Cyberbullying detection solutions based on deep learning architectures
暂无分享,去创建一个
Praveen Kumar Reddy Maddikunta | Gautam Srivastava | Celestine Iwendi | Suleman Khan | Gautam Srivastava | C. Iwendi | P. Maddikunta | Suleman Khan
[1] Diana Inkpen,et al. A multi-platform dataset for detecting cyberbullying in social media , 2020, Language Resources and Evaluation.
[2] Celestine Iwendi,et al. Analyzing the Effectiveness and Contribution of Each Axis of Tri-Axial Accelerometer Sensor for Accurate Activity Recognition , 2020, Sensors.
[3] Justin W. Patchin,et al. Bullies Move Beyond the Schoolyard , 2006 .
[4] Robert S. Tokunaga,et al. Following you home from school: A critical review and synthesis of research on cyberbullying victimization , 2010, Comput. Hum. Behav..
[5] Gautam Srivastava,et al. Suspicious activity detection using deep learning in secure assisted living IoT environments , 2020, The Journal of Supercomputing.
[6] Celestine Iwendi,et al. Analysis of security and energy efficiency for shortest route discovery in low‐energy adaptive clustering hierarchy protocol using Levenberg‐Marquardt neural network and gated recurrent unit for intrusion detection system , 2020, Trans. Emerg. Telecommun. Technol..
[7] Ricardo Ribeiro,et al. Automatic cyberbullying detection: A systematic review , 2019, Comput. Hum. Behav..
[8] Martin Potthast,et al. On Textual Analysis and Machine Learning for Cyberstalking Detection , 2016, Datenbank-Spektrum.
[9] Akshi Kumar,et al. Cyberbullying detection on social multimedia using soft computing techniques: a meta-analysis , 2019, Multimedia Tools and Applications.
[10] June F. Chisholm. Review of the Status of Cyberbullying and Cyberbullying Prevention , 2014, J. Inf. Syst. Educ..
[11] Mariarosaria Taddeo. Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity , 2019, Minds and Machines.
[12] Rui Zhao,et al. Cyberbullying Detection Based on Semantic-Enhanced Marginalized Denoising Auto-Encoder , 2017, IEEE Transactions on Affective Computing.
[13] Abhishek Agrawal,et al. Automatic Monitoring and Prevention of Cyberbullying , 2016 .
[14] Gautam Srivastava,et al. KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks , 2020, IEEE Access.
[15] G. R. Paez. Assessing Predictors of Cyberbullying Perpetration Among Adolescents: the Influence of Individual Factors, Attachments, and Prior Victimization , 2020, International Journal of Bullying Prevention.