Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

University of South Carolina

Knowledge

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Ksat: Knowledge-Infused Self Attention Transformer - Integrating Multiple Domain-Specific Contexts, Kaushik Roy, Yuxin Zi, Vignesh Narayanan, Manas Gaur, Amit P. Sheth Jan 2022

Ksat: Knowledge-Infused Self Attention Transformer - Integrating Multiple Domain-Specific Contexts, Kaushik Roy, Yuxin Zi, Vignesh Narayanan, Manas Gaur, Amit P. Sheth

Publications

Domain-specific language understanding requires integrating multiple pieces of relevant contextual information. For example, we see both suicide and depression related behavior (multiple contexts) in the text “I have a gun and feel pretty bad about my life, and it wouldn’t be the worst thing if I didn’t wake up tomorrow”. Domain specificity in self-attention architectures is handled by fine-tuning on excerpts from relevant domain specific resources (datasets and external knowledge - medical textbook chapters on mental health diagnosis related to suicide and depression). We propose a modified self-attention architecture Knowledge infused Self Attention Transformer (KSAT) that achieves the integration of …


Defining And Detecting Toxicity On Social Media: Context And Knowledge Are Key, Amit Sheth, Valerie Shalin, Ugur Kursuncu Dec 2021

Defining And Detecting Toxicity On Social Media: Context And Knowledge Are Key, Amit Sheth, Valerie Shalin, Ugur Kursuncu

Publications

As the role of online platforms has become increasingly prominent for communication, toxic behaviors, such as cyberbullying and harassment, have been rampant in the last decade. On the other hand, online toxicity is multi-dimensional and sensitive in nature, which makes its detection challenging. As the impact of exposure to online toxicity can lead to serious implications for individuals and communities, reliable models and algorithms are required for detecting and understanding such communications. In this paper We define toxicity to provide a foundation drawing social theories. Then, we provide an approach that identifies multiple dimensions of toxicity and incorporates explicit knowledge …