2020 International Conference on Emerging Trends in Information Technology and Engineering (Ic-Etite) 2020
DOI: 10.1109/ic-etite47903.2020.031
|View full text |Cite
|
Sign up to set email alerts
|

A Detailed Survey On Cyberbullying in Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0
1

Year Published

2022
2022
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 34 publications
0
9
0
1
Order By: Relevance
“…When new inputs are mapped into the space, they are assigned to the corresponding class by determining the space. In real-life problems, a hyperplane cannot be always a linear seperator [27]. Kernels are implemented in SVM to turn the function space, incase the dataset is seperable by non-linear boundaries.…”
Section: E[p R(error)] ≤ E[numberof Supportvectors] Numberof Training...mentioning
confidence: 99%
See 2 more Smart Citations
“…When new inputs are mapped into the space, they are assigned to the corresponding class by determining the space. In real-life problems, a hyperplane cannot be always a linear seperator [27]. Kernels are implemented in SVM to turn the function space, incase the dataset is seperable by non-linear boundaries.…”
Section: E[p R(error)] ≤ E[numberof Supportvectors] Numberof Training...mentioning
confidence: 99%
“…SVM is used in predicting cyberbullying and is shown to be efficient and effective [5]. SVM has proven to be efficient in terms of binary classification [27]. However, with the increase in the size of the dataset, SVM may not be idle, as it has to deal with vagueness in the language associated with cyberbullying.…”
Section: E[p R(error)] ≤ E[numberof Supportvectors] Numberof Training...mentioning
confidence: 99%
See 1 more Smart Citation
“…ey analysed 27 research studies regarding datasets and platform, feature engineering, and the classifiers used for detecting both abuse and cyberbullying. Krithika and Priya [16] discussed different datasets used for cyberbullying detection from different platforms.…”
Section: Introductionmentioning
confidence: 99%
“…They analysed 27 research studies regarding datasets and platform, feature engineering, and the classifiers used for detecting both abuse and cyberbullying. Krithika and Priya [ 16 ] discussed different datasets used for cyberbullying detection from different platforms. They also compared the different classifiers and feature extractions techniques used with the platform for both text and images.…”
Section: Introductionmentioning
confidence: 99%