Deep Learning Algorithm for Cyberbullying Detection
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 9
Abstract
Cyberbullying is a crime where one person becomes the target of harassment and hate. Many cyberbullying detection approaches have been introduced, however, they were largely based on textual and user features. Most of the research found in the literature aimed at improving detection through introducing new features. However, as the number of features increases, the feature extraction and selection phases have become harder. On the other hand, no study has examined the meaning of words and semantics in cyberbullying. In order to bridge this gap, we propose a novel algorithms CNN-CB that eliminate the need for feature engineering and produce better prediction than traditional cyberbullying detection approaches. The proposed algorithm adapts the concept of word embedding where similar words have similar embedding. Therefore, bullying tweets will have similar representations and this will advance the detection. CNN-CB is based on convolutional neural network (CNN) and incorporates semantics through the use of word embedding. Experiments showed that CNN-CB algorithm outperform traditional content-based cyberbullying detection with an accuracy of 95%.
Authors and Affiliations
Monirah Abdullah Al-Ajlan, Mourad Ykhlef
Corrupted MP4 Carving Using MP4-Karver
In the digital forensic, recovery of deleted and damaged video files play an important role in searching for the evidences. In this paper, MP4-Karver tool is proposed to recover and repair the corrupted videos. Moreover,...
Insulator Detection and Defect Classification using Rotation Invariant Local Directional Pattern
Detecting power line insulator automatically and analyzing their defects are vital processes in maintaining power distribution systems. In this work, a rotation invariant texture pattern named rotation invariant local di...
Deployment Protocol for Underwater Wireless Sensors Network based on Virtual Force
Recently, Underwater Sensor Networks (UWSNs) have attracted researchers’ attention due to the challenges and the peculiar characteristics of the underwater environment. The initial random deployment of UWSN where sensors...
CluSandra: A Framework and Algorithm for Data Stream Cluster Analysis
The clustering or partitioning of a dataset’s records into groups of similar records is an important aspect of knowledge discovery from datasets. A considerable amount of research has been applied to the identification o...
Secure and Privacy Preserving Mail Servers using Modified Homomorphic Encryption (MHE) Scheme
Electronic mail (Email) or the paperless mail is becoming the most acceptable, faster and cheapest way of formal and informal information sharing between users. Around 500 billion mails are sent each day and the count is...