Open Access   Article Go Back

Cyberbullying Discovery on Social Networks: A Study

G Sireesha1 , G Kranthikumar2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-06 , Page no. 154-158, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si6.154158

Online published on Mar 20, 2019

Copyright © G Sireesha, G Kranthikumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G Sireesha, G Kranthikumar, “Cyberbullying Discovery on Social Networks: A Study,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.154-158, 2019.

MLA Style Citation: G Sireesha, G Kranthikumar "Cyberbullying Discovery on Social Networks: A Study." International Journal of Computer Sciences and Engineering 07.06 (2019): 154-158.

APA Style Citation: G Sireesha, G Kranthikumar, (2019). Cyberbullying Discovery on Social Networks: A Study. International Journal of Computer Sciences and Engineering, 07(06), 154-158.

BibTex Style Citation:
@article{Sireesha_2019,
author = {G Sireesha, G Kranthikumar},
title = {Cyberbullying Discovery on Social Networks: A Study},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {06},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {154-158},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=889},
doi = {https://doi.org/10.26438/ijcse/v7i6.154158}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.154158}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=889
TI - Cyberbullying Discovery on Social Networks: A Study
T2 - International Journal of Computer Sciences and Engineering
AU - G Sireesha, G Kranthikumar
PY - 2019
DA - 2019/03/20
PB - IJCSE, Indore, INDIA
SP - 154-158
IS - 06
VL - 07
SN - 2347-2693
ER -

           

Abstract

The fast improvement of relational cooperation is upgrading the development of advanced tormenting works out. Most of the general population connected with these activities have a place with the more energetic ages, especially youngsters who are the most exceedingly terrible circumstance are at more risk of pointless undertakings we propose a fruitful predator and harmed singular ID with semantic enhanced thought little of de-noising auto-encoder approach to manage distinguish advanced tormenting message from online life through the measuring plan of a component of decision. We present a graph model to expel the cyberbullying framework, which is used to perceive the most unique cyberbullying predators and abused individuals to situating counts the present channels generally work with the clear catchphrase look moreover, can`t grasp the semantic noteworthiness of the substance. So we propose Semantic-Enhanced Marginalized De-noising Auto-Encoder. (smSDA) is created by methods for a semantic development of the notable significant learning model stack de-noising auto-encoder. The semantic expansion includes semantic dropout clatter and sparsely necessities, where the semantic dropout bustle is organized in perspective of zone data and the word embeddings framework. The test demonstrates practical of our strategy.

Key-Words / Index Term

Detection, Cyberbullying, Social-Networking, De-noising

References

[1]. A. M. Kaplan and M. Haenlein, "Clients of the world, join together! The difficulties and chances of online life," Business skylines, vol. 53, no. 1, pp. 59– 68, 2010.
[2].R. M. Kowalski, G. W. Giumetti, A. N. Schroeder, and M. R.Lattanner, "Harassing in the computerized age: A basic audit and metaanalysis of cyberbullying research among youth." 2014.
[3]. M. Ybarra, "Patterns in innovation based sexual and non-sexual hostility after some time and linkages to nontechnology aggression,"National Summit on Interpersonal Violence and Abuse Across the Lifespan: Forging a Shared Agenda, 2010.
[4]. B. K. Biggs, J. M. Nelson, and M. L. Sampilo, "Peer relations in the anxiety–depression link: Test of a mediation model," Anxiety, Stress, & Coping, vol. 23, no. 4, pp. 431–447, 2010.
[5]. S. R. Jimerson, S. M. Swearer, and D. L. Espelage, Handbook of bullying in schools: An international perspective. Routledge/Taylor & Francis Group, 2010.
[6]. G. Gini and T. Pozzoli, "Association between bullying and psychosomatic problems: A metaanalysis," Pediatrics, vol. 123, no. 3, pp. 1059– 1065, 2009.
[7]. A. Kontostathis, L. Edwards, and A. Leatherman, "Text mining and cybercrime," Text Mining: Applications and Theory. John Wiley & Sons, Ltd, Chichester, UK, 2010.
[8]. J.M. Xu, K.- S. Jun, X. Zhu, and A. Bellmore, "Gaining from tormenting follows in internet based life," in Proceedings of the 2012 conferenceof the North American part of the relationship for computational phonetics: Human dialect advancements. Relationship for Computational Linguistics, 2012, pp. 656– 666.
[9]. Q. Huang, V. K. Singh, and P. K. Atrey, "Digital harassing identification utilizing social and printed investigation," in Proceedings of the third International Workshop on Socially-Aware Multimedia. ACM, 2014, pp.3– 6.
[10]. D. Yin, Z. Xue, L. Hong, B. D. Davison, A. Kontostathis, and L. Edwards, "Location of badgering on web 2.0," Proceedings of the Content Analysis in the WEB, vol. 2, pp. 1– 7, 2009. Volume 2 | Issue 3 | May-June-2017 | www.ijsrcseit.com 856
[11]. K. Dinakar, R. Reichart, and H. Lieberman, "Modeling the detection of textual cyberbullying." in The Social Mobile Web, 2011.
[12]. V. Nahar, X. Li, and C. Pang, "An effective approach for cyberbullying detection," Communications in Information Science and Management Engineering, 2012.
[13]. M. Dadvar, F. de Jong, R. Ordelman, and R. Trieschnigg, "Improved cyberbullying detection using gender information," in Proceedings of the 12th -Dutch-Belgian Information Retrieval Workshop (DIR2012). Ghent, Belgium: ACM, 2012.
[14]. M. Dadvar, D. Trieschnigg, R. Ordelman, and F. de Jong, "Enhancing cyberbullying location with client setting," in Advances in Information Retrieval. Springer, 2013, pp. 693– 696.
[15]. P. Vincent, H. Larochelle, I. Lajoie, Y. Bengio, and P.- A. Manzagol, "Stacked denoising autoencoders: Learning helpful portrayals in a profound system with a neighborhood denoising paradigm," The Journal of Machine Learning Research, vol. 11, pp. 3371– 3408, 2010.
[16]. P. Baldi, "Autoencoders, unsupervised learning, and deep architectures," Unsupervised and Transfer Learning Challenges in Machine Learning, Volume 7, p. 43, 2012.
[17]. M. Chen, Z. Xu, K. Weinberger, and F. Sha, "Marginalized denoising autoencoders for domain adaptation," arXiv preprint arXiv: 1206.4683, 2012. [18]. T. K. Landauer, P. W. Foltz, and D. Laham, "An introduction to latent semantic analysis," Discourse processes, vol. 25, no. 2-3, pp.259– 284, 1998.
[19]. T. L. Griffiths and M. Steyvers, "Finding scientific topics," Proceedings of the National academy of Sciences of the United States of America, vol. 101, no. Suppl 1, pp. 5228–5235, 2004.
[20]. D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent dirichlet allocation," the Journal of machine Learning research, vol. 3, pp. 993–1022, 2003. [
21]. T. Hofmann, "Unsupervised learning by probabilistic inactive semantic investigation," Machine learning, vol. 42, no. 1-2, pp. 177– 196, 2001.
22]. [22]. Y. Bengio, A. Courville, and P. Vincent, "Portrayal learning: A survey and new points of view," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 35, no. 8, pp. 1798– 1828, 2013.
[23]. B. L. McLaughlin, A. A. Braga, C. V. Petrie, M. H. Moore et al., Deadly Lessons:: Understanding Lethal School Violence. National Academies Press, 2002.