2023
DOI: 10.3390/math11163567
|View full text |Cite|
|
Sign up to set email alerts
|

Cyberbullying Detection on Twitter Using Deep Learning-Based Attention Mechanisms and Continuous Bag of Words Feature Extraction

Suliman Mohamed Fati,
Amgad Muneer,
Ayed Alwadain
et al.

Abstract: Since social media platforms are widely used and popular, they have given us more opportunities than we can even imagine. Despite all of the known benefits, some users may abuse these opportunities to humiliate, insult, bully, and harass other people. This issue explains why there is a need to reduce such negative activities and create a safe cyberspace for innocent people by detecting cyberbullying activity. This study provides a comparative analysis of deep learning methods used to test and evaluate their ef… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 52 publications
0
6
0
Order By: Relevance
“… Advantages Disadvantages Techniques used Dataset Accuracy 1 Shetty et al ( 3 ) Masking of data at the before start of data preprocessing leading to higher data security High run time, two fold increase in computational load on the system. SBERT, Universal Sentence Encoders –DAN, Universal Sentence Encoders – Transformers Data from Kaggle, Youtube, Twitter 97.12% 2 Fati et al ( 8 ) Data pre processing is made a part of Deep Learning Methodologies, leading to a more holistic output. Running NLP and DL together leads to a dependency on one layer for processing the other layer.…”
Section: Literature Reviewmentioning
confidence: 99%
“… Advantages Disadvantages Techniques used Dataset Accuracy 1 Shetty et al ( 3 ) Masking of data at the before start of data preprocessing leading to higher data security High run time, two fold increase in computational load on the system. SBERT, Universal Sentence Encoders –DAN, Universal Sentence Encoders – Transformers Data from Kaggle, Youtube, Twitter 97.12% 2 Fati et al ( 8 ) Data pre processing is made a part of Deep Learning Methodologies, leading to a more holistic output. Running NLP and DL together leads to a dependency on one layer for processing the other layer.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The Tensorflow library is used for applications such as computer vision and NLP is used to implement the proposed cyberbullying model and the other baseline models. The objective was to minimize the complexity of the model by removing unnecessary elements, such as the number of hidden nodes, and in the dense layer by finding optimal hyperparameters [47]. An input matrix of 35,873 tweets was constructed to divide the raw input data into tokens, which helped the cyberbullying model to understand the context and interpret the vital information in the text by analyzing the word sequence using tokenization in the Tensorflow library.…”
Section: Experimental Settingmentioning
confidence: 99%
“…In the original paper [1], we mistakenly omitted Prince Sultan University (PSU) from the funding. PSU is one of the main funders for this paper, which was a joint effort between King Saud University, Universiti Teknologi Petronas, and Prince Sultan University.…”
Section: Missing Fundingmentioning
confidence: 99%
“…In the original publication [1], the Funding statement was "The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the project no. (IFKSUOR3-057-1)".…”
Section: Missing Fundingmentioning
confidence: 99%