2015 15th International Conference on Intelligent Systems Design and Applications (ISDA) 2015
DOI: 10.1109/isda.2015.7489220
|View full text |Cite
|
Sign up to set email alerts
|

Methods for detection of cyberbullying: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 4 publications
0
11
0
Order By: Relevance
“…'I think Tom W. is a tw*t') These two varieties can be called 'tagged individual-directed' and 'referenced individual-directed' respectively. Most research in this area falls under cyberbullying (Sugandhi, Pande, Chawla, Agrawal, & Bhagat, 2016) although there are notable exceptions (Wulczyn, Thain, & Dixon, 2017).…”
Section: Categorizing Abusive Contentmentioning
confidence: 99%
“…'I think Tom W. is a tw*t') These two varieties can be called 'tagged individual-directed' and 'referenced individual-directed' respectively. Most research in this area falls under cyberbullying (Sugandhi, Pande, Chawla, Agrawal, & Bhagat, 2016) although there are notable exceptions (Wulczyn, Thain, & Dixon, 2017).…”
Section: Categorizing Abusive Contentmentioning
confidence: 99%
“…But only a few try to enhance software to prohibit cyberbullying. Robust and selective representation of learning of text messages is crucial for consistent detection system [11]. Machine Learning representation and authentication makes automatic revelation of bullied messages in online media possible and ensures building a relevant and clear social media environment.…”
Section: Conclusion and Future Scopementioning
confidence: 99%
“…The hyper∖parameter settings of neural networks may depended on the dataset being used. We used rectified linear units, filter windows h of (3,4,5) and (7,8) on the two layers with 256 feature maps each. We used the chunk of size 3 for local max-pooling, and set the dropout rate (p) of 0.5 and l 2 constraint of 3.…”
Section: Hyperparameters and Trainingmentioning
confidence: 99%
“…Cyberbullying events are hard to recognize. The major problem in cyberbullying detection is the lack of identifiable parameters and clearly quantifiable standards and definitions that can classify posts as bullying 4 . As people spend increasingly more time on social networks, cyberbullying has become a social problem that needs to be solved, and it is very necessary to detect the occurrence of cyberbullying through an automated method.…”
Section: Introductionmentioning
confidence: 99%