Home Technology peripherals AI Use AI to combat keyboard warriors and internet trolls, and protect the lives of those who are bullied online

Use AI to combat keyboard warriors and internet trolls, and protect the lives of those who are bullied online

May 06, 2023 pm 04:55 PM
ai Internet violence

Use AI to combat keyboard warriors and internet trolls, and protect the lives of those who are bullied online

A girl born in 1995 committed suicide because she posted a blog post online.

Use AI to combat keyboard warriors and internet trolls, and protect the lives of those who are bullied online

##After the release of this tender blog post, the protagonist Zheng Linghua encountered a lot of rumors and abuse.

Some people questioned her identity and spread rumors that she was a "barmaid" just because her hair was pink; some people spread rumors that she was a "young and old lover" and a "cha-flow" , a "liar" who spread rumors that she was taking advantage of her grandfather's illness to make money.

This is so unsightly. Although many media refuted the rumors, Zheng Linghua did not receive an apology. Even when Zheng Linghua took up legal weapons to defend his rights, he was still harassed.

In the end, Zheng Linghua suffered from depression and ended his life not long ago.

Such things have happened many times on the Internet. This kind of "terrible words" that permeate the Internet world not only makes people feel disgusted, but can even take people's lives. There is also a special term for this behavior - cyber violence, or "cyber violence" for short.

So today, when AI can already communicate with humans fluently, can AI play a role in identifying cyber atrocities?

Overcoming two major difficulties, the accuracy rate of identifying online violent comments exceeds 90%

Although most Internet platforms have already launched some special recognition systems Speech systems, but most of these systems only detect and delete key words, which is obviously not smart enough. You can circumvent these restrictions with a little attention.

In fact, to accurately identify online violent remarks, two things need to be done:

    How to accurately identify online violent remarks based on the context?
  • How to effectively identify online violent comments?

The first point to pay attention to is the content of cyber violence remarks, because most letters and messages on the Internet are segmented, and cyber violence often occurs during conversations. Gradually it becomes serious and eventually leads to negative consequences.

The second point of concern is speed. After all, in the Internet environment, there is too much data to be processed. If the detection takes a long time, then this system will have no practical value and will not be adopted.

Use AI to combat keyboard warriors and internet trolls, and protect the lives of those who are bullied online

#A team of researchers in the UK has developed a new artificial intelligence model called BiCapsHate that overcomes The research results of these two challenges were published in a paper in "IEEE Transactions on Computational Social Systems" on January 19.

Use AI to combat keyboard warriors and internet trolls, and protect the lives of those who are bullied online

The model consists of five layers of deep neural network, which starts with an input layer, processes the input text, and then to An embedding layer embeds text into a numerical representation, then a BiCaps layer learns sequential and linguistic context representations, a dense layer prepares the model for final classification, and finally an output layer outputs the results.

The BiCaps layer is the most important component. It effectively obtains contextual information in different directions before and after the input text through capsule networks. Make your model even more informative thanks to a wealth of hand-tuned shallow and deep auxiliary functions (including Hatebase dictionaries). The researchers conducted extensive experiments on five benchmark datasets to demonstrate the effectiveness of the proposed BiCapsHate model. Overall results show that BiCapsHate outperforms existing state-of-the-art methods, including fBERT, HateBERT and ToxicBERT.

On balanced and unbalanced data sets, BiCapsHate achieved 94% and 92% f-score accuracy respectively.

Fast and can run on GPU

Tarique Anwar is a lecturer in the Department of Computer Science at the University of York, He participated in this research. He noted that online debates often result in negative, hateful and abusive trolling comments, which cannot be controlled by existing content moderation practices on social media platforms.

He said: "In addition, online hate speech sometimes reflects the real environment, leading to crime and violence." Tariq Anwar also said that online hate speech leads to physical violence There were several instances of rioting.

Use AI to combat keyboard warriors and internet trolls, and protect the lives of those who are bullied online

#To help solve this problem, Tariq Anwar’s team decided to develop BiCapsHate and achieved very good results. Effect.

As Anwar points out, language can be ambiguous in some cases, i.e. a word can be positive in one context and negative in another. Previous models were not good enough in this regard, such as HateBERT, toxicBERT and fBERT. These artificial intelligences can capture context to a certain extent, but Tariq Anwar believes that "these are still not good enough."

Another advantage of BiCapsHate is the model’s ability to perform computations using limited hardware resources. "[Other models] require high-end hardware resources like GPUs, and high-end systems for computing," Tariq Anwar explained. "In contrast, BiCapsHate... can be executed on a CPU machine, even if you only have 8GB of memory."

It is worth noting that this artificial intelligence has been developed and tested so far , is only designed to analyze English speech, so it will need to be adapted into other languages. It's also less good at spotting offensive words with a mild or subtle hateful tone than more intense hate speech.

The researchers hope to next explore ways to assess the mental health of users who express hate online. If one is concerned that the person is mentally unstable and may be physically violent toward people in the real world, early intervention may be considered to reduce the likelihood of this occurring. ​

The above is the detailed content of Use AI to combat keyboard warriors and internet trolls, and protect the lives of those who are bullied online. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to optimize the performance of debian readdir How to optimize the performance of debian readdir Apr 13, 2025 am 08:48 AM

In Debian systems, readdir system calls are used to read directory contents. If its performance is not good, try the following optimization strategy: Simplify the number of directory files: Split large directories into multiple small directories as much as possible, reducing the number of items processed per readdir call. Enable directory content caching: build a cache mechanism, update the cache regularly or when directory content changes, and reduce frequent calls to readdir. Memory caches (such as Memcached or Redis) or local caches (such as files or databases) can be considered. Adopt efficient data structure: If you implement directory traversal by yourself, select more efficient data structures (such as hash tables instead of linear search) to store and access directory information

How to implement file sorting by debian readdir How to implement file sorting by debian readdir Apr 13, 2025 am 09:06 AM

In Debian systems, the readdir function is used to read directory contents, but the order in which it returns is not predefined. To sort files in a directory, you need to read all files first, and then sort them using the qsort function. The following code demonstrates how to sort directory files using readdir and qsort in Debian system: #include#include#include#include#include//Custom comparison function, used for qsortintcompare(constvoid*a,constvoid*b){returnstrcmp(*(

How to set the Debian Apache log level How to set the Debian Apache log level Apr 13, 2025 am 08:33 AM

This article describes how to adjust the logging level of the ApacheWeb server in the Debian system. By modifying the configuration file, you can control the verbose level of log information recorded by Apache. Method 1: Modify the main configuration file to locate the configuration file: The configuration file of Apache2.x is usually located in the /etc/apache2/ directory. The file name may be apache2.conf or httpd.conf, depending on your installation method. Edit configuration file: Open configuration file with root permissions using a text editor (such as nano): sudonano/etc/apache2/apache2.conf

How Debian OpenSSL prevents man-in-the-middle attacks How Debian OpenSSL prevents man-in-the-middle attacks Apr 13, 2025 am 10:30 AM

In Debian systems, OpenSSL is an important library for encryption, decryption and certificate management. To prevent a man-in-the-middle attack (MITM), the following measures can be taken: Use HTTPS: Ensure that all network requests use the HTTPS protocol instead of HTTP. HTTPS uses TLS (Transport Layer Security Protocol) to encrypt communication data to ensure that the data is not stolen or tampered during transmission. Verify server certificate: Manually verify the server certificate on the client to ensure it is trustworthy. The server can be manually verified through the delegate method of URLSession

Debian mail server SSL certificate installation method Debian mail server SSL certificate installation method Apr 13, 2025 am 11:39 AM

The steps to install an SSL certificate on the Debian mail server are as follows: 1. Install the OpenSSL toolkit First, make sure that the OpenSSL toolkit is already installed on your system. If not installed, you can use the following command to install: sudoapt-getupdatesudoapt-getinstallopenssl2. Generate private key and certificate request Next, use OpenSSL to generate a 2048-bit RSA private key and a certificate request (CSR): openss

How debian readdir integrates with other tools How debian readdir integrates with other tools Apr 13, 2025 am 09:42 AM

The readdir function in the Debian system is a system call used to read directory contents and is often used in C programming. This article will explain how to integrate readdir with other tools to enhance its functionality. Method 1: Combining C language program and pipeline First, write a C program to call the readdir function and output the result: #include#include#include#includeintmain(intargc,char*argv[]){DIR*dir;structdirent*entry;if(argc!=2){

Debian mail server firewall configuration tips Debian mail server firewall configuration tips Apr 13, 2025 am 11:42 AM

Configuring a Debian mail server's firewall is an important step in ensuring server security. The following are several commonly used firewall configuration methods, including the use of iptables and firewalld. Use iptables to configure firewall to install iptables (if not already installed): sudoapt-getupdatesudoapt-getinstalliptablesView current iptables rules: sudoiptables-L configuration

How to learn Debian syslog How to learn Debian syslog Apr 13, 2025 am 11:51 AM

This guide will guide you to learn how to use Syslog in Debian systems. Syslog is a key service in Linux systems for logging system and application log messages. It helps administrators monitor and analyze system activity to quickly identify and resolve problems. 1. Basic knowledge of Syslog The core functions of Syslog include: centrally collecting and managing log messages; supporting multiple log output formats and target locations (such as files or networks); providing real-time log viewing and filtering functions. 2. Install and configure Syslog (using Rsyslog) The Debian system uses Rsyslog by default. You can install it with the following command: sudoaptupdatesud

See all articles