• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Understanding the Language of ISIS:An Empirical Approach to Detect Radical Content on Twitter Using Machine Learning

    2021-12-15 12:45:30ZiaUlRehmanSagheerAbbasMuhammadAdnanKhanGhulamMustafaHiraFayyazMuhammadHanifandMuhammadAnwarSaeed
    Computers Materials&Continua 2021年2期

    Zia Ul Rehman, Sagheer Abbas,Muhammad Adnan Khan,Ghulam Mustafa, Hira Fayyaz,Muhammad Hanif and Muhammad Anwar Saeed

    1School of Computer Science, National College of Business Administration &Economics, Lahore, 54000,Pakistan

    2Department of Computer Sciences, Bahria University, Lahore, 54000,Pakistan

    3Department of Computer Science, Lahore Garrison University, Lahore, 54000,Pakistan

    4School of Systems and Technology, University of Management and Technology, Lahore, 54000,Pakistan

    5Department of CS& IT, Virtual University of Pakistan, Lahore, 54000,Pakistan

    Abstract: The internet, particularly online social networking platforms have revolutionized the way extremist groups are influencing and radicalizing individuals.Recent research reveals that the process initiates by exposing vast audiences to extremist content and then migrating potential victims to confined platforms for intensive radicalization.Consequently, social networks have evolved as a persuasive tool for extremism aiding as recruitment platform and psychological warfare.Thus,recognizing potential radical text or material is vital to restrict the circulation of the extremist chronicle.The aim of this research work is to identify radical text in social media.Our contributions are as follows:(i)A new dataset to be employed in radicalization detection;(ii)In depth analysis of new and previous datasets so that the variation in extremist group narrative could be identified; (iii) An approach to train classifier employing religious features along with radical features to detect radicalization; (iv) Observing the use of violent and bad words in radical, neutral and random groups by employing violent, terrorism and bad words dictionaries.Our research results clearly indicate that incorporating religious text in model training improves the accuracy, precision, recall, and F1-score of the classifiers.Secondly a variation in extremist narrative has been observed implying that usage of new dataset can have substantial effect on classifier performance.In addition to this, violence and bad words are creating a differentiating factor between radical and random users but for neutral (anti-ISIS) group it needs further investigation.

    Keywords:Radicalization; extremism; machine learning; natural language processing;twitter;text mining

    1 Introduction

    Internet and social media networks may play a dynamic role in the violent radicalization process as it allows convenient spread of misinformation and propaganda.It also facilitates the identification and engagement of selected audience who seem to be interested in radical messages.Online radicalization introduces an individual to ideology that encourages the drive to shift from mainstream belief to extremism.Precisely defining radicalism, it specifies embedding oneself into others opinion, belief, and knowledge to persuade the behavior of other individual [1].It has been identified that radical individual control the minds of young generation by initiating radicalization process through social media [2].Online radicalization of social network users is growing pain and concern in current digital age as it escalates negative activities.With the increase of terror attacks and extremism in religious context radicalization is receiving serious attention and research work [3].Recent research proves that 78%terrorists are using internet for various activities and social media as a facilitative tool for online violent radicalization and for other extremist activities [4].Secondly we also have some examples of people who ended up being radicalized through online media as they were actively involved with like-minded people ending up believing on their ideology [1].Anders Breivik [5], an anti-Islam rebel was a normal social individual but somehow carried out Norway Bombing.Secondly, Zachary Chesser [6] a young enthusiastic student accepted Islam and speedily entered process of radicalization.He posted extremist views, comment,and videos and ended up joining Al Shabab.

    This research work primarily concentrates on the online radicalization process of Islamic State of Iraq and Syria (ISIS).Facts depict that ISIS has a deep-rooted online radicalization network which is highly persuasive and operative [7,8].One such illustration is the rise of ISIS propaganda on Twitter by 4% in the month of October 2019, which was the month of Baghdadi’s death (leader of ISIS).On average 214 new ISIS accounts were activated in the month of September 2019 and October 2019 as reported by Ctrl-Sec (https://twitter.com/CtrlSec).These all statistics demonstrate that ISIS online network is working at its best to induce their rationale into common user and death of their leader has only contributed towards more publicity to ISIS agenda and thoughts.Previous research reveals that killing is ineffective counter terrorism strategy against separatist and religious organizations [9].This has been proven as ISIS has announced their new leader just after a week of Baghdadi death [10].All these sightings and statistics demonstrate that ISIS has intensive embedded wide network of militants who are aimed at radicalizing potential online users and we have to formulate a strategy where we can hinder and stop this process as just by killing their leaders would not make a difference.Secondly it is essential to note that ISIS has been active in all good and bad times of organization itself.Recently many operations are executed against ISIS, but organization is fulfilling its motive.In January 2020, suicide bombing was conducting in Quetta, Pakistan killing 15 people [11].In same year in March 2020 an attack on Sikh complex was also executed by ISIS [12].ISIS is also proving threat in recent Covid-19 pandemic, executing attacks in 10 countries including Syria, Iraq, first ever attack in Maldives and Philippine.After Baghdadi’s death 25 terrorist attacks are executed by ISIS resulting in 491 fatalities till June 2020 [13].This all strongly indicate that ISIS has penetrated various corners of world and online radicalization has been one of the most fertile platforms to do so.

    Previous research has worked on Radicalization and have determined five Radical Groups.Doosje in their research [14] have discussed Separatist radical group which aims at securing a territory for their own group and religious group which aims at strict interpretation of their religion to justify violence against other religions.ISIS lies in both groups as they intent to control Iraq and Syria as their territory.Secondly ISIS are religiously motivated also as they use religious text to propagate their ideology.Additionally, ISIS followers normally support for violent actions and tend to use violent and bad words.This research work has mainly focused on identifying tweets which relate to these two characteristics(radical and religious).Based on all these findings this research effort investigates these main questions:

    ? Can incorporation of religious text into computational model enhance the performance of radicalization detection approaches? Previous research affirms that users when became activated as radical users, they started to use more religious terms while communicating on social media[15].

    ? Are there any changes in linguistic narrative and patterns of Pro-ISIS users?It is an important factor when detecting radicalization as basing on language we train our model.For answering this question,a comprehensivecorpusanalysis is conducted with previous and recent datasets.

    ? Is there any empirical evidence which proves that including violent and bad words in radicalization detection process is good measure? Secondly, we need to assess if Anti-ISIS users are also using it frequently or not.

    The research work is organized as follows:Section 1 introduces the scope and need of research,Section 2 presents an insight of previous work and its short coming, Section 3 demonstrates detailed methodology describing each and every stage of working model, Section 4 illustrates experiments and results, further it also presentscorpusanalysis,and section 5 concludes the research work discussing future perspective as well.

    2 Related Work

    Researchers are actively working on the online radicalization phenomenon [16] and how extremist organizations are employing it to achieve their motive [17,18].In this section we are summarizing established computational approaches developed to analyze,detect,and predict the processes of radicalization.

    Starting off with analysis of radicalization,in 2015 Klausen[19]has explored the role of Twitter in the jihadist functioning policy in Iraq and Syria.Considering 55 manually identified Twitter accounts,author has found out that the flow of communication is from terrorist account to the fighters situated in rebellious region to the supporters located in west.Author also discovered that 38.54% tweets were related to religious guidance.In 2015, Chatfield [20] has also found strong evidence that ISIS supporters/members utilize multisided Twitter network for terrorism propaganda, communication, recruitment, and radicalization.Vergani [21] has studied the growth and progression of ISIS language by examining the text used in 11 issues of Dabiq which is ISIS’ official English magazine.Findings are as follows:Firstly, using expression related to power and achievement, secondly using emotional words and thirdly frequent mentions of females, death, and Islam.Rowe [15] have examined user behavior at different stages of adopting pro-ISIS stance.Utilizing data mining approach author has defined the points of activation,portraying divergent behavior, and finally embracing pro-ISIS behavior.Br?ckling [22] in their work assessed the contents of Rumiyah which is the second IS propaganda magazine.Comprehensive analysis of all the issues of Rumiyah reveal that content instigate in readers that Caliphate is longer the objective rather they should start battle from their homelands.Secondly the magazine clearly narrates enemy images thus providing a basis for radicalization of youth.In 2019, Torregrosa [23] has conducted a study to compare the features of the rhetoric utilized by pro-ISIS and general Twitter users.Author investigated that usage of words with six or more letters relate with emotionality in negative sense and is an indicator towards psychological distancing.Previous research [24,25] are also reporting same.

    Elaborating the considerable efforts regarding detection of radicalization, we will first talk about the research of Berger et al.[26].In their work they had formulated a scoring mechanism to point out social media accounts which were most influential or had the tendency of being influenced within an extremist sphere.In [27] Berger focused at identifying ISIS supporting accounts from profile descriptions which comprised of words such as linger, succession, Caliph state, Islamic State, Iraq, and many more with the accuracy of 94%.The limitation of the study is that only 70% accounts had the profile information.Agarwal [28] has employed single class KNN and SVM algorithms for automatic detection of hate/extremism promoting tweets.The research concluded that the presence of war related term, religious term, negative and offensive words clearly indicate a tweet to be hate promoting.The model achieved F-Score 83%.Ashcroft [29] utilizes sentiment, time, and stylo-metric features to automatically detect text distributed from jihadist groups on Twitter.Author concludes that proposed technique can only assist humans in detection and is not capable of replacing completely.Saif [30] tested the efficacy of semantic features in comparison to sentiment features, unigram features, network features, and topic features for categorizing anti-ISIS and pro-ISIS users on Twitter.Experiments demonstrate that classifiers trained by semantic features perform well by 7.8% on F1-measure when compared with other baseline features.Lara-Cabrera [31] has established a set of Radicalization indicators based on belief, religion, personality from social sciences to evaluate if user has signs towards radicalization.In an extension to their work[32] author has mapped a set of radicalization indicators by social sciences (discrimination, introversion,frustration) to set of computational features (keywords) which could be extracted automatically from data.Results show this mapping is effective but has a limitation as it based on keywords only.In 2018 Smedt[33] developed a system that automatically detects online jihadist hate speech with F-score of 80%.The tweets were collected from October 2014 to December 2016.The research effort of Nouh [34]demonstrate that radical users (focused group was ISIS) particularly from Twitter show some textual,behavioral, and psychological characteristics.Secondly psychological are the most distinctive ones.Utilizing textual features author achieved F-Score of 80%with word2vec.

    In context of prediction, Ferrara [35] proposes a technique to predict if a Twitter user will embrace extremist content and reciprocates it.The results divulge that number of hashtags promoted, proportion of retweeting to tweeting and total number of tweets are all determining factors.In 2018, Fernandez [36]predicts and detects the radicalization influence a specific user has based on roots of radicalization extracted from social science models [37].In 2019, Waqas [38] proposed an approach to identify extreme behavior of Twitter users (focused extremist group was Taliban).TF-IDF features were extracted from n-gram terms in the tweets and best classifier (SVM) achieved average F-score of 84%.

    In this section we have conducted an exhaustive survey on types of models developed for analyzing,detecting,and predicting radicalization.Some of the significant findings are as follows:

    ? Most of the approaches are categorizing users based on few pieces of user content(new comments,recent posts),very few works consider complete history of user for instance their complete timelines.

    ? Most of the approaches are considering ISIS as only separatist group (aims at securing a territory)hence are extracting features based on radical language only.

    ? According to our knowledge very few approaches are focusing on violent and bad words.Some research efforts indicate that they are contributing towards radicalization process [28,34].

    ? Most approaches are not considering recent ISIS datasets which includes tweets from 2019.

    ? Some of the studies [14,15,19] particularly which are analyzing radicalization process have clearly hinted towards the presence of religious terms in radical content.

    We are aiming at providing a step ahead in relevance to the previous research efforts.We intend to introduce an approach which is considering ISIS as both Religious and Separatist group, hence incorporating religious text in addition to radical language for feature extraction.In contrast to previous studies our technique considers complete timeline of Twitter accounts to detect radicalization stance.In addition, we are analyzing violent and bad words usage pattern for radical and neutral users.It will allow us to illuminate the effect of violent and bad words in the process of radicalization as it is observed that all radical groups share common characteristics of showing violent and bad languages.Finally, we are employing our own new dataset which is collected from September 2019 to November 2019 so that results are based on the recent activity of ISIS.

    3 Methodology

    This research effort aims at developing an efficient framework for detecting radicalization content in potential Twitter accounts.The proposed framework outlines some major steps as illustrated in Fig.1.The major steps are data collection, data pre-processing, feature engineering, model generation, and evaluation of results.

    Figure 1:Proposed approach where radical features extracted from pro-ISIS users’ tweets, violent/bad words, and Arabic terms from dabiq and inspire magazines.Religious features extracted from religious text used in dabiq and rumiyah magazines

    3.1 Data Collection

    Starting from step 1 which is data acquisition we have utilized five distinct data sets in this study.In the following we will elaborate each dataset in detail.

    3.1.1 Radical Corpus(D1)

    This data set is named as D1 and represents RadicalCorpus.It consists of 17,350 Twitter user tweets.It is collected from 112 user accounts claimed to be pro-ISIS.It ranges on the period of three months.Users are identified basing on keywords such as Amaq,Dawla and Wilyat.Next,users are filtered basing on their usage of images(images of radical leadership,ISIS flags,Anwar Awlaki).It is publicly available on Kaggle data science community (https://www.kaggle.com/fifthtribe/how-isis-uses-twitter).

    3.1.2 Neutral Corpus(D2)

    This dataset is named as D2 and represents NeutralCorpus.It has been extracted as counterpoise of dataset D1.It consists of 122k tweets all collected from 95,725 anti-ISIS users on two days 7-11-2016 and 7-4-2016.Tweet are gathered basing on keywords such as isil, isis, Islamicstate, Mosul, raqqa,‘islamic state’.It is publicly available on Kaggle(https://www.kaggle.com/activegalaxy/isis-related-tweets).

    3.1.3 Religious Corpus(D3)

    This dataset is named as D3 and represents ReligiousCorpus.This dataset is vital in research as religious text plays a fundamental role in promoting and publicizing ISIS ideology and recruitment.It contains all the ideological and religious texts (Jewish, Muslim, Christian) utilized in ISIS English magazines.It analyzes 15 issues of Dabiq (June 2014-July 2016) and 9 issues of Rumiyah (September 2016-May 2017)generating 2,685 texts.It is publicly available on Kaggle data science community(https://www.kaggle.com/fifthtribe/isis-religious-texts).There are total 8 features in the dataset named as Magazine(Dabiq,Rumiyah),Issue #, Date, Type (Quran, Hadith, Jihadist, Islamist, 20 others), Source (Sahi Muslim, Bukhari, 1155 others), Quote (the actual text), Purpose, Article Name.We filter the dataset on basis of type selecting Jihadist, Islamist, and others as sources.We have excluded Quran, Hadith, and Bible as it does not represent extremist content.After filtration 936 quotes are used for the training purpose in our experiments.Most of these are the quotes from head of extremist groups for example Abu Mus’ab az-Zarqawi, Abu Bakr al-Baghdadi,and Osama Bin Laden.

    3.1.4 New Dataset (D4)

    This is newly collected dataset for this research work.It comprises of both radical and neutral tweets.To generate this dataset, we have extracted relevant data from Twitter employing Twitter Streaming API.It consists of tweets from user previously recognized as Pro-ISIS and suspended by Twitter.Ctrl-Sec is responsible for reporting these accounts.It is a non-profit organization which voluntarily reports the ISIS propaganda on Twitter.Earlier research [36] asserts that Ctrl-Sec is an efficient resource in generating dataset which assist in identifying radical users.Ctrl-Sec claims to be responsible for suspension of more than 350,000 reported Twitter accounts since it started working 2015.These reported accounts are immediately suspended hindering the collection of data.Consequently, researchers are unable to use most relevant tweets for further advance research endeavors.For D4 dataset we crawled the tweets (complete timeline) of latest reported accounts by Ctrl-Sec before they are suspended by the Twitter.The 9000 Tweets are collected by 13 reported accounts and their followers.The dataset is collected between September 2019 and November 2019.The ISIS propaganda increased in September 2019 after the releasing of new recording of their leader Abu Bakr al-Baghdadi in which he urges followers to continue attacks.We also manually review the tweets from each account to make sure it is promoting ISIS ideology or are involved to support their propaganda.While crawling the tweets we also found the English translation of the latest speech of the Abu Bakr al-Baghdadi shared by one of the reported accounts.The speech text is also incorporated in D4.These 13 accounts are suspended and no longer available.This dataset also comprises tweets from neutral users.For neutral class we collected tweets from 28 October 2019 to 30 October 2019 after Baghdadi’s death.We used the hashtags #Al-baghdadi,#baghdadikilled #abubakaralbaghdadi #ISIS to gather these tweets.These tweets are also analyzed manually to make sure it does not contain pro-ISIS contents.

    3.1.5 Random Dataset(D5)

    We have also collected tweets by random users discussing general topics.The dataset is collected by using Twitter API.The tweets are collected from 15 October 2019 to 20 October 2019.We manually observe the tweets to make sure it does not contain pro-ISIS or anti-ISIS contents.There are total 7000 tweets that are discussing current affairs, sports, and general topics.We have used this dataset in experiments to investigate our third research question which is to examine the usage of violence and bad words by radical users.

    3.2 Data Pre-Processing

    Moving towards Step 2 which is data pre-processing,we clean the acquired data(D1,D2,D3,D4,and D5).The extracted set of tweets are in raw state and contains undesired data and noise.This reduces the performance of classifiers.Consequently,we have performed a series of pre-processing tasks to clean data and make it appropriate for feature extraction.

    The steps are as follows;(i)Tokenization transform each tweet into word segments,it is necessary as we have to remove undesired term and construct word vector,(ii)It is very likely that token are repetitive with uppercase and lowercase.Character transformation aims at converting each single token into a specific format to control repetitive features,so here we are converting all tokens to lowercase,(iii)Irregular terms such as tagged URL links or images with combined text decreases the performance of model,hence all such term are also removed from tweets,(iv)In this step we remove all non-English tweets.The approach is to tokenize each tweet into a list of words and compare each word against an English dictionary then calculate a score between 0 and 1 measuring the amount of known English words in the tweet.We used Microsoft dictionary and remove the tweet if it contains 50% of non-English words.We kept the threshold value at 50% because we do not want to remove the tweet containing some non-English words such as Kafir,Muwahhid and Taghut because these are the radical words and will help us to develop radical dictionary at feature engineering stage, (v) Stop words increases the dimensionality of features and are of no use.All the stop words (the, is, an, am, e.g., to, how and, punctuation marks) are removed from the dataset,(vi) Stemming is performed to eradicate various inflected form of words to a common base from, storing the result in word vector.

    3.3 Feature Engineering

    In the next step, feature engineering was performed.We have considered two categories to determine appropriate features to detect radical text.In the following we will explain these two categories of textual features.

    3.3.1 Radical Language

    In this category we had to comprehend the construction and usage of radical terms.For this we extracted textual features from the D1 dataset which contains the tweets from radical users.For understanding the construction of radical messages, we have extracted radical language used by the pro-ISIS users.We have also incorporated existing dictionaries with the aim of providing a wider set of terms representing radicalization terminology.The integrated dictionaries are:

    ? The Top 50 terms used by Pro-ISIS users as mentioned in [30,31,39].Some of these terms are Caliphate,Crusaders,Apostate,assad, war,enemy,isis, Islamic state,Syria.

    ? Arabic terms glossary as referred in [40].These all terms are extracted from ISIS official magazine Dabiq (issue July 2014-July 2016) and Al-Qaida magazine Inspire (issue June 2010-May 2016).Some of the terms are not in standard format with respect to their usage and spelling so these terms are considered as jihadist slang.This glossary includes 300 distinct terms, but we have only used the ones which clearly speak for ISIS propaganda.Some sample terms are:al-wala wal bara,Alawite, dar al-kufr, fajir, Cihad (Turkish form of Jihad), Madkhalis, manhaj, murtad, Muwahhid,salaf,shirk,takfir,takhmis, wilayah, zindiq,zani,Hijrah, Bay’ah, Murtaddin,Mushrikin, Taghut.

    ? In addition,we also incorporate vocabularies of violence,terrorism related words[41],and curse/bad words[42].We combine all these vocabularies.After removing duplicate words there are 2375 unique words in total.These vocabularies are also used in previous studies[34]for radicalization detection.

    3.3.2 Religious Text

    In this category we had to understand the construction and usage of religious language.As mentioned earlier ISIS falls into the category of religious radical group and uses religious text to promote their ideology and for propaganda contents.For this we extracted textual features from D3 dataset which contains the religious text used in ISIS propaganda magazines Dabiq and Rumiyah.

    We have used TF-IDF technique of extraction of radical terms from the radicalcorpus(D1) and the religious terms from the religiouscorpus(D3).In Term Frequency-Inverse Document Frequency(TF-IDF) the values of each words within these datasets are calculated.Unigrams and bigrams are applied to identify the terms and the perspective in which these phrases are being used.Top-scoring grams are then selected to be employed as features for the language modelling.Previous literature proves that N-gram have been efficient in detecting extremist content and hate speech[38].

    3.4 Classification Model

    Moving ahead next step is to train machine learning algorithm.Choosing an efficient classifier is an imperative task to construct a progressive predictive capability.In this study we have employed na?ve Bayes, Random Forest, and Support Vector Machines.Previous studies [34,38] investigating similar problems proves that these classifiers are performed better.The efficacy of these algorithms is discussed in the coming sections which elaborates experiments and results.

    3.5 Evaluation Metrics

    The last step is to evaluate our results.The standard evaluation metrics are used to measure the effectiveness of the classifiers.These are precision,recall,accuracy,and F-score.

    4 Experimental Setup

    In our experimental setup we have taken following steps; (i) Dataset collection and generation, (ii)Exploratory Data Analysis, (iii) Applying classification algorithms on developed classification model and,(iv) Evaluating results.We have already described datasets D1, D2, D3, D4, and D5 in Section 3.An elaborated insight about the purpose of each dataset is also given.It all accumulates Step 1, data collection and generation.In the next sub-section,we will demonstrate exploratory data analysis.

    4.1 Corpus Analysis

    Corpusanalysis is a textual analysis which facilitates comparison between textual object at a larger scale.It is an effective approach for in-depth demographic analysis.It enhances the understanding of dataset as it represents data with improved visualization techniques.In this sub-section we will present exploration of radical tweets fromcorpusD4 (testingcorpus) and D3 (ReligiousCorpus).D1 (RadicalCorpus) is used in previous studies [23,31,34,36] and it is already established that it contains pro-ISIS tweets.To validate that our newly collected dataset (D4) is also aligned with this we performed this investigation.We investigated the new dataset (D4) with two different tools and techniques to explore varying patterns and properties of the datasets.We have conducted (i) Linguistic analysis by employing LIWC,(ii) Scatter-text.Following sections explain them in detail.

    4.1.1 Linguistic Analysis

    Linguistic analysis is a study which aims at analyzing the distinct pattern in language employed by a group.In our research effort we have employed the Linguistic Inquiry Word Count (LIWC) software to observe and understand terminologies contained in our dataset D4.As elaborated earlier D4 is one of the pivotal datasets which effects results immensely.It consists tweets from pro-ISIS accounts which are reported by ctrl-sec.It is a novel dataset,so we have explored the characteristics it possesses.

    Previously many research attempts have been made which deeply analyzed the language patterns of jihadi groups.Some substantial findings are; i) Jihadi groups use more words related to anger,emotionality, religion and death [43], ii) Increased usage of words related to females so that women get attracted to their motive [21], iii) Very less usage of words depicting friendship while significant use of words with negative tone, certainty and power [44].It is also stated that pro-ISIS users use third person plural pronouns and words with six or more letters while interacting as compared to singular pronoun or other words [24].Torregrosa in his research effort [23] has conducted a comprehensive linguistic analysis of pro-ISIS users’ dataset which in our case is D1.Some common characteristics are defined for the extremist contents.Following we assess our dataset D4 based on these characteristics of extremist data.We will discuss each property in relevance to D4.

    ?Supportive comments towards jihadi/extremist groups and their ideologies.In D4 the tweets support the extremist groups such as ISIS and Taliban and express sentiments by using words like Mujahedeen,Muwahideen,Fighters,and Taliban.

    ?Usage of extremist terminologies to criticize the groups and people for instance“Kafir”and“Kuffar.” D4 do possess the attribute of criticizing other groups by using violence and aggression related words such as “Kill them all,”Taghut, Pigs,and Kafir.

    ?Expression of support and dedication towards jihadi leaders (for example, Al-Baghdadi).In D4“Ameer ul momnin” and“Shykh” are used to show respect and support towards leaders.

    ?Intensive sharing of interviews, links to interviews of jihadifigure and of individuals who show support towards ISIS.In case of D4, Twitter removed the video links containing extremist contents, but we found statements, quotes, and speeches of ISIS leaders.We also found the English translation of the Al-Baghdadi’s speech of September 2019, which is the last speech before his death.This testify that intensive sharing has been done.

    ?Strong condemnation of countries which are involved in US-led coalition in Iraq and Syria.In our dataset(D4)strong opposition to US coalition by using extremist terminologies is observed.Presence of US-led coalition in Afghanistan is also criticized in addition to Syria and Iraq.

    Above we have manually observed the characteristics of our dataset D4.The characteristics demonstrated by D4 are similar with the characteristics of D1.This proves that D4 is promoting radical propaganda especially the motive of ISIS.This analysis will support us in our experiments as we aim to train and test our model on D4.Secondly, this dataset can be used in further research.Now we will assess the psychological patterns of the tweets shared by the radical users in D4.For the purpose we employ LIWC default dictionaries which will measure the occurrence of word from each dictionary.We compare our results with [23] and found our results are in-line with them.Tab.1 is showing the average words count for each category.From Tab.1 it is evident that emotional tone is relatively high as compared to previous analysis.First person plural and third person plural values are also higher in our case.As expected, they use more words expressing anger, certainty, power, religion, and death.These results are in-line with previous analysis [23], the only contradiction witnessed is for the results of emotional tone and first person singular.

    4.1.2 Scatter-Text Analysis

    Scatter-text has the competency of comparing the frequency of two terms and label them in scatterplot.In our study we have employed scatter-text;an open source tool to visualize linguistic dissimilarity between document groups.It presents a scatterplot where each axis corresponds to the frequency of a term occurring in document groups.Through state of art technology this tool can exhibit thousands of terms represented in point form and finds space to legibly label at least hundreds of them.We have used scatter-text for data visualization and identify differences in word usage between radical and neutral tweets.Fig.2 demonstrate the graph generated by scatter-text for D4.

    In the graph,x-axis represents radical group with red color and y-axis represents neutral group with blue color.The total documents analyzed are as follows;(1)Radical Documents Count:6,922 and Word Count:59,215,(2)Neutral Document Count:1,898 and Word Count:17,749.Point placement and intelligent word labelling makes analysis extremely competent and resourceful.As the graph illustrates some of the top frequent terms used by radical users areTaliban, allah, muslim, afghanistan, islam, war and ibn.In the same manner top frequent terms used by neutral users areraid, baghdadi, trump, terrorist, dog, andisisleader.Characteristics shows the unordered list of the frequent used words by both radical and neutral.One noteworthy observation is that even non-English terms and abbreviation which are frequently used are highlighted in this analysis,for instancekhawaarij,kuffar,kufr,ummahanddunya.The scatterplot is highly interactive,as you click on any specific term its TF-IDF score will be displayed.For instance,considering the top frequent termterroristwe can see the frequency and TF-IDF score as “173.13 per 25k words, score:0.59990.”It is quite useful information regarding hidden pattern of our new dataset D4.

    Table 1:Average no.of words used by radical users of corpus D4 in comparison to users of corpus D1

    Figure 2:X-axis shows the frequency of words used by radical users and y-axis shows the frequency of words used by neutral users.On the right, top 10 neutral and top 10 radical, and an unordered list of words (characteristic) used by both users are listed

    4.1.3 Results and Findings of Corpus Analysis

    Thiscorpusanalysis is quite fruitful as it has rendered some noteworthy observations.We have figured out some similarities and differences in previous and new dataset.According to our analysis,both datasets possess following similarities.

    ? Negative emotions occur with high frequency which means the ratio of negative words is higher in the tweets.

    ? Power, Certainty, Anger, Religion and Death related words are sighted with higher value.These observations are in-line with the previous studies [38].

    ? Religious terms such as Allah,Muslim, People,and Islam occur frequently in both datasets.

    ? Violence and bad words vocabulary such as Killed, Attack, Kafir, and Enemy are also giving higher values.

    Coming towards the contradicting properties we had following notes:

    ? Both datasets are showing different political terms.D1 is showing Syria, Iraq, Israel, Aleppo, and Ramadi with high frequency.On the other hand, D4 is frequently showing the terms related to Afghanistan,Kashmir, and Taliban.This shows the change in political narrative of ISIS.

    ? Terms related to Women are occurring more frequently in D4 as compared with previous dataset D1.This represent the ISIS agenda to motivate women to promote their ideology.

    To sum up,it is reasonable to say that our new dataset is representing the current narrative of ISIS which has changed from 2015 to 2020.According to our understanding the proposed dataset D4 if included in future research will deliver promising results.

    4.2 Experiments

    For the evaluation of our research objectives,we have setup an experiment.Our first research objective states that supporters of radical group particularly ISIS may exhibit similar textual properties as presented by religiouscorpusD3(extracted from propaganda magazines)when communicating on social media.We have put an effort to identify if religious text contributes positively towards detecting radical content.

    4.2.1 Experiment 1

    The first experiment is divided into two cycles.In the first cycle we trained the classifiers by employing radical features only as described in Section 3.We used our new dataset D4 for model training and testing by applying 10-fold cross-validation.A specific tweet is labeled as radical if it shows radical language,propagates violence, or encourages violence.In the second cycle we again trained our classifier and this time by selecting both radical and religious features so a clear comparison could be established.We compared the results from both experiments and found out that the performance of model improves by employing religious features in classifier training.The results can be seen in Tab.2.To get better predictive competency, we have applied various learning algorithm such as na?ve Bayes, SVM(linearSVC) and Random Forest (n-estimators = 100 with gini impurity for split).This experiment is performed on the complete set of features mined that comprises of TF-IDF feature set.We used scikitlearn’s TfidfVectorizer.

    F-score, accuracy, precision and recall with each classifier are recorded.With all three classifiers the values of accuracy, precision, recall, and F-score increases as we incorporate religious features in classifier training.This is evident from results that religious terms are vital in detecting radicalization content.This is clearly in-line with our research objective.

    Table 2:Classifiers scores of evaluation metrics

    4.2.2 Experiment 2

    Our second experiment intends to observe the usage of violent and bad words by extremist group supporters.We also need to look if it can aid in detection of radical content.For this we utilized LIWC to acquire the average word count (bad and violent words) from radical and neutral users’ tweets.Dictionaries of violence, terrorism, and bad words are employed.These dictionaries are described in Section 3.First, we compare radical user’s tweets from D4 with random tweets dataset D5.The results demonstrate that radical users on average use more words related to violence as compared with general Twitter users.The values for both users can be visualize in Fig.3.

    Figure 3:Average No.of violence/bad words used by radical(pro-ISIS)users and random(normal)users

    After that we compare the radical and neutral users of our recent proposed dataset (D4) and already available datasets (D1, D2).The results demonstrate clearly that both classes radical and neutral are using violent and bad words while communicating on social media.Fig.4 presents results in detail.For D4, the word count is higher for neutral class and same goes for D2.D1 is radicalcorpusbut it is showing a lesser value.At this stage further research is required to measure the extent by which the usage of violent and bad words of radical group differ from neutral group.

    Figure 4:Average No.of violence/bad words used by radical(pro-ISIS)users and neutral(anti-ISIS)users

    4.3 Analysis of Results and Discussion

    In this section,we are deeply analyzing the results we achieved from our experiments.We also compare our results with previous related studies so that a clear comparison of proposed methodology could be established.Previous work used the lexicon-based techniques [36] and machine learning [28,33,34,38] to identify the radical content on Twitter.In our research we used machine learning to classify the tweets as radical or neutral.Our approach is different from [33,34,38] in terms of extracting features.We combine radical and religious terms in feature extraction.Experiment 1 studies the role of religious terms.The results we have achieved are better as compared with previous related studies that investigates radical or extremist contents on social media.We have presented a short summary of previous substantial research efforts and our research attempt in Tab.3.We have included the focus group of study, extracted textual features and the achieved F-score with proposed methodology.

    Table 3:F-score in comparison to previous related studies

    Earlier, we have put up three research questions that we intended to investigate (Section 1).Research Question 1 focused on the religious language and how it can be employed for radicalization detection.For this purpose, an empirical approach which incorporates religious features for the detection is proposed.Experiments illustrate that integration of religious features yields higher value for F-score,Precision, Accuracy, and Recall.Consequently, it is reasonable to merge religious features along with other features for radicalization detection.In reference to Research Question 2 we anticipated to observe the narrative of radical (pro-ISIS) users over the time.We sought to establish a comparison of linguistic patterns for previous and new datasets by using different state of the art tools and techniques.The objective is to observe the difference or change in use of common terms/expressions, emotions and behavioral or psychological patterns.As we found some common terms or expressions in our new dataset that are also appeared in previous dataset, but we also observed some changes in narrative.The religious terms (Allah, Muslim, People, Prophet, Islam) used by pro-ISIS users previously are still used frequently in new dataset.Some political terms that are used frequently before such as Syria, Iraq, Aleppo, and Ramadi are not used frequently in our latest dataset.In contrast the words of Afghanistan, Kashmir and Taliban are used frequently in recent data.This is consistent with language of Rumiyah.The content of Rumiyah encourage readers that caliphate is no longer the objective rather they should start battle from their homelands.The recent attacks of ISIS in Afghanistan, Philippine and Maldives seem to relate with the content of Rumiyah magazine.In relevance to research Question 2, it is justifiable to say that new dataset (D4) can increase the accuracy of model as it represents the current narrative of ISIS.

    Finally,coming to Research Question 3 which raises concerns about violent and bad words.We explored the use of bad and violent words by radical and neutral group.We employed LIWC to analyze the tweet text of radical and random users.Our results show that radical users are using more words related to violence and bad words as compared to random users.We also compared the tweets text of radical and neutral users(tweets that are showing Anti-ISIS sentiments).Our results show that violent and bad words are frequently used by neutral classes as well when communicating on social media.This question needs further intensive research to see if bad and violent words could help in detection process.

    5 Conclusion and Future Perspectives

    This research attempt proposes an effective approach employing machine learning which aims at detection of radical content on social media.Its major focus is to take advantage of religious language used by extremist group particularly on Twitter as some evidence supports that religious language also contributes positively towards radicalization detection.Religious features along with radical features are employed.Various machine learning algorithms are trained to evaluate the results.Secondly,we have also conducted an in-depth analysis of datasets.For this purpose,corpusanalysis was performed to understand the difference in language narrative of ISIS over time.Thirdly, violence and bad words are also considered.Our experiments produced positive results supporting our research objective, but we believe in future enhancements.First, we like to add psychological and contextual dimension to the proposed model and validate if its efficacy has increased over multiple datasets.Furthermore, most of the accounts reported by Ctrl-Sec are from Afghanistan and they tweet in Pashto language.We intend to expand this research with other languages particularly Pashto language.Collecting empirical data in terrorism is a grueling process, but in future we should aim at experimenting with larger samples.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产成人一区二区在线| 美女主播在线视频| 97在线视频观看| 久久国产亚洲av麻豆专区| 欧美日韩av久久| 新久久久久国产一级毛片| 亚洲精品一二三| 国产精品一区二区性色av| 成人国产麻豆网| 99九九线精品视频在线观看视频| 国产精品99久久99久久久不卡 | 午夜影院在线不卡| av福利片在线观看| 亚洲美女黄色视频免费看| 啦啦啦在线观看免费高清www| 久久韩国三级中文字幕| 精品99又大又爽又粗少妇毛片| 国产在线男女| 亚洲一区二区三区欧美精品| 亚洲欧洲精品一区二区精品久久久 | 亚洲精品久久久久久婷婷小说| 亚洲精品日韩av片在线观看| 校园人妻丝袜中文字幕| 美女视频免费永久观看网站| 精品人妻熟女毛片av久久网站| 欧美精品一区二区大全| 自拍欧美九色日韩亚洲蝌蚪91 | 欧美xxⅹ黑人| 免费不卡的大黄色大毛片视频在线观看| 综合色丁香网| 久久99热6这里只有精品| 日韩视频在线欧美| 久久99一区二区三区| 九九久久精品国产亚洲av麻豆| 最近中文字幕高清免费大全6| 色婷婷久久久亚洲欧美| 丁香六月天网| 亚洲成人av在线免费| 婷婷色综合大香蕉| 少妇猛男粗大的猛烈进出视频| 亚洲成人一二三区av| 秋霞伦理黄片| 久久热精品热| 伦理电影免费视频| 日韩 亚洲 欧美在线| 一个人免费看片子| 寂寞人妻少妇视频99o| 色婷婷av一区二区三区视频| 一区二区三区乱码不卡18| 国产精品久久久久久久久免| 内射极品少妇av片p| freevideosex欧美| 在线观看国产h片| 人妻少妇偷人精品九色| 欧美变态另类bdsm刘玥| 这个男人来自地球电影免费观看 | 一区二区三区四区激情视频| 欧美成人精品欧美一级黄| 91精品一卡2卡3卡4卡| 交换朋友夫妻互换小说| 精品一区在线观看国产| 欧美丝袜亚洲另类| 久久精品国产亚洲av涩爱| 天天躁夜夜躁狠狠久久av| 亚州av有码| 精品国产国语对白av| 中文字幕制服av| 伊人久久精品亚洲午夜| 欧美日韩精品成人综合77777| 一级毛片久久久久久久久女| 妹子高潮喷水视频| 免费看光身美女| 欧美日韩在线观看h| 青春草亚洲视频在线观看| 国产成人aa在线观看| 日韩电影二区| 天天躁夜夜躁狠狠久久av| 国产精品免费大片| 韩国av在线不卡| 久久毛片免费看一区二区三区| 中文天堂在线官网| 黑人猛操日本美女一级片| 曰老女人黄片| 国产成人午夜福利电影在线观看| 国产精品偷伦视频观看了| 亚洲欧洲精品一区二区精品久久久 | 国产av国产精品国产| 亚洲av综合色区一区| 日韩成人伦理影院| 免费高清在线观看视频在线观看| 午夜免费鲁丝| 丝瓜视频免费看黄片| 人人妻人人澡人人爽人人夜夜| 国产欧美日韩综合在线一区二区 | 赤兔流量卡办理| 男女免费视频国产| 日韩欧美 国产精品| 国产精品无大码| 亚洲av.av天堂| 国产视频首页在线观看| 91久久精品国产一区二区成人| 成年人午夜在线观看视频| 免费看av在线观看网站| 在线观看人妻少妇| a级一级毛片免费在线观看| 亚洲成色77777| 国产一区二区在线观看av| 国模一区二区三区四区视频| 日韩视频在线欧美| 一区二区三区精品91| 丰满迷人的少妇在线观看| 久久精品国产亚洲网站| 亚洲性久久影院| 午夜日本视频在线| 啦啦啦中文免费视频观看日本| 晚上一个人看的免费电影| 一个人看视频在线观看www免费| 国产精品无大码| 久久6这里有精品| 亚洲国产成人一精品久久久| 熟女电影av网| 精品一区在线观看国产| 久久久久久久国产电影| 欧美日韩综合久久久久久| 国产伦精品一区二区三区视频9| 精品卡一卡二卡四卡免费| 精品亚洲乱码少妇综合久久| 国产成人精品无人区| 一边亲一边摸免费视频| 欧美精品亚洲一区二区| 中文资源天堂在线| 日韩制服骚丝袜av| 黄色视频在线播放观看不卡| 亚洲,欧美,日韩| 日本色播在线视频| 91精品国产国语对白视频| 高清在线视频一区二区三区| 精品熟女少妇av免费看| 成人影院久久| 亚洲不卡免费看| 高清午夜精品一区二区三区| a级毛片免费高清观看在线播放| 少妇熟女欧美另类| 黑丝袜美女国产一区| 亚洲精品乱久久久久久| 午夜激情福利司机影院| 欧美最新免费一区二区三区| 日韩三级伦理在线观看| 欧美3d第一页| 黑丝袜美女国产一区| 日韩三级伦理在线观看| 99热6这里只有精品| 十八禁网站网址无遮挡 | 极品少妇高潮喷水抽搐| 交换朋友夫妻互换小说| 久久 成人 亚洲| 伊人久久国产一区二区| 亚洲av中文av极速乱| 综合色丁香网| 在线观看人妻少妇| 久久久午夜欧美精品| 国产综合精华液| 中文字幕免费在线视频6| 亚洲成人av在线免费| 午夜激情久久久久久久| 香蕉精品网在线| 老司机影院毛片| 黑人高潮一二区| 少妇熟女欧美另类| 99视频精品全部免费 在线| 自拍欧美九色日韩亚洲蝌蚪91 | 草草在线视频免费看| 亚洲精品国产av成人精品| 青春草视频在线免费观看| 亚洲精品亚洲一区二区| 一级毛片我不卡| 青春草视频在线免费观看| 国产黄频视频在线观看| 一二三四中文在线观看免费高清| 国产淫语在线视频| 最黄视频免费看| 成人无遮挡网站| 久久精品熟女亚洲av麻豆精品| 日本与韩国留学比较| 中文字幕av电影在线播放| 亚洲精品一区蜜桃| 亚洲av中文av极速乱| 免费观看无遮挡的男女| 精品一品国产午夜福利视频| 看非洲黑人一级黄片| 人妻人人澡人人爽人人| 日日摸夜夜添夜夜添av毛片| 最新中文字幕久久久久| 国产 精品1| 精品人妻熟女毛片av久久网站| 国产成人免费观看mmmm| 天堂俺去俺来也www色官网| 亚洲经典国产精华液单| 国国产精品蜜臀av免费| 乱人伦中国视频| 久久久久久久久久久久大奶| 亚洲成人手机| 亚洲精华国产精华液的使用体验| 七月丁香在线播放| 嘟嘟电影网在线观看| 最近中文字幕2019免费版| 夫妻午夜视频| 久久久久久人妻| 制服丝袜香蕉在线| 青青草视频在线视频观看| 亚洲av在线观看美女高潮| 我的老师免费观看完整版| 丰满迷人的少妇在线观看| 精品亚洲乱码少妇综合久久| 深夜a级毛片| 插阴视频在线观看视频| 少妇被粗大的猛进出69影院 | 亚洲欧美日韩东京热| 色吧在线观看| 久热久热在线精品观看| 欧美精品人与动牲交sv欧美| 成人无遮挡网站| 亚洲欧美成人精品一区二区| 国产一区亚洲一区在线观看| 久久久久久久大尺度免费视频| 久久99一区二区三区| 黄色怎么调成土黄色| 久久久a久久爽久久v久久| 久久久午夜欧美精品| videossex国产| 97超碰精品成人国产| 少妇人妻 视频| 亚洲国产色片| 黑丝袜美女国产一区| 久久ye,这里只有精品| 国产乱人偷精品视频| 99热这里只有是精品在线观看| 美女cb高潮喷水在线观看| 亚洲人成网站在线播| 欧美97在线视频| 亚洲欧美一区二区三区黑人 | 亚洲欧美日韩卡通动漫| 国产无遮挡羞羞视频在线观看| 国产伦理片在线播放av一区| 在线观看免费日韩欧美大片 | 天美传媒精品一区二区| 国产亚洲一区二区精品| 尾随美女入室| 国产熟女午夜一区二区三区 | 亚洲av在线观看美女高潮| 午夜日本视频在线| 男人和女人高潮做爰伦理| 欧美激情国产日韩精品一区| 国产亚洲91精品色在线| 99久久人妻综合| 亚洲精品亚洲一区二区| 男人爽女人下面视频在线观看| 亚洲欧美日韩东京热| 少妇的逼好多水| av线在线观看网站| 国产一区二区三区av在线| 热99国产精品久久久久久7| 久久精品国产亚洲av涩爱| 大片电影免费在线观看免费| 新久久久久国产一级毛片| 欧美日韩在线观看h| 国产老妇伦熟女老妇高清| 大香蕉久久网| 偷拍熟女少妇极品色| 老女人水多毛片| 国产午夜精品久久久久久一区二区三区| 午夜福利影视在线免费观看| 五月开心婷婷网| av一本久久久久| 乱码一卡2卡4卡精品| 国产黄频视频在线观看| 最近2019中文字幕mv第一页| 欧美三级亚洲精品| 一区二区三区乱码不卡18| 亚洲久久久国产精品| 五月玫瑰六月丁香| 又爽又黄a免费视频| 亚洲精品,欧美精品| 国内精品宾馆在线| 精品国产露脸久久av麻豆| 久久综合国产亚洲精品| 国产色婷婷99| 亚洲精品色激情综合| 狠狠精品人妻久久久久久综合| 日日啪夜夜撸| 婷婷色综合www| 成年人免费黄色播放视频 | 国产亚洲av片在线观看秒播厂| av在线观看视频网站免费| 色婷婷久久久亚洲欧美| 欧美日韩一区二区视频在线观看视频在线| 99九九在线精品视频 | 高清欧美精品videossex| www.av在线官网国产| 一级毛片电影观看| 国产欧美日韩精品一区二区| 国产男人的电影天堂91| 国产亚洲av片在线观看秒播厂| 3wmmmm亚洲av在线观看| 久久精品久久久久久久性| 精品人妻偷拍中文字幕| 丝袜脚勾引网站| 亚洲成人av在线免费| 最近中文字幕高清免费大全6| 18+在线观看网站| 爱豆传媒免费全集在线观看| 在线亚洲精品国产二区图片欧美 | 亚洲av电影在线观看一区二区三区| 国产免费又黄又爽又色| 女人精品久久久久毛片| 中文字幕制服av| 国产精品偷伦视频观看了| 国产 精品1| 日本黄大片高清| 毛片一级片免费看久久久久| 伊人久久精品亚洲午夜| 黄色怎么调成土黄色| 免费看不卡的av| 自拍欧美九色日韩亚洲蝌蚪91 | 丰满乱子伦码专区| tube8黄色片| 亚洲美女视频黄频| 纯流量卡能插随身wifi吗| 欧美亚洲 丝袜 人妻 在线| 亚洲国产色片| 欧美精品人与动牲交sv欧美| 亚洲国产精品成人久久小说| 国产成人精品无人区| 美女cb高潮喷水在线观看| 国产精品一区二区在线观看99| 精品少妇久久久久久888优播| 18+在线观看网站| 精品久久国产蜜桃| 男人添女人高潮全过程视频| 少妇的逼好多水| 亚洲国产毛片av蜜桃av| 色吧在线观看| 国产亚洲av片在线观看秒播厂| 少妇人妻 视频| 欧美日韩亚洲高清精品| 欧美精品一区二区免费开放| 青春草国产在线视频| 国内少妇人妻偷人精品xxx网站| 在线 av 中文字幕| av.在线天堂| 丰满少妇做爰视频| 老司机影院毛片| av卡一久久| 亚洲欧美日韩东京热| 9色porny在线观看| 国产伦在线观看视频一区| 国产精品一区二区在线不卡| 中文资源天堂在线| 免费大片18禁| 欧美人与善性xxx| 国产视频首页在线观看| 国产精品不卡视频一区二区| 成人漫画全彩无遮挡| 久久毛片免费看一区二区三区| 一级a做视频免费观看| 亚洲国产毛片av蜜桃av| 亚洲国产欧美在线一区| 国产日韩欧美在线精品| 五月玫瑰六月丁香| 久久狼人影院| 少妇的逼好多水| 日韩精品免费视频一区二区三区 | 大话2 男鬼变身卡| 国产片特级美女逼逼视频| 人体艺术视频欧美日本| 插阴视频在线观看视频| 亚洲电影在线观看av| 能在线免费看毛片的网站| 老司机影院毛片| 亚洲婷婷狠狠爱综合网| 你懂的网址亚洲精品在线观看| 国产免费一区二区三区四区乱码| 99视频精品全部免费 在线| 99九九在线精品视频 | 狂野欧美白嫩少妇大欣赏| 欧美精品人与动牲交sv欧美| 少妇 在线观看| 国内少妇人妻偷人精品xxx网站| 亚洲国产精品成人久久小说| 日韩一本色道免费dvd| 欧美精品亚洲一区二区| 在线观看av片永久免费下载| 51国产日韩欧美| 日韩人妻高清精品专区| 亚洲精品第二区| 精品人妻偷拍中文字幕| 一级黄片播放器| 久久久午夜欧美精品| 99热全是精品| 午夜av观看不卡| 妹子高潮喷水视频| 日韩伦理黄色片| 国产精品蜜桃在线观看| 日韩不卡一区二区三区视频在线| 在线观看一区二区三区激情| 精品人妻偷拍中文字幕| 高清不卡的av网站| 一级爰片在线观看| 亚洲真实伦在线观看| 亚洲欧美清纯卡通| 人人妻人人澡人人爽人人夜夜| 亚洲高清免费不卡视频| 在线天堂最新版资源| 国产亚洲精品久久久com| 高清黄色对白视频在线免费看 | 免费人妻精品一区二区三区视频| 国产无遮挡羞羞视频在线观看| 91aial.com中文字幕在线观看| 成人二区视频| 日韩不卡一区二区三区视频在线| 观看免费一级毛片| 午夜激情久久久久久久| 人人妻人人看人人澡| 久久久久人妻精品一区果冻| 欧美高清成人免费视频www| 精品一区二区免费观看| 久久精品国产亚洲av天美| 九九久久精品国产亚洲av麻豆| av黄色大香蕉| 啦啦啦在线观看免费高清www| 国产伦精品一区二区三区四那| 色婷婷av一区二区三区视频| 如何舔出高潮| 日韩中字成人| 亚洲图色成人| 哪个播放器可以免费观看大片| 国内精品宾馆在线| 中文天堂在线官网| 三级国产精品片| 亚洲天堂av无毛| 女的被弄到高潮叫床怎么办| www.色视频.com| 国产色爽女视频免费观看| 亚洲自偷自拍三级| 人人妻人人看人人澡| 青青草视频在线视频观看| 人妻制服诱惑在线中文字幕| 欧美日韩国产mv在线观看视频| 国产高清不卡午夜福利| 欧美 亚洲 国产 日韩一| 国产精品一区二区性色av| 国产精品99久久99久久久不卡 | 国产精品一区二区在线不卡| 亚洲欧美日韩东京热| 王馨瑶露胸无遮挡在线观看| 久久人妻熟女aⅴ| 男人爽女人下面视频在线观看| 国产免费一区二区三区四区乱码| 大香蕉久久网| 一区二区三区乱码不卡18| 国产精品一区二区性色av| 最近2019中文字幕mv第一页| 少妇人妻一区二区三区视频| 久久精品国产鲁丝片午夜精品| 日韩三级伦理在线观看| 另类亚洲欧美激情| av国产精品久久久久影院| 黑丝袜美女国产一区| 老司机亚洲免费影院| 亚洲精品乱码久久久久久按摩| 超碰97精品在线观看| 亚洲欧洲国产日韩| 国产日韩欧美在线精品| 噜噜噜噜噜久久久久久91| 人妻制服诱惑在线中文字幕| 午夜福利影视在线免费观看| 天天躁夜夜躁狠狠久久av| 久久精品久久久久久久性| 日韩精品有码人妻一区| 在线观看人妻少妇| 国产亚洲最大av| 99国产精品免费福利视频| 91久久精品国产一区二区成人| 亚洲电影在线观看av| 最近2019中文字幕mv第一页| 日韩中字成人| 久久久久久久亚洲中文字幕| 国产精品三级大全| 伦精品一区二区三区| 亚洲成人手机| 91久久精品电影网| 一级av片app| 九九久久精品国产亚洲av麻豆| 日韩视频在线欧美| 亚洲情色 制服丝袜| 精品人妻熟女毛片av久久网站| 午夜91福利影院| 我的老师免费观看完整版| a级毛色黄片| 国产极品粉嫩免费观看在线 | 国产伦精品一区二区三区四那| 在线观看美女被高潮喷水网站| 久久女婷五月综合色啪小说| av女优亚洲男人天堂| 亚洲美女黄色视频免费看| 高清毛片免费看| 国产亚洲欧美精品永久| 日韩成人伦理影院| 少妇猛男粗大的猛烈进出视频| 制服丝袜香蕉在线| 免费看av在线观看网站| 我的女老师完整版在线观看| 欧美变态另类bdsm刘玥| 国产成人免费无遮挡视频| 日本免费在线观看一区| 亚洲国产精品成人久久小说| 日本色播在线视频| 又黄又爽又刺激的免费视频.| 亚洲精品国产色婷婷电影| av有码第一页| 曰老女人黄片| 美女主播在线视频| 欧美一级a爱片免费观看看| 日韩强制内射视频| 女人久久www免费人成看片| 春色校园在线视频观看| 蜜臀久久99精品久久宅男| 亚洲精品乱码久久久v下载方式| av又黄又爽大尺度在线免费看| 中国美白少妇内射xxxbb| 国产免费视频播放在线视频| 天天操日日干夜夜撸| 嘟嘟电影网在线观看| 成人国产av品久久久| 性色avwww在线观看| 两个人的视频大全免费| 女的被弄到高潮叫床怎么办| 人人妻人人澡人人看| 亚洲第一av免费看| 天堂8中文在线网| 久久精品国产亚洲av涩爱| 毛片一级片免费看久久久久| 男女啪啪激烈高潮av片| 在线免费观看不下载黄p国产| 26uuu在线亚洲综合色| av在线app专区| 一级毛片电影观看| 免费看光身美女| 女性被躁到高潮视频| 亚洲真实伦在线观看| 国产日韩欧美亚洲二区| 18禁在线播放成人免费| 你懂的网址亚洲精品在线观看| 国产视频内射| 亚洲av男天堂| 国产欧美日韩一区二区三区在线 | 又粗又硬又长又爽又黄的视频| 欧美97在线视频| 一边亲一边摸免费视频| 中文字幕久久专区| 国产男女内射视频| 国产av一区二区精品久久| 成人18禁高潮啪啪吃奶动态图 | 高清在线视频一区二区三区| 一本—道久久a久久精品蜜桃钙片| 黄色欧美视频在线观看| 色哟哟·www| 日韩电影二区| 搡老乐熟女国产| 欧美老熟妇乱子伦牲交| 丰满乱子伦码专区| 欧美+日韩+精品| 日本爱情动作片www.在线观看| 九草在线视频观看| 国模一区二区三区四区视频| 寂寞人妻少妇视频99o| 老司机亚洲免费影院| 国产精品不卡视频一区二区| 日韩大片免费观看网站| 色视频www国产| 两个人的视频大全免费| 成人无遮挡网站| 国产成人freesex在线| 激情五月婷婷亚洲| 中文资源天堂在线| 免费观看无遮挡的男女| 精品国产一区二区三区久久久樱花| 国内精品宾馆在线| a级毛片在线看网站| 三级国产精品片| 欧美日韩精品成人综合77777| 在线亚洲精品国产二区图片欧美 | 亚州av有码| 国产精品久久久久久久电影| 人妻少妇偷人精品九色| 国产一区二区在线观看日韩| 久久国产精品男人的天堂亚洲 | 3wmmmm亚洲av在线观看| 国产淫语在线视频| 精品卡一卡二卡四卡免费| 亚洲一区二区三区欧美精品| 久久久国产欧美日韩av| 一级毛片久久久久久久久女| 欧美精品一区二区大全| 久久精品国产a三级三级三级| 国产视频首页在线观看| 你懂的网址亚洲精品在线观看| 91精品国产九色| 高清av免费在线| 女性生殖器流出的白浆| 亚洲精品成人av观看孕妇| 亚洲国产av新网站| 中文资源天堂在线| 国产片特级美女逼逼视频| 亚洲怡红院男人天堂|