2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) 2020
DOI: 10.1109/csde50874.2020.9411601
|View full text |Cite
|
Sign up to set email alerts
|

Cyberbullying Detection on Social Networks Using Machine Learning Approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(17 citation statements)
references
References 20 publications
0
16
0
1
Order By: Relevance
“…The current social networks are regularly misused to post or spread CSA messages, comments and chat conversation. Hence, the 24 research papers [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [24], [25], [27], [28], [29], [30], [31], [32], [37], [38], [40], [41] and [43] proposed methods to detect, prevent and/or process CSAMs in text format.…”
Section: ) Working On Textmentioning
confidence: 99%
See 2 more Smart Citations
“…The current social networks are regularly misused to post or spread CSA messages, comments and chat conversation. Hence, the 24 research papers [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [24], [25], [27], [28], [29], [30], [31], [32], [37], [38], [40], [41] and [43] proposed methods to detect, prevent and/or process CSAMs in text format.…”
Section: ) Working On Textmentioning
confidence: 99%
“…To provide a safe environment for children in online networks, computer scientists applied artificial intelligent algorithms for: (1) Detecting abusive comments, chat conversations and/or messages ( [9], [10], [38], [31], [41]); (2) Analysing responses and posts on Twitter and Facebook in India ( [27]);…”
Section: ) Working On Textmentioning
confidence: 99%
See 1 more Smart Citation
“…Social networking sites, such as Facebook, Twitter, etc., become inextricably linked to the lives of their users. As a result, these platforms are the most common forms of cyberbullying victimization, and their admiration and widespread use have increased the number of cybercrime incidents [6]. This rise is generally attributed to traditional bullying being more challenging to perpetrate than cyberbullying, in that bullies bully their victims without being confronted directly through the associated author.…”
Section: Introductionmentioning
confidence: 99%
“…Taking into consideration the dangers mentioned above, it is decisive to find a way to detect accurately any type of cyberbullying in an automatic and quickly way. The majority of the proposed solutions in special literature about cyberbullying detection are based on supervised approaches [6,9]. As a general conclusion of these kind of research papers is that their big limitations are related to the insufficient amount of labeled data that implies, in most of the cases, the overfitting of the models.…”
mentioning
confidence: 99%