2021
DOI: 10.1108/ijius-02-2021-0011
|View full text |Cite
|
Sign up to set email alerts
|

Transformer network-based word embeddings approach for autonomous cyberbullying detection

Abstract: PurposeNowadays people are connected by social media like Facebook, Instagram, Twitter, YouTube and much more. Bullies take advantage of these social networks to share their comments. Cyberbullying is one typical kind of harassment by making aggressive comments, abuses to hurt the netizens. Social media is one of the areas where bullying happens extensively. Hence, it is necessary to develop an efficient and autonomous cyberbullying detection technique.Design/methodology/approachIn this paper, the authors prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…Cyber-attacks such as malware detection, 77 intrusion detection, 76,92 botnet attack 93 can also be detected using hybrid network models consisting of multiple deep basic learning models with better accuracy. In addition, a transformer network-based model can be used to solve security issues, such as autonomous cyberbullying detection, 94 intrusion or anomaly detection 95,96 and so forth. Overall, DL models and their variations mentioned above could play a vital part in the development of effective AI models to address cybersecurity issues, depending on their learning capabilities at various levels, the nature of the data, and the desired outcome, particularly for large datasets.…”
Section: Neural Network and Deep Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…Cyber-attacks such as malware detection, 77 intrusion detection, 76,92 botnet attack 93 can also be detected using hybrid network models consisting of multiple deep basic learning models with better accuracy. In addition, a transformer network-based model can be used to solve security issues, such as autonomous cyberbullying detection, 94 intrusion or anomaly detection 95,96 and so forth. Overall, DL models and their variations mentioned above could play a vital part in the development of effective AI models to address cybersecurity issues, depending on their learning capabilities at various levels, the nature of the data, and the desired outcome, particularly for large datasets.…”
Section: Neural Network and Deep Learningmentioning
confidence: 99%
“…Cyber‐attacks such as malware detection, 77 intrusion detection, 76,92 botnet attack 93 can also be detected using hybrid network models consisting of multiple deep basic learning models with better accuracy. In addition, a transformer network‐based model can be used to solve security issues, such as autonomous cyberbullying detection, 94 intrusion or anomaly detection 95,96 and so forth.…”
Section: Ai‐based Modeling In Cybersecuritymentioning
confidence: 99%
“…Transformers are deep learning models based on attention that have shown effectiveness in detecting cyberbullying [113][114][115]. Since its primary application is machine translation, the transformer model has been used for various natural language processing tasks, including the detection of cyberbullying.…”
Section: Transformersmentioning
confidence: 99%
“…Hybrid network models, such as the ensemble of learning models, e.g., CNN and RNN, or others with their optimization can also be used to detect cyber-attacks, such as malware detection [120], phishing, and Botnet attack detection and mitigation [110]. In addition, authors in [111] describe a transformer network-based word embeddings approach for autonomous cyberbullying detection. A robust transformer-based intrusion detection system has been presented in [131].…”
Section: Deep Learning In Cybersecuritymentioning
confidence: 99%