Optimized Twitter Cyberbullying Detection based on Deep Learning

Cyberbullying is a crime in which a perpetrator targets a person with online harassment and hate. Many cyberbullying detection approaches have been introduced, but they were largely based on textual and user features. Most of the research found in the literature aimed to improve detection by introducing new features. Although, as the number of features increases, the feature extraction and selection phases become harder. In addition, another drawback of such improvements is that some features—for example, user age—can be easily fabricated. In this paper, we propose optimised Twitter cyberbullying detection based on deep learning (OCDD), a novel approach to address the above challenges. Unlike prior work in this field, OCDD does not extract features from tweets and feed them to a classifier; rather, it represents a tweet as a set of word vectors. In this way, the semantics of words is preserved, and the feature extraction and selection phases can be eliminated. As for the classification phase, deep learning will be used, along with a metaheuristic optimisation algorithm for parameter tuning.

[1]  Karolien Poels,et al.  Automatic monitoring of cyberbullying on social networking sites: From technological feasibility to desirability , 2015, Telematics Informatics.

[2]  Zbigniew Michalewicz,et al.  Genetic algorithms + data structures = evolution programs (3rd ed.) , 1996 .

[3]  Joemon M. Jose,et al.  Building a large-scale corpus for evaluating event detection on twitter , 2013, CIKM.

[4]  Zong Woo Geem,et al.  A New Heuristic Optimization Algorithm: Harmony Search , 2001, Simul..

[5]  Henry Lieberman,et al.  Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying , 2012, TIIS.

[6]  Xiang Zhang,et al.  Character-level Convolutional Networks for Text Classification , 2015, NIPS.

[7]  Rashmi Shetgiri Bullying and victimization among children. , 2013, Advances in pediatrics.

[8]  Tong Zhang,et al.  Effective Use of Word Order for Text Categorization with Convolutional Neural Networks , 2014, NAACL.

[9]  Chaoyi Pang,et al.  Semi-supervised Learning for Cyberbullying Detection in Social Networks , 2014, ADC.

[10]  Jimmy J. Lin,et al.  Quantitative evaluation of passage retrieval algorithms for question answering , 2003, SIGIR.

[11]  Amber N. Schroeder,et al.  Chapter 14 Cyber Bullying Among College Students: Evidence from Multiple Domains of College Life , 2012 .

[12]  Shivakant Mishra,et al.  Prediction of Cyberbullying Incidents on the Instagram Social Network , 2015, ArXiv.

[13]  Walter Daelemans,et al.  Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP) , 2014, EMNLP 2014.

[14]  Dolf Trieschnigg,et al.  Improving Cyberbullying Detection with User Context , 2013, ECIR.

[15]  Peter K. Smith,et al.  Cyberbullying: another main type of bullying? , 2008, Scandinavian journal of psychology.

[16]  Qianjia Huang,et al.  Cyber Bullying Detection Using Social and Textual Analysis , 2014, SAM '14.

[17]  Cécile Favre,et al.  Event detection, tracking, and visualization in Twitter: a mention-anomaly-based approach , 2015, Social Network Analysis and Mining.

[18]  James H. Jones,et al.  Detection of Abusive Accounts with Arabic Tweets , 2022 .

[19]  Elizabeth F. Churchill,et al.  Automatic identification of personal insults on social news sites , 2012, J. Assoc. Inf. Sci. Technol..

[20]  R. Donegan Bullying and Cyberbullying : History , Statistics , Law , Prevention and Analysis , 2012 .

[21]  J. I. Sheeba,et al.  Online Social Network Bullying Detection Using Intelligence Techniques , 2015 .

[22]  Kelly Reynolds,et al.  Using Machine Learning to Detect Cyberbullying , 2011, 2011 10th International Conference on Machine Learning and Applications and Workshops.

[23]  Abhishek Agrawal,et al.  Methods for detection of cyberbullying: A survey , 2015, 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA).

[24]  T.G.I. Fernando,et al.  A Comparative Study on Nature Inspired Algorithms with Firefly Algorithm , 2014 .

[25]  Hila Becker,et al.  Beyond Trending Topics: Real-World Event Identification on Twitter , 2011, ICWSM.

[26]  Xue Li,et al.  An Effective Approach for Cyberbullying Detection , 2013 .

[27]  Jeffrey Pennington,et al.  GloVe: Global Vectors for Word Representation , 2014, EMNLP.

[28]  Abhishek Agrawal,et al.  Automatic Monitoring and Prevention of Cyberbullying , 2016 .

[29]  Rui Li,et al.  TEDAS: A Twitter-based Event Detection and Analysis System , 2012, 2012 IEEE 28th International Conference on Data Engineering.