{"id":1881,"date":"2016-09-19T15:46:56","date_gmt":"2016-09-19T19:46:56","guid":{"rendered":"http:\/\/wordpress.cs.vt.edu\/csblog\/?p=1881"},"modified":"2016-09-19T15:46:56","modified_gmt":"2016-09-19T19:46:56","slug":"bert-huangs-great-innovative-idea-featured-in-computing-community-consortium-blog","status":"publish","type":"post","link":"https:\/\/wordpress.cs.vt.edu\/csblog\/2016\/09\/19\/bert-huangs-great-innovative-idea-featured-in-computing-community-consortium-blog\/","title":{"rendered":"Bert Huang&#8217;s Great Innovative Idea featured in Computing Community Consortium Blog"},"content":{"rendered":"<p>One of my research topics that I\u2019m most passionate about is on developing machine learning algorithms that detect cyberbullying in social media. Cyberbullying is a serious public health threat that is detrimentally shaping the online experience. And while Internet technology is rapidly amplifying our ability to communicate, it\u2019s important to develop complementary technology to help mitigate the harm of such detrimental communication.<\/p>\n<div>\n<p>Computer programs that detect online harassment could allow automatic interventions, e.g., providing advice to those involved, but we don\u2019t yet have machine learning algorithms that can handle the scale, the structure, and the rapidly changing nature of cyberbullying. Standard approaches for classification are hindered by the cost of labeling bullying examples and the need for social context to differentiate bullying from other less harmful behavior.<\/p>\n<\/div>\n<div>\n<p>My group is developing machine learning algorithms that use weak supervision, where the input to the algorithm isn\u2019t whether each interaction is bullying, but general indicators of bullying, such as offensive language. The algorithms try to extrapolate from that using social media data, considering who\u2019s sending and receiving messages with the provided indicators, and the overall structure of the relationships in the data. The algorithms do collective, data-driven discovery of who is bullying, who\u2019s being bullied, and what additional vocabulary is indicative of bullying.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.cccblog.org\/2016\/09\/13\/great-innovative-idea-weakly-supervised-cyberbullying-detection-in-social-media\/\">Read the Full Blog<\/a><\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_1882\" class=\"thumbnail wp-caption alignnone\" style=\"width: 160px\"><img loading=\"lazy\" decoding=\"async\" class=\"size-thumbnail wp-image-1882\" src=\"http:\/\/wordpress.cs.vt.edu\/csblog\/wp-content\/uploads\/sites\/6\/2016\/09\/Bert-Huang-150x150.jpg\" alt=\"Bert Huang\" width=\"150\" height=\"150\" srcset=\"https:\/\/wordpress.cs.vt.edu\/csblog\/wp-content\/uploads\/sites\/6\/2016\/09\/Bert-Huang-150x150.jpg 150w, https:\/\/wordpress.cs.vt.edu\/csblog\/wp-content\/uploads\/sites\/6\/2016\/09\/Bert-Huang-60x60.jpg 60w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><figcaption class=\"caption wp-caption-text\">Bert Huang<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>The following Great Innovative Idea is from\u00a0<a href=\"http:\/\/people.cs.vt.edu\/%7Ebhuang\/Bert_Huang\/Home.html\">Bert Huang<\/a>, Assistant Professor of <a href=\"https:\/\/www.cs.vt.edu\/\">Computer Science<\/a> at <a href=\"http:\/\/www.vt.edu\/index.html\">Virginia Tech<\/a>.\u00a0 Huang presented his poster, <a class=\"mfp-iframe\" href=\"https:\/\/www.youtube.com\/watch?time_continue=3&amp;v=fBe7rIXwp8Y\">Weakly Supervised Cyberbullying Detection in Social Media<\/a>, at the <a href=\"http:\/\/cra.org\/ccc\/events\/computing-innovation-societal-needs-the-impact-of-computing-research\/\">CCC Symposium on Computing Research<\/a>, May 9-10, 2016.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of my research topics that I\u2019m most passionate about is on developing machine learning algorithms that detect cyberbullying in social media. Cyberbullying is a serious public health threat that is detrimentally shaping the online experience. And while Internet technology is rapidly amplifying our ability to communicate, it\u2019s important to develop complementary technology to help [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,1],"tags":[],"class_list":["post-1881","post","type-post","status-publish","format-standard","hentry","category-faculty","category-news"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/wordpress.cs.vt.edu\/csblog\/wp-json\/wp\/v2\/posts\/1881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wordpress.cs.vt.edu\/csblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wordpress.cs.vt.edu\/csblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.cs.vt.edu\/csblog\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.cs.vt.edu\/csblog\/wp-json\/wp\/v2\/comments?post=1881"}],"version-history":[{"count":3,"href":"https:\/\/wordpress.cs.vt.edu\/csblog\/wp-json\/wp\/v2\/posts\/1881\/revisions"}],"predecessor-version":[{"id":1885,"href":"https:\/\/wordpress.cs.vt.edu\/csblog\/wp-json\/wp\/v2\/posts\/1881\/revisions\/1885"}],"wp:attachment":[{"href":"https:\/\/wordpress.cs.vt.edu\/csblog\/wp-json\/wp\/v2\/media?parent=1881"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wordpress.cs.vt.edu\/csblog\/wp-json\/wp\/v2\/categories?post=1881"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wordpress.cs.vt.edu\/csblog\/wp-json\/wp\/v2\/tags?post=1881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}