• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Applying Machine Learning Techniques for Religious Extremism Detection on Online User Contents

    2022-11-09 08:15:08ShynarMussiraliyevaBatyrkhanOmarovPaulYooandMilanaBolatbek
    Computers Materials&Continua 2022年1期

    Shynar Mussiraliyeva,Batyrkhan Omarov,*,Paul Yoo,2 and Milana Bolatbek

    1Al-Farabi Kazakh National University,Almaty,Kazakhstan

    2CSIS,Birkbeck College,University of London,London,UK

    Abstract:In this research paper,we propose a corpus for the task of detecting religious extremism in social networks and open sources and compare various machine learning algorithms for the binary classification problem using a previously created corpus,thereby checking whether it is possible to detect extremist messages in the Kazakh language.To do this,the authors trained models using six classic machine-learning algorithms such as Support Vector Machine,Decision Tree,Random Forest,K Nearest Neighbors,Naive Bayes,and Logistic Regression.To increase the accuracy of detecting extremist texts,we used various characteristics such as Statistical Features,TF-IDF,POS,LIWC,and applied oversampling and undersampling techniques to handle imbalanced data.As a result,we achieved 98%accuracy in detecting religious extremism in Kazakh texts for the collected dataset.Testing the developed machine learning models in various databases that are often found in everyday life“Jokes”,“News”,“Toxic content”,“Spam”,“Advertising”has also shown high rates of extremism detection.

    Keywords: Extremism;religious extremism;machine learning;social media;social network;natural language processing;NLP

    1 Introduction

    Over the past fifty years,the ideologies of extremism,radicalism,and terrorism have clearly increased,as evidenced by the rapid increase in the number of terrorist incidents worldwide and the severity of deaths associated with each incident,as shown by the global terrorism database(GTD) [1].Unfortunately,the number of terrorist attacks against countries of the Organization for economic cooperation and development (OECD) in 2015 was the highest since 2000.It was the second-worst year in terms of the number of deaths after 2001,as reported in the Global Terrorism index [2].In 2015 alone,there were more than eleven thousand terrorist attacks globally,as a result of which more than twenty-eight thousand people were killed [3].While in 2016,a study by Peace Tech Lab showed that 1,441 terrorist attacks occurred worldwide with more than fourteen thousand deaths [4].While in the first half of 2017,the number of terrorist attacks reached 520,as a result of which,according to the map of terrorist incidents,3565 people were killed,and that year,terrorism was responsible for 0.05% of global deaths [5].

    Since 2014,the threat of lone-wolf attacks has increased significantly.This was facilitated by the call of the Islamic State of Iraq and Syria (ISIL/ISIL/DAESH) to its supporters on September 22,2014,to carry out terrorist attacks on countries participating in or supporting the global coalition against DAESH,including many OECD countries.As a result,the United States was heavily targeted by ISIS-inspired attacks,with almost a third of all attacks targeting OECD countries from 2014 to mid-2016 occurring in the United States [6].A study by the Institute for Economics and Peace found that religious extremism has increased dramatically since 2000 and embodying the leading ideology of terrorism in the Middle East and North Africa,sub-Saharan Africa,and South Asia [7].

    Although the terms “radicalism”and “terrorism” are widely used,they remain poorly defined and are often confused because they are exonyms by nature [8].In this context,the following definition of violent extremism is accepted as “encouraging,condoning,justifying or supporting the Commission of a violent act to achieve political,ideological,religious,social or economic goals”.In comparison,the term radicalism is defined as “the process of developing extremist ideologies and beliefs” [9,10].On the other hand,Islamist radicalism is defined as “a militant methodology practiced by Sunni Salafi Islamists who seek the immediate overthrow of existing regimes and the non-Muslim geopolitical forces that support them in order paving the way for an Islamist society that will develop through military force” [11,12].

    The use of technologies such as artificial intelligence,machine learning,and data mining in the fight against terrorism,radicalism,and violent extremism,especially in social networks,has attracted the attention of researchers over the past seventeen years [13-16].Thus,intelligence and security Informatics has become a trending interdisciplinary field of research where advanced information technologies,systems,algorithms,and databases are studied,developed,and developed for international,national,and domestic security-related applications [17].Several universities are working with local and national security agencies to establish research centers for the study of terrorism.Prominent examples of such institutions are the Chicago security and threat project(CPOST),based at the University of Chicago [18,19],and the national consortium for the study of terrorism and responses to terrorism,which is the center of excellence of the US Department of homeland security,based at the University of Maryland [20,21].

    In this article,we explore the problem of detecting religious extremist thoughts and calls for extremism in online social sites,focusing on understanding and detecting extremist thoughts in online user content.We conduct a thorough analysis of content,language preferences,and topic descriptions to understand extremist appeals from a data mining perspective.Six different sets of informative features were identified,and several training algorithms were compared to identify extremist thoughts in the data.This is a new application of automatic detection of religious extremism in content with a combination of our proposed effective feature design and classification models.

    This article makes a notable contribution and innovation to the literature in the following ways:

    (1) Application of knowledge detection and data mining to detect the specific nature of religious extremism and calls to commit extremist acts in online user content.Previous work in this area has been done by psychological experts with statistical analysis;this approach reveals knowledge about extremist ideas in data analysis.

    (2) Data corpus and platform: this article presents the Vkontakte social network and collects a new set of data for detecting extremist messages and calls to extremism.We used the Vkontakte social network [22] as it is the most popular social network among Kazakhstani youth [23].Fig.1 illustrates the results of surveys about utilizing social networks among young people in Kazakhstan.The data set is collected from a social network widely used in CIS countries and is classified into two categories (containing and not containing extremist messages or calls to extremism) by psychologists.

    (3) Models and benchmarking: instead of using basic models with simple functions to detect extremist messages,this approach (1) identifies informative functions from various perspectives,including statistical,syntactic,linguistic,word embedding,and thematic functions;(2) chooses the best model to identify extremist texts by comparing various classifiers such as Support Vector Machine,Decision Tree,Random Forest,K Nearest Neighbors,Naive Bayes,and Logistic Regression and (3) provides benchmarks for detecting calls to extremism.

    Figure 1:Trends of Kazakhstan youth: the most popular social networks among youth in Kazakhstan

    The overall structure of the paper is as follows.In Section 2,we do a review on the related works.There,we tell about web-crawlers that proposed to collect,classify,and interpret the extremism information on the internet,machine learning techniques that used to identify extremism related texts,and about analyzing online user contents.Section 3 describes data collection,data annotation,data exploration,and preparation process.Section 4 describes feature extraction and text classification methods.Section 5 demonstrates the experiment results that were conducted to different algorithms and their comparison.In Section 6,we discuss opportunities in practical use and limitations of current research.In the end,we conclude and talk about the future of the research.

    2 Related Works

    Ashcroft et al.[24] tried to identify Jihadist messages on Twitter automatically.Within the article,researchers center on tweets which include English hashtags associated with ISIS.The authors used 3 dissimilar features such as stylometric features,temporal features and sentiment features.Be that as it may,one of the most confinements of their approach is that it is exceedingly subordinate on the information.Moreover,in [25] the researchers centered on identifying Twitter users included with “Media Mujahideen”,a Jihadist bunch who disseminate purposeful content online.They utilized a machine learning approach employing a combination of data-dependent and data-independent features.The test was based on a restricted set of Twitter accounts,making it troublesome to generalize the outcomes to a more complex and reasonable scenario.

    In [26],the authors proposed to apply LSTM-CNN model,which works as follows: (i)CNN model is applied for feature extraction,and (ii) LSTM model receives input from the CNN model and retains a sequential correlation by taking into account the previous data for capturing the global dependencies of a sentence in the document concerning tweet classification into extremist and non-extremist.Authors experimented with multiple Machine Learning classifiers such as Random Forest,Support Vector Machine,KN-Neighbors,Naive Bayes,and deep learning classifiers.

    In [27],a sentiment analysis tool and a decision tree are used to differentiate pro-extremist web pages from anti-extremist pages,news pages,and pages that did not relate to extremism.

    The novelty of the research [28] is to improve the algorithm of naive Bayes on detecting a sentiment that leads to terrorism on Twitter.To increase the accuracy,user behavioral analysis has been proposed to embed into the algorithm after the sentiment classification process has been done.

    In [29],the authors searched for lexical,psycholinguistic and semantic features that allow automatic detection of extremist texts.The researchers performed morphological analysis,syntactical analysis of the corpus,as well as semantic role labelling (SRL) and keyword extraction (noun phrases).

    The work [30] points at identifying right-wing radical content Twitter profiles written in German.The authors created a bag-of-words frequency profile of all tokens used by authors in the entirety of all messages in their profile.

    In [31],an Exploratory Data Analysis (EDA) using Principal Component Analysis (PCA),was performed for tweets data (having TF-IDF features) to reduce a high-dimensional data space into a low-dimensional space.Furthermore,the classification algorithms like naive Bayes,K-Nearest Neighbors,random forest,Support Vector Machine and ensemble classification methods (with bagging and boosting),etc.,were applied PCA-based reduced features and with a complete set of features.

    In [32],the authors made a detailed analysis of the use of affect technologies to analyze online radicalization.Influence analysis was applied to a wide range of domains,such as radical forums,radical magazines,and social networks (Twitter,Facebook and YouTube).As classifiers,in this work,both Logistic Regression and Linear SVM are considered.In this work,the SIMON method is adapted to extract radicalization detection features by using radically oriented lexicons.

    Research [33] focuses on the sentimental analysis of social media multilingual (Urdu,English and Roman Urdu) textual data to discover the intensity of extremism’s sentiments.The study classifies the incorporated textual views into four categories,including high extreme,low extreme,moderate,and neutral,based on their level of extremism.

    In [34],a context-sensitive computational method to investigating radical content on Twitter breaks down the influence prepared into building blocks.The authors show this handle employing a combination of three relevant measurements—religion,ideology and hate—each explaining a degree of radicalization and highlighting autonomous features to render them computationally open.The paper makes three commitments to solid examination: (i) Advancement of a computational method established within the relevant measurements of religion,ideology,and hate,which reflects procedures utilized by online Islamist radical bunches;(ii) An in-depth investigation of important tweet corpora concerning these measurements to prohibit likely mislabeled users;and iii) a system for comprehension online extremism as a handle to help counterprogramming.In this paper,researchers utilize Word2Vec with skip-grams to produce contextual dimension models.

    In [35],and experience and the results of collecting,analyzing,and classifying Twitter data from affiliated members of ISIS,as well as sympathizers are presented.Authors used artificial intelligence and machine learning classification algorithms to categorize the tweets,as terrorrelated,generic religious,and unrelated.In addition,researchers built their own crawler to download tweets from suspected ISIS accounts.Authors report the K-Nearest Neighbour classification accuracy,Bernoulli Na?ve Bayes,and Support Vector Machine (One-Against-All and All-Against-All) algorithms.

    It should be noted that all the above-mentioned literature contains studies to determine extremist texts in English and other languages.At the moment,the authors of the study have not been able to find any work on the definition of extremist messages in the Kazakh language.

    3 Data

    Before classifying texts to extremist-related or neutral,we need to define danger criteria.One solution is to prepare a set of keywords.For the definition,a set of key phrases was prepared,applied to explore data in the Vkontakte social network [22].Referring to the indicated keywords or phrases in the text,the software package infers that the text is applicable for further study.Fig.2 shows the entire data collection,analysis of posts,and classification of texts.

    Figure 2:Scheme of data acquisition,analysis and classification of posts

    The accomplishment of data acquisition may differ depending on the data source but keeps the main concept of its structure.The main goal of the part of the software responsible for data retrieval from open sources is to accomplish actions promptly and effectively.To gain high efficiency,it is necessary to use the built-in methods for receiving data from sources (API).In case of absence of such methods,then it is necessary to acquire the required data from HTTP requests.

    There are three modules of the software package:

    1) Information collection module is responsible for obtaining data from open sources and transmitting it for further treatment;A Python framework was built to parse data from the VK social network.We used official VK API [36] and partially parsed open accounts in Kazakhstan.

    2) Keyword search module is responsible for finding keywords in a large amount of data;since we already had a list of keywords and key phrases often found in extremism related messages;we applied a linear search for words in each text,partitioning it into tokens.Keywords or key phrases for searching for possible dangerous messages were developed and approved by experts.

    3) Document ranking module is responsible for identifying whether the data is related to extremism.

    3.1 Information Collection Module

    To collect data,we use the Vkontakte social network.Fig.3 illustrates a schema of the data collection process.We use Python 3.6 to create a parser for data collection.Interaction with the social network API was performed using the requests library.The Pycharm Community Edition 2018 software was chosen as the development environment.To get the data,we use The VK API,a ready-made interface that allows getting the necessary information from the Vkontakte social network database using HTTPS requests.Components of the request are given in Tab.1.Tab.1 lists the components of a simple users query.get which as a request url looks like this‘https://api.vk.com/method/users.get?user_id=210700286&v=5.92’.

    Figure 3:Data collection schema

    Table 1:Query component

    All methods in the system are divided into sections.In the transmitted request,you must pass the input data as getting parameters in the HTTP request after the method name.If the request is successfully processed,the server returns a JSON object with the requested data.The response structure for each method is strictly defined.The rules are specified on the pages describing the method in the official documentation.

    To analyze the data,Python 3.7 programming language was applied with pandas,NumPy,matplotlib,plotly,bokeh,cufflinks,spacy,googletrans packages as main libraries for calculation and visualization.Full description of programming code was given in Google Colaboratory [37]notebook by the address https://colab.research.google.com/drive/1osZ0oEAgmna2OTK5gpTG4_24 f3P-dsX?usp=sharing [38].

    3.2 Keyword Search Module

    What does “keywords confirming the possibility of defining a post as extremist” mean? There is a certain set of words that are often used by people who have decided to commit extremism or to call for extremism.In General,these words are directly related to the idea of life and death.Still,sometimes,in posts written by people who call for extremism,they try to avoid using words that directly mean their attempt at extremism.But they try to use synonyms for these same words,allowing us to find their posts using more and more new sets of keywords.

    Keywords associated with extremism were identified from the previous topic.For example,kafir,kill,blow up,end,etc.These keywords will help you search for extremist posts on social networks.

    As you find extremist posts,the keyword database will be updated,thereby providing a more accurate definition of extremist posts.

    3.3 Document Ranking Module

    Document ranking module-responsible for determining whether the information is dangerous.Word2vec vectorizer and deep learning algorithms such as Long Short Term Memory (LSTM)and Bidirectional Long Short Term Memory (BiLSTM) were used to rank documents by hazard level.More information about feature processing methods is given in the next sections.

    Data Annotation Module.We collected the extremism ideation texts from Vkontakte social network and manually checked all the posts to ensure they were correctly labelled.Our annotation rules and examples of posts appear in Tab.2.

    Table 2:Annotation rules

    4 Methods and Technical Solutions

    Before attributing the text to extremism related,it is necessary to define the criteria of“danger”.One solution is to define a set of keywords.This method of determining the types of information was used in the developed software package.For the definition,a set of keywords was compiled,which was used to analyze information in the social network Vkontakte.Based on the presence or absence of the specified keywords in the text,the software package concludes that the text is suitable for further research.In our study,we used statistical features,parts of speech(POS),Linguistic Inquiry and Word Count (LIWC),TF-IDF word frequency features.

    To understand the informativeness of these feature sets,we visualise the features on the collected corpus in 2-dimensional space by using principal component analysis (PCA) [39] in Fig.4.From Fig.4,we can observe a clearer separation between the two colours.This indicates that it should be easier for our classifier to separate both groups.

    4.1 Classification Models

    Extremism related message detection in social networks content is a standard supervised learning classification problem.Taking into account a corpus {xi,yi}niconsisting texts {xi}niwith labels {yi}ni,we developed a supervised classification models to learn the function from the training data pairs of input objects and supervisory signals [40]:

    whereyi=1 represents thatxiis “extremist intended text”,yi=0 denotes “not extremist intended text.” The training of the classification problem is to minimize the classification error in the training data.The prediction error is to be introduced as a loss function L(y,F(x)) where y is the real label and F(x) is the predicted label.In general terms,the goal of training is to obtain an optimal prediction model F(x) by solving below optimization task:

    Figure 4:Visualization of extracted features using PCA

    Fig.5 demonstrates a schema of extremism related texts classification.The features include statistical features,LIWC features,POS,TF-IDF vectors,and as well as oversampling and undersampling techniques to handle imbalanced data.All extracted features were input to the classifiers.

    4.2 Evaluation Method

    Our task is to detect extremism related content of each of the users in the chosen data.We start performing text classification methods using the entire space of dimensional objects extracted from the data set.As basic characteristics,we utilize N-gram probabilities,LIWC categories,the LDA model,and their multiple combinations of functions based on collected training data.

    Confusion matrix: this is a method for summarizing the results of classification.Accuracy alone is misleading if the number of observations is not balanced in each class.This gives an idea of our model for getting the correct one and differentiating it from the error.This clearly shows that the correct classification of a low extreme class is less,which is why its accuracy and recall work poorly.

    Precision and recall: accuracy is also called positive predictive value.This is the proportion between the corresponding instances among the extracted instances.The recall is the sensitivity,and it is the proportion between the retrieved relevant instances compared to the total number of relevant instances.In classification,the accuracy is a true positive (TP) divided by the total number of labelled (TP + FP) belonging to this class.Recall that in classification,the total number of true positives (TP) is divided into instances that actually belong to the class (TP + FN).

    Figure 5:Classification of extremism related texts

    Receiver Operating Characteristic (ROC): ROC is usually used for binary classification to study the output quality of the classifier.To find the ROC for classification with multiple labels,you must binarize the output data.One curve is drawn for each label,but each indicator is treated as a binary forecast.

    5 Experiment Results and Evaluation

    In this section,we compare the results of applying different machine learning algorithms for religious extremism classification using different combinations of features.In current research,we consider the following most common methods of classifier construction and training: Decision Tree,Random Forest,Support Vector Machine,k-nearest neighbors,Logistic Regression,Na?ve Bayes.

    5.1 Feature Processing

    In this section,we compare the results of applying different machine learning algorithms for religious extremism classification using different combinations of features.In current research,we consider the following most common methods of classifier construction and training: Decision Tree,Random Forest,Support Vector Machine,k-nearest neighbors,Logistic Regression,Na?ve Bayes.

    As shown in Tab.3,the performance of all methods improves by combining more features as a whole.This observation confirms the informativity and efficiency of the acquired features.Nevertheless,the contribution of each feature varies considerably,which indicates oscillations in the outcomes of separate methods.The Support Vector Machine and Logistic Regression methods show the best productivity of the applied methods when using all groups of features as input data.Random Forest and Na?ve Bayes also show good results in F1.

    Table 3:Comparison of different methods using different features

    The AUC performance measurement in each classification is the area under the receiver operating characteristic curve with all extracted features.As we noticed from the results,the AUC performance rises with the increasing of features.

    The Logistic Regression method achieves the highest AUC of 0.9759.In addition to this,the majority of other methods have AUC value above 0.9.The receiver operating characteristic (ROC)curves of these methods are shown in Fig.6.

    Figure 6:The receiver operating characteristic curve of six methods with all processed features

    5.2 Extremism Ideas in Neutral Topics

    To evaluate the extremism related text classification with other specific online communities,we expanded our corpus and tested our models in “news”,“toxic content”,“spam”,“advertising”,“jokes”.The results are illustrated in Fig.7.They show more than 90% accuracy in detecting extremism related texts from the other domains.Thus,using the features extracted using our approach was an effective way to classify reports of extremist ideas from another area.

    In real world data,a class imbalance is a frequent problem,where one class contains a small number of data points,and another contains a large number of data points.In our dataset,we have met a class imbalanced problem,where 1% of all data is religious extremism related data;the other part is neutral data.In order to solve a class imbalanced problem we did experiments using oversampling and undersampling techniques.

    Tab.4 demonstrates the imbalanced classification results.The KNN method gave the best result in imbalanced classification with the maximum classification accuracy,recall,f1-score,and AUC ROC curve applying oversampling,maximum precision in undersampling.In these experiments,KNN gains better performance in accuracy,recall,f1-score,and AUC ROC than most models using oversampling and the best precision using undersampling.Fig.8 demonstrates receiving operating characteristics for imbalanced data classification.

    Figure 7:Classification for extremist related content vs. other domain texts

    Table 4:Comparison of different methods using different features applying sampling techniques

    Table 4:Continued

    Table 4:Continued

    Table 4:Continued

    Figure 8:The ROC curve of six methods with all processed features using imbalanced classification

    6 Discussion

    6.1 Practical Use

    Our research results demonstrate that the text-mining approach can be used to detect contents with religious extremism on the internet.As one of the most effective models,the logistic regression model and the Na?ve Bayes algorithm conduct well on the given issue.The models that are applied in this research can be applied to instantly identify people with calls to extremism when they publish materials on their forum or blog entry.Because of the suitability and flexibility of the mentioned model,code for embedding in mobile applications,comments,blogs,forums add little workload.If religious extremism calls or thoughts are recognized in the pop-up window,the message can be immediately blocked.

    6.2 Limitations

    Firstly,the classification system in current research is limited to text messages in the Kazakh Language.Such models can be trained and tested in other languages if there is an appropriate dataset or corpus.

    Secondly,our system can give a decision if an input text is religious extremism related or not.It cannot distinguish the level of hardness of extremism (as low,moderate,high extremism types).For that,it needs to create another corpus or the current corpus needs to be expanded with labelling of different levels of extremism.

    Thirdly,by saying extremism detection,we can tell only about religious extremism.The other extremism types as violent,radicalization,racism,supremacism and ultranationalism,political extremism,anarchist,maoist,or single issue extremism are not considered in this research.For automatic detection of each type of extremism,it would be necessary to create a sufficient corpus that divided multiple classes and multiclassification algorithms would need to be applied.

    Fourthly,our system can only claim to detect extremism texts,not a possible extremism attempt.

    Fifthly,in this research,we use classical machine learning algorithms and features.In further research,we will propose our own methods to improve extremism detection rate by considering the Kazakh language features.In the next part of our research,we are going to improve classification results by considering the uniqueness of the Kazakh Language.

    By considering the relationship between religious extremism ideation and extremism facts,the acute focus should be devoted to people who use social networks to talk with thoughts of radical or extremist beliefs.The results of this research specify that these short statements have the capability to attract user’s attention and cause serious anxiety.Future study may attempt to illuminate the true threat by exploring the social networks materials of those known to have committed extremist acts.Besides,carrying a prospective examination within which users give permission to having both extremist thought risk and social network posts monitored with relevant operations for adverse events would help to better understand the nature of social network behavior among those who experienced radical thoughts.

    The given limitations during this study are going to be considered in the next step of our research.

    7 Data Availability

    The data used to confirm the results of this study is available in the Mendeley data resource at https://data.mendeley.com/datasets/h272z7xv9w/1.

    8 Conclusion

    The amount of text information is growing rapidly with the popularization of social networks,thus leaving many problems such as calls for extremism,suicide,and the dissemination of various information that will lead to psychological problems.Now,the prevention of these problems is the most important problem of the Internet society and it is extremely important to develop methods for automatic detection of such texts.

    In this research,we studied the problem of automatic detection of religious extremism in online user content.By gathering and exploring depersonalized data from open groups and social network accounts,we implement a wealth of knowledge that can complement the understanding of religious extremism and calls to extremism.By applying machine learning,feature processing techniques to the constructed corpora,we have clearly shown that our framework can achieve high accuracy in detecting extremist ideas and calls to religious extremism from ordinary messages,thereby preventing the spread of extremism.In this paper,we deliver our knowledge in 1)understanding of extremist thoughts and calls to extremism by analyzing extremism related posts,comments,texts;2) propose corpora to classify extremism ideation in the Kazakh language;3)proffer machine learning methods,techniques and features in detecting extremist ideas.

    Funding Statement: This work was supported by the grant “Development of models,algorithms for semantic analysis to identify extremist content in web resources and creation the tool for cyber forensics” funded by the Ministry of Digital Development,Innovations and Aerospace industry of the Republic of Kazakhstan.Grant No.IRN AP06851248.Supervisor of the project is Shynar Mussiraliyeva,email: mussiraliyevash@gmail.com.

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    热99re8久久精品国产| 国产aⅴ精品一区二区三区波| 97超碰精品成人国产| 九九在线视频观看精品| 久久这里只有精品中国| 午夜亚洲福利在线播放| 一级av片app| 赤兔流量卡办理| 精品熟女少妇av免费看| 五月玫瑰六月丁香| 免费观看的影片在线观看| 久久精品国产亚洲网站| 搡老熟女国产l中国老女人| av.在线天堂| 日韩欧美一区二区三区在线观看| 国产成人影院久久av| 亚洲国产精品久久男人天堂| 一个人看的www免费观看视频| 91av网一区二区| 欧美性猛交黑人性爽| 好男人在线观看高清免费视频| 国产在视频线在精品| h日本视频在线播放| 18禁黄网站禁片免费观看直播| 嫩草影院精品99| 熟女人妻精品中文字幕| 日韩在线高清观看一区二区三区| 最好的美女福利视频网| 一夜夜www| 久久久久性生活片| 国产成人一区二区在线| av国产免费在线观看| 一个人免费在线观看电影| a级毛色黄片| 看片在线看免费视频| 永久网站在线| 国产一区二区在线av高清观看| 老司机影院成人| 又黄又爽又刺激的免费视频.| 在线a可以看的网站| 一a级毛片在线观看| a级毛片a级免费在线| 可以在线观看的亚洲视频| 联通29元200g的流量卡| 又粗又爽又猛毛片免费看| 色哟哟·www| 国产真实乱freesex| 又黄又爽又刺激的免费视频.| 熟女电影av网| 天堂√8在线中文| 在现免费观看毛片| 大又大粗又爽又黄少妇毛片口| 精品一区二区三区视频在线观看免费| 天堂动漫精品| 精品一区二区三区视频在线| 欧美最黄视频在线播放免费| 亚洲精品亚洲一区二区| 中文字幕熟女人妻在线| 国产亚洲欧美98| 中文资源天堂在线| 色在线成人网| 69av精品久久久久久| 如何舔出高潮| 白带黄色成豆腐渣| 丰满的人妻完整版| 成人无遮挡网站| 精品午夜福利视频在线观看一区| 三级经典国产精品| 久久久久久久久久黄片| 亚洲国产精品成人久久小说 | 欧美人与善性xxx| 日本五十路高清| 久久久精品欧美日韩精品| 午夜激情福利司机影院| 久久久久久久久久成人| 3wmmmm亚洲av在线观看| 日韩av在线大香蕉| 精品久久久久久久久久久久久| 国产高清不卡午夜福利| 国产亚洲91精品色在线| 亚洲人与动物交配视频| 国产伦在线观看视频一区| 亚洲自拍偷在线| 俄罗斯特黄特色一大片| 精品日产1卡2卡| 少妇高潮的动态图| 精品乱码久久久久久99久播| 亚洲欧美中文字幕日韩二区| 久久久久免费精品人妻一区二区| 美女免费视频网站| 久久久久国内视频| 看黄色毛片网站| 国产精品久久久久久亚洲av鲁大| 亚洲性夜色夜夜综合| 国产精品一二三区在线看| av在线亚洲专区| 日本五十路高清| 精品免费久久久久久久清纯| 国产精品久久电影中文字幕| 亚洲第一区二区三区不卡| 久久人人爽人人爽人人片va| 国产视频内射| h日本视频在线播放| 国产精品久久久久久精品电影| 成人无遮挡网站| 精品久久久久久久久久免费视频| 久久精品人妻少妇| 日韩欧美免费精品| 国产 一区 欧美 日韩| 亚洲中文字幕一区二区三区有码在线看| 国产一区亚洲一区在线观看| 免费在线观看成人毛片| 伦理电影大哥的女人| 99热网站在线观看| 日韩 亚洲 欧美在线| 日日摸夜夜添夜夜添av毛片| 在线观看一区二区三区| 亚洲四区av| 美女被艹到高潮喷水动态| 日本免费一区二区三区高清不卡| 狂野欧美激情性xxxx在线观看| 久久99热6这里只有精品| 日本熟妇午夜| 日日撸夜夜添| 秋霞在线观看毛片| 亚洲国产精品合色在线| 国产男人的电影天堂91| 欧美3d第一页| 在线观看66精品国产| 国产男人的电影天堂91| 欧美高清性xxxxhd video| 亚洲精品一卡2卡三卡4卡5卡| 99久久中文字幕三级久久日本| 精品一区二区三区视频在线| 免费看光身美女| www.色视频.com| 男人的好看免费观看在线视频| 淫妇啪啪啪对白视频| 欧美一区二区精品小视频在线| 亚洲内射少妇av| 51国产日韩欧美| av在线亚洲专区| 国产精品av视频在线免费观看| videossex国产| 国产综合懂色| 人人妻,人人澡人人爽秒播| 激情 狠狠 欧美| 免费看日本二区| h日本视频在线播放| 国产精品人妻久久久影院| 人妻少妇偷人精品九色| 亚洲最大成人中文| 欧美精品国产亚洲| 久久草成人影院| .国产精品久久| 天堂动漫精品| 极品教师在线视频| 国产女主播在线喷水免费视频网站 | 日本爱情动作片www.在线观看 | 97在线视频观看| 99热这里只有是精品在线观看| 国产成人freesex在线 | 18+在线观看网站| 国产一区二区三区av在线 | 国内久久婷婷六月综合欲色啪| 亚洲电影在线观看av| 成年女人永久免费观看视频| 亚洲图色成人| 日韩精品青青久久久久久| 岛国在线免费视频观看| 十八禁国产超污无遮挡网站| 亚洲乱码一区二区免费版| 天天躁日日操中文字幕| 少妇的逼水好多| 看非洲黑人一级黄片| 国内精品宾馆在线| 91在线观看av| 波多野结衣高清作品| aaaaa片日本免费| 又黄又爽又免费观看的视频| 色综合站精品国产| 亚洲国产精品久久男人天堂| 亚洲精品一区av在线观看| 亚洲aⅴ乱码一区二区在线播放| 淫妇啪啪啪对白视频| 免费看a级黄色片| 精品久久久久久久末码| 91狼人影院| 久久久成人免费电影| 麻豆成人午夜福利视频| 三级男女做爰猛烈吃奶摸视频| 99在线人妻在线中文字幕| 国产精品久久久久久久久免| 欧美一区二区精品小视频在线| 一夜夜www| 久久久精品大字幕| 色噜噜av男人的天堂激情| 亚洲欧美日韩高清专用| 国产伦一二天堂av在线观看| 国产成人福利小说| 久久精品国产鲁丝片午夜精品| 大型黄色视频在线免费观看| 插阴视频在线观看视频| 搞女人的毛片| 一级毛片电影观看 | 性插视频无遮挡在线免费观看| 国产色婷婷99| 国产伦精品一区二区三区视频9| 久久午夜亚洲精品久久| 伦理电影大哥的女人| 国产av不卡久久| 老司机午夜福利在线观看视频| 国产视频一区二区在线看| 日韩强制内射视频| 久久久久精品国产欧美久久久| 亚洲av中文av极速乱| 毛片一级片免费看久久久久| 国产午夜精品论理片| 99久久中文字幕三级久久日本| 国产视频内射| 日韩人妻高清精品专区| 亚洲av熟女| 成人欧美大片| 国产一区二区在线观看日韩| 天天躁日日操中文字幕| 别揉我奶头 嗯啊视频| 黄色视频,在线免费观看| 亚洲七黄色美女视频| 在线免费观看不下载黄p国产| 亚洲成a人片在线一区二区| 天堂√8在线中文| 欧美精品国产亚洲| 亚洲欧美清纯卡通| 99久久成人亚洲精品观看| 国产精品一区二区性色av| 国产一区二区激情短视频| 亚洲人与动物交配视频| 国产av麻豆久久久久久久| 久久精品91蜜桃| 亚洲18禁久久av| 亚洲高清免费不卡视频| 日本三级黄在线观看| 亚洲中文字幕日韩| 亚洲av美国av| 亚洲av免费高清在线观看| 午夜日韩欧美国产| 在线观看一区二区三区| 男人和女人高潮做爰伦理| 亚洲欧美日韩高清在线视频| 熟女电影av网| 久久中文看片网| 午夜精品在线福利| 精品久久久噜噜| 日韩,欧美,国产一区二区三区 | 日本免费a在线| 99在线视频只有这里精品首页| 久久久久精品国产欧美久久久| 亚洲在线自拍视频| 国产黄片美女视频| 亚洲乱码一区二区免费版| 国产高清视频在线观看网站| 精品久久国产蜜桃| 99国产精品一区二区蜜桃av| 少妇熟女欧美另类| 在线播放国产精品三级| 又黄又爽又免费观看的视频| 国产探花在线观看一区二区| 在线观看免费视频日本深夜| 色哟哟哟哟哟哟| 国产精品一区二区三区四区久久| 欧美成人一区二区免费高清观看| 精品一区二区三区av网在线观看| 12—13女人毛片做爰片一| 天堂动漫精品| 麻豆国产av国片精品| 真人做人爱边吃奶动态| ponron亚洲| 日韩强制内射视频| 干丝袜人妻中文字幕| 亚洲性久久影院| 精品人妻视频免费看| 校园人妻丝袜中文字幕| 午夜精品国产一区二区电影 | 麻豆国产av国片精品| 国产在线男女| 日本与韩国留学比较| 亚洲欧美日韩卡通动漫| 久久久久精品国产欧美久久久| 一区二区三区高清视频在线| 亚洲av美国av| 美女 人体艺术 gogo| 赤兔流量卡办理| 麻豆久久精品国产亚洲av| 精品福利观看| 亚洲av成人av| 一级黄片播放器| 亚洲无线观看免费| 亚洲欧美日韩无卡精品| videossex国产| 大又大粗又爽又黄少妇毛片口| 自拍偷自拍亚洲精品老妇| 日韩欧美精品免费久久| 天堂av国产一区二区熟女人妻| 久久精品人妻少妇| 午夜亚洲福利在线播放| 欧美色欧美亚洲另类二区| 中文字幕熟女人妻在线| 少妇熟女欧美另类| 免费无遮挡裸体视频| 3wmmmm亚洲av在线观看| 日本爱情动作片www.在线观看 | av在线观看视频网站免费| 亚洲五月天丁香| 麻豆一二三区av精品| 18禁黄网站禁片免费观看直播| 99riav亚洲国产免费| 久久久a久久爽久久v久久| 国产午夜福利久久久久久| 成人特级黄色片久久久久久久| 搡女人真爽免费视频火全软件 | 免费观看的影片在线观看| 国产欧美日韩精品一区二区| 成年女人毛片免费观看观看9| 波多野结衣巨乳人妻| 日韩欧美精品v在线| 插阴视频在线观看视频| 中文资源天堂在线| 日韩精品有码人妻一区| 在线免费十八禁| 亚洲无线观看免费| 国产伦精品一区二区三区视频9| 国模一区二区三区四区视频| 高清毛片免费观看视频网站| 丝袜喷水一区| 欧美日本亚洲视频在线播放| 久久午夜福利片| 黄色欧美视频在线观看| 你懂的网址亚洲精品在线观看 | 91久久精品国产一区二区三区| 99久国产av精品| 亚洲中文字幕日韩| 亚洲内射少妇av| 国产精品伦人一区二区| 亚洲成人av在线免费| 国产成人91sexporn| 一本久久中文字幕| 午夜精品国产一区二区电影 | 精品国产三级普通话版| 亚洲五月天丁香| 日韩欧美国产在线观看| 国产精品国产高清国产av| 又黄又爽又刺激的免费视频.| 伦理电影大哥的女人| 久久中文看片网| 精品一区二区三区视频在线| 成人高潮视频无遮挡免费网站| a级毛片免费高清观看在线播放| 乱码一卡2卡4卡精品| av天堂在线播放| 禁无遮挡网站| 天天一区二区日本电影三级| 久久久精品欧美日韩精品| 尤物成人国产欧美一区二区三区| 日韩欧美精品v在线| 亚洲四区av| 欧美激情久久久久久爽电影| 成年女人永久免费观看视频| 亚洲不卡免费看| 国产三级中文精品| 亚洲精品影视一区二区三区av| 日韩欧美国产在线观看| 国产高潮美女av| 日日干狠狠操夜夜爽| 国产大屁股一区二区在线视频| 三级国产精品欧美在线观看| 亚洲无线在线观看| 性欧美人与动物交配| 国内精品一区二区在线观看| av免费在线看不卡| 国产亚洲av嫩草精品影院| 亚洲国产日韩欧美精品在线观看| 国产三级在线视频| 六月丁香七月| 成人美女网站在线观看视频| 1000部很黄的大片| 俺也久久电影网| 白带黄色成豆腐渣| 狂野欧美激情性xxxx在线观看| 欧美极品一区二区三区四区| 身体一侧抽搐| 天美传媒精品一区二区| 亚洲在线观看片| 精华霜和精华液先用哪个| 99久久精品国产国产毛片| 国产成人一区二区在线| 欧美性猛交黑人性爽| 久久久国产成人精品二区| av福利片在线观看| АⅤ资源中文在线天堂| 91精品国产九色| 国内少妇人妻偷人精品xxx网站| 欧美成人一区二区免费高清观看| 免费av观看视频| 我的女老师完整版在线观看| 午夜福利在线观看吧| 日韩强制内射视频| 内地一区二区视频在线| 婷婷精品国产亚洲av在线| 国产成人影院久久av| 尾随美女入室| 草草在线视频免费看| 18禁黄网站禁片免费观看直播| 欧美xxxx黑人xx丫x性爽| 97超碰精品成人国产| 97超视频在线观看视频| 国产精品久久久久久久久免| 又爽又黄a免费视频| 亚洲欧美日韩东京热| 床上黄色一级片| 日本在线视频免费播放| 日韩人妻高清精品专区| 91久久精品国产一区二区成人| 精品久久久久久久人妻蜜臀av| 精品午夜福利在线看| 在线看三级毛片| 全区人妻精品视频| 欧美性感艳星| 亚洲在线自拍视频| 亚洲av.av天堂| 亚洲久久久久久中文字幕| 精品熟女少妇av免费看| 性插视频无遮挡在线免费观看| 久久久久免费精品人妻一区二区| 搡女人真爽免费视频火全软件 | 成人毛片a级毛片在线播放| 一夜夜www| 美女被艹到高潮喷水动态| 久久久久久伊人网av| 啦啦啦啦在线视频资源| 免费看光身美女| 特级一级黄色大片| 色吧在线观看| a级毛色黄片| 日本-黄色视频高清免费观看| 嫩草影院入口| 国产精品一区二区三区四区免费观看 | 免费搜索国产男女视频| 欧美人与善性xxx| 日韩欧美免费精品| 色5月婷婷丁香| 亚洲精品国产成人久久av| 可以在线观看毛片的网站| 天堂动漫精品| 99热这里只有是精品50| 国产成人91sexporn| 成人亚洲精品av一区二区| 午夜福利在线在线| 日韩欧美精品免费久久| 看免费成人av毛片| 国产精品精品国产色婷婷| 午夜精品一区二区三区免费看| 国产私拍福利视频在线观看| 亚洲人成网站在线播| 一进一出抽搐gif免费好疼| 成人漫画全彩无遮挡| 精品日产1卡2卡| 国产亚洲精品久久久久久毛片| 国产精品免费一区二区三区在线| 亚洲欧美中文字幕日韩二区| 人妻制服诱惑在线中文字幕| 国产亚洲91精品色在线| 国内久久婷婷六月综合欲色啪| 亚洲精品粉嫩美女一区| 高清毛片免费观看视频网站| 久久久久久久久久成人| 一级毛片电影观看 | 免费黄网站久久成人精品| 午夜视频国产福利| 精品乱码久久久久久99久播| 国产精品久久久久久久久免| 日日啪夜夜撸| 美女cb高潮喷水在线观看| 国产熟女欧美一区二区| 麻豆国产av国片精品| 寂寞人妻少妇视频99o| 午夜老司机福利剧场| 国产高清不卡午夜福利| 日韩欧美精品免费久久| 亚洲专区国产一区二区| 亚洲aⅴ乱码一区二区在线播放| 欧美绝顶高潮抽搐喷水| 久久久久久久午夜电影| 成人一区二区视频在线观看| АⅤ资源中文在线天堂| 午夜精品一区二区三区免费看| 国产男人的电影天堂91| 午夜精品一区二区三区免费看| 国内揄拍国产精品人妻在线| 干丝袜人妻中文字幕| 日日啪夜夜撸| 久久人人爽人人片av| 日韩欧美 国产精品| 欧美成人a在线观看| 在线播放无遮挡| av国产免费在线观看| 春色校园在线视频观看| 亚洲成av人片在线播放无| 五月玫瑰六月丁香| 国产精品久久电影中文字幕| 成人毛片a级毛片在线播放| 午夜福利在线观看吧| 国产白丝娇喘喷水9色精品| 一夜夜www| 久久久久久久久中文| 变态另类丝袜制服| 国产大屁股一区二区在线视频| 精华霜和精华液先用哪个| 久久人人爽人人片av| 亚洲成人久久性| 午夜免费激情av| av天堂中文字幕网| 男女视频在线观看网站免费| 国产精品不卡视频一区二区| 一级毛片电影观看 | 成年版毛片免费区| a级毛片a级免费在线| 日本一本二区三区精品| 久久婷婷人人爽人人干人人爱| 直男gayav资源| 久久精品国产自在天天线| 国产精品伦人一区二区| 国产一区二区三区av在线 | 亚洲久久久久久中文字幕| 午夜福利高清视频| 人妻少妇偷人精品九色| 国产成人精品久久久久久| 久久午夜亚洲精品久久| 全区人妻精品视频| 69人妻影院| 欧美不卡视频在线免费观看| 男女之事视频高清在线观看| 国产综合懂色| 亚州av有码| 精品人妻一区二区三区麻豆 | 99在线视频只有这里精品首页| 99视频精品全部免费 在线| 亚洲av第一区精品v没综合| 中文资源天堂在线| 久久久精品94久久精品| 精品久久久久久久人妻蜜臀av| 国产精品,欧美在线| 成人鲁丝片一二三区免费| 日韩一本色道免费dvd| 久99久视频精品免费| 91午夜精品亚洲一区二区三区| 国产美女午夜福利| 亚洲精华国产精华液的使用体验 | 欧美另类亚洲清纯唯美| 国内揄拍国产精品人妻在线| 欧美成人精品欧美一级黄| 看非洲黑人一级黄片| 极品教师在线视频| 一a级毛片在线观看| 老师上课跳d突然被开到最大视频| 久久精品影院6| 国产精品永久免费网站| 深夜精品福利| 亚洲欧美日韩高清在线视频| 哪里可以看免费的av片| 久久久久久久久中文| 亚洲七黄色美女视频| 又黄又爽又免费观看的视频| 成人无遮挡网站| 身体一侧抽搐| 狂野欧美白嫩少妇大欣赏| 男人舔奶头视频| 乱系列少妇在线播放| 国产av在哪里看| 免费看日本二区| 日韩中字成人| 久久久久精品国产欧美久久久| 国产成年人精品一区二区| 国产精品野战在线观看| 亚洲性夜色夜夜综合| 久久鲁丝午夜福利片| 夜夜爽天天搞| 日本黄色视频三级网站网址| 毛片女人毛片| 日韩欧美 国产精品| 老司机影院成人| 亚洲精品亚洲一区二区| 性欧美人与动物交配| 午夜a级毛片| 黄色欧美视频在线观看| 麻豆国产97在线/欧美| 国产午夜精品论理片| 深爱激情五月婷婷| 看免费成人av毛片| 在线观看午夜福利视频| 免费在线观看影片大全网站| 热99re8久久精品国产| 婷婷色综合大香蕉| 成年av动漫网址| 美女黄网站色视频| 国产精品野战在线观看| 深爱激情五月婷婷| 成人亚洲欧美一区二区av| 男人和女人高潮做爰伦理| 神马国产精品三级电影在线观看| 精品久久久久久久久久久久久| 99九九线精品视频在线观看视频| 国产一级毛片七仙女欲春2| 欧美另类亚洲清纯唯美| a级毛片a级免费在线| 成年女人看的毛片在线观看|