Open hamedwaezi01 opened 1 year ago
@hamedwaezi01 very nice summary. I'm happy that what we were thinking was followed by others. So, we're in the right track!
@hamedwaezi01 so, they could reproduce Ebrahimi's work? or just report the values? Also, now this becomes an important baseline for the project, what do you think?
Actually, they only reported the results of Ebrahimi's and did not mention any implementation. About the baseline, their best results were driven from the Ridge classifier and the Naïve Bayes classifier none of which is a neural network. Additionally, I saw a 2022 paper by the same author, Bours, and would like to have a look at it. Its title is 'Predatory Conversation Detection Using Transfer Learning Approach'.
Detection of Cyber Grooming in Online Conversation Patrick Bours, Halvor Kulsrud December 2019
Why I chose this paper? It was a 2019 paper and they used various algorithms. They also tried to detect the predator in the early phases of conversations and, as they said, no one has done the same thing before. Their metrics were an F-0.5 score and an F-2 score which shows they did care about different aspects of the topic.
The main problem: finding a predator in an online conversation
The minor problem: finding a predator in an online conversation as soon as possible.
Applications: Automatic detection of online predators in a conversation in the early stages of the conversation
Existing Works: Villatoro-Tello et al (winner of PAN2012) Eriksson and Karlgren (5th place of PAN2012) (high recall 0.8937, precision 0.8566) Ebrahimi et al; used CNN on PAN2012 (2016) Pandey et al; on full Perverted Justice dataset (Detecting predatory behavior from online textual chats) Gunawan et al (Detecting online child grooming conversation)
Method: They first preprocessed the PAN2012 data, then created Bag of Words (BoW) and Term Frequency-Inverse Document Frequency (TF-IDF) feature sets.
They used three approaches and five classification algorithms. The approaches: Messaged-based detection (MBD), author-based detection (ABD), conversation-based detection (CBD) Classification algorithms: Logistic Regression, Ridge, Naïve Bayes, SVM, Neural Network
Input and Output:
Gaps: the authors did not talk about the details of their neural network. in the CBD method, they just used the phase one results of one of the algorithms for the second phase algorithms.
Results:
MBD: Only applied on Logistic Regression and Ridge
ABD: All 5 classifiers were used. NN worked better on TF-IDF for the F-0.5 score. And NN with BoW returned a better F-2 score.
CBD Phase 1: F-0.5 and F-2 with TF-IDF showed significantly better results than that of BoW. And SVM scores were the highest with 0.974 and 0.910
CBD FULL: Used the output of the SVM and TF-IDF combination of phase 1 as input for the 5 other classifiers. Naïve Bayes and TF-IDF showed better F-0.5 scores but the best F-2 score was for Ridge and TF-IDF. Also, TF-IDF and NB's F-0.5 were slightly higher than that of Ridge and TF-IDF.
Did they answer the question? The author concluded that the ABD approach alongside NN with TF-IDF works well. In overall, TF-IDF results were always more prominent
Early detection Almost all the classifiers needed at least 36 messages of conversation to have a recall over 0.8. For a precision of over 0.8 the classifiers needed at least 21 messages.
Also, they used 10 full Perverted Justice conversations for the early detection step. Using CBD, SVM and TF-IDF for phase 1, and NB for the second phase. In most cases, 10% of the conversation was needed (their lengths were on average around 3000 messages).