Submit Search
Upload
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
•
0 likes
•
7 views
IRJET Journal
Follow
https://www.irjet.net/archives/V10/i10/IRJET-V10I1017.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
ijaia
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
Cyberbullying Detection on Social Networks Using Machine Learning Approaches
Cyberbullying Detection on Social Networks Using Machine Learning Approaches
IRJET Journal
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
IRJET Journal
Recommended
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
ijaia
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
Cyberbullying Detection on Social Networks Using Machine Learning Approaches
Cyberbullying Detection on Social Networks Using Machine Learning Approaches
IRJET Journal
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
IRJET Journal
tcss.2021.3049232.pdf
tcss.2021.3049232.pdf
KiranKumar757501
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
dbpublications
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
IJECEIAES
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learning
MirXahid1
204
204
vivatechijri
IRJET - Profanity Statistical Analyzer
IRJET - Profanity Statistical Analyzer
IRJET Journal
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
Detection of Cyberbullying on Social Media using Machine Learning
Detection of Cyberbullying on Social Media using Machine Learning
IRJET Journal
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
IRJET Journal
Social media platform and Our right to privacy
Social media platform and Our right to privacy
vivatechijri
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning...
Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning...
AIRCC Publishing Corporation
Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning...
Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning...
AIRCC Publishing Corporation
Word embedding for detecting cyberbullying based on recurrent neural networks
Word embedding for detecting cyberbullying based on recurrent neural networks
IAESIJAI
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
IAEME Publication
6356152.pdf
6356152.pdf
PravinKshirsagar11
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
Combating propaganda texts using transfer learning
Combating propaganda texts using transfer learning
IAESIJAI
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
tcss.2021.3049232.pdf
tcss.2021.3049232.pdf
KiranKumar757501
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
dbpublications
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
IJECEIAES
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learning
MirXahid1
204
204
vivatechijri
IRJET - Profanity Statistical Analyzer
IRJET - Profanity Statistical Analyzer
IRJET Journal
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
Detection of Cyberbullying on Social Media using Machine Learning
Detection of Cyberbullying on Social Media using Machine Learning
IRJET Journal
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
IRJET Journal
Social media platform and Our right to privacy
Social media platform and Our right to privacy
vivatechijri
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning...
Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning...
AIRCC Publishing Corporation
Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning...
Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning...
AIRCC Publishing Corporation
Word embedding for detecting cyberbullying based on recurrent neural networks
Word embedding for detecting cyberbullying based on recurrent neural networks
IAESIJAI
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
IAEME Publication
6356152.pdf
6356152.pdf
PravinKshirsagar11
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
Combating propaganda texts using transfer learning
Combating propaganda texts using transfer learning
IAESIJAI
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
IRJET Journal
Similar to BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
(20)
tcss.2021.3049232.pdf
tcss.2021.3049232.pdf
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learning
204
204
IRJET - Profanity Statistical Analyzer
IRJET - Profanity Statistical Analyzer
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Detection of Cyberbullying on Social Media using Machine Learning
Detection of Cyberbullying on Social Media using Machine Learning
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
Social media platform and Our right to privacy
Social media platform and Our right to privacy
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning...
Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning...
Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning...
Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning...
Word embedding for detecting cyberbullying based on recurrent neural networks
Word embedding for detecting cyberbullying based on recurrent neural networks
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
6356152.pdf
6356152.pdf
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
Combating propaganda texts using transfer learning
Combating propaganda texts using transfer learning
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
PragyanshuParadkar1
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
ROCENODodongVILLACER
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
koyaldeepu123
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Recently uploaded
(20)
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Internship report on mechanical engineering
Internship report on mechanical engineering
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
1.
© 2023, IRJET
| Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 108 BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING Srinadh Unnava1, Manikanta Bandla2 1 Assistant Professor dept. of Information Technology SITE, Tadepalligudem srinadh@sasi.ac.in 2 Student dept. of Information Technology SITE, Tadepalligudem manikanta1208@sasi.ac.in ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Social media platforms such as Facebook and Twitter offer various benefits, but they also have some negative aspects. One of the significant issues related to these platforms is cyberbullying, which can have a profound impact on the victims. The impact of cyberbullying may vary from person to person, and it is subjective to how each individual deals with it.The influence of cyberbullying on youths has become more prominent in recent times. With the aid of machine learning, it is possible to identify speech patterns employed by bullies and their targets, and establish guidelines to automatically recognize cyberbullying material. It affects both young people and adults and has been linked to negative outcomes such as depression and even suicide.To successfully address cyberbullying, it is necessary to first comprehend the numerous elements and processes that lead to its occurrence. Furthermore, there is a rising awareness of the necessity to govern material uploaded on social media networks. The primary goal of this research is to create a cyberharassment detection system (CDS) to detect harassing and abusive activity on electronic media platforms.Among such algorithms, we investigated four distinct optimizers of neural networks and convolutional neural networks in this study. Rmsprop had the highest accuracy (98.45%), followed by Adam, Adadelta, and Adagrad. Index Terms—Deeplearning, Cyberharass, Cyberbullying, Machinelearning, Electrionic media,twitter. Key Words: Deeplearning, Cyberharass, Cyberbullying, Machine Learning, Electrionic media,twitter. 1.INTRODUCTION The growth of information and communication technology has provided numerous advantages to society, such as social media, which allows people to expand their social networks. However, as Segal suggests, this new technology has a dark side, including cyberbullying. Cyberbullying is a form of online violence where the victim is humiliated, ridiculed, and intimidated. This kind of harassment can lead to serious mental health issues, and in some cases, even suicide. Social media platforms offer users the opportunity to express their opinions and connect with people around the world. However, the two sided nature of these platforms has contributed to anti-social behavior that affects people of all ages. Cyberbullying and cyber- aggression are prevalent, with over half of young social media users experiencing digital harassment. 2. RELATED WORKS Irjet Template sample paragraph Roy, et al [1] proposed a method that can prevent imagebased cyberbullying on social media platforms. To accomplish this, the researchers first used a deep learning-based convolutional neural network to build the model. However, they later turned to transfer learning models, which involve reusing pre-trained models, in order to improve the model’s performance. After testing various settings of the hyper- parameters, the researchers found that the transfer learning-based model was more effective in addressing this problem. This research demonstrates the importance of developing new tools and technologies to combat the harmful effects of cyberbullying on individuals and communities. Aldhyani, et al [2] created a Cyberbullying Detection System (CDS) that can identify harmful and abusive behavior on social media platforms. The researchers conducted two experiments to train and test the proposed system using binary and multiclass cyberbullying classification datasets. This research highlights the importance of developing advanced tools and technologies to address the growing problem of cyberbullying on social media platforms. Ahmed, et al [3] introduces a binary and multiclass classification model that utilizes a hybrid neural network to detect instances of bullying in the Bengali language. The researchers used a dataset of 44,001 user comments from popular public Facebook pages, This research highlights the importance of developing effective models for identifying and preventing instances of bullying in online environments, especially in languages other than English. De Angelis, et al [4] said that with the rise of technology, cyberbullying has become a significant threat to the psychosocial wellbeing of adolescents. ML encompasses a wide range of techniques that allow systems to learn from data and make complex decisions quickly. This paper aims to explore the potential of ML in detecting and preventing cyberbullying, highlighting the importance of developing effective tools and strategies to address this growing problem. Keni, et al [5] This study focuses on developing techniques for detecting cyberbullying using supervised learning methods. This research highlights the potential of machine learning techniques to aid in the detection and prevention of cyberbullying, which is an important step towards creating safer online spaces for all users. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 10 | Oct 2023 www.irjet.net p-ISSN: 2395-0072
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 10 | Oct 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 109 Chandrasekaran,et al [6] says Because of the ease of access to the internet and cell phones, the popularity of online social networks and social media has skyrocketed. However, security and privacy issues are key concerns on these platforms, and cyberbullying has developed into a serious issue that must be addressed. Cyberbullying is defined as the repeated and intentional use of information and communication technology platforms such as social media and the internet to transmit hate messages. Furthermore, the SSA-DBN model combines the salp swarm algorithm (SSA) with a deep belief network (DBN) to detect and characterise cyberbullying in social media networks and other online contexts. The creation of the BCO-FSS and SSA-DBN models for the identification and categorization of cyberbullying is a first in the area. Numerous simulations show that the suggested FSSDL- CBDC approach has higher classification performance. Aditya, et al [7] recommended the construction of a model for detecting cyberbullying that takes several factors into account. We used BERT, a bidirectional deep learning model, to achieve some of these properties. Talpur, et al [8] article presents a thorough analysis of cyberbullying that commonly takes place on online social networking (OSN) platforms. It offers an overview of the existing techniques to address cyberbullying on OSNs and examines the obstacles and difficulties involved in the development of cyberbullying detection systems. The paper also suggests future research directions in this area. The paper begins by introducing OSNs and cyberbullying, outlining different forms of cyberbullying, and discussing the accessibility of data. This project aims to examine and assess the interaction between two individuals or an anonymous user with the help of a machine learning model. The primary objective is to detect and prevent harassment in one-on-one conversations. Two classifiers, SVM and Na¨ıve Bayes, are employed to train and test the detection of cyberbullying in social media [9].The nature of online social networks provides an opportunity for cyberbullies to target people across different regions and countries. Our goal is to detect cyberbullying in Twitter using SVM. Our objectives are outlined in the objective section. In this paper they categorizes existing methods into four main classes: supervised learning, lexicon-based, rule-based, and mixed-initiative approaches. We will focus on supervised learning-based approaches that utilize classifiers like SVM and Na¨ıve Bayes to create predictive models for cyberbullying detection. We will also employ natural language processing techniques and machine learning methods such as Bayesian logistic regression, random forest algorithm, and support vector machines to identify cyberbullying [10]. In today’s fast-paced world, innovation is rapidly increasing, leading to increased communication. Unfortunately, this communication can also be used for negative purposes, such as cyberbullying. Cyberbullying involves targeting individuals or groups through electronic messages on social media platforms, which can lead to depression and even suicide. In fact, approximately 80 Percent of young people who commit suicide have experienced depression caused by cyberbullying. In this paper they discusses the various approaches and ideas that can be used to detect cyberbullying on social media platforms, as well as its impact on individuals [11].The emergence of social networking sites on the internet has facilitated diverse expressions and opinions. This study proposes a sentiment detection system using text and image data. The text data is obtained from Twitter using its API, and RNN and CNN are used for text and image analysis respectively. The models’ efficiency and performance were evaluated, and RNN and CNN were found to outperform other classification algorithms [12]. Research has indicated that cyberbullying is a prevalent issue across the globe, affecting both young individuals and adults. Regulating social media content has become increasingly necessary. The upcoming study aims to analyze hate speech tweets from Twitter and personal attack-based comments from Wikipedia forums to extract text data utilizing natural language processing and machine learning. The objective is to create a model that can detect cyberbullying. The study considers three feature extraction methods and four classifiers to identify the optimal approach. [13].Gauri, et al [14] analysed the current cyberbullying detection models and proposes a novel approach utilizing Na¨ıve Bayes Classification and N-Gram Model to evaluate the overall bullying scenario or sentiment of tweets. Monirah Abdullah Al-Ajlan and Mourad Ykhlef [15] aimed to improve cyberbullying detection techniques by proposing a new algorithm called CNN-CB. Unlike traditional approaches, CNN-CB does not require feature engineering and produces better predictions. The algorithm is based on word embedding, where similar words have similar representations, and is implemented using a convolutional neural network (CNN) that incorporates semantics. In our experiments, CNN-CB outperformed traditional content- based cyberbullying detection methods. The task of sentiment analysis is a complex one that falls under the domain of Natural Language Processing (NLP), text analytics, and computational linguistics. In this research paper,they suggested a supervised machine learning method for detecting and preventing cyberbullying [16]. The performance of eleven classification models, including four standard machine learning algorithms and seven shallow neural networks, is compared using a unique neural network design in which parameters are optimised. The researchers used two real-world cyberbullying datasets to evaluate the effects of feature extraction and natural language processing based on word embeddings. According to the results, bidirectional neural networks and attention models provide great accuracy, whereas logistic regression is the best traditional machine learning classifier. Among the neural networks tested,The research examines eleven classification approaches and seven feature extraction methodologies, and the shallow neural networks proposed outperform existing state-of-the-art methods for identifying cyberbullying [17].
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 10 | Oct 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 110 3. PROPOSED DETECTION MODEL 1.1 Dataset Description In this experiment dataset was considered from which randomly selected 9093 tweets to focus on identifying cyberbullying. These data are saved as a CSV file with two columns: ’tweet’ and ’class’.”Tweet denotes the collection of all offensive and non-offensive tweets obtained for our experiment. Class represents how each tweet is labelled. Tweets that are not offensive are labelled as ’0,’ while those that are offensive are labelled as ’1’. The remaining 4929 tweets are classified as offensive (0.542), while 4164 are classified as non-offensive (0.458). Many preparation procedures were used to obtain the data in a clean way. The technique included noise reduction (tags, links, whitespace, and numbers), punctuation removal, and conversion of the entire document to lower case for uniformity. The documents are then tokenized, and insignificant terms known as stopwords are removed. the tokens are Fig.2 : Data preprocessing flow. transformed to their root form, a process known as stemming. Snowball Stemmer was employed for this purpose.Finally, in the final phase of preprocessing, detokenization was performed, resulting in clean and acceptable data for the following stage. 1.2 Preprocessed Data Visualization Data that has been preprocessed The process of visualising data after it has been cleaned, converted, and readied for analysis is referred to as visualisation.” This form of visualisation is significant because it helps us examine and comprehend the data’s underlying patterns and insights without being distracted by noise or extraneous details. 1.3 Data splitting The cleaned label dataset was divided into two parts: a train set (80%) and a test set (20%). Following the completion of the division, features were added to the train set. Because our dataset was not completely balanced, we verified our model using a variety of cross- validation approaches, including KFold, Stratified K-Fold, Shuffle Split, and Stratified Shuffle Split. These procedures have been applied tenfold. 1.4 Model building 1.4.1 NEURAL NETWORK Fig.3 : Artificial Nueral Network.. ANNs, also known as neural networks (NNs), are computer systems inspired by biological neural networks in animal brains. They are made up of linked components known as artificial neurons .Signals can be sent between neurons via connections, also known as edges. Each artificial neuron receives signals, analyses them, and delivers them to other neurons that are linked to it. The weights of the connections between neurons alter when learning happens, increasing or lowering the intensity of messagesy 1.4.1.1 Adam optimizer Adam optimizer: Adaptive Moment Estimation (Adam) is a powerful optimisation approach that is utilised in gradient descent. It is especially beneficial for dealing with large- scale challenges involving enormous volumes of data or parameters. 1.4.1 .2 Adagrad optimizer Adagrad is an abbreviation for Adaptive Gradient Optimizer. Optimizers such as gradient descent, stochastic gradient descent, and mini-batch SGD were utilised to lower the loss function in relation to the weights.In SGD and mini-batch SGD, the value of used to be the constant for each weightage, or say for every parameter. Here typically = 0.01. Where in Adagrad Optimizer, the basic
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 10 | Oct 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 111 idea was that each weight has a different learning rate (). This change is critical because in a real dataset, some features are sparse (for example, in Bag of Words, most features are zero, so it is sparse) and some are dense (most features will be non-zero) 1.4.2 CONVOLUTIONAL NEURAL NETWORK, A convolutional neural network (CNN) is a sort of artificial neural network that is often used for visual data analysis. Unlike classic fully connected networks, CNNs include a mathematical technique known as convolution in at least one of their layers, allowing them to exploit data’s hierarchical structure. CNNs divide the input into smaller, CNNs are modelled after Fig.4 : Convolutional Nueral Network Convolutional Nueral Network the organisation of the visual cortex in animals, in which individual neurons react exclusively to stimuli in a narrow part of the visual field known as the receptive field. ARCHITECTURE: The very next layer from the paste layer (if any should occur) is a convolutional layer. This is the main core layer of the entire convolutional neural network.In this paper different convolution layers are used. follows: ● Input. ● Word Embedding layer. ● Dropout layer(0.25). ● Convolution layer. ● Max Pooling. ● Convolution-layer. ● Max Pooling. ● Dropout layer(0.5). ● Softmax. ● Classification layer 1.4.2 .1 Rmsprop optimizer RMSprop is a technique used in optimizing neural networks during training. It was introduced by Geoffrey Hinton, the creator of back-propagation. In complex functions like neural networks, gradients tend to vanish or explode as data passes through the function. wt+1 = wt − αt (vt+ε) 1/2 ∗ h δL δwt i Essentially, RMSprop adjusts the learning rate dynamically instead of treating it as a fixed hyperparameter. As a result, the learning rate changes over time 1.4.2 .2 Adadelta optimizer Adadelta is another AdaGrad variation. The primary distinction is that it decreases the extent to which the learning rate is adaptable to the coordinates. It has also been described as having no learning rate since it uses the amount of change as a calibration for future adjustments. wt = wt−1 − η ∂L ∂w(t−1) Zeiler (2012) proposed the algorithm. Given the preceding algorithm’s description, this is quite basic. 1.4 Model Training Model training is a vital stage in the development of a deep learning-based text classification system. The goal is to lower the loss function on a labelled training dataset by optimising the model’s parameters. The procedure entails randomly initialising model parameters, feeding input data into the model to compute a predicted output, evaluating the difference between expected and actual output, and repeating the process 4. EXPERIMENTAL RESULTS The present research covers multiple DL outcomes from experiments and transfer learning models.The dataset statistics are used for testing and training. Accuracy is the total number of correctly categorised samples among all samples, while recall is the number of genuine positive samples over all positive samples. Precision is the number of real positive samples over all samples shown to be positive. The total dataset size is 8000, with 3542 samples classified as non-bully (Class 0) and the remaining 4458 samples classified as bullies (Class 1). Fig.5 : Adam optimizer Performance..
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 10 | Oct 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 112 The model, on the other hand, has experimented with various training and testing sizes of samples. Because the suggested system is a supervised model, its performance is measured using precision, recall, loss, confusion matrix, area under the ROC curve, and accuracy. Fig.6 : Adagrad optimizer Performance. Precision is the number of properly categorised bullying comments among all bullying comments in the dataset, whereas recall is the number of bullying comments among all bullying comments in the dataset. The loss is the mean error across samples for each update (batch) or the average error across all updates for the samples (epoch). The total of properly categorised bullying and non- bullying remarks is the accuracy.The area under the ROC curve (AUC) has a value that ranges from 0 to 1. Fig.7 : Rmsprop optimizer Performance. The Table displays the input processing and prediction results obtained throughout our testing. Table -1: Model performances Accuracy Loss Precession Recall Recall 0.9173 0.216 0.9274 0.905 Recall 0.8032 0.4755 0.8054 0.7997 Recall 0.8032 0.2905 0.8739 0.8739 Rmpsprop 0.8032 0.1178 0.9845 0.9845 We took a bullyingrelated tweet from Twitter and applied it to our model. The categorization report of Adam Optimizer is displayed in Fig. 5. Adagrad optimizer’s categorization report is displayed in Fig. 6.The Adadelta optimizer’s categorization report is displayed in Fig. 7. The classification report of the Rmsprop optimizer is displayed in Fig. 8. Bullying and non-bullying are represented here by the designations 0 and 1, respectively. Based on the results of this research tests, the performance is depicted in Fig. 5. Fig.8 : Adadelta optimizer Performance. The accuracy of the Adam, Adagrad, Adadelta, and Rmsprop is represented in Table 1 and is 91.73%, 80.32%, 87.39%, and 98.45%, respectively. The loss of the Adam, Adagrad, Adadelta, and Rmsprop is parallel represented in Table 1 and is equal to 21.60%, 47.55%, 11.78%, and 29.05%, respectively. When applied to the Twitter dataset for the cyberbully classification, the Rmsprop optimizer method outperformed the other proposed models with a better accuracy of 98.45%, which may be viewed as a better outcome when compared to the typical machine learning models and optimizers employed on comparable datasets.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 10 | Oct 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 113 Fig.9 : Optimizers Performance. Graph shows the overall performances of Adam, Adadelta, Adagram, Rmsprop optimizers. 5. CONCLUSION AND FUTURE WORKS Online harassment occurs when someone threatens another person electronically using social media, online discussion blogs, email, or other electronic or digital means. The goal of this research is to design and build a cyber harassment detection system that can be utilised to detect and eliminate online bullying occurrences perpetrated by social media users. Create a deep learning approach for detecting abusive tweets and chats online prior to cyberbullying, which may be employed in the creation of bullying detection systems for online social media sharing platforms like Twitter and Facebook. When compared to other optimizers, the Rmsprop optimizer algorithm performed better. In future, significance of individual features can be studied for further enhancement of the model. REFERENCES [1] Roy, P.K., Mali, F.U. Cyberbullying detection using deep transfer learning. Complex Intell. Syst. 8, 5449–5467 (2022). https://doi.org/10.1007/s40747-022-00772- z . [2] Aldhyani, T.H.H.; Al-Adhaileh, M.H.; Alsubari, S.N. Cyberbullying Identification System Based Deep Learning Algorithms. Electronics 2022, 11, 3273. https://doi.org/10.3390/electronics11203273. [3] Ahmed, Md Faisal, et al. ”Cyberbullying detection using deep neural network from social media comments in bangla language.” arXiv preprint arXiv:2106.04506 (2021). [4] De Angelis, Jacopo, and Giulia Perasso. ”Cyberbullying detection through machine learning: Can technology help to prevent internet bullying?.” International Journal of Management and Humanities 4.57 (2020): 10-35940. [5] Keni, A., et al. ”Cyberbullying detection using machine learning algorithms.” Int. J. Creat. Res. Thoughts (IJCRT) 1972 (1966): 2020. [6] Chandrasekaran, Saravanan, Aditya Kumar Singh Pundir, and T. Bheema Lingaiah. ”Deep learning approaches for cyberbullying detection and classification on social media.” Computational Intelligence and Neuroscience 2022 (2022). [7] Desai, Aditya, et al. ”Cyber Bullying Detection on Social Media using Machine Learning.” ITM Web of Conferences. Vol. 40. EDP Sciences, 2021. [8] Talpur, KAZIM RAZA, SITI SOPHIAYATI Yuhaniz, and N. N. B. Amir. ”Cyberbullying detection: Current trends and future directions.” J. Theor. Appl. Inf. Technol. 98 (2020): 3197-3208. [9] Shreenidhi B S, Mohammed Zaid Hulikatti, Nafey A H, Neha M R, Shradha.”CYBERBULLYING DETECTION USING MACHINE LEARNING”. [10] Abutorab, Miss Jafri Sayeedaaliza, et al. ”DETECTION OF CYBERBULLYING ON SOCIAL MEDIA USING MACHINE LEARNING”. [11] Nivethitha R Jayashree D Year: 2021” Cyberbullying Detection in Social Networks using Machine Learning Models” ICCAP EAI DOI: 10.4108/eai.7-12- 2021.2314577. [12] AGBAJE, MICHAEL, and Oreoluwa Afolabi. ”Neural Network-Based Cyber-Bullying and Cyber-Aggression Detection Using Twitter Text.” (2022). [13] RAJESWARI, Mrs K., MUSHRUF BASHA M 2nd, and S. PRAVEEN. ”Prevention and Suppression of Cyberbullying Using Machine Learning”. [14] Rao, Gauri Goyal, Mehul Wali, Diksha Yadav, Sarthak. (2022). ”Cyber-Bullying Detection Using Machine Learning and Na¨ıve Bayes and N-Gram Model”. [15] Monirah Abdullah Al-Ajlan and Mourad Ykhlef, “Deep Learning Algorithm for Cyberbullying Detection” International Journal of Advanced Computer Science and Applications(IJACSA), 9(9), 2018. http://dx.doi.org/10.14569/IJACSA.2018.090927. [16] Moratanch N, Srimathi G, Sujitha S, Tharani M,” CYBER BULLYING SCRUTINY FOR WOMEN SECURITY IN SOCIAL MEDIA”,” irjmets,2023. [17] Raj, C.; Agarwal, A.; Bharathy, G.; Narayan, B.; Prasad, M. Cyberbullying Detection: Hybrid Models Based on Machine Learning and Natural Language Processing Techniques. Electronics 2021, 10, 2810. https://doi.org/10.3390/electronics10222810.
Download now