Identifying Offensive Posts and Targeted Offense from Twitter

by   Haimin Zhang, et al.
IIIT Delhi
Delhi Technological University

In this paper we present our approach and the system description for Sub-task A and Sub Task B of SemEval 2019 Task 6: Identifying and Categorizing Offensive Language in Social Media. Sub-task A involves identifying if a given tweet is offensive or not, and Sub Task B involves detecting if an offensive tweet is targeted towards someone (group or an individual). Our models for Sub-task A is based on an ensemble of Convolutional Neural Network, Bidirectional LSTM with attention, and Bidirectional LSTM + Bidirectional GRU, whereas for Sub-task B, we rely on a set of heuristics derived from the training data and manual observation. We provide detailed analysis of the results obtained using the trained models. Our team ranked 5th out of 103 participants in Sub-task A, achieving a macro F1 score of 0.807, and ranked 8th out of 75 participants in Sub Task B achieving a macro F1 of 0.695.


page 3

page 5

page 6


Suggestion Mining from Online Reviews using ULMFiT

In this paper we present our approach and the system description for Sub...

UBC-NLP at SemEval-2019 Task 6:Ensemble Learning of Offensive Content With Enhanced Training Data

We examine learning offensive content on Twitter with limited, imbalance...

MeToo Tweets Sentiment Analysis Using Multi Modal frameworks

In this paper, We present our approach for IEEEBigMM 2020, Grand Challen...

WOLI at SemEval-2020 Task 12: Arabic Offensive Language Identification on Different Twitter Datasets

Communicating through social platforms has become one of the principal m...

Bidirectional Recurrent Models for Offensive Tweet Classification

In this paper we propose four deep recurrent architectures to tackle the...

Turing at SemEval-2017 Task 8: Sequential Approach to Rumour Stance Classification with Branch-LSTM

This paper describes team Turing's submission to SemEval 2017 RumourEval...

Please sign up or login with your details

Forgot password? Click here to reset