WO2022055546A1 - Method and system to filter out unwanted content from incoming social media data - Google Patents

Method and system to filter out unwanted content from incoming social media data Download PDF

Info

Publication number
WO2022055546A1
WO2022055546A1 PCT/US2021/017120 US2021017120W WO2022055546A1 WO 2022055546 A1 WO2022055546 A1 WO 2022055546A1 US 2021017120 W US2021017120 W US 2021017120W WO 2022055546 A1 WO2022055546 A1 WO 2022055546A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
content
text
classifier
user
Prior art date
Application number
PCT/US2021/017120
Other languages
French (fr)
Inventor
Corinne David
Original Assignee
Corinne David
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US16/786,225 external-priority patent/US11126678B2/en
Priority claimed from US17/168,838 external-priority patent/US11170064B2/en
Application filed by Corinne David filed Critical Corinne David
Publication of WO2022055546A1 publication Critical patent/WO2022055546A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • G06N20/10Machine learning using kernel methods, e.g. support vector machines [SVM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/01Dynamic search techniques; Heuristics; Dynamic trees; Branch-and-bound

Definitions

  • the disclosed method and system offer a solution at the point where data are received.
  • the system filters any media including but not limited to text, images, audio, and video.
  • Incoming data is filtered through a classifier.
  • a set of trained Machine Learning (ML) classifier models separate unwanted content and assign it to a separate set.
  • Only acceptable content is displayed on the main screen but the user retains the ability to access the filtered out material.
  • the acceptable content comprises any neutral content including but not limited to positive and neutral. Reporting of the harassment is automated, obviating the need for the user to take affirmative steps for each instance of harassment.
  • the main benefits of the system are: first, to filter out any unwanted content comprising but not limited to harassment, threat, abuse, sexual aggression, religious aggression, fake news, and fake videos prior to viewing by recipients; second to automate reporting.
  • harassment comprises threats, abuse, sexual, religious, and gender aggressions. 2 Cross-Reference
  • ML algorithms are used to train known labeled data for predicting the label of unlabeled data. This computational process is called a “classifier.” Classifiers can be applied to text, images, audio, and video. In the 1990s, a variety of text classification techniques started to demonstrate reasonable performance (Nigam et al., 1999).
  • Patent No. US 10031977 issued on July 24, 2018, to Maycock describes a solution to the problem of harassment on social media.
  • May cock’s patent solves the issue by filtering the data at the operating system level of the user device. But accessing the operating system (called “jailbreaking“) may violate user licensing agreements and the law. (See 17 U.S.C. ⁇ 1201).
  • the disclosed system proposes to resolve the issue at a higher level without need to access the operating system. Instead, to access data, an inter-process technology communication system is used including but not limited to an Application Programming Interface (API), Representational State Transfer Rest (Rest API), and Webhook.
  • API Application Programming Interface
  • Rest API Representational State Transfer Rest
  • Webhook Webhook
  • Fig. 1 - Classifiers filter out harassment from incoming data from different platforms.
  • FIG. 3 Portal to access the different social media platform data.
  • Fig. 5 Algorithm to find the text on an image to filter out harassment.
  • Fig. 6 Folder structure to enter data into the ML classifiers.
  • Fig. 7 Tools for extracting features from text, natural language, and machine learning.
  • Fig. 9 Training and test data to train and test ML classifier to create a model.
  • Fig. 10B Improving the results by comparing the Core ML and Auto ML classifiers.
  • Fig. 11 System sender side.
  • Fig. 12 Process of customization of the ML models.
  • FIG. 13 Overview of data filtered with a customized ML model.
  • the method, system, and product comprise several components: Receiver Side, Rest API, Webhook, a user application running on devices, data collection, training, evaluation and deployment of ML models on the user device, reports, and any additional programs to process and validate the data and the labeling.
  • Fig. 1 describes the incoming data 56, which are in text, image, video, and audio format.
  • the data from any social media platforms 52, 53, 54, 55 are processed to solve the harassing issue on social media.
  • Any classifier models comprising Apple Core ML, Google Auto ML, or AWS ML determine if the incoming data 56 is harassing.
  • the classifier models separate the data into sets comprising the harassment data set 62 and the neutral data set 61. Only the neutral data are displayed to the receiver’s main screen; the harassing content is filtered out.
  • the classification process is similar to the ML classifiers used to filter out spam from emails.
  • the system uses any classifier including but not limited to the Apple Core ML classifier to create classifier models for the iPhone. For Android phones, the system uses but is not limited to AutoML provided by Google.
  • ML classifiers process incoming image, audio, and video data to detect unwanted content. Also, an additional text classifier is trained with fake news data in order to detect incoming fake news. The results of all the classifiers are combined to finalize the result. The incoming data from each platform are processed with a set of classifiers that were previously trained with its own labeled data to create a data-specific model.
  • Fig. 2 describes how the system processes the incoming data 56 and how the data is transferred.
  • ML classifier models 57, 58, 59, 60 are applied to the incoming data either on the device 108 or on the server 105 in order to filter out unwanted content.
  • the results from the classifiers are analyzed to make the final decision.
  • Social media platforms transfer the content of user data to a third party via an API that provides access that could be Rest API or Webhook depending on their own internal social media platform rules.
  • the data are routed via two different paths, one path directly from social media platforms to the user device via Rest API 102 and the other from the social media platform to the server 105 and then to the user device 108 via Webhook 103.
  • the data are usually delivered in JSON format.
  • Social media platforms 104 provide access to user data to third parties when the users input their username and password. The system does not have access to the latter two.
  • the user runs the user application 116 to seek an authorization request 101 from the social media platform 104 to allow the application to access the user’s data.
  • the social media platform provides a token to allow for continuous access. By saving the session, the user is able to re-enter the application without having to log in again.
  • the function of the Rest API is to pull the data. It provides a communication protocol between the user’s device 108 and the social media platforms. After authorization is granted, the protocol allows the user to request and receive data.
  • the social media platform 104 transfers the data directly to the application 116 via Rest API 102.
  • Webhook 103 The function of the Webhook is to push the data to the server.
  • Webhook 103 is typically used to transfer large amounts of data. No request for data is required.
  • the social media platform sends data when it becomes available.
  • the use of Webhook 103 requires registration of a Unified Resource Location (URL) through a domain service provider. The URL becomes the endpoint where the data are received on the server 105.
  • URL Unified Resource Location
  • the social media platform 104 sends the data via Webhook to the end-point on the server.
  • the server listens for user content at the end-point.
  • the system hardware needs to be expandable to accommodate increasing numbers of users and development growth.
  • the different ML classifiers require the system to have high processing power.
  • Platforms that provide high Central Processing Units (CPUs) usage and memory that are expandable comprise Google Cloud, AWS Amazon, and like.
  • the server processes, labels, and stores labeled data in any media and in multiple languages 115; trains, retrains, and validates different sets of ML classifiers for each language and each data type 114; and runs additional programs 112.
  • These programs 112 collect harassment data; process text, images, audio, and video; and create reports of the harassment or fake news.
  • the programs 112 will integrate additional functionalities.
  • the system runs on several cloud servers across different geographic regions.
  • the data are in English and Italian, and the text classifier models are trained with English labeled content and Italian labeled content. In future versions, the system will process additional languages and emoji.
  • the specific hashtag searches return a series of tweets containing harassing terms. Those tweets are labeled and added to the existing set.
  • the program also allows searches for specific Twitter users to train the model to be exposed to different styles of writing. For instance, the program searched for former President Obama’s tweets. After validating their content, those tweets were added to the labeled neutral data set for purposes of training. Later, the model was tested with Michelle Obama's tweets.
  • Fig. 2 shows the user application 116 running on any user device comprising iPhone, iPad, Android, Samsung, and Window mobile 108.
  • the data is received via any inter-process communication technology including but not limited to Rest API or Webhook.
  • the application runs the processes 111, compromising the classifier models 65 that filter unwanted content in real-time on the incoming data; the other component 109 represents what is displayed on the device.
  • Unwanted content is separated but can still be accessed with any clickable or sliding area including but not limited to the TabBar icon 110 at the bottom of the display.
  • the user can modify the labeling if the user considers the separated content as not harassing. Vice versa, neutral content can be labeled as harassing by sliding the content on the screen and moving it to a different category.
  • the modifications made by the user are sent to the server to retrain the Model with the individual user preferences.
  • the ML model will be trained or retrained with data based on what users define to be harassment or not.
  • a report 107 is sent for further proceedings on solving the harassment issue.
  • Fig. 3 shows an application Graphic User Interface (GUI ) 206, a portal to access any social media platforms comprising Twitter 201, Facebook 202, Instagram 203, Reddit 204, and others 205.
  • GUI Graphic User Interface
  • the portal allows users to navigate from one social media platform to another in order to access their user data from that platform without being subjected to unwanted content.
  • Fig. 3 shows radio buttons; however, any GUI with functionality including but not limited to sliding or clicking such as a TabBar could be used instead of a radio button to access the social media data.
  • ML classifiers 57, 58, 59, 60 are trained on the server and run either on the server 105 or the user device 108.
  • Fig. 4 describes how the bag-of-words 301 acts as an adaptive filter to reduce text classifier inaccuracy.
  • the system trains text classifiers including but not limited to the Apple Core ML, Google AutoML, AWS ML, Windows ML, and Python ML.
  • the trained model when used with real-time data, is initially not 100% accurate. The accuracy of the model is then improved by increasing the size of the labeled data set by collecting more labeled data from different sources.
  • the system uses a filter which is called a bag-of-words.
  • the bag-of-words acts as an adaptive filter by catching content as yet unknown to the model.
  • the model is retrained with the unknown content that has been classified by the bag-of-words filter as harassment.
  • the bag-of-words is subdivided into five sets, a number that can be increased.
  • the first set is hardcore harassing terms.
  • the second set has words evincing a milder harassing tone.
  • the third set has terms that have a double meaning, with one of the meanings being harassing.
  • the fourth set contains phrases connecting the sub-list of "bad actions" with the sub-list of the intended recipient of those bad actions and the fifth set contains emojis.
  • the number of sets might increase with the data needs.
  • Content defined as harassing has at least one word from the first, fourth, or fifth set.
  • the neutral content may include words from the set with moderate words (e.g., the word “stupid”) and/or the set with double meaning terms.
  • Language detection 302 determines the language of the data. Then, a corresponding text classifier 57 is loaded to process the incoming data 56. The classifier labels the incoming content as harassing or neutral. In parallel, the data go through the bag-of-words filter 301. While the bag-of- words can aid to detect explicit abuse, it is used most effectively in reinforcing the model to be more accurate by detecting the unknown terms with which to retrain the model.
  • Results from the model and the bag-of-words filter are compared 303. If the model and filter results are the same, then the data are placed in the corresponding category 304. If the results differ 305, the decision of the filter overrides the one by the model. The discrepancy between model and filter results is reported to the server for analysis. On the server 105, the data collected with the correct label is used to retrain the model 310.
  • the system in addition to detecting harassment in text, also detects harassment on image content. Some images contain text; others do not. If the image contains a text, the system detects the text. Fig- 5 describes how to capture harassment on the text content of images 56, by applying an Optical Characters Recognition (OCR) 402 to perform text detection on the image. Once captured 403, the text is passed through the ML text classifier model 57 to detect harassment. If harassment is detected in text 406, then the label for text content is set to harassing. If the text does not have harassing content the label for the text is set as neutral 405.
  • OCR Optical Characters Recognition
  • the system After labeling the text, the system applies a set of processes 115 on the image to extract its features: color histogram; texture; edge-direction coherence vector, Fast Fourier Transform (FFT), face detection, and object detection, among others.
  • the extracted features are entered as the parameter of the training of the model.
  • the model is then run against the image data, a process that will result in the categorization of image content as harassing or neutral.
  • the Apple Vision framework works with Core ML by applying classification models to images and preprocessing those images to make machine learning tasks easier and more reliable.
  • the open-source MobileNet model one of several available classification models, identifies an image using 1000 classification categories.
  • Another available model is Visual Geometry Group (VGG), a convolutional neural network model proposed by K. Zisserman from the University of Oxford in the paper, “Very Deep Convolutional Networks for Large-Scale Image Recognition.”
  • VGG Visual Geometry Group
  • the VGG model achieves 92.7% top-5 test accuracy in ImageNet,
  • the image is run through the image classifier model 58 to determine if the image is harassing or not.
  • Which image classifier is used depends on the operating system of the user device (Core ML with Apple Vision framework for Apple; AutoML Vision for Google; Windows ML for Windows).
  • Multiple Python ML vision libraries (including but not limited to TensorFlow and Keras image classifiers) train models that run on any operating system.
  • Final decision 407 is if either the image or the text is harassing, then the tweet content is labeled as harassment 409; otherwise, it is labeled as neutral 408.
  • ML Image Classifiers 501 is trained with an input of data 56 comprising of images that need to be categorized before the classifier can learn to recognize the images.
  • the categorization is done by naming folders.
  • a data source provides training or testing data to an ML image classifier 501.
  • the data are organized on disk to be compatible with the ML Image classifier data source, the classifier 501 is initialized with the data source, a URL of the directory that contains the data.
  • Fig. 6 shows two folders, one named Training Data 503, and the other Testing Data 502. Each folder is organized with subfolders that have been labeled with the name of the category Harassing 504 and Neutral 505.
  • the images are located in the appropriate subfolders for each data category. No duplicate images are allowed in the data source.
  • the ML Vision classifier model 58 is uploaded to the user mobile device to predict the content of received images in the user social media content.
  • YouTube-8M Segments dataset is an extension of the YouTube-8M dataset with human-verified segment annotations.
  • the entities in the videos are temporally localized.
  • YouTube-8M is a large-scale labeled video dataset that comprises of millions of YouTube video IDs, with high- quality machine-generated annotations from a diverse vocabulary of 3,800+ visual entities. It comes with precomputed audio-visual features from billions of frames and audio segments.
  • the Core ML video classifier runs with the Apple Vision framework to recognize, track objects, categorize, and filter out harassing videos.
  • AutoML Video Intelligence Classification enables the training of machine learning models to classify shots and segments of video data according to labels. These models track objects in video data according to labels (harassment and neutral). The data is presented to the video classifier in the same way as shown in Fig. 6. Instead of having images in the folder, folder content of videos.
  • Multiple Python ML vision libraries including but not limited to TensorFlow and Kera video classifier models, run on any operating system.
  • a model that extracts the audio part of the video comprises the VGGish model.
  • the VGGish uses the same architecture as the VGG model and replaces the input image with an audio spectrogram (Hershey et al., 2017).
  • Audio clips are input to a different audio classifier to filter out unwanted content.
  • One classifier is trained with intonation clips while another is trained with audio clips that emphasize content.
  • the content of the audio is grabbed with an audio to text converter. The text is then fed to a text classifier to filter out unwanted content.
  • the results of the three classifiers are analyzed to determine if unwanted content is present.
  • a sound classifier e.g., Apple Sound classifier with Sound Analysis framework
  • the model is trained with the awareness of the ambient noise of the environment.
  • speech recognition and voice analytics provide additional tools for the audio classifier model.
  • the sound classification used by the Core ML model is using the SoundAnalysis and AVKit frameworks.
  • the incoming audio content has its features extracted.
  • the data is presented to the audio classifier in the same way as shown in Fig. 6. Instead of having images in the folder, the folder content comprises of audio clips.
  • the audio classifier model 60 is uploaded on the mobile device to process real-time audio data to filter out harassment.
  • fake news we define false information that can be verified as not true.
  • a sizeable data set is needed for purposes of training the model. Each item of the set is labeled as “fake” or “real.”
  • the data set is gathered by scraping data from lists that contain different websites that are known for posting unwanted content, such as the list provided by https://mediabiasfactcheck.com, a Media Bias/Fact Check website and the Washington Post fact-checking website. Additional fact-checking websites are listed on compilations provided by Wikipedia.
  • Deepfake is used to create malicious hoaxes, fake news, or revenge pornography. Deepfake is a technique to combine and superimpose images to create new content.
  • the current Deepfake algorithm can only generate images of limited resolutions, which need to be further warped to match the original faces in the source video. Such transforms leave distinctive artifacts in the resulting Deepfake videos.
  • the system uses lots of labeled data to train the ML text classifier in order to have a wellperforming model.
  • the labeled data are gathered internally and externally.
  • External Text Labeled Data To detect harassment in content, the system uses two labels for text data: "harassment” and "neutral.” If the external data to be used is labeled by the external source in more than two categories, then the system will combine them into only two categories. For instance, if the external source uses three categories labeled “abuse,” “neutral” and “positive,” then those three are merged into two categories: “harassment” and “neutral.” The “neutral” label will now include the formerly labeled “neutral” and “positive” sets. The system uses the following sources of labeled text data.
  • the Program Collecting Harassing Data 112 uses the standard search Twitter API to obtain tweets with specific harassment terms unknown to the model. • By using the bag-of-words adaptive filter 301 and retraining the text classifier with content yet unknown to the model.
  • the bag-of-words content comprises of data from different sources.
  • One source is the file “hatebase dict.csv,” provided by Hatebase, an online database of hate speech.
  • the other source is the master thesis in computing sciences, “Automatic Detection of Cyberbullying on Social Media,” by Love Engman.
  • the bag-of-words is divided but not limited into five sets: the hardcore abusive set; the set of unpleasant terms; one set of double meaning terms; one set “bad action” and “target”; and the emojis.
  • bag-of-words is used as a feedback loop to retrain the models during the deployment.
  • Text classifiers Apple Core ML and the AutoML text classifiers have been trained to recognize a pattern in the text, such as sentiments expressed in a sentence.
  • Fig. 7 describes how Core ML provides several fundamental NLP building blocks 601 such as language identification 602, tokenization 603, part of speech tagging 604, lemmatization 605, and named entity recognition 606. These functionalities are provided across multiple languages.
  • Text classification The objective in text classification - the text can either be a sentence, a paragraph, or a document - is to assign labels to this piece of text, and these labels can be sentiment labels, topic labels, or any type of labels.
  • Word tagging Given a sequence of words or tokens, the objective is to assign a label to every token in the sequence.
  • Core ML has APIs in both text classification as well as word tagging.
  • the sentiment analysis API is in seven different languages: English, French, Italian, German, Spanish, Portuguese, and simplified Chinese.
  • the model learns to associate characteristics of the input text with labels.
  • Fig. 8 shows different types of classification algorithms that are run: logistic regression
  • MaxEnt The Max Entropy (MaxEnt) 651 algorithm evaluates and decides which classification algorithms will train the data.
  • the MaxEnt is based on the Principle of Maximum Entropy and from all the models that fit the training data, it selects the one which has the largest entropy.
  • the MaxEnt classifier is used to solve a large variety of text classification problems such as topic classification, sentiment analysis, and more. MaxEnt provides a framework for integrating information for classification from different algorithms.
  • MaxEnt uses the training data to set constraints on the conditional distribution. Each constraint expresses a characteristic of the training data that should also be present in the learned distribution. MaxEnt performs well with dependent features. Internally, MaxEnt runs different sets of classification algorithms on a subset of the training data and uses a smaller subset of the training data (which becomes the validation set of the training set) to evaluate its own algorithm.
  • Fig. 9 illustrates the English input data comprising of 78,533 inputs 701 with 33% (25,655) labeled as harassing content and 67% (52,878) labeled as neutral content.
  • the 78,533 inputs are split randomly with 80% of the data going toward the training set 702 and 20% toward the testing set 703, with a seed of 5.
  • the data are parsed randomly in 0.101028 seconds into the two sets. First, the data are cleaned by removing all the duplicate inputs and changing upper case characters to lower case characters.
  • the data are put into a structure but limited to a MLDataTable, which is a machine learning version of a spreadsheet in which each row represents an entity; in this case, a tweet, and the first column in the table is the text of the tweet and the second column the label.
  • the MLDataTable is an Apple Core ML structure that loads and processes large amounts of text in a tabular data format. The structure is designed to allow for the significant inputs of data that are required while performing machine learning.
  • the ML text classifier is initiated with the training data comprising of data content and a label for the specific content, either neutral or harassment.
  • the model tokenizes the data and extracts its features.
  • a classifier such as the MLTextClassifier puts aside a small percentage of the training data to use for validating the model’s progress during the training phase.
  • the total data set of 78,533 labeled tweets is divided into two sets: one consisting of 62,640 items 702 and the testing set 703 of 15,893 items.
  • ML text classifier 310 puts aside 12,767 inputs out of the 62,640 inputs 702, to create a validation set 704 and the remaining 49,873 inputs become the training set 709.
  • the validation set allows the training process to gauge the model’s performance on examples the model hasn’t been trained on.
  • the evaluation accuracy describes how many examples are correctly labeled divided by the total number of examples.
  • the training algorithm could adjust values within the model or even stop the training process when accuracy is deemed sufficient.
  • the text classifier model 57 acquires an accuracy 705 of 99.34% on the validation data. This level of accuracy was reached in 4.36 seconds.
  • Table 2 percentages are calculated from the values set forth in Table 1. To calculate the first row of Table 2 (Precision Recall Table), we define the following:
  • TP reflects when the neutral content is labeled “neutral.”
  • TN reflects the content labeled “harassment.”
  • FP and FN are re-assigned accordingly.
  • Precision is the percentage of harassment detected compared to the total number of harassments.
  • the recall is the percentage of harassment detected compared to the total number of items correctly detected either as harassment or as neutral.
  • Precision and recall on the harassment set reflect more accurately how the model is performing on the harassment set and the neutral set.
  • the test data evaluation accuracy of 90.36 % 706 reflects the overall performance of the model on the entire set.
  • the 84.26% and 85.56% precision and recall percentages reflect how the model is performing on the harassing data.
  • the 93.26% and 92.59% precision and recall percentages reflect how the model is performing on the neutral set.
  • Fl Score is the weighted average of the Precision and Recall. Therefore this score takes both false positives and false negatives into account. (See Table 3.)
  • the Italian input data consists of 199,020 inputs 701 with 50% labeled as harassing content and 50% labeled as neutral content.
  • the Italian training data consists of 127,177 inputs 702 .
  • the 25 ML classifier iterations create a model with an accuracy of 98.12% on the training data.
  • the ML classifier training using MaxEnt is completed in 11.84 seconds.
  • the validation set of 31,959 inputs 704 evaluates the ML classifier training and at the final iteration, an accuracy of 98.12% is obtained.
  • the testing data consist of 39,884 inputs 703; Table 5, based on the Table 4 data, shows that 89.38% precision and 87.07% recall were obtained for the harassing content.
  • Table 4 Confusion matrix - Core ML - Italian Results
  • Table 5 Precision and Recall - Core ML - Italian Results
  • the Italian data set is more balanced with half harassment content and half neutral content.
  • the precision and the recall percentage results between harassing content and neutral content are closer in range than for the English data set which is not a well-balanced set.
  • Table 6 reflects the well balanced Italian data.
  • Google Cloud Natural Language API provides content classification; sentiment detection; and extracts entities and syntax analysis.
  • AutoML. Natural Language features custom entity extraction and custom sentiment analysis.
  • the training set 702 consists of 62,575 English tweets with 20,433 labeled as “harassment” and 42,142 labeled as “neutral”.
  • the testing set 703 consists of 7,822 labeled tweets of which 2,554 are labeled as “harassment” and 5,268 as “neutral”. (See Tables 7 and 8.)
  • Table 7 Confusion matrix - AutoML - English Results
  • Table 8 Precision and Recall - AutoML - English Results
  • the Italian data training set 702 consists of 99,938 inputs.
  • the Auto ML Text classifier is still a beta version and the maximum input data that its structure can take is 100,000 inputs.
  • the Italian data set exceeds the maximum so it was reduced to half.
  • the Italian testing set 703 consists of 9,994 inputs. (See Tables 9 and 10.) u jkio
  • Further testing employing real-time data are conducted to test the accuracy of the model.
  • Previously English-language trained models are uploaded with the Model Testing application on the device. From a list of user names previously gathered, the Model Testing application accesses their tweets, in real-time, and evaluates them with the trained model.
  • the user name list is created from different sources. The list of user names contains names from people with diverse backgrounds. These selected users are not the individuals who wrote the tweets from the labeled data.
  • the list is uploaded with the Model Testing application.
  • tweets from the list of names are displayed. The tweets (which are the real-time data) are unknown to the Model, the bag-of-words and our development team.
  • our deployment testing set comprises of random tweets from the user names list.
  • the neutral tweets are displayed; TabBar allows the harassing content to be accessed.
  • the Model Testing application is a way to evaluate how text classifier is filtering out harassment on realtime data content.
  • Fig. 2 describes how a report 107 is sent to the system after the classifier models running on the server or the user device have detected harassment.
  • the report contains the received harassing tweets and several components such as location, friends, and followers of the senders and of the receiver; this allows the harassment history of the senders to be better understood and recorded.
  • the report analyzes how the harassment spreads, what the harassment topics are and the sentiments associated with them, the emotional connection feature of the harassment (e.g., sexual), points of view, and geography (location of harasser; is he/she close by?).
  • the report is sent to the appropriate responder 113 to solve the harassment issue depending on the intensity and the type of content. Reports are also sent to the corresponding social media company from where the content was derived and requests the removal of the content from the platform. Follow-up checks are done to see what action was taken by the social media company. Reports and analyses are stored to provide additional information on future reports. The report and any follow-ups will be sent to the users to inform them of the extent of the harassment threat.
  • the system generates a recommended action to address the conduct presented in the report.
  • the urgency of the situation is taken into consideration.
  • Outreach is done by asking, at the user’s election, for professional intervention from social services, the education system, the judicial system, mental health providers, health providers, police, parents, and others in order to help root out harassment and its consequences.
  • the offensive senders are blocked from sending additional content to the user.
  • the above information is stored in any graph database including but not limited to Neo4j to visualize the spread of the harassing tweets among users.
  • the graph database stores report data comprising the following elements: sender I D. and user name; tweet content and I.D.; receiver I.D. and user name; and retweet status.
  • the graph is composed of nodes. Each node is either a sender or a receiver. On the graph, only the sender and receiver I.D. are displayed. The transaction between the nodes is characterized by the tweet I. Ds. Other tables associate the tweet I.D. to the tweet content; sender I.D. with the sender user name; receiver I.D. with the receiver user name.
  • the tweet I.D. is unique and it was created by Twitter while the sender and receiver I.D. are created internally.
  • the historical information collected provides additional input parameters to reinforce the classifier model training.
  • Fig. 10A shows a text classifier 809 training with Tabular data 801.
  • the table comprises a group of rows and columns to store training parameters.
  • the columns comprise: tweet content 802, Auto ML results 803; Core ML results 804; any bag-of-words terms contained in the tweet 805; the intensity of the harassing history of the sender 806; the intensity of the harassing history of the sender’s friends and followers 807; tweet, label 808.
  • Each row of the table represents a tweet content with each associated column element for that row.
  • the text classifier 806 creates a model 57-c.
  • Fig. 10B shows that to improve and evaluate the results of text classifiers, including but not limited to Core ML 57-a and AutoML 57-b models on the incoming data 56, we compare the results 851. If the results from both classifiers are the same, the content data is added to the corresponding set 852. Harassing content is added to the harassing set. If the results from both classifiers differ 853, then the text classifiers model 57-c is run on the input parameters 854 comprising: the tweet content; Core ML result; Auto ML result; Bag-of-words terms if any is content in the tweet; the intensity of the harassing history of the sender, the sender’s friends and followers. Depending on the result, the tweet content is tagged with the appropriate label either harassing or neutral 855.
  • Fig. 14 shows the transfer of the outgoing data between the device 108 and social media platforms 104 and is similar to the transfer of incoming data shown in Fig. 2. However, the ML classifier or process is not applied to the outgoing data. When the user composes a tweet, it is sent with no alteration.
  • Text classifiers train customized ML models such as a Customized Core ML model.
  • Fig. 12 shows a smaller amount of labeled customer data 901 to train a model in conjunction with prior knowledge of the language word embeddings model 902 that provides a great deal of knowledge of the language. It is called Transfer Learning which is a highly active research area in NLP. The training of the new model relies on previous trained model knowledge.
  • ML classifier 903 trains the model with the data 901 and any word embedding model such as Word Embedding Core ML model 902; the outcome is a transfer learning text classification model such as Transfer Learning Text Classification model Core ML model 57-d.
  • Fig. 13 shows how customized ML classifier models 65 apply to incoming data on mobile devices 108 and on the server 105. No ML classifier models are applied to the sender content. The classifiers are tuned to the user's definition of what is harassing or not.
  • An on-device training of the model allows the model to be trained with user specific data such as the likes and user tweets; as well as for each instance that the user relabeled received tweets.
  • a look-up table for words and phrases such as Gazetteer Apple is specific to the user language style.
  • a word embedding dictionary of words and their embedding vectors such as the MLWordEmbedding model from Apple is also specific to the user data.
  • a text catalog such as Gazetteer from Core ML for compressing data to obtain a smaller bag-of-words.
  • Machine Learning comprising Core ML and Auto ML
  • new functionalities are provided that are expected to be incorporated into the system to fine-tune the accuracy.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A method, system, and product for filtering out unwanted social media content in real-time. The system comprises multiple sets of machine learning classifiers to filter out the unwanted content on any media including but not limited to text, images, audio, and video. Classifiers are trained with labeled data. After being trained, the models screen the incoming real-time data either on a server or a mobile device. A user application is run that results in only approved content to be displayed on the main screen of the user application device. The unwanted data are still available if the user desires to access them. The classifiers are trained with labeled data; and with input parameters in addition to the labeled data. On the device, customized models are trained with the individual user data and Transfers Learning models. When unwanted content is detected, a report is sent to an entity that might help support the receiver.

Description

METHOD AND SYSTEM TO FILTER OUT UNWANTED CONTENT FROM
INCOMING SOCIAL MEDIA DATA
1 Summary
[0001] Social media users increasingly complain of harassment through the receipt of unwanted content. Some users no longer feel safe expressing themselves on social media as a result of being subjected to such content. It is unrealistic to expect that people refrain from social media use to avoid such harassment. Social media use has become a necessity in our economic and social lives. Therefore, the need exists to filter out unwanted content, thereby creating a safer social media environment. Social media companies have been loath to police content on the sender side. Abusive senders have been removed from social media platforms but not with an automated system. Removal, a rare occurrence, is subject to individual human evaluations. Moreover, such interventions take place after the fact.
[0002] The disclosed method and system offer a solution at the point where data are received. The system filters any media including but not limited to text, images, audio, and video. Incoming data is filtered through a classifier. A set of trained Machine Learning (ML) classifier models separate unwanted content and assign it to a separate set. Only acceptable content is displayed on the main screen but the user retains the ability to access the filtered out material. The acceptable content comprises any neutral content including but not limited to positive and neutral. Reporting of the harassment is automated, obviating the need for the user to take affirmative steps for each instance of harassment. The main benefits of the system are: first, to filter out any unwanted content comprising but not limited to harassment, threat, abuse, sexual aggression, religious aggression, fake news, and fake videos prior to viewing by recipients; second to automate reporting. The term harassment comprises threats, abuse, sexual, religious, and gender aggressions. 2 Cross-Reference
[0003] This application claims the benefit of and priority under 35 U.S.C. § 119(e) to U.S. Patent Application No. 62813752, filed on March 5, 2019, entitled, “System to filter out harassment on social media on the receiver side,” which is incorporated herein by reference in its entirety.
[0004] This application claims the benefit of and priority under 35 U.S.C. § 119(e) to U.S. Patent Application No. 62847818, filed May 15, 2019, entitled “System filters out harassment from incoming social media data,” which is incorporated herein by reference in its entirety.
[0005] This application claims the benefit of and priority under 35 U.S.C. § 119(e) to U.S. Patent Application No. 62847885, filed May 15, 2019, entitled “System to filter out harassment on social media on the receiver side,” which is incorporated herein by reference in its entirety.
[0006] This application claims the benefit of and priority under 35 U.S.C. § 119(e) to U.S. Patent Application No. 16786225, filed February 10, 2020, entitled “Method and system to filter out harassment from incoming social media data,” which is incorporated herein by reference in its entirety.
[0007] This application claims the benefit of and priority under 35 U.S.C. § 119(e) to U.S. Patent Application No. 17168838, filed February 05, 2021, entitled “Method and system to filter out harassment from incoming social media data,” which is incorporated herein by reference in its entirety.
3 Background and Prior Art
[0008] In a January 19, 2019 interview, Jack Dorsey, one of the founders and the Chief Executive Officer of Twitter revealed how surprised he and his colleagues were at the prevalence of social media harassment: “We weren’t expecting any of the abuse and harassment, and the ways that people have weaponized the platform.” Dorsey explained that they felt “responsible about it.” [0009] Social media companies allow users to report abuse and require verification by e-mail addresses, phone numbers, or the identification of pictures to prevent robotic contact attempts. But these mechanisms have proven fruitless to stop harassment. Improvements in ML technology, however, provide an opportunity to counter harassment.
[0010] ML algorithms are used to train known labeled data for predicting the label of unlabeled data. This computational process is called a “classifier.” Classifiers can be applied to text, images, audio, and video. In the 1990s, a variety of text classification techniques started to demonstrate reasonable performance (Nigam et al., 1999).
[0011] Text classifiers have become more accurate. News providers have taken the lead in protecting conversations with their readers or viewers from bad actors by using machine learning technology to approve comments for publication on their websites. The Times, an English newspaper, for instance, partnered in 2016 with a Google-owned technology incubator to score incoming comments by comparing them to more than 16 million labeled Times comments going back to 2007. Bassey Etim, “The Times Sharply Increases Articles Open for Comments, Using Google’s Technology,” New York Times, June 13, 2017.
[0012] Patent No. US 10031977 issued on July 24, 2018, to Maycock, describes a solution to the problem of harassment on social media. May cock’s patent solves the issue by filtering the data at the operating system level of the user device. But accessing the operating system (called “jailbreaking“) may violate user licensing agreements and the law. (See 17 U.S.C. § 1201). The disclosed system proposes to resolve the issue at a higher level without need to access the operating system. Instead, to access data, an inter-process technology communication system is used including but not limited to an Application Programming Interface (API), Representational State Transfer Rest (Rest API), and Webhook.
4 Short Description of Drawings
[0013] Fig. 1 - Classifiers filter out harassment from incoming data from different platforms.
[0014] Fig. 2 - System receiver side.
[0015] Fig. 3 - Portal to access the different social media platform data.
[0016] Fig. 4 - Algorithm for filtering out harassment on text.
[0017] Fig. 5 - Algorithm to find the text on an image to filter out harassment.
[0018] Fig. 6 - Folder structure to enter data into the ML classifiers.
[0019] Fig. 7 - Tools for extracting features from text, natural language, and machine learning.
[0020] Fig. 8 - Max Entropy with different algorithms to run.
[0021] Fig. 9 - Training and test data to train and test ML classifier to create a model.
[0022] Fig. 10A -Text Classifier training with parameters.
[0023] Fig. 10B - Improving the results by comparing the Core ML and Auto ML classifiers.
[0024] Fig. 11 - System sender side. [0025] Fig. 12 - Process of customization of the ML models.
[0026] Fig. 13 - Overview of data filtered with a customized ML model.
5 Detail Description of the Invention
[0027] The method, system, and product comprise several components: Receiver Side, Rest API, Webhook, a user application running on devices, data collection, training, evaluation and deployment of ML models on the user device, reports, and any additional programs to process and validate the data and the labeling.
[0028] Fig. 1 describes the incoming data 56, which are in text, image, video, and audio format. The data from any social media platforms 52, 53, 54, 55 are processed to solve the harassing issue on social media. We apply a set 65 of ML classifier models 57, 58, 59, 60 on the incoming content 56. Any classifier models comprising Apple Core ML, Google Auto ML, or AWS ML determine if the incoming data 56 is harassing. The classifier models separate the data into sets comprising the harassment data set 62 and the neutral data set 61. Only the neutral data are displayed to the receiver’s main screen; the harassing content is filtered out. The classification process is similar to the ML classifiers used to filter out spam from emails. The system uses any classifier including but not limited to the Apple Core ML classifier to create classifier models for the iPhone. For Android phones, the system uses but is not limited to AutoML provided by Google.
[0029] ML classifiers process incoming image, audio, and video data to detect unwanted content. Also, an additional text classifier is trained with fake news data in order to detect incoming fake news. The results of all the classifiers are combined to finalize the result. The incoming data from each platform are processed with a set of classifiers that were previously trained with its own labeled data to create a data-specific model.
5.1 System - Incoming Data (Fig. 2)
[0030] Fig. 2 describes how the system processes the incoming data 56 and how the data is transferred. ML classifier models 57, 58, 59, 60 are applied to the incoming data either on the device 108 or on the server 105 in order to filter out unwanted content. The results from the classifiers are analyzed to make the final decision. 5.1.a Data Transfer
[0031] Social media platforms transfer the content of user data to a third party via an API that provides access that could be Rest API or Webhook depending on their own internal social media platform rules. The data are routed via two different paths, one path directly from social media platforms to the user device via Rest API 102 and the other from the social media platform to the server 105 and then to the user device 108 via Webhook 103. The data are usually delivered in JSON format.
Authorization Request (101)
[0032] Social media platforms 104 provide access to user data to third parties when the users input their username and password. The system does not have access to the latter two. The user runs the user application 116 to seek an authorization request 101 from the social media platform 104 to allow the application to access the user’s data. The social media platform provides a token to allow for continuous access. By saving the session, the user is able to re-enter the application without having to log in again.
Rest API (102)
[0033] The function of the Rest API is to pull the data. It provides a communication protocol between the user’s device 108 and the social media platforms. After authorization is granted, the protocol allows the user to request and receive data. The social media platform 104 transfers the data directly to the application 116 via Rest API 102.
Webhook (103)
[0034] The function of the Webhook is to push the data to the server. Webhook 103 is typically used to transfer large amounts of data. No request for data is required. The social media platform sends data when it becomes available. The use of Webhook 103 requires registration of a Unified Resource Location (URL) through a domain service provider. The URL becomes the endpoint where the data are received on the server 105.
[0035] Whenever there is new content for the user, the social media platform 104 sends the data via Webhook to the end-point on the server. The server listens for user content at the end-point. 5.1.b Server (105)
[0036] The system hardware needs to be expandable to accommodate increasing numbers of users and development growth. The different ML classifiers require the system to have high processing power. Platforms that provide high Central Processing Units (CPUs) usage and memory that are expandable comprise Google Cloud, AWS Amazon, and like. The server processes, labels, and stores labeled data in any media and in multiple languages 115; trains, retrains, and validates different sets of ML classifiers for each language and each data type 114; and runs additional programs 112. These programs 112 collect harassment data; process text, images, audio, and video; and create reports of the harassment or fake news. The programs 112 will integrate additional functionalities. The system runs on several cloud servers across different geographic regions.
[0037] The data are in English and Italian, and the text classifier models are trained with English labeled content and Italian labeled content. In future versions, the system will process additional languages and emoji.
Program Collecting Harassing Data (112)
[0038] Different in-house programs run on the server. One such program collects harassing tweets from Twitter to increase the size of the data set used to train the Text Classifier model. The program uses the standard search Twitter API to obtain specific harassing terms that are new to the labeled data set. The URL is one of the many search APIs.
Figure imgf000007_0001
The specific hashtag searches return a series of tweets containing harassing terms. Those tweets are labeled and added to the existing set. The program also allows searches for specific Twitter users to train the model to be exposed to different styles of writing. For instance, the program searched for former President Obama’s tweets. After validating their content, those tweets were added to the labeled neutral data set for purposes of training. Later, the model was tested with Michelle Obama's tweets.
5.1. c User Application (116)
[0039] Fig. 2 shows the user application 116 running on any user device comprising iPhone, iPad, Android, Samsung, and Window mobile 108. The data is received via any inter-process communication technology including but not limited to Rest API or Webhook. The application runs the processes 111, compromising the classifier models 65 that filter unwanted content in real-time on the incoming data; the other component 109 represents what is displayed on the device. [0040] Unwanted content is separated but can still be accessed with any clickable or sliding area including but not limited to the TabBar icon 110 at the bottom of the display. The user can modify the labeling if the user considers the separated content as not harassing. Vice versa, neutral content can be labeled as harassing by sliding the content on the screen and moving it to a different category. The modifications made by the user are sent to the server to retrain the Model with the individual user preferences. The ML model will be trained or retrained with data based on what users define to be harassment or not. When the harassment content is detected, a report 107 is sent for further proceedings on solving the harassment issue.
[0041] Fig. 3 shows an application Graphic User Interface (GUI ) 206, a portal to access any social media platforms comprising Twitter 201, Facebook 202, Instagram 203, Reddit 204, and others 205. The portal allows users to navigate from one social media platform to another in order to access their user data from that platform without being subjected to unwanted content. Fig. 3 shows radio buttons; however, any GUI with functionality including but not limited to sliding or clicking such as a TabBar could be used instead of a radio button to access the social media data.
5.1. d ML Classifiers (65)
[0042] ML classifiers 57, 58, 59, 60 are trained on the server and run either on the server 105 or the user device 108.
Text Classifier Model to detect Harassment (57)
[0043] Fig. 4 describes how the bag-of-words 301 acts as an adaptive filter to reduce text classifier inaccuracy. The system trains text classifiers including but not limited to the Apple Core ML, Google AutoML, AWS ML, Windows ML, and Python ML. The trained model, when used with real-time data, is initially not 100% accurate. The accuracy of the model is then improved by increasing the size of the labeled data set by collecting more labeled data from different sources. To increase detection accuracy and to collect more data for retraining the model, the system uses a filter which is called a bag-of-words. The bag-of-words acts as an adaptive filter by catching content as yet unknown to the model. Afterward, the model is retrained with the unknown content that has been classified by the bag-of-words filter as harassment. The bag-of-words is subdivided into five sets, a number that can be increased. The first set is hardcore harassing terms. The second set has words evincing a milder harassing tone. The third set has terms that have a double meaning, with one of the meanings being harassing. The fourth set contains phrases connecting the sub-list of "bad actions" with the sub-list of the intended recipient of those bad actions and the fifth set contains emojis. The number of sets might increase with the data needs. Content defined as harassing has at least one word from the first, fourth, or fifth set. The neutral content, however, may include words from the set with moderate words (e.g., the word “stupid”) and/or the set with double meaning terms.
[0044] Language detection 302 determines the language of the data. Then, a corresponding text classifier 57 is loaded to process the incoming data 56. The classifier labels the incoming content as harassing or neutral. In parallel, the data go through the bag-of-words filter 301. While the bag-of- words can aid to detect explicit abuse, it is used most effectively in reinforcing the model to be more accurate by detecting the unknown terms with which to retrain the model.
[0045] Results from the model and the bag-of-words filter are compared 303. If the model and filter results are the same, then the data are placed in the corresponding category 304. If the results differ 305, the decision of the filter overrides the one by the model. The discrepancy between model and filter results is reported to the server for analysis. On the server 105, the data collected with the correct label is used to retrain the model 310.
[0046] To reduce the size of the bag of words we use multiple approaches comprising a set of NLP algorithms such as stemming and lemmatizing to reduce the inflectional forms of each word into a common base or root and a look-up table for words and phrases. Any lookup table that compresses data comprising Gazetteer from Apple is used.
Image Classifier Model (58)
[0047] The system, in addition to detecting harassment in text, also detects harassment on image content. Some images contain text; others do not. If the image contains a text, the system detects the text. Fig- 5 describes how to capture harassment on the text content of images 56, by applying an Optical Characters Recognition (OCR) 402 to perform text detection on the image. Once captured 403, the text is passed through the ML text classifier model 57 to detect harassment. If harassment is detected in text 406, then the label for text content is set to harassing. If the text does not have harassing content the label for the text is set as neutral 405. After labeling the text, the system applies a set of processes 115 on the image to extract its features: color histogram; texture; edge-direction coherence vector, Fast Fourier Transform (FFT), face detection, and object detection, among others. The extracted features are entered as the parameter of the training of the model. The model is then run against the image data, a process that will result in the categorization of image content as harassing or neutral. The Apple Vision framework works with Core ML by applying classification models to images and preprocessing those images to make machine learning tasks easier and more reliable. The open-source MobileNet model, one of several available classification models, identifies an image using 1000 classification categories. Another available model is Visual Geometry Group (VGG), a convolutional neural network model proposed by K. Zisserman from the University of Oxford in the paper, “Very Deep Convolutional Networks for Large-Scale Image Recognition.” The VGG model achieves 92.7% top-5 test accuracy in ImageNet, which is a dataset of over 14 million images divided into 1000 classes.
[0048] Then, the image is run through the image classifier model 58 to determine if the image is harassing or not. Which image classifier is used depends on the operating system of the user device (Core ML with Apple Vision framework for Apple; AutoML Vision for Google; Windows ML for Windows). Multiple Python ML vision libraries (including but not limited to TensorFlow and Keras image classifiers) train models that run on any operating system.
[0049] Final decision 407 is if either the image or the text is harassing, then the tweet content is labeled as harassment 409; otherwise, it is labeled as neutral 408.
[0050] In Fig. 6, ML Image Classifiers 501 is trained with an input of data 56 comprising of images that need to be categorized before the classifier can learn to recognize the images. The categorization is done by naming folders. A data source provides training or testing data to an ML image classifier 501. The data are organized on disk to be compatible with the ML Image classifier data source, the classifier 501 is initialized with the data source, a URL of the directory that contains the data. Fig. 6 shows two folders, one named Training Data 503, and the other Testing Data 502. Each folder is organized with subfolders that have been labeled with the name of the category Harassing 504 and Neutral 505. The images are located in the appropriate subfolders for each data category. No duplicate images are allowed in the data source.
[0051] Then, the ML Vision classifier model 58 is uploaded to the user mobile device to predict the content of received images in the user social media content.
Video Classifier Model (59)
[0052] For incoming data in video format, features of the video content are extracted. One of the first steps is to detect the area of focus against the background. The current frame is compared to the background to detect people and extract features. The video classifier processes the video content to separate harassing data from neutral data (You et al., 2017). YouTube-8M Segments dataset is an extension of the YouTube-8M dataset with human-verified segment annotations. In addition to having the videos annotated, the entities in the videos are temporally localized. YouTube-8M is a large-scale labeled video dataset that comprises of millions of YouTube video IDs, with high- quality machine-generated annotations from a diverse vocabulary of 3,800+ visual entities. It comes with precomputed audio-visual features from billions of frames and audio segments. For devices with the iOS operating system, the Core ML video classifier runs with the Apple Vision framework to recognize, track objects, categorize, and filter out harassing videos. For Android devices, AutoML Video Intelligence Classification enables the training of machine learning models to classify shots and segments of video data according to labels. These models track objects in video data according to labels (harassment and neutral). The data is presented to the video classifier in the same way as shown in Fig. 6. Instead of having images in the folder, folder content of videos. Multiple Python ML vision libraries, including but not limited to TensorFlow and Kera video classifier models, run on any operating system.
Audio Classifier Model (60)
[0053] Similarly, for incoming audio content, features of the audio are extracted and the audio data are processed through an audio classifier to filter out harassment (Nam et al., 2016). A model that extracts the audio part of the video comprises the VGGish model. The VGGish uses the same architecture as the VGG model and replaces the input image with an audio spectrogram (Hershey et al., 2017). Audio clips are input to a different audio classifier to filter out unwanted content. One classifier is trained with intonation clips while another is trained with audio clips that emphasize content. In parallel, the content of the audio is grabbed with an audio to text converter. The text is then fed to a text classifier to filter out unwanted content. The results of the three classifiers are analyzed to determine if unwanted content is present. For devices using the iOS operating system, a sound classifier (e.g., Apple Sound classifier with Sound Analysis framework) categorizes the data. To perform effectively, the model is trained with the awareness of the ambient noise of the environment. In addition, speech recognition and voice analytics provide additional tools for the audio classifier model. The sound classification used by the Core ML model is using the SoundAnalysis and AVKit frameworks. The incoming audio content has its features extracted. The data is presented to the audio classifier in the same way as shown in Fig. 6. Instead of having images in the folder, the folder content comprises of audio clips. The audio classifier model 60 is uploaded on the mobile device to process real-time audio data to filter out harassment. Text Classifier Model for Fake News (57)
[0054] We define fake news as false information that can be verified as not true. In order to train text classifiers 57 to detect fake and real news, a sizeable data set is needed for purposes of training the model. Each item of the set is labeled as “fake” or “real." The data set is gathered by scraping data from lists that contain different websites that are known for posting unwanted content, such as the list provided by https://mediabiasfactcheck.com, a Media Bias/Fact Check website and the Washington Post fact-checking website. Additional fact-checking websites are listed on compilations provided by Wikipedia. Phys.org quoted Professor Ulrich Schade of the Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE on the difficulty involved: “Fake news items are often hosted on websites designed to mimic the web presence of news agencies and can be difficult to distinguish from the genuine sites.” The data are processed to extract the characteristics of what renders the content fake. With the fact extraction characteristics and with the labeled data we build a knowledge base with content labeled as “fake” or “real.” The decision-making process of the classifier is based on language by providing insights into the language used by fake news. The text classifier model is trained with the labeled data. Once the model is uploaded on the device, the incoming data are processed by the text classifier model trained to detect fake news in order to let the user know whether the content received is valid.
Video Classifier Model for Deepfake Video Detection (59)
[0055] Deepfake is used to create malicious hoaxes, fake news, or revenge pornography. Deepfake is a technique to combine and superimpose images to create new content. The current Deepfake algorithm can only generate images of limited resolutions, which need to be further warped to match the original faces in the source video. Such transforms leave distinctive artifacts in the resulting Deepfake videos. We use a classifier to detect Deepfake, Face Swap, and Lip Sync from audio. Lip Sync from audio files results when audio files of speech are blended with the head of a person different from the one who is talking.
5.1. e Labeled Text Data
[0056] The system uses lots of labeled data to train the ML text classifier in order to have a wellperforming model. The labeled data are gathered internally and externally.
External Text Labeled Data [0057] To detect harassment in content, the system uses two labels for text data: "harassment" and "neutral." If the external data to be used is labeled by the external source in more than two categories, then the system will combine them into only two categories. For instance, if the external source uses three categories labeled "abuse," "neutral" and "positive," then those three are merged into two categories: “harassment” and “neutral.” The “neutral” label will now include the formerly labeled “neutral” and “positive” sets. The system uses the following sources of labeled text data.
[0058] Six different available datasets were merged to create a general and comprehensive input dataset by leveraging their annotation schemes into a binary “harassment” and “neutral” classification.
• NAACL_SRW_2016.csv (Waseem et al., 2016), “Hateful Symbols or Hateful People? Predictive Features for Hate Speech Detection on Twitter.” A corpus of more than 16k tweets, annotated with labels such as Racism, Sexism, and Neither. The labels conveying harassing content were changed into “harassment” and the neutral data kept as is.
• OnlineHarassmentDataset.csv (Golbeck et al., 2017), “A Large Labeled Corpus for Online Harassment Research.” A corpus of 35,000 tweets, with 15% positive harassment examples and 85% negative examples.
• BullyingV3.0.zip (Xu, 2012), “Learning from bullying traces in social media.” 7321 tweets with tweet ID, bullying, author role, teasing, type, form, and emotion labels that were all converted into ’’harassment” tweets.
• http://research.cs.wisc.edu/bullying website provides 7,321 annotated tweets in total.
• Twitter-hate-speech-classifier-DFE-a845520.csv from data. world created on Nov. 21, 2016, by @crowdflowerdata.
• Labeled_data.csv (Waseem et al., 2017), “Understanding Abuse: A Typology of Abusive Language Detection Subtasks.”
Internal Text Labeled Data
[0059] The system collects labeled English text data internally in two different ways:
• The Program Collecting Harassing Data 112 uses the standard search Twitter API to obtain tweets with specific harassment terms unknown to the model. • By using the bag-of-words adaptive filter 301 and retraining the text classifier with content yet unknown to the model.
[0060] The Italian data were gathered and labeled with a similar program that collects data with search Twitter API.
5.1.f Bag-of-Words
[0061] The bag-of-words content comprises of data from different sources. One source is the file “hatebase dict.csv,” provided by Hatebase, an online database of hate speech. The other source is the master thesis in computing sciences, “Automatic Detection of Cyberbullying on Social Media,” by Love Engman. The bag-of-words is divided but not limited into five sets: the hardcore abusive set; the set of unpleasant terms; one set of double meaning terms; one set “bad action” and “target”; and the emojis.
5.1. g Validation of Labeled Data and bag-of-words
[0062] To assess the quality of the training data, the same bag-of-words is used as a feedback loop to retrain the models during the deployment. At first, only one bag-of-words set of harassing words was used. During validation, this was extended to at least five different sets. The number of sets may increase depending on the data needs.
[0063] Labeled data are evaluated against the content of the bag-of-words set to check whether the different harassing terms were present or not in the tweets. If any hate-related term is found in tweets labeled as neutral, the label is changed to harassment. On the other hand, if no terms were found in tweets labeled as harassment, it is relabeled as neutral. Following this method, 1880 labels were changed from neutral to harassing. The size of the combined five bag-of-words sets needs to be reduced since the code is running on a mobile device and run time is essential. Reducing the lexicon set will consume less (CPU) power on the device since searching a huge set increases the CPU consumption. Additional Natural Language Procession (NLP) tools are being developed such as a lemma program that reduces different spellings of the same word to one word.
5.1.h ML Text Classifier Training & Testing
[0064] Text classifiers Apple Core ML and the AutoML text classifiers have been trained to recognize a pattern in the text, such as sentiments expressed in a sentence. Fig. 7 describes how Core ML provides several fundamental NLP building blocks 601 such as language identification 602, tokenization 603, part of speech tagging 604, lemmatization 605, and named entity recognition 606. These functionalities are provided across multiple languages.
[0065] Most NLP functionalities can be broken down into two broad categories of tasks:
• Text classification: The objective in text classification - the text can either be a sentence, a paragraph, or a document - is to assign labels to this piece of text, and these labels can be sentiment labels, topic labels, or any type of labels.
• Word tagging: Given a sequence of words or tokens, the objective is to assign a label to every token in the sequence.
[0066] Core ML has APIs in both text classification as well as word tagging. The sentiment analysis API is in seven different languages: English, French, Italian, German, Spanish, Portuguese, and simplified Chinese. The model learns to associate characteristics of the input text with labels.
[0067] Fig. 8 shows different types of classification algorithms that are run: logistic regression
654, nearest neighbor classifier 656, Support Vector Machines (SVM) 652, boosted decision trees
655, random forests 653, and any additional ones if needed.
[0068] The Max Entropy (MaxEnt) 651 algorithm evaluates and decides which classification algorithms will train the data. The MaxEnt is based on the Principle of Maximum Entropy and from all the models that fit the training data, it selects the one which has the largest entropy. The MaxEnt classifier is used to solve a large variety of text classification problems such as topic classification, sentiment analysis, and more. MaxEnt provides a framework for integrating information for classification from different algorithms.
[0069] The MaxEnt uses the training data to set constraints on the conditional distribution. Each constraint expresses a characteristic of the training data that should also be present in the learned distribution. MaxEnt performs well with dependent features. Internally, MaxEnt runs different sets of classification algorithms on a subset of the training data and uses a smaller subset of the training data (which becomes the validation set of the training set) to evaluate its own algorithm.
[0070] For Core ML and AutoML classifiers, no tuning of parameters and hyperparameters is required, as it is done automatically. The hyperparameters are the variables that orchestrate the training process itself: the setup of the neural network; how many hidden layers between the input layer and output layer; and how many nodes each layer should have. Apple Core ML Text Classifier Training & Testing (Fig. 9)
[0071] Fig. 9 illustrates the English input data comprising of 78,533 inputs 701 with 33% (25,655) labeled as harassing content and 67% (52,878) labeled as neutral content. The 78,533 inputs are split randomly with 80% of the data going toward the training set 702 and 20% toward the testing set 703, with a seed of 5. The data are parsed randomly in 0.101028 seconds into the two sets. First, the data are cleaned by removing all the duplicate inputs and changing upper case characters to lower case characters. The data are put into a structure but limited to a MLDataTable, which is a machine learning version of a spreadsheet in which each row represents an entity; in this case, a tweet, and the first column in the table is the text of the tweet and the second column the label. The MLDataTable is an Apple Core ML structure that loads and processes large amounts of text in a tabular data format. The structure is designed to allow for the significant inputs of data that are required while performing machine learning.
Training:
[0072] The ML text classifier is initiated with the training data comprising of data content and a label for the specific content, either neutral or harassment. The model tokenizes the data and extracts its features. During the training, a classifier such as the MLTextClassifier puts aside a small percentage of the training data to use for validating the model’s progress during the training phase. The total data set of 78,533 labeled tweets is divided into two sets: one consisting of 62,640 items 702 and the testing set 703 of 15,893 items. ML text classifier 310 puts aside 12,767 inputs out of the 62,640 inputs 702, to create a validation set 704 and the remaining 49,873 inputs become the training set 709. The validation set allows the training process to gauge the model’s performance on examples the model hasn’t been trained on. The evaluation accuracy describes how many examples are correctly labeled divided by the total number of examples. Depending on the validation accuracy, the training algorithm could adjust values within the model or even stop the training process when accuracy is deemed sufficient. After 25 to 29 iterations of training with the training data set 709, the text classifier model 57 acquires an accuracy 705 of 99.34% on the validation data. This level of accuracy was reached in 4.36 seconds.
Testing:
[0073] After acquiring training data accuracy of 99.35%, the model performance was evaluated on the test data consisting of 15,893 inputs 703 that were set aside before the training. [0074] The evaluation accuracy on the test data was 90.36%. The classification error is the fraction of incorrectly labeled data over total data. The classifier error on the test data is 9.64%. The evaluation accuracy and the classification error are useful metrics only when the data is well- balanced between categories.
[0075] Our English data set is not balanced with 33% harassment versus 67% neutral. The ratio of harassing tweets on the Twitter app is much smaller than 33%, around 3% to 11%. Tables 1 and 2 reflect how imbalance affects the results.
[0076] Table 2 percentages are calculated from the values set forth in Table 1. To calculate the first row of Table 2 (Precision Recall Table), we define the following:
• True Positive (TP): when the harassment content is labeled “harassment.”
• True Negative (TN): when the neutral content is labeled “neutral.”
• False Negative (FN): when neutral content is labeled “harassment.”
• False Positive (FP): when harassment content is labeled “neutral.”
Figure imgf000017_0002
Table 1 : Confusion matrix - Core ML - English Results
Figure imgf000017_0003
Table 2: Precision and Recall - Core ML - English Results
Figure imgf000017_0004
Table 3: Fl Score - Core ML - English Results
Figure imgf000017_0001
Figure imgf000018_0001
[0077] To calculate the second row of Table 2, we follow the same approach as in the first-row calculation, only this time TP reflects when the neutral content is labeled “neutral.” Similarly, TN reflects the content labeled “harassment.” FP and FN are re-assigned accordingly.
[0078] Precision is the percentage of harassment detected compared to the total number of harassments. The recall is the percentage of harassment detected compared to the total number of items correctly detected either as harassment or as neutral.
[0079] Precision and recall on the harassment set reflect more accurately how the model is performing on the harassment set and the neutral set. The test data evaluation accuracy of 90.36 % 706 reflects the overall performance of the model on the entire set. In Table 2, the 84.26% and 85.56% precision and recall percentages reflect how the model is performing on the harassing data. The 93.26% and 92.59% precision and recall percentages reflect how the model is performing on the neutral set.
[0080] Fl Score is the weighted average of the Precision and Recall. Therefore this score takes both false positives and false negatives into account. (See Table 3.)
[0081] The Italian input data consists of 199,020 inputs 701 with 50% labeled as harassing content and 50% labeled as neutral content. The Italian training data consists of 127,177 inputs 702 . The 25 ML classifier iterations create a model with an accuracy of 98.12% on the training data. The ML classifier training using MaxEnt is completed in 11.84 seconds. The validation set of 31,959 inputs 704 evaluates the ML classifier training and at the final iteration, an accuracy of 98.12% is obtained. The testing data consist of 39,884 inputs 703; Table 5, based on the Table 4 data, shows that 89.38% precision and 87.07% recall were obtained for the harassing content.
Figure imgf000018_0002
Table 4: Confusion matrix - Core ML - Italian Results
Figure imgf000018_0003
Table 5: Precision and Recall - Core ML - Italian Results
Figure imgf000019_0001
Table 6: Fl Score - Core ML - Italian Results
[0082] The Italian data set is more balanced with half harassment content and half neutral content. The precision and the recall percentage results between harassing content and neutral content are closer in range than for the English data set which is not a well-balanced set. Table 6 reflects the well balanced Italian data.
AutoML Text Classifier Training & Testing (Fig. 9)
[0083] Google Cloud Natural Language API provides content classification; sentiment detection; and extracts entities and syntax analysis. AutoML. Natural Language features custom entity extraction and custom sentiment analysis. The training set 702 consists of 62,575 English tweets with 20,433 labeled as “harassment” and 42,142 labeled as “neutral”. The testing set 703 consists of 7,822 labeled tweets of which 2,554 are labeled as “harassment” and 5,268 as “neutral”. (See Tables 7 and 8.)
Figure imgf000019_0002
Table 7: Confusion matrix - AutoML - English Results
Figure imgf000019_0003
Table 8: Precision and Recall - AutoML - English Results
[0084] The Italian data training set 702 consists of 99,938 inputs. The Auto ML Text classifier is still a beta version and the maximum input data that its structure can take is 100,000 inputs. The Italian data set exceeds the maximum so it was reduced to half. The Italian testing set 703 consists of 9,994 inputs. (See Tables 9 and 10.) u jkio
Figure imgf000020_0001
Table 9: Confusion matrix - AutoML - Italian Results
Figure imgf000020_0002
Table 10: Precision and Recall - AutoML - Italian Results
[0085] The evaluation accuracy results we obtain with Core ML and Auto ML with the English and Italian data sets are in the same range. Table 11 reflects the good results obtained with an evaluation accuracy ranging from 88.61% to 94.36%. (See Tables 9 and 10.)
Figure imgf000020_0003
Table 11 : Evaluation Accuracy 5.1.i Real-time results
[0086] Further testing employing real-time data are conducted to test the accuracy of the model. Previously English-language trained models are uploaded with the Model Testing application on the device. From a list of user names previously gathered, the Model Testing application accesses their tweets, in real-time, and evaluates them with the trained model. The user name list is created from different sources. The list of user names contains names from people with diverse backgrounds. These selected users are not the individuals who wrote the tweets from the labeled data. The list is uploaded with the Model Testing application. On the device, tweets from the list of names are displayed. The tweets (which are the real-time data) are unknown to the Model, the bag-of-words and our development team. As a result, our deployment testing set comprises of random tweets from the user names list. The neutral tweets are displayed; TabBar allows the harassing content to be accessed. The Model Testing application is a way to evaluate how text classifier is filtering out harassment on realtime data content.
[0087] A search for U.S. Congresswoman Maxine Waters on Twitter shows that she receives a lot of harassing tweets. The names of harassing individuals were collected and added to the user name list. Results output were collected in debug mode with a print console function. On the device, 1890 tweets were displayed and the accuracy was 94%. The accuracy of our models varies with the type of tweets searched. The accuracy is lower for harassing tweets than for neutral ones. The margin of error in the accuracy is large given the need to integrate the modification found with the validation step into the deployment step.
5.1.j Report
[0088] When the classifier models 57, 58, 59, 60 detect harassment on the incoming data content 56, the harassment 62 and all the information about the senders and the receivers involved are sent to the server 105. Fig. 2 describes how a report 107 is sent to the system after the classifier models running on the server or the user device have detected harassment. The report contains the received harassing tweets and several components such as location, friends, and followers of the senders and of the receiver; this allows the harassment history of the senders to be better understood and recorded. [0089] The report analyzes how the harassment spreads, what the harassment topics are and the sentiments associated with them, the emotional connection feature of the harassment (e.g., sexual), points of view, and geography (location of harasser; is he/she close by?). The report is sent to the appropriate responder 113 to solve the harassment issue depending on the intensity and the type of content. Reports are also sent to the corresponding social media company from where the content was derived and requests the removal of the content from the platform. Follow-up checks are done to see what action was taken by the social media company. Reports and analyses are stored to provide additional information on future reports. The report and any follow-ups will be sent to the users to inform them of the extent of the harassment threat.
[0090] The system generates a recommended action to address the conduct presented in the report. The urgency of the situation is taken into consideration. Outreach is done by asking, at the user’s election, for professional intervention from social services, the education system, the judicial system, mental health providers, health providers, police, parents, and others in order to help root out harassment and its consequences. The offensive senders are blocked from sending additional content to the user.
[0091] The above information is stored in any graph database including but not limited to Neo4j to visualize the spread of the harassing tweets among users. The graph database stores report data comprising the following elements: sender I D. and user name; tweet content and I.D.; receiver I.D. and user name; and retweet status. The graph is composed of nodes. Each node is either a sender or a receiver. On the graph, only the sender and receiver I.D. are displayed. The transaction between the nodes is characterized by the tweet I. Ds. Other tables associate the tweet I.D. to the tweet content; sender I.D. with the sender user name; receiver I.D. with the receiver user name. The tweet I.D. is unique and it was created by Twitter while the sender and receiver I.D. are created internally. The historical information collected provides additional input parameters to reinforce the classifier model training.
5.1.j Improving the Prediction Result (Figs. 10A, 10B)
[0092] Fig. 10A shows a text classifier 809 training with Tabular data 801. The table comprises a group of rows and columns to store training parameters. The columns comprise: tweet content 802, Auto ML results 803; Core ML results 804; any bag-of-words terms contained in the tweet 805; the intensity of the harassing history of the sender 806; the intensity of the harassing history of the sender’s friends and followers 807; tweet, label 808. Each row of the table represents a tweet content with each associated column element for that row. The text classifier 806 creates a model 57-c.
[0093] Fig. 10B shows that to improve and evaluate the results of text classifiers, including but not limited to Core ML 57-a and AutoML 57-b models on the incoming data 56, we compare the results 851. If the results from both classifiers are the same, the content data is added to the corresponding set 852. Harassing content is added to the harassing set. If the results from both classifiers differ 853, then the text classifiers model 57-c is run on the input parameters 854 comprising: the tweet content; Core ML result; Auto ML result; Bag-of-words terms if any is content in the tweet; the intensity of the harassing history of the sender, the sender’s friends and followers. Depending on the result, the tweet content is tagged with the appropriate label either harassing or neutral 855.
5.2 System - Outgoing data (Fig. 11) [0094] Fig. 14 shows the transfer of the outgoing data between the device 108 and social media platforms 104 and is similar to the transfer of incoming data shown in Fig. 2. However, the ML classifier or process is not applied to the outgoing data. When the user composes a tweet, it is sent with no alteration.
5.3 Customized ML Models (Figs. 12, 13)
[0095] Text classifiers train customized ML models such as a Customized Core ML model. Fig. 12 shows a smaller amount of labeled customer data 901 to train a model in conjunction with prior knowledge of the language word embeddings model 902 that provides a great deal of knowledge of the language. It is called Transfer Learning which is a highly active research area in NLP. The training of the new model relies on previous trained model knowledge.
[0096] ML classifier 903 trains the model with the data 901 and any word embedding model such as Word Embedding Core ML model 902; the outcome is a transfer learning text classification model such as Transfer Learning Text Classification model Core ML model 57-d.
[0097] One of the purposes of embedding is to give different values for words depending on their meaning and context. Ordinary word embedding just maps words to vectors, and it will give the same value for the word no matter how it appears. The dynamic embedding changes the value of the embedding for words depending on their sentence context, which is a very powerful technique for doing Transfer Learning for Text Classification.
[0098] Fig. 13 shows how customized ML classifier models 65 apply to incoming data on mobile devices 108 and on the server 105. No ML classifier models are applied to the sender content. The classifiers are tuned to the user's definition of what is harassing or not.
[0099] An on-device training of the model allows the model to be trained with user specific data such as the likes and user tweets; as well as for each instance that the user relabeled received tweets. A look-up table for words and phrases such as Gazetteer Apple is specific to the user language style. A word embedding dictionary of words and their embedding vectors such as the MLWordEmbedding model from Apple is also specific to the user data.
[0100] The embodiments discussed herein are illustrative of the present invention. As these embodiments of the present invention are described with reference to illustrations, various modifications or adaptations of the methods and/or specific structures described may become apparent to those skilled in the art. For example, the bag-of-words is currently divided into five sets, but it is understood that the content and division and subdivision may be modified to accommodate new data. Another example is the report that might evolve with input from different groups such as social platforms, school systems, LGBT groups, and more. [0101] All such modifications, adaptations, or variations that rely upon teachings of the present invention, and through which these teachings have advanced the art, are considered to be within the scope of the present invention. For example, a text catalog such as Gazetteer from Core ML for compressing data to obtain a smaller bag-of-words. With the latest developments in Machine Learning comprising Core ML and Auto ML, new functionalities are provided that are expected to be incorporated into the system to fine-tune the accuracy.

Claims

Claims What is claimed is:
1. A method filtering incoming social media data with a system comprising: transferring data from at least one social media platform to at least one user device and at least one server; labeling social media data content with a characteristic term that represents the content in multiple language including emojis; validating training data sets against bag-of-words sets; training and evaluating classifier models with the labeled data in any language and any type of data to filter out unwanted data; implementing a user application that runs the models and any necessary processes; running the user application on a user mobile device; detecting the language of the data content; uploading the classifier models associated with the detected language onto the user device; filtering out unwanted incoming social media content with classifier models on a server or a mobile device; separating neutral content from unwanted content; displaying neutral content while the unwanted content is still accessible with a clickable or a sliding area, including but not limited to a tab; customizing models for the user preferences; reporting the unwanted content to entities that might be able to support the user who is receiving the unwanted content and intervene on the user’s behalf.
2. The method of claim 1, wherein the social media data is transferred with any inter-process technology communication system, including but not limited to Rest API or Webhook depending on the social media platforms.
3. The method of claim 1, wherein the classifier models that filter out unwanted content is comprised of text classifier models that filter incoming text data in multiple language; image classifier models that filter incoming image data; audio classifier models that filter incoming audio data; video classifier models that filter incoming video data.
4. The method of claim 1, wherein text classifiers are trained to filter out fake news in multiple language.
5. The method of claim 1, wherein a video classifier is trained to filter out deep fake videos in multiple language.
6. The method of claim 3, wherein the results of the text, image, audio, video classifier models are analyzed to produce the final result.
7. The method of claim 1, wherein the bag-of-words comprise at least five sets: the first set with hardcore harassing terms; the second set with a milder harassing tone; the third set with terms having a double meaning, with one of the meanings being harassing; the fourth set with phrases connecting a sub-list of "bad actions" with a sub-list of the intended recipient of those bad actions; the fifth set with emojis.
8. The method of claim 3, wherein the text classifier model is tuned with a bag of words to catch content unknown to the model.
9. The method of claim 8, wherein the bag-of-words size is reduced with NLP tools such as, but not limited to, stemming, lemmatization, and text catalog.
10. The method of claim 8, wherein the model is retrained with content unknown to the model.
11. The method of claim 1, whereby the users can modify, with the user application, the label of the data content depending on their definition of harassment.
12. The method of claim 1, wherein the user application displays a GUI portal so that the user has access to content from multiple platforms.
13. The method of claim 1, wherein the report collects data, including but not limited to the history of the offenders, their friends, their followers, the location of the offenders and the analysis of how widespread the distribution of the unwanted content is.
14. The method of claim 13, wherein the collected data are put into a graph database to better visualize the spread of the unwanted content.
15. The method of claim 3, wherein a text classifier is trained with the following input parameters comprising: the tweet content; any bag-of-words terms contained in the tweet; the intensity of the harassing history of the sender; the intensity of the harassing history of the sender’s friends, the intensity of the harassing history of the sender’s followers; results from different types of text classifier model; tweet label.
16. The method of claim 15, wherein a model was created to evaluate data content when results from two different text classifier models differ from each other after the same data content has been input.
17. The method of claim 1, wherein customized models are trained on the user device, with the individual user data and Transfer Learning models.
PCT/US2021/017120 2020-02-10 2021-02-08 Method and system to filter out unwanted content from incoming social media data WO2022055546A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US16/786,225 US11126678B2 (en) 2019-03-05 2020-02-10 Method and system to filter out harassment from incoming social media data
US16/786,225 2020-02-10
US17/168,838 2021-02-05
US17/168,838 US11170064B2 (en) 2019-03-05 2021-02-05 Method and system to filter out unwanted content from incoming social media data

Publications (1)

Publication Number Publication Date
WO2022055546A1 true WO2022055546A1 (en) 2022-03-17

Family

ID=80629771

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2021/017120 WO2022055546A1 (en) 2020-02-10 2021-02-08 Method and system to filter out unwanted content from incoming social media data

Country Status (1)

Country Link
WO (1) WO2022055546A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150249584A1 (en) * 2014-02-28 2015-09-03 Cellco Partnership D/B/A Verizon Wireless Method and apparatus for providing an anti-bullying service
US20160199977A1 (en) * 2013-03-15 2016-07-14 JIBO, Inc. Engaging in human-based social interaction for performing tasks using a persistent companion device
US20170061248A1 (en) * 2015-09-02 2017-03-02 James Ronald Ryan, JR. System and Method of Detecting Offensive Content Sent or Received on a Portable Electronic Device
US20170232300A1 (en) * 2016-02-02 2017-08-17 Bao Tran Smart device
US20180210960A1 (en) * 2017-01-26 2018-07-26 Rena Maycock Data content filter

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160199977A1 (en) * 2013-03-15 2016-07-14 JIBO, Inc. Engaging in human-based social interaction for performing tasks using a persistent companion device
US20150249584A1 (en) * 2014-02-28 2015-09-03 Cellco Partnership D/B/A Verizon Wireless Method and apparatus for providing an anti-bullying service
US20170061248A1 (en) * 2015-09-02 2017-03-02 James Ronald Ryan, JR. System and Method of Detecting Offensive Content Sent or Received on a Portable Electronic Device
US20170232300A1 (en) * 2016-02-02 2017-08-17 Bao Tran Smart device
US20180210960A1 (en) * 2017-01-26 2018-07-26 Rena Maycock Data content filter

Similar Documents

Publication Publication Date Title
US11170064B2 (en) Method and system to filter out unwanted content from incoming social media data
US11126678B2 (en) Method and system to filter out harassment from incoming social media data
US11249774B2 (en) Realtime bandwidth-based communication for assistant systems
Alzanin et al. Rumor detection in Arabic tweets using semi-supervised and unsupervised expectation–maximization
Chancellor et al. Multimodal classification of moderated online pro-eating disorder content
US20190122093A1 (en) Artificial intelligence system for supporting communication
US10977448B2 (en) Determining personality profiles based on online social speech
Kagan et al. Using data science to understand the film industry’s gender gap
KR20160055930A (en) Systems and methods for actively composing content for use in continuous social communication
CN109933782B (en) User emotion prediction method and device
US20200202369A1 (en) Digital surveys based on digitally detected facial emotions
US11928985B2 (en) Content pre-personalization using biometric data
Li et al. SSDMV: Semi-supervised deep social spammer detection by multi-view data fusion
Jaichandran et al. Sentiment analysis of movies on social media using R studio
Shannag et al. The design, construction and evaluation of annotated Arabic cyberbullying corpus
Sharma et al. Fake news detection on Twitter
Su et al. Classification and interaction of new media instant music video based on deep learning under the background of artificial intelligence
Fersini et al. Misogynous meme recognition: A preliminary study
Kumar How Much Noise ChatGPT is Making: A Sentiment Analysis Approach
Ashraf et al. Personalized news recommendation based on multi-agent framework using social media preferences
Rodríguez-Barroso et al. Federated Learning for Exploiting Annotators’ Disagreements in Natural Language Processing
WO2022055546A1 (en) Method and system to filter out unwanted content from incoming social media data
Barunaha et al. Real-Time Sentiment Analysis of Social Media Content for Brand Improvement and Topic Tracking
Razis et al. Enriching social analytics with latent Twitter image information
Enache Sentiment Analysis in Tourism

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21867279

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21867279

Country of ref document: EP

Kind code of ref document: A1