An Approach to Distinguish Between the Severity of Bullying in Messages in Social Media
暂无分享,去创建一个
[1] A. Kaplan,et al. Users of the world, unite! The challenges and opportunities of Social Media , 2010 .
[2] Igor Santos,et al. Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying , 2015, Log. J. IGPL.
[3] Aaron Smith,et al. Teens, Kindness and Cruelty on Social Network Sites , 2011 .
[4] Stephanie Pieschl,et al. Relevant dimensions of cyberbullying — Results from two experimental studies , 2013 .
[5] Decui Liang,et al. Incremental Learning Researches on Rough Set Theory: Status and Future , 2014, Int. J. Rough Sets Data Anal..
[6] Chaoyi Pang,et al. Semi-supervised Learning for Cyberbullying Detection in Social Networks , 2014, ADC.
[7] Henry Lieberman,et al. Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying , 2012, TIIS.
[8] D. Olweus,et al. Bullying at school : what we know and what we can do / Dan Olweus , 1993 .
[9] Hein S. Venter,et al. Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness , 2011, 2011 Information Security for South Africa.
[10] Aboul Ella Hassanien,et al. Forecasting Exchange Rates: A Chaos-Based Regression Approach , 2015, Int. J. Rough Sets Data Anal..
[11] Aboul Ella Hassanien,et al. Evaluating the Degree of Trust Under Context Sensitive Relational Database Hierarchy Using Hybrid Intelligent Approach , 2015, Int. J. Rough Sets Data Anal..
[12] Justin W. Patchin,et al. Bullying, Cyberbullying, and Suicide , 2010, Archives of suicide research : official journal of the International Academy for Suicide Research.
[13] N. Willard. Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress , 2007 .
[14] Laura P. Del Bosque,et al. Aggressive Text Detection for Cyberbullying , 2014, MICAI.
[15] Henry Lieberman,et al. Modeling the Detection of Textual Cyberbullying , 2011, The Social Mobile Web.
[16] Hiroshi Sakai,et al. Two Rough Set-based Software Tools for Analyzing Non-Deterministic Data , 2014, Int. J. Rough Sets Data Anal..
[17] Dolf Trieschnigg,et al. Expert knowledge for automatic detection of bullies in social networks , 2013 .
[18] Dolf Trieschnigg,et al. Towards User Modelling in the Combat against Cyberbullying , 2012, NLDB.
[19] Nilanjan Dey,et al. Reversible Color Image Watermarking Using Trigonometric Functions , 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies.
[20] Atsushi Tagami,et al. A Study of Contact Network Generation for Cyber-bullying Detection , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.
[21] Justin W. Patchin,et al. Offline Consequences of Online Victimization , 2007 .
[22] Qianjia Huang,et al. Cyber Bullying Detection Using Social and Textual Analysis , 2014, SAM '14.
[23] Robert Slonje,et al. The nature of cyberbullying, and strategies for prevention , 2013, Comput. Hum. Behav..
[24] Jayanthi Ranjan,et al. A holistic framework for mCRM - data mining perspective , 2009, Inf. Manag. Comput. Secur..
[25] Kelly Reynolds,et al. Detecting cyberbullying: query terms and techniques , 2013, WebSci.
[26] Yudong Zhang,et al. Binary PSO with mutation operator for feature selection using decision tree applied to spam detection , 2014, Knowl. Based Syst..
[27] Jayanthi Ranjan,et al. Principles for successful aCRM in organizations , 2008 .
[28] Dolf Trieschnigg,et al. Experts and Machines against Bullies: A Hybrid Approach to Detect Cyberbullies , 2014, Canadian Conference on AI.
[29] Robert S. Tokunaga,et al. Following you home from school: A critical review and synthesis of research on cyberbullying victimization , 2010, Comput. Hum. Behav..
[30] M. P. S. Bhatia,et al. Content based approach to find the credibility of user in social networks: an application of cyberbullying , 2015, International Journal of Machine Learning and Cybernetics.
[31] Franciska de Jong,et al. Cyberbullying detection: a step toward a safer internet yard , 2012, WWW.
[32] Dolf Trieschnigg,et al. Improving Cyberbullying Detection with User Context , 2013, ECIR.
[33] D. Deepak,et al. Information Systems on Hesitant Fuzzy Sets , 2016, Int. J. Rough Sets Data Anal..
[34] Michele L. Ybarra,et al. Examining Characteristics and Associated Distress Related to Internet Harassment: Findings From the Second Youth Internet Safety Survey , 2006, Pediatrics.
[35] Ian Witten,et al. Data Mining , 2000 .
[36] Pavel Brazdil,et al. Comparison of SVM and Some Older Classification Algorithms in Text Classification Tasks , 2006, IFIP AI.
[37] J S Suri,et al. Automated and accurate carotid bulb detection, its verification and validation in low quality frozen frames and motion video. , 2014, International angiology : a journal of the International Union of Angiology.
[38] Shivakant Mishra,et al. Towards understanding cyberbullying behavior in a semi-anonymous social network , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).
[39] Jaideep Srivastava,et al. Predicting trusts among users of online communities: an epinions case study , 2008, EC '08.
[40] Chaoyi Pang,et al. Sentiment Analysis for Effective Detection of Cyber Bullying , 2012, APWeb.
[41] Kelly Reynolds,et al. Using Machine Learning to Detect Cyberbullying , 2011, 2011 10th International Conference on Machine Learning and Applications and Workshops.