R Ma, Y You, X Gui, Y Kou - Proceedings of the ACM on Human …, 2023 - dl.acm.org
Researchers across various fields have investigated how users experience moderation through different perspectives and methodologies. At present, there is a pressing need of …
This study is an empirical investigation into the semantic vulnerabilities of four popular pre- trained commercial Large Language Models (LLMs) to ideological manipulation. Using …
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in seemingly contradictory results and expands the boundaries of known discoveries …
Recent research has suggested that there are clear differences in the language used in the Dark Web compared to that of the Surface Web. As studies on the Dark Web commonly …
W Zhu, S Bhat - arXiv preprint arXiv:2106.01625, 2021 - arxiv.org
Countermeasures to effectively fight the ever increasing hate speech online without blocking freedom of speech is of great social interest. Natural Language Generation (NLG), is …
M Gavidia, P Lee, A Feldman, J Peng - arXiv preprint arXiv:2205.02728, 2022 - arxiv.org
Euphemisms have not received much attention in natural language processing, despite being an important element of polite and figurative language. Euphemisms prove to be a …
To curb the problem of false information, social media platforms like Twitter started adding warning labels to content discussing debunked narratives, with the goal of providing more …
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and E2EE data storage is becoming common. These important advances for security and privacy …
W Zhu, S Bhat - arXiv preprint arXiv:2109.04666, 2021 - arxiv.org
It is a well-known approach for fringe groups and organizations to use euphemisms-- ordinary-sounding and innocent-looking words with a secret meaning--to conceal what they …