inconsistencies in the database, preventing us from retrieving the context of certain messages. We cannot apply our classification method to them, so we discard them for the work presented here. Note that this concerns both classes. Moreover, our tests show that removing those samples does not significantly impact our previous performances. The resulting dataset is constituted of messages in the Non-Abuse class and messages in the Abuse class. Figure 9 shows the distribution of abuse cases by user. It suggests that most abusive users need only a few warnings before mending their ways, but it also shows that some users are exceptional in the number of abuses they commit.

Fig. 9: Distribution of the number of abuse cases by user.

Because of the relatively small dataset, we set up our experiment for a -fold cross-validation. We split the dataset into same-sized parts containing the same ratio of abusive to non-abusive messages. We use a 70%-train / 30%-test split, which means, for each run of the cross-validation, the train set is composed of of those parts while the test set is composed of the remaining . We use Python-iGraph [54]

to extract the conversational networks and process the graph-based features for each message. As a classifier, we use an SVM (Support Vector Machine), implemented in the

Sklearn toolkit [55] under the name SVC (C-Support Vector Classification).

We mainly experiment with different sets of features: Full, Before, After and All. For a given message, Before, After and Full correspond to all the topological measures computed for the Before, After and Full graphs, respectively. All is the union of all three sets, i.e. it includes all topological measures for all graphs.

In the remainder of this section, we occasionally provide computational time requirements. For context, the times that we provide correspond to single-threaded calculations performed on an Intel Xeon CPU E5-2620 v3s, clock speed 2.5 GHz and 15 MB cache.

Iv-B Feature Dependence Study

Each considered topological measure was originally defined to characterize a graph in a specific, distinct way. So, in theory, they could all be independent for a given graph, and thus all necessary to describe it completely. But in practice, according to the structure of the considered graph, some of them can be statistically dependent, and therefore redundant. In order to get a better understanding of the way these topological measures behave on our conversational graphs, we compare all the computed features using Pearson’s correlation coefficient. In our context, where these features are later fetched to a classifier, only the strength of the association is relevant, i.e. the absolute value of the correlation (not its sign). We identify clusters of highly correlated features using the hclust function of the R

language, which implements a standard hierarchical cluster analysis method, with average linkage. We use the

Silhouette measure [56] as a criterion to select the best cut in the produced dendrograms. To keep the description short, we only focus on the most interesting results.

A very small number of features are constant over all instances of the corpus, which means they have no discriminative power at all. For all three types of networks, the number of weak components is always , which means they are always (weakly) connected. This can be explained by our use of a sliding window: even if the context period contains two separate conversations, they will be connected, possibly by a edge of quasi-zero weight. In the After and Full graphs, the targeted user is never an articulation point. Moreover, in the Full graph, the number of articulation points is always zero. We already know that the graphs are connected, so this zero value means no single vertex removal can disconnect them.

A few features are quasi-independent, in the sense they display almost no correlation with any other feature. This is the case of certain variants of the Power, Subgraph and Alpha centralities. From this point of view, they differ from the other spectral measures, which are overall strongly correlated. Certain variants of measures focusing on connectivity (Strong Component Count, Adhesion, Cohesion and Radius) are also independent. And it is the case for a number of mesoscale features too, all of them based on the community structure. The fact that these features are only weakly (if at all) correlated to the others makes them singular, in the sense they are the only ones to capture certain structural changes in the conversational graphs. But it does not imply they have any particular discriminative power regarding the classification task at hand. However, they must be closely monitored in the rest of our experiments, because they constitute good candidates.

The rest of the features form highly correlated clusters. As explained in Section III-B, for each topological measure we consider several variants to define our features. Those can be direction- (undirected, incoming and outgoing variants of the same measure), weight- (unweighted vs. weighted) and average-based (nodal measure processed for the targeted vertex vs. averaged over the whole graph), and of course these different traits can be combined. Our correlation study shows that certain variants of the same measure are strongly related, i.e. are placed in the same cluster, which makes them redundant for our purpose. A very large number of measures, mainly distance- and community-based, are direction-independent, i.e.

all their direction-based variants are strongly correlated. This indicates that most of the time, considering the direction of the interactions between users does not bring any additional information. This effect is clearly much less marked for average-based and weight-based variants. Thus, unlike direction, weight seems like an important aspect of our graphs, and averaging measures over all vertices also seems to bring some relevant information. This opens an interesting perspective, as it may be promising to explore other statistics such as the standard deviation.

The strong correlations between variants of the same measure form small tight clusters, but there are also larger clusters gathering a number of variants based on distinct measures. They tend to concern measures relying on a similar concept, e.g. community structure. But there are also more surprising associations, for instance for each type of graph, the larger cluster contains features related to Authority/Hub Scores, Eigenvector centrality and PageRank (which are all spectral measures), but also Eccentricity, Diameter, Radius and average Distance (all distance-based).

Overall, we observe different behaviors, which cannot be explained only by the various characteristics of the features (micro/meso/macroscopic, un/directed, un/weighted, Before/After/Full graphs). This supports our decision to adopt an exploratory approach to identify the most appropriate features for our classification problem. The detected clusters of correlated features will be useful later to ease the interpretation of the classification results, as features belonging to the same cluster can be considered as interchangeable. It is worth noticing that these clusters are based on a linear definition of the correlation. But the classifier we use is able to detect non-linear associations, and may therefore consider that some of these clusters are equivalently informative for the problem at hand (by detecting additional or stronger relations between the features).

Iv-C Impact Of Graph Extraction Parameters

As explained in Section III-A, our graph extraction method has three important parameters: 1) size of the context period; 2) size of the sliding window, and 3) weight assignment strategy. In this section, we explore how the classification performance varies depending on these parameters. Our goal here is both to get a better understanding of the parameters role, and to identify the most appropriate values without having to use brute force.

Fig. 10: Classification performance (-measure) as a function of the context period size, for a sliding window of messages and using the Recursive weight assignment strategy ().

As a reminder, the context period is the sequence of messages considered to classify the targeted message, and symmetrically built around this message. We expect it to have a strong effect on the classification performance, depending on its size. If it is too small, one can suppose it only includes a part of the conversation containing the targeted message, and therefore lacks some information necessary to make a proper decision regarding the abusive nature of this message. On the contrary, if it is too large, we assume it contains several conversations having nothing to do with the targeted message, which should also result in lower classification performance. In summary, when using a growing context period, we expect the classification performance to increase, then reach a plateau corresponding more or less to the typical duration of a conversation, and then decrease as the context period contains more and more noise (i.e. information not related to the targeted message).

Figure 10 shows the evolution of the classification performance, expressed in terms of -measure for the Abuse class, as a function of the context period size, as for it expressed in numbers of messages. We fix the sliding window to messages, and the recursive strategy to assign weights. All available features (All feature set) are used during the classification. We choose these extraction parameters because earlier testing showed that the recursive strategy yielded the best performance, and this sliding window size provides a good trade-off between a graph that would be very sparse and therefore not informative enough, and one that would be very dense and thus too noisy.

It appears that our assumption is only partially verified: the performance first increases with the context period size. However, it does not reach a plateau as expected, and, on the contrary, seems to go on increasing, albeit more and more slowly, as if it was logarithmically depending on the context period size. The maximal performance is obtained for a size of messages, but it is possible that even higher values can be obtained for larger context periods (which we did not check due to computational limitations). This means that our assumption regarding that large context periods would bring mainly additional noise is incorrect, because, on the contrary, they convey more relevant information concerning the classification task.

Fig. 11: Classification performance (blue) and number of abuse occurrences in the context period (red), as functions of the context period size.

We manually investigate a sample of our dataset to understand this trend. From reading a number of conversation logs, it first appears that conversation boundaries are not well defined, and so there is no typical duration for a conversation: this can explain the absence of a plateau in the plot. Furthermore, we based our assumptions with regard to performance on the idea that an abusive message has a specific impact on what happens after it is posted. Specifically, the conversation would show markers of normality before the message occurs and quickly devolves after that. As it turns out, in conversations where an abusive message is found, the author of the abusive message usually has been around for a while, and the message that is actually flagged and confirmed as abusive is not his first suspicious message. We assume that the classifier can take advantage of this type of situations, therefore invalidating our previous assumption that a large context period would only bring noise.

Note that more than one message of the Abuse class can co-occur, i.e. can appear in the same context period, if it is large enough, which also supports our point. This is generally due to a single user sending multiple abusive messages in quick succession, or because the conversation devolves into name-calling following an initial abusive message. Figure 11 shows the number of co-occurring abusive messages, as well as the -measure performance, as functions of the size of the context period. There is a very strong match between both series, even if not perfect. This seems to back our assumption of the classifier taking advantage of the potential abuse cases happening around the targeted message. All these observations regarding the co-occurrence of abuse expose a couple of interesting perspectives: 1) user models can presumably yield features useful for classification, and 2) a text-based model of the whole conversations would also likely be useful.

We now explore the impact of the window size and weight assignment strategy on the overall performance. Figure 12 shows the evolution of our performances for two fixed sizes of context periods ( and our previously obtained optimum of ). The maximal window size considered is , which corresponds to almost twice the default GUI limitation (cf. Section III-A2).

Fig. 12: Classification performance (-measure) for the considered weight assignment strategies (Uniform, Linear and Recursive) and context period sizes ( and messages), as a function of the sliding window size.

For our optimal context size, we obtain the best results for a window size of and the Linear assignment strategy, and for the window size and the Recursive assignment strategy. Both of those strategies give greater importance to temporal proximity. Overall, there is no much difference between our weight assignment strategies. It seems that the specific values of the weights are not as important as their relative ordering. It is also worth noting that those window sizes are very close to the natural limitation of the GUI, which means they likely best capture the intended recipients of any given message.

Iv-D Temporal Aspects

The results shown until now are all obtained using the All feature set, i.e. the features resulting from the calculation of all topological measure variants for all three individual graphs (Full, Before and After). However, using the Full or After graphs restricts the possible use cases for the system to tasks that do not require taking a decision as soon as the message to classify becomes available since the “future” context of the targeted message is taken into account. In order to have a system that is capable of doing so, we must investigate the impact of the Before features. Studying the features from the three individual graphs also allows us to get a better understanding of the system by providing a qualitative and accurate analysis of each part of the context.

Figure 13 shows the results obtained for classifiers built using combinations of the available feature sets: After, Before and Full correspond to each graph considered separately, whereas Before+After denotes the union of the Before and After sets, and All represents the set of all computed features (Before, After and Full). The conversational graphs used for these experiments are extracted using the Recursive assignment strategy and a sliding window of messages. Unless stated otherwise, we use these parameters in the rest of this paper as they match the best performance obtained during our greedy search of the parameter space (Section IV-C).

Fig. 13: Classification performance (-measure) as a function of the context period size (in messages), for the considered feature sets (Before, After, Full, All) as well as a combination of the first two of them (Before+After).

Since the main idea behind our approach is to detect the nature of a message based on the reaction it triggers in the community, it is not surprising to see that the After feature set (in red) reaches an acceptable performance level on this task. However, what is surprising is that by using only the Before feature set (in blue), the system performs much better on the same task (at least for small context periods). This suggests that the interactions occurring before the targeted message reveal more about its abusive nature than those happening after.

Nevertheless, when using large context periods, the performances obtained for Before and After get very similar. This indicates that what is important is not whether the messages used to extract the conversational graph precede or follow the targeted message, but rather how many of these messages are used. This supports our previous finding, regarding the fact that the context period size is the most important parameter of our graph extraction procedure. Moreover, based on the same observation, one could also think that the Before and After graphs convey approximately the same information, when considering large context periods, because the corresponding performances are roughly the same. However, this is disproved by the results obtained for the union of the Before and After feature sets (in yellow): the classification performance is noticeably higher, which means both types of graphs do not completely overlap, informationally speaking.

It is worth noticing that we get almost the same performance with the Full feature set as with Before+After. One could assume that the use of two distinct graphs built on either sides of the targeted message would help better characterizing it, compared to the Full feature set, which covers the same time span based on a single graph. Indeed, when extracting the latter, the sliding window passes through the targeted message, and is likely to smooth the potentially relevant topological changes occurring right around it. However, even if the performance gap between Before and After seems to widen when the context period gets larger, the difference is not clear, so this assumption is not verified. This means that the single Full graph is as approximately as informative as the joint use of both Before and After graphs. The latter option procures more flexibility in the possible application scenarios, but it contains twice as many features, and therefore requires roughly twice the computational time.

This observation is confirmed when we consider the All feature set (in green), which contains all features for all graphs. As expected, it is the best performing feature set overall, since it is the union of all the other considered feature sets. However, the obtained results are only marginally better than for Full and Before+After. This means that the information conveyed by the Full and Before+After feature sets essentially overlaps: using their union does not bring any noticeable performance increase.

Iv-E Impact of Weights and Directions

We now investigate how considering the edge weights and directions in our features affects the classification performance. Based on the All feature set, we define new feature sets, characterized by their focus on unweighted undirected (UU), unweighted directed (UD), weighted undirected (WU), and weighted directed (WD) measures, respectively. Concretely, each set includes the same group of core features, which are conceptually not concerned by the notion of weight or direction. This core is completed by features designed to consider or ignore weights or directions. For instance, the Clique Count is a core feature, whereas each one of the variants of the Diameter appears in a specific set.

Fig. 14: Performance (-measure) obtained for the (un)directed and (un)weighted feature sets, as a function of the context period size.

Figure 14 displays how the corresponding classification performance (in terms of -measure) evolves as a function of the context period size. It appears that both weighted feature sets (blue and yellow) dominate their unweighted counterparts (green and red) over the considered interval. This seems to confirm our assumption from Section III-A, regarding the fact that weights can help discriminate between certain structures of conversations, and/or distinguish consecutive conversations.

There is a similar effect for directions, but it is much weaker, as each directed feature set (red and yellow) only partially dominates its undirected counterpart (green and blue). This is consistent with our observation from Section IV-B, regarding the high correlation noticed for certain measures, between their undirected and directed variants (and therefore their potential lack of discriminative power). This indicates that the direction of edges is not as relevant as their weight relatively to the classification task at hands. Yet, the best performance is reached when using both weights and directions. If the additional computational cost is not too high (and it is generally not the case), it is therefore worth using directed features.

Iv-F Feature Contributions

In order to estimate the discriminative power of our features with regard to this classification task, we use a recursive feature elimination method. It takes a given feature set as input, and outputs its subset of so-called Top Features (TF). These are the minimal subset of features allowing to reach 97% of the performance obtained when considering the input feature set. In order to identify these top features, we apply an iterative method based on Sklearn. This toolkit allows us to fit a linear kernel SVM with the values of the input feature set, and provides a ranking of the individual features in that set, reflecting their relevance to the classification task. We then drop the least important feature, and train a new model using all the remaining features. We repeat this process until the classification performance reaches the targeted minimal threshold of 97% of the original -measure score.

Feature Number of Total Average -
set features Runtime Runtime measure
All 459 4:15:29:24 157.71 s 83.89
All-TF 10 53.92 0.02 s 82.65
Before 153 1:05:51:06 42.23 s 79.03
Before-TF 8 29.68 0.01 s 79.02
After 153 1:06:04:15 42.54 s 78.28
After-TF 11 1:30.72 0.04 s 76.01
Full 153 2:03:34:02 72.94 s 82.17
Full-TF 6 2:38.37 0.06 s 82.65
TABLE II: Comparison of the performances obtained with the feature sets (All, Before, Full, After) and their subsets of Top Features (TF). The total runtime is expressed as day:h:min:s.

We first apply this recursive feature elimination process to the All feature set in order to identify the overall best features, then do the same with the Before, After, Full feature sets, for comparison purposes. Table II presents the performances and computational time costs measured for each of these complete feature sets, as well as for their respective Top Feature subsets (TF). It appears that, for all feature sets, using the top features during the classification allows reducing the runtime by up to orders of magnitude, while retaining at least 97% of the -measure value, which is very interesting from an application perspective. It means that the longer features to process do not bring more discriminative power than the shorter ones, regarding the classification task at hand (at least for our dataset). The fourth column describes the average runtime by message, and shows that the classifier could operate in real-time when limited to the top features.

It is important to notice that feature computation is by far the most computationally expensive step of our framework. By comparison, extracting the conversational graphs for the full corpus takes around minutes, and performing the whole cross-validation (i.e. 10-fold training and testing) only minute. The time required to compute our features depends on the size of the conversational graph, in terms of number of vertices and/or edges. The graph size is affected, in turn, by the number of users involved in the conversation (number of vertices) and the density of exchanged messages (number and weights of the edges). These characteristic are bounded by social and ergonomic (e.g. user interface) constraints, and therefore be assumed as independent from the corpus size. The scalability of our method therefore depends on that of the tool selected to perform the classification step: it is an SVM in this work, but the end-user is free to use any other classifier instead.

As explained in Section IV-B, certain of our features are strongly correlated, which led us to identify clusters of interchangeable features. Studying the top features would result in missing this information: we must consider their clusters instead. Table III displays the clusters corresponding to the top features obtained for the All feature set. For matters of space, we discuss in detail this sole feature set only. Note that these clusters generally contain several variants of one (or more) topological measure(s), as indicated by the last columns. For instance, Cluster 10 contains all variants of average weighted and unweighted undirected Eigenvector Centrality for all types of graphs (Before, After, Full). Also note that a letter G in the Scale column can either refer to a naturally graph-scale feature, or to a vertex-scale feature averaged over (cf. Section III-B). For completeness, the proper top features are represented in bold.

Clust. Measure Graph Wght. Dir. Scale
9 Clique Count A/F G
Burt’s Constraint A/F W G
Coreness Score A/F U/I/O G
Degree Centrality A/F U U/I/O G
Strength Centrality A/F W U/I/O G
10 Assortativity A/B/F U/D G
Density A G
Diameter A U U/D G
Average Distance A U U/D G
Radius A U U G
Hub/Authority Scores A/F W D G
Burt’s Constraint A/F U G/N
Closeness Centrality A U U/I/O G
Eccentricity A U U/I/O G
Eigenvector Centrality A/B/F U/W U G
PageRank Centrality A/F U/W U/D G/N
41 Degree Centrality A/F U U/I/O N
Strength Centrality A/F W U/I/O N
49 Vertex Count A/F G
Betweenness Centrality A/F U/W U/D G
110 Density B G
Closeness Centrality B W U/I/O G/N
118 Average Distance B U U/D G
Hub/Authority Scores B W D G
PageRank Centrality B U/W U/D G/N
119 Hub/Authority Scores A/B U D N
172 Reciprocity A D G
177 Closeness Centrality A W U/O G/N
TABLE III: Clusters containing the top features (in bold) obtained for the All feature set. The letters in the Graph column stand for Before (B), After (A) and Full (F). Those in the Scale column mean Graph-scale (G) or Vertex-scale (N). Those in the Wght. and Dir. columns have the same meaning as in Table I.

Cluster 9 contains only micro- (Degree, Strength, Burt’s Constraint) and meso-scopic (Clique Count, Coreness) features describing the After and Full graphs. Moreover, all of them are graph-scale (as the vertex-scale measures are averaged over the graph). In contrast, Cluster 41 focuses on the same graphs and also contains the Degree and Strength, but as vertex-scale features this time. Put differently, Cluster 41 can be viewed as a vertex-scale counterpart of Cluster 9. This indicates that the microscopic characteristics of both the targeted vertex and the whole graph are relevant to our classification task.

Cluster 10 is very large and contains almost only graph-scale features. It focuses mainly on distance-based (Diameter, Average Distance, Radius, Closeness, Eccentricity) and spectral (Hub/Authority, Eigenvector, PageRank) macroscopic measures. Like the previous clusters, it essentially contains features computed on the After graph, but unlike them, it includes only a few features from the Full graph. Nevertheless, it appears as quite complementary of Cluster 9, in the sense it can be considered as its macroscopic counterpart.

Cluster 49 suggests that the Betweenness of the After and Full graphs mechanically increases with their number of vertices. But more importantly, it identifies the Vertex Count, i.e. the size of the conversation after the targeted message, as one of its most discriminative aspects, relatively to our classification task. The interpretation of Clusters 172 and 177 is even clearer, as each focus on a single measure (Reciprocity and Closeness), uniquely for the After graph. The bilateral nature of the exchanges after the targeted message, as well as how direct these are, can therefore also be considered as very important for the classification.

Clusters 110 and 118 deal only with the Before graph. Cluster 110 includes variants of the weighted Closeness (both for the targeted vertex and in average) and Density. It can be considered as the Before counterpart of Cluster 177, which also focuses on the weighted Closeness but for the After graph. Cluster 118 contains distance-based and spectral macroscopic measures, mainly describing the whole graph. Thus, although much smaller, it can be seen as the Before counterpart of Cluster 10, semantically speaking.

Finally, Cluster 119 contains the unweighted Hub and Authority Scores of the targeted vertex, for both After and Before graphs. It can be opposed to both Clusters 10 and 118, which also contain Hub and Authority for the After and Before graphs, respectively, but in their weighted and averaged versions.

Let us summarize our observations. A number of composite clusters describe the After/Full (Clusters 9, 10 and 41) and Before (Cluster 118) graphs at various scales and scopes. Two clusters focus more precisely on the Closeness, for the Before (Cluster 110) and After (Cluster 177) graphs. We assume that the classifier is able to take advantage of this to compare various aspects of the graphs, be it in terms of scale (Clusters 9 vs. 41), scope (Clusters 9 vs. 10) or time (Cluster 10 vs. 118, and 177 vs. 110). This means that 1) temporal aspects are useful for this classification task and 2) an abuse case is reflected by its impact on both the position of the abusive user in the graph and the overall aspect of the conversation.

Each remaining cluster (49, 119, and 172) focuses on a measure of the After graph, highlighting their contribution to class discrimination. We examine more thoroughly these features, by considering separately their distributions in the Abuse and Non-abuse classes. For the number of users in the conversation, it turns out these distributions are quite different: the Vertex Count is relatively homogeneous and centered around for the Abuse class, whereas its distribution is heterogeneous (closer to a power law) when there is no abuse, with a very large number of very small networks (less than users).

Looking at the Reciprocity, there is again a relatively homogeneous distribution for the Abuse class, centered around . For the Non-abuse class, a part of the distribution is quite similarly homogeneous (albeit around ), but the large majority of instances have either a or Reciprocity, i.e. only unilateral or bilateral edges, respectively. After verification, the former case corresponds to conversations that come to an abrupt end in a short-lived conversation channel. The latter case is just a normally functioning conversation, in which every user talks to each other. Both cases are more likely to happen when few users are involved, which is consistent with our observations regarding the Vertex Count. However, both features are only partially correlated, which shows that the Abuse class cannot be reduced only to a question of number of users involved in the conversation.

The Closeness seems to have a special role, since its weighted variants constitute their own clusters for the Before (Cluster 110) and After (Cluster 177) graphs. By comparison, the average unweighted Closeness is correlated with many other features as it belongs to the large Cluster 10: this is consistent with our previous observation that certain weighted variants appear to be more informative. Further examination shows that the Closeness follows a power law-like distribution in both classes, covering three orders of magnitude. However, this heterogeneity is much more marked in the case of the Non-abuse class. Concretely, the Closeness is generally higher for the Abuse class. This means that the average distance between the author of the targeted message and the rest of the graph decreases in case of abuse. This user becomes less peripheral (or more central), and the same goes for the other users of the graph (in average). This fits in quite well with assumptions about how abuse impacts a discussion: an abuser would tend not to be peripheral in a conversation, while we can reasonably assume that the other participants will be piling on and therefore be less peripheral themselves.

Most mesoscopic measures are discarded during the feature elimination process. The only remaining ones are the Clique Count and the Coreness, which are also the only ones not related to community structure. Yet, we had considered them as promising in Section IV-B, because they are uncorrelated with the others: it turns out the unique information they convey does not help solving this specific classification task. When inspecting the distribution of the modularity measure, we observe that it is overwhelmingly close to zero in both classes. This means that our networks generally do not have any community structure, which explains why the related features are not discriminative (at least for this dataset).

We also have identified and studied the clusters corresponding to the top features of the Before (Table IV), After (Table V), and Full (Table VI) feature sets. For matters of space, we do not present them in detail, though, and only discuss our most interesting observations. Certain clusters identified for the All feature set also appear for the other sets: those focusing on the considered type of graph, i.e. Clusters 110 and 118 for Before; 10, 41, 49 and 177 for After, and 9, 10, 41 and 49 for Full. Some of the missing clusters are replaced by semantically close and relatively correlated clusters. For instance, Before has a cluster containing exactly the same measure variants as Cluster 49 (Vertex Count and Betweenness), but for the Before graph. Similarly, Full has a cluster focusing on the weighted Closeness, as Cluster 177 does for After. We interpret Clusters 9 and 41 as describing the microscopic aspects of the After graph at the graph and vertex scale, respectively: Before has comparable clusters focusing similarly on the Before graph. Overall, we can say that when focusing on a specific type of graph (by opposition to All), the classifier takes advantage of informationally close clusters, albeit inferior in terms of discriminative power, as they lead to a lower performance.

Clust. Measure Graph Wght. Dir. Scale
110 Cf. Table III
113 Clique Count B G
Coreness Centrality B U/I/O G
Degree Centrality B U U/I/O G
Strength Centrality B W U/I/O G
114 Degree Centrality B U U/I/O N
Strength Centrality B W U/I/O N
118 Cf. Table III
123 Vertex Count B G
Betweenness Centrality B U/W U/D G
131 Eigenvector Centrality B U/W U N
TABLE IV: Clusters containing the top features (in bold) obtained for the Before feature set. Same remarks as for Table III.
Clust. Measure Graph Wght. Dir. Scale
10 Cf. Table III
40 Coreness A/F U/I/O N
41 Cf. Table III
49 Cf. Table III
71 Local Transitivity A/F U/W U N
175 Adhesion/Cohesion A D G
176 Closeness A U U/I N
Eccentricity A U U/I/O N
177 Cf. Table III
191 Closeness A W I G/N
TABLE V: Clusters containing the top features (in bold) obtained for the After feature set. Same remarks as for Table III.
Clust. Measure Graph Wght. Dir. Scale
9 Cf. Table III
10 Cf. Table III
39 Closeness F W U G/N
41 Cf. Table III
49 Cf. Table III
TABLE VI: Clusters containing the top features (in bold) obtained for the Full feature set. Same remarks as for Table III.

Iv-G Baseline Comparison

For matters of exhaustiveness, we assess the performance of our framework on a balanced version of our classes, instead of the unbalanced ones used throughout this section. In this setting, the Abuse class stays the same, but the Non-abuse class is reduced to the size of the Abuse one, through sampling. When using these data, we observe a significant performance improvement for all feature sets. In particular, the -measure values obtained for All and All-TF increase from and , to and , respectively. Further investigations shows that this improvement is mainly due to a decrease in the number of false positives, itself caused by the smaller size of the non-abuse class. Such a balanced situation is unlikely in practice, though.

Method Reference -measure
Content-based [17] 76.50
Graph-based [3] 77.00
Extended graph-based – All This article 83.89
Extended graph-based – All-TF This article 82.65
TABLE VII: Best performances for the baselines and current framework.

Finally, we compare the results obtained using our framework with our two baselines (Table VII): the content-based approach of [17] and the previous version of our graph-based method [3]. As a reminder, the main differences between the latter and our present framework are that we now extract a directed graph, and use a much larger number of topological measures as classification features. The combination of these two improvements leads to a significant performance increase over our previous effort. As described in Section IV-E, the contribution of edge directions to the overall performance is relatively minor. One could assume that the performance improvement is mainly caused by the major expansion of the feature set, however this improvement is observed even when only using the top features identified in the previous section. Yet, there are only of them, by comparison to the features used in our previous approach [3]. So the conclusion here is that both extracting a directed graph and selecting a more appropriate set of features (in particular, topological measures able to handle edge weights) helped improve the performance. More importantly, the performance is greatly improved compared to our content-based approach [17], which is quite representative of the preprocessing and features used in the literature when classifying such data. This is a major result, as it shows that the sole structure of the conversation is enough to efficiently detect abuses, without considering at all the content of the exchanged messages.

V Conclusion

In this article, we tackle the problem of automatic abuse detection in online communities. We propose to model online conversations through graphs, and to perform the classification task using only graph-based features. The method, while simple, yields good results (up to a -measure), besting the score obtained with a content-based approach [17] and our previous graph-based effort [3]. It completely ignores the content of messages exchanged between users of an online community, which means it is robust to intentional obfuscation of messages by abusive users, as well as unintentional content noise. It is also inherently language-independent. One important limitation of our method is the high computational time required to extract the features. However, we show that it can be very significantly reduced by working with a small subset of relevant features, resulting in more than of the original performance for less than of the processing time. We also show that while our method is originally not designed for real-time abuse detection, the information available at the time the message appears is discriminative enough to do so.

A straightforward extension of our work is to take advantage of both content- and graph-based features, an approach previously applied in other contexts [57]. In our case, they are both based on completely different types of information, so we can assume they are complementary, which could improve the classification performance. At the very least, it will be interesting to combine the features of the Before graph with textual features since that can lead to a system useful for a prediction task. We also consider using a content-based classifier in a completely different way, during the graph extraction process. Such a classifier could be trained to detect the nature of the interaction between two users, allowing to extract a signed network (negative edge for a hostile exchange, positive otherwise). This additional information is likely to improve the performance of our graph-based classifier.

Finally, part of the future work will focus on applying our proposed approaches to other types of social network corpora. Indeed, chat logs are a special case of communications records that have a very specific structure (entanglement of discussions, near-synchronous communications, various topics in a single flow of discussion, uncertainty about who is the intended recipient of a message…) which do not necessarily appear in other forms of social networks, such as forums or micro-blogs. For example, since our results have shown that directionality is not the dominant graph construction parameter, we would be interested in evaluating its impact on a type of social media integrating a clear response structure (i.e. a clear identification of who answers whom, such as in a forum like Reddit or a tree-shaped comment section of a news website). Additionally, another type of social network corpora might present a more distinct community structure and therefore render the meso-scale features we have presented more relevant.


This work was funded by a grant from the Provence-Alpes-Côte-d’Azur region (France) and the Nectar de Code company.


  • [1] French Republic, Loi n2004-575 du 21 juin 2004 pour la confiance dans l’économie numérique - article 6 (2004).
  • [2] French Republic, Loi n82-652 du 29 juillet 1982 sur la communication audiovisuelle - article 93-3 (1982).
  • [3] E. Papegnies, V. Labatut, R. Dufour, G. Linares, Graph-based features for automatic online abuse detection, in: International Conference on Statistical Language and Speech Processing, Springer, Berlin, DE, 2017, pp. 70–81. doi:10.1007/978-3-319-68456-7_6.
  • [4] E. Spertus, Smokey: Automatic recognition of hostile messages

    , in: 14th National Conference on Artificial Intelligence and 9th Conference on Innovative Applications of Artificial Intelligence, AAAI, 1997, pp. 1058–1065.

  • [5] Y. Chen, Y. Zhou, S. Zhu, H. Xu, Detecting offensive language in social media to protect adolescent online safety, in: International Conference on Privacy, Security, Risk and Trust and International Conference on Social Computing, IEEE, 2012, pp. 71–80. doi:10.1109/SocialCom-PASSAT.2012.55.
  • [6] K. Dinakar, R. Reichart, H. Lieberman, Modeling the detection of textual cyberbullying, in: 5th International AAAI Conference on Weblogs and Social Media / Workshop on the Social Mobile Web, AAAI, 2011, pp. 11–17.
  • [7] V. S. Chavan, S. S. Shylaja, Machine learning approach for detection of cyber-aggressive comments by peers on social media network, in: International Conference on Advances in Computing, Communications and Informatics, IEEE, 2015, pp. 2354–2358. doi:10.1109/ICACCI.2015.7275970.
  • [8] H. Mubarak, K. Darwish, W. Magdy, Abusive language detection on Arabic social media, in: 1st Workshop on Abusive Language Online, ACL, 2017, pp. 52–56.
  • [9] A. H. Razavi, D. Inkpen, S. Uritsky, S. Matwin, Offensive language detection using multi-level classification, in: Canadian Conference on Artificial Intelligence, Springer, Berlin, DE, 2010, pp. 16–27. doi:10.1007/978-3-642-13059-5_5.
  • [10] N. Djuric, J. Zhou, R. Morris, M. Grbovic, V. Radosavljevic, N. Bhamidipati, Hate speech detection with comment embeddings, in: 24th international conference on World Wide Web, ACM, 2015, pp. 29–30. doi:10.1145/2740908.2742760.
  • [11] J. H. Park, P. Fung, One-step and two-step classification for abusive language detection on Twitter, in: 1st Workshop on Abusive Language Online, ACL, 2017, pp. 41–45.
  • [12] J. Pavlopoulos, P. Malakasiotis, I. Androutsopoulos, Deep learning for user comment moderation, in: 1st Workshop on Abusive Language Online, ACL, 2017, pp. 25–35.
  • [13] H. Hosseini, S. Kannan, B. Zhang, R. Poovendran, Deceiving Google’s Perspective API built for detecting toxic comments, arXiv (2017) 1702.08138.
  • [14] H. Lee, A. Y. Ng, Spam deobfuscation using a hidden Markov model, in: 2nd Conference on Email and Anti-Spam, 2005.
  • [15] S. Rojas-Galeano, On obstructing obscenity obfuscation, ACM Transactions on the Web 11 (2) (2017) 12. doi:10.1145/3032963.
  • [16] D. Yin, Z. Xue, L. Hong, B. D. Davison, A. Kontostathis, L. Edwards, Detection of harassment on Web 2.0, in: WWW Workshop: Content Analysis in the Web 2.0, 2009, pp. 1–7.
  • [17] E. Papegnies, V. Labatut, R. Dufour, G. Linares, Impact of content features for automatic online abuse detection, in: International Conference on Computational Linguistics and Intelligent Text Processing, Springer, Berlin, DE, 2017, pp. 404–419. doi:10.1007/978-3-319-77116-8_30.
  • [18] J. Cheng, C. Danescu-Niculescu-Mizil, J. Leskovec, Antisocial behavior in online discussion communities, in: 9th International AAAI Conference on Web and Social Media, AAAI, 2015, pp. 61–70.
  • [19] K. Balci, A. A. Salah, Automatic analysis and identification of verbal aggression and abusive behaviors for online social games, Computers in Human Behavior 53 (2015) 517–526. doi:10.1016/j.chb.2014.10.025.
  • [20] P. Mutton, Inferring and visualizing social networks on Internet Relay Chat, in: 8th International Conference on Information Visualisation, IEEE, 2004, pp. 35–43. doi:10.1109/IV.2004.1320122.
  • [21] O. I. Osesina, J. P. McIntire, P. R. Havig, E. E. Geiselman, C. Bartley, M. E. Tudoreanu, Methods for extracting social network data from chatroom logs, in: Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR III, Vol. 8389 of Proceedings of SPIE, 2012, p. 83891H. doi:10.1117/12.920019.
  • [22] A. Gruzd, C. Haythornthwaite, Automated discovery and analysis of social networks from threaded discussions, in: International Network of Social Network Analysis Conference, 2008.
  • [23] A. Camtepe, M. S. Krishnamoorthy, B. Yener, A tool for Internet chatroom surveillance, in: International Conference on Intelligence and Security Informatics, Springer, Berlin, DE, 2004, pp. 252–265. doi:10.1007/978-3-540-25952-7_19.
  • [24] M. Forestier, J. Velcin, D. Zighed, Extracting social networks to understand interaction, in: International Conference on Advances in Social Networks Analysis and Mining, IEEE, 2011, pp. 213–219. doi:10.1109/ASONAM.2011.64.
  • [25] S. Tavassoli, M. Moessner, K. Zweig, Constructing social networks from semi-structured chat-log data, in: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, IEEE, 2014, pp. 146–149. doi:10.1109/ASONAM.2014.6921575.
  • [26] T. Sinha, I. Rajasingh, Investigating substructures in goal oriented online communities: Case study of Ubuntu IRC, in: IEEE International Advance Computing Conference, IEEE, 2014, pp. 916–922. doi:10.1109/IAdCC.2014.6779445.
  • [27] T. Anwar, M. Abulaish, A social graph based text mining framework for chat log investigation, Digital Investigation 11 (4) (2014) 349–362. doi:10.1016/j.diin.2014.10.001.
  • [28] K. Garimella, G. de Francisci Morales, A. Gionis, M. Mathioudakis, Quantifying controversy in social media, in: 9th ACM International Conference on Web Search and Data Mining, ACM, 2015, pp. 33–42. doi:10.1145/2835776.2835792.
  • [29] D. R. White, F. Harary, M. Sobel, M. Becker, The cohesiveness of blocks in social networks: node connectivity and conditional density, Sociological Methodology 31 (1) (2001) 305–359. doi:10.1111/0081-1750.00098.
  • [30] M. E. J. Newman, M. Girvan, Finding and evaluating community structure in networks, Physical Review E 69 (2) (2004) 026113. doi:10.1103/PhysRevE.69.026113.
  • [31] R. D. Luce, A. D. Perry, A method of matrix analysis of group structure, Psychometrika 14 (2) (1949) 95–116. doi:10.1007/BF02289146.
  • [32] S. Wasserman, K. Faust, Social Network Analysis: Methods and Applications, Vol. 8, Cambridge University Press, Cambridge, UK, 1994.
  • [33] M. E. J. Newman, Assortative mixing in networks, Physical Review Letters 89 (20) (2002) 208701. doi:10.1103/PhysRevLett.89.208701.
  • [34] P. Bonacich, Factoring and weighting approaches to status scores and clique identification, Journal of Mathematical Sociology 2 (1) (1972) 113–120. doi:10.1080/0022250X.1972.9989806.
  • [35] J. Kleinberg, Authoritative sources in a hyperlinked environment, Journal of the Association for Computing Machinery 46 (5) (1999) 604–632. doi:10.1145/324133.324140.
  • [36] L. Katz, A new status index derived from sociometric analysis, Psychometrika 18 (1) (1953) 39–43. doi:10.1007/bf02289026.
  • [37] P. F. Bonacich, Power and centrality: A family of measures, American Journal of Sociology 92 (5) (1987) 1170–1182. doi:10.1086/228631.
  • [38] S. Brin, L. E. Page, The anatomy of a large-scale hypertextual Web search engine, Computer Networks and ISDN Systems 30 (1998) 107–117. doi:10.1016/S0169-7552(98)00110-X.
  • [39] E. Estrada, J. A. Rodriguez-Velazquez, Subgraph centrality in complex networks, Physical Review E 71 (5) (2005) 056103. doi:10.1103/PhysRevE.71.056103.
  • [40] L. C. Freeman, A set of measures of centrality based on betweenness, Sociometry 40 (1) (1977) 35–41. doi:10.2307/3033543.
  • [41] A. Bavelas, Communication patterns in task-oriented groups, Journal of the Acoustical Society of America 22 (6) (1950) 725–730. doi:10.1121/1.1906679.
  • [42] F. Harary, Graph Theory, Addison-Wesley, 1969.
  • [43] S. B. Seidman, Network structure and minimum degree, Social Networks 5 (3) (1983) 269–287. doi:10.1016/0378-8733(83)90028-X.
  • [44] R. Guimerà, L. A. N. Amaral, Functional cartography of complex metabolic networks, Nature 433 (2005) 895–900. doi:10.1038/nature03288.
  • [45] N. Dugué, V. Labatut, A. Perez, Identifying the community roles of social capitalists in the Twitter network, in: IEEE/ACM International Conference on Advances in Social Network Analysis and Mining, IEEE, 2014, pp. 371–374. doi:10.1109/ASONAM.2014.6921612.
  • [46] M. E. Shaw, Group structure and the behavior of individuals in small groups, Journal Of Psychology 38 (1954) 139–149. doi:10.1080/00223980.1954.9712925.
  • [47] A. Barrat, M. Barthelemy, R. Pastor-Satorras, A. Vespignani, The architecture of complex weighted networks, Proceedings of the National Academy of Sciences 101 (11) (2004) 3747–3752. doi:10.1073/pnas.0400087101.
  • [48] D. J. Watts, S. H. Strogatz, Collective dynamics of ’small-world’ networks, Nature 393 (6684) (1998) 440–442. doi:10.1038/30918.
  • [49] R. S. Burt, Structural holes and good ideas, American Journal of Sociology 110 (2) (2004) 349–399. doi:10.1086/421787.
  • [50] L. C. Freeman, Centrality in social networks I: Conceptual clarification, Social Networks 1 (3) (1978) 215–239. doi:10.1016/0378-8733(78)90021-7.
  • [51] P. Bonacich, P. Lloyd, Eigenvector-like measures of centrality for asymmetric relations, Social Networks 23 (3) (2001) 191–201. doi:10.1016/S0378-8733(01)00038-7.
  • [52] M. Rosvall, C. T. Bergstrom, Maps of random walks on complex networks reveal community structure, Proceedings of the National Academy of Sciences 105 (4) (2008) 1118. doi:10.1073/pnas.0706851105.
  • [53] N. Dugué, V. Labatut, A. Perez, A community role approach to assess social capitalists visibility in the Twitter network, Social Network Analysis and Mining 5 (2015) 26. doi:10.1007/s13278-015-0266-0.
  • [54] G. Csardi, T. Nepusz, The igraph software package for complex network research, InterJournal 1695 (Complex Systems).
  • [55] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, E. Duchesnay, Scikit-learn: Machine learning in Python, Journal of Machine Learning Research 12 (2011) 2825–2830.
  • [56] P. J. Rousseeuw, Silhouettes: a graphical aid to the interpretation and validation of cluster analysis, Computational and Applied Mathematics 20 (1987) 53–65. doi:10.1016/0377-0427(87)90125-7.
  • [57] A. Rumshisky, M. Gronas, P. Potash, M. Dubov, A. Romanov, S. Kulshreshtha, A. Gribov, Combining network and language indicators for tracking conflict intensity, in: International Conference on Social Informatics, Springer, Berlin, DE, 2017, pp. 391–404. doi:10.1007/978-3-319-67256-4_31.