Cyberbullying detection solutions based on deep learning architectures

Cyberbullying is disturbing and troubling online misconduct. It appears in various forms and is usually in a textual format in most social networks. Intelligent systems are necessary for automated detection of these incidents. Some of the recent experiments have tackled this issue with traditional machine learning models. Most of the models have been applied to one social network at a time. The latest research has seen different models based on deep learning algorithms make an impact on the detection of cyberbullying. These detection mechanisms have resulted in efficient identification of incidences while others have limitations of standard identification versions. This paper performs an empirical analysis to determine the effectiveness and performance of deep learning algorithms in detecting insults in Social Commentary. The following four deep learning models were used for experimental results, namely: Bidirectional Long Short-Term Memory (BLSTM), Gated Recurrent Units (GRU), Long Short-Term Memory (LSTM), and Recurrent Neural Network (RNN). Data pre-processing steps were followed that included text cleaning, tokenization, stemming, Lemmatization, and removal of stop words. After performing data pre-processing, clean textual data is passed to deep learning algorithms for prediction. The results show that the BLSTM model achieved high accuracy and F1-measure scores in comparison to RNN, LSTM, and GRU. Our in-depth results shown which deep learning models can be most effective against cyberbullying when directly compared with others and paves the way for future hybrid technologies that may be employed to combat this serious online issue.

[1]  Diana Inkpen,et al.  A multi-platform dataset for detecting cyberbullying in social media , 2020, Language Resources and Evaluation.

[2]  Celestine Iwendi,et al.  Analyzing the Effectiveness and Contribution of Each Axis of Tri-Axial Accelerometer Sensor for Accurate Activity Recognition , 2020, Sensors.

[3]  Justin W. Patchin,et al.  Bullies Move Beyond the Schoolyard , 2006 .

[4]  Robert S. Tokunaga,et al.  Following you home from school: A critical review and synthesis of research on cyberbullying victimization , 2010, Comput. Hum. Behav..

[5]  Gautam Srivastava,et al.  Suspicious activity detection using deep learning in secure assisted living IoT environments , 2020, The Journal of Supercomputing.

[6]  Celestine Iwendi,et al.  Analysis of security and energy efficiency for shortest route discovery in low‐energy adaptive clustering hierarchy protocol using Levenberg‐Marquardt neural network and gated recurrent unit for intrusion detection system , 2020, Trans. Emerg. Telecommun. Technol..

[7]  Ricardo Ribeiro,et al.  Automatic cyberbullying detection: A systematic review , 2019, Comput. Hum. Behav..

[8]  Martin Potthast,et al.  On Textual Analysis and Machine Learning for Cyberstalking Detection , 2016, Datenbank-Spektrum.

[9]  Akshi Kumar,et al.  Cyberbullying detection on social multimedia using soft computing techniques: a meta-analysis , 2019, Multimedia Tools and Applications.

[10]  June F. Chisholm Review of the Status of Cyberbullying and Cyberbullying Prevention , 2014, J. Inf. Syst. Educ..

[11]  Mariarosaria Taddeo Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity , 2019, Minds and Machines.

[12]  Rui Zhao,et al.  Cyberbullying Detection Based on Semantic-Enhanced Marginalized Denoising Auto-Encoder , 2017, IEEE Transactions on Affective Computing.

[13]  Abhishek Agrawal,et al.  Automatic Monitoring and Prevention of Cyberbullying , 2016 .

[14]  Gautam Srivastava,et al.  KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks , 2020, IEEE Access.

[15]  G. R. Paez Assessing Predictors of Cyberbullying Perpetration Among Adolescents: the Influence of Individual Factors, Attachments, and Prior Victimization , 2020, International Journal of Bullying Prevention.