TACKLING CYBERBULLYING ON SOCIAL MEDIA A MACHINE LEARNING FOR EFFECTIVE DETECTION
DOI:
https://doi.org/10.29121/shodhkosh.v5.i7.2024.4954Keywords:
IoT, AI, Deep Learning, SensorAbstract [English]
Over the past few years, social media and online social networks (OSN) have seen a sharp rise in popularity. However, the main issues with social media sites and online networks are security and privacy. However, attention must be paid to the grave issue of cyberbullying (CB) on social media platforms. An intentional, tenacious, and forceful reaction The phrase "cyberbullying" (CB) refers to behaviors on information and communication technology (ICT) platforms, such as social media, the internet, and mobile devices. Deep learning (DL) methods are needed for the identification and classification of CB in social networks in order to counter this trend. An novel method that combines deep learning and feature subset selection for social networks is called feature subset selection with deep learning based CB detection and categorization (FSSDL-CBDC). Three steps make up the suggested FSSDL-CBDC method: preprocessing, classification, and feature selection. combining a system for automatically filtering social media accounts with a A deep learning method system for automatically identifying and classifying cyberbullying on social media platforms is given in this study. Proactive steps to protect user safety and wellness are becoming more and more crucial due to the prevalence of online abuse and cyberbullying. With cutting-edge techniques for text and audio-visual data analysis on social media, the suggested system attains a 99.983% accuracy rate. Convolutional neural networks (CNNs) and recurrent neural networks (RNNs) are two categories of deep learning models. All things considered, the experimental findings showed that the FSSDL-CBDC technique outperformed the other options in several areas..
References
Humera Aqeel, “A Hybrid Classifier of Cyber Bullying Detection in Social Media Platforms”, IEEE Conference on Emerging Research in Electronics, Computer Science and Technology2022 DOI: https://doi.org/10.1109/ICERECT56837.2022.10060739
Chetna Sharma, “Cyber-Bullying Detection Via Text Mining and Machine Learning”, IEEE Conference on Computing Communication and Networking Technologies, 2021 DOI: https://doi.org/10.1109/ICCCNT51525.2021.9579625
Peidong Zhang, “Detect Chinese Cyber Bullying by Analyzing User Behaviors and Language Patterns”, IEEE International Symposium on Autonomous Systems, 2019 DOI: https://doi.org/10.1109/ISASS.2019.8757714
Djedjiga Mouheb, “Detection of Offensive Messages in Arabic Social Media Communications”, IEEE Conference on Innovations in Information Technology, 2018 DOI: https://doi.org/10.1109/INNOVATIONS.2018.8606030
Daphney-Stavroula Zois, “Optimal Online Cyberbullying Detection”, IEEE Conference on Acoustics, Speech and Signal Processing, 2018
B. Wang, G. Chen, L. Fu, L. Song, and X. Wang, “Drimux: Dynamic rumor influence minimization with user experience in social networks,” in Proc. 30th AAAI Int. Conf. Artif. Intell., Feb. 2016. DOI: https://doi.org/10.1609/aaai.v30i1.10063
L. Fu, W. Huang, X. Gan, F. Yang, and X. Wang, “Capacity of wireless networks with social characteristics,” IEEE Trans. Wireless Commun., vol. 15, pp. 1505–1516, Feb. 2016. DOI: https://doi.org/10.1109/TWC.2015.2491278
D. N. Yang, H. J. Hung, W. C. Lee, and W. Chen, “Maximizing acceptance probability for active friending in online social networks,” in Proc. 19th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2013, pp. 713–721. DOI: https://doi.org/10.1145/2487575.2487599
C. Budak, D. Agrawal, and A. E. Abbadi, “Limiting the spread of misinformation in social networks,” in Proc. 20th Int. Conf. World Wide Web, 2011, pp. 665–674. DOI: https://doi.org/10.1145/1963405.1963499
X. Rong and Q. Mei, “Diffusion of innovations revisited: From social network to innovation network,” in Proc. 22Nd ACM Int. Conf. Inf. Knowl. Manag., 2013, pp. 499–508. DOI: https://doi.org/10.1145/2505515.2505587
U. Azam, H. Rizwan and A. Karim, "Exploring data augmentation strategies for hate speech detection in roman urdu", Proceedings of the Thirteenth Language Resources and Evaluation Conference, pp. 4523-4531, 2022.
U. Azam, H. Rizwan and A. Karim, "Exploring data augmentation strategies for hate speech detection in roman urdu", Proceedings of the Thirteenth Language Resources and Evaluation Conference, pp. 4523-4531, 2022.
M. Bilal, A. Khan, S. Jan, S. Musa and S. Ali, "Roman urdu hate speech detection using transformer-based model for cyber security applications", Sensors, vol. 23, no. 8, pp. 3909, 2023. DOI: https://doi.org/10.3390/s23083909
M. M. Khan, K. Shahzad and M. K. Malik, "Hate speech detection in roman urdu", ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), vol. 20, no. 1, pp. 1-19, 2021.
M. M. Khan, K. Shahzad and M. K. Malik, "Hate speech detection in roman urdu", ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), vol. 20, no. 1, pp. 1-19, 2021. DOI: https://doi.org/10.1145/3414524
M. P. Akhter, Z. Jiangbin, I. R. Naqvi, M. Abdelmajeed and M. T. Sadiq, "Automatic detection of offensive language for urdu and roman urdu", IEEE Access, vol. 8, pp. 91213-91226, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.2994950
T. Sajid, M. Hassan, M. Ali and R. Gillani, "Roman urdu multi-class offensive text detection using hybrid features and svm", 2020 IEEE 23rd International Multitopic Conference (INMIC), pp. 1-5, 2020.
T. Sajid, M. Hassan, M. Ali and R. Gillani, "Roman urdu multi-class offensive text detection using hybrid features and svm", 2020 IEEE 23rd International Multitopic Conference (INMIC), pp. 1-5, 2020. DOI: https://doi.org/10.1109/INMIC50486.2020.9318069
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Priyatharsini.C, Satyendra Kumar, Navaneethakrishan K, Nishanth K, Krishna Raj

This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.