Comparison of Machine Learning and Deep Learning Models for Detecting Cyberbullying
Since social media has grown, cyberbullying has become a widespread problem that seriously damages both people and society. This work looks at how deep learning (DL) and machine learning (ML) models might be used to identify cyberbullying on social media. We use advanced DL architectures like Convol...
Saved in:
Published in | 2024 International Visualization, Informatics and Technology Conference (IVIT) pp. 138 - 144 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
07.08.2024
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/IVIT62102.2024.10692892 |
Cover
Abstract | Since social media has grown, cyberbullying has become a widespread problem that seriously damages both people and society. This work looks at how deep learning (DL) and machine learning (ML) models might be used to identify cyberbullying on social media. We use advanced DL architectures like Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNN) together with ML methods like Random Forest and Support Vector Machine (SVM) to analyze textual data and find cases of cyberbullying. A dataset of 39,999 tweets classified as cyberbullying is used in the study; to guarantee data quality, it is thoroughly preprocessed, including text normalization, tokenization, and vectorization. We show that, in terms of accuracy, precision, recall, and F1-score, DL models-especially CNN and RNN-far outperform conventional ML models. Higher computational complexity and training time notwithstanding, DL models show better capacity to identify complicated and context-rich cyberbullying cases. The results indicate that the RNN model achieved the highest accuracy of 84.71%, followed closely by the CNN model with 84.01%. The discussion highlights DL models' superior ability to capture complex patterns in textual data, making them more effective for cyberbullying detection, although they require significant computational resources. This study emphasizes the potential of incorporating AI-driven solutions for real-time monitoring and mitigation of cyberbullying, advocating for further optimization of these models and their integration into practical applications to foster safer online environments. Future development will focus on efficiency optimization and the deployment of these models for real-time cyberbullying detection. |
---|---|
AbstractList | Since social media has grown, cyberbullying has become a widespread problem that seriously damages both people and society. This work looks at how deep learning (DL) and machine learning (ML) models might be used to identify cyberbullying on social media. We use advanced DL architectures like Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNN) together with ML methods like Random Forest and Support Vector Machine (SVM) to analyze textual data and find cases of cyberbullying. A dataset of 39,999 tweets classified as cyberbullying is used in the study; to guarantee data quality, it is thoroughly preprocessed, including text normalization, tokenization, and vectorization. We show that, in terms of accuracy, precision, recall, and F1-score, DL models-especially CNN and RNN-far outperform conventional ML models. Higher computational complexity and training time notwithstanding, DL models show better capacity to identify complicated and context-rich cyberbullying cases. The results indicate that the RNN model achieved the highest accuracy of 84.71%, followed closely by the CNN model with 84.01%. The discussion highlights DL models' superior ability to capture complex patterns in textual data, making them more effective for cyberbullying detection, although they require significant computational resources. This study emphasizes the potential of incorporating AI-driven solutions for real-time monitoring and mitigation of cyberbullying, advocating for further optimization of these models and their integration into practical applications to foster safer online environments. Future development will focus on efficiency optimization and the deployment of these models for real-time cyberbullying detection. |
Author | Briant Joe, Cornelius Philip, Samuel Lo, Kevin Alexander Hidayaturrahman |
Author_xml | – sequence: 1 givenname: Kevin Alexander surname: Lo fullname: Lo, Kevin Alexander email: kevin.alexander007@binus.ac.id organization: Bina Nusantara University,School of Computer Science,Tangerang,Indonesia – sequence: 2 givenname: Cornelius surname: Briant Joe fullname: Briant Joe, Cornelius email: cornelius.joe@binus.ac.id organization: Bina Nusantara University,School of Computer Science,Tangerang,Indonesia – sequence: 3 givenname: Samuel surname: Philip fullname: Philip, Samuel email: samuel.philip@binus.ac.id organization: Bina Nusantara University,Computer Science Department,Tangerang,Indonesia – sequence: 4 surname: Hidayaturrahman fullname: Hidayaturrahman email: hidayaturrahman@binus.ac.id organization: Bina Nusantara University,Computer Science Department,Tangerang,Indonesia |
BookMark | eNpFj8tKxDAYhSPoQsd5A8G8QGsuf5NmKfUyhQ4uLG6HTPJXA520pHXRt7ei4upwvg8OnCtyHoeIhNxylnPOzF39VrdKcCZywQTknCkjSiPOyNZoU8qCyQIA9CV5rYbTaFOYhkiHju6t-wgRaYM2xRDfqY2ePiCO_2Q_eOwn2g1pFTO6-RtWyxHT8bPvl7Vdk4vO9hNuf3ND2qfHttplzctzXd03WTB8zhx0vEAJDi1YbZgSXirhrIcSCgcMGFMMvLXaaodCMdNJp_TKvZbeSbkhNz-zAREPYwonm5bD31X5BXTyTj8 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/IVIT62102.2024.10692892 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9798350354447 |
EndPage | 144 |
ExternalDocumentID | 10692892 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i91t-c4f15e34cea4a79062d362cad4845c40400604daa7a7ce2609f3c67040d73dc33 |
IEDL.DBID | RIE |
IngestDate | Wed Oct 09 06:12:57 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i91t-c4f15e34cea4a79062d362cad4845c40400604daa7a7ce2609f3c67040d73dc33 |
PageCount | 7 |
ParticipantIDs | ieee_primary_10692892 |
PublicationCentury | 2000 |
PublicationDate | 2024-Aug.-7 |
PublicationDateYYYYMMDD | 2024-08-07 |
PublicationDate_xml | – month: 08 year: 2024 text: 2024-Aug.-7 day: 07 |
PublicationDecade | 2020 |
PublicationTitle | 2024 International Visualization, Informatics and Technology Conference (IVIT) |
PublicationTitleAbbrev | IVIT |
PublicationYear | 2024 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.880945 |
Snippet | Since social media has grown, cyberbullying has become a widespread problem that seriously damages both people and society. This work looks at how deep... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 138 |
SubjectTerms | Accuracy AI-based Detection Systems Biological system modeling Computational modeling Content Moderation Convolutional Neural Network (CNN) Convolutional neural networks Cyberbullying Data models Deep learning Machine Learning Natural Language Processing (NLP) Online Communication Online Safety Random Forest Random forests Real-time Detection Real-time systems Recurrent Neural Network (RNN) Sentiment Analysis social media Support Vector Machine (SVM) Support vector machines |
Title | Comparison of Machine Learning and Deep Learning Models for Detecting Cyberbullying |
URI | https://ieeexplore.ieee.org/document/10692892 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwEA66J59UnPibPPja2rWXpnmejk3YEJyyt5HkEhFHN7R70L_eXNdtKAi-lWsh5S7p5Zrvu4-x64wE3z0i0T7SCARCVAgvIu0NenRJoQsiCg9Hef8J7idi0pDVay6Mc64Gn7mYLuuzfJzbJf0qCys8V6FACF_c3TDPVmStBrPVSdTN4HkwzqmECWVfCvH66R-6KXXa6O2z0XrAFVrkLV5WJrZfv3ox_vuNDlh7y9DjD5vcc8h2XHnEHrsbUUE-93xY4yQdb1qovnBdIr91brG1kBLa7IOHjWu4QccJZOx-GvL1bEYMqDYb9-7G3X7UiCZEr6pTRRZ8R7gMrNOgJTUhxpCirEYoQFigJZsngFpLLa0LxYzymc1lsKPM0GbZMWuV89KdMC5MolKZo0pQAFhlUAEan4YI6sR4OGVtcsh0sWqLMV374uwP-znbo7jU6Dl5wVrV-9Jdhoxemas6kt_TE6Kr |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEF1ED3pSseK3e_CamDazSfZcLa22RTBKb2V3Z1fEkhZND_rr3UnTFgXBW5gEEmbYvEz2vXmMXcVk-O4QSfbRCkAgBJlwIlBOo0MbZSojofBgmHSf4G4kRrVYvdLCWGsr8pkN6bDay8epmdOvMr_CE-kbBP_G3fLAD2Ih16pZW81IXveee3lCTYxv_FoQLq__4ZxSAUdnlw2Xt1zwRd7CealD8_VrGuO_n2mPNdYaPf6wQp99tmGLA_bYXtkK8qnjg4opaXk9RPWFqwL5jbWzdYS80CYf3H-6-hO0oUDB9qembE8mpIFqsLxzm7e7QW2bELzKZhkYcE1hYzBWgUppDDF6kDIKIQNhgBZtEgEqlarUWN_OSBebJPVxTGM0cXzINotpYY8YFzqSrTRBGaEAMFKjBNSu5WuoIu3gmDUoIePZYjDGeJmLkz_il2y7mw_6435veH_KdqhGFZcuPWOb5fvcnnt8L_VFVdVvhz2l-A |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+International+Visualization%2C+Informatics+and+Technology+Conference+%28IVIT%29&rft.atitle=Comparison+of+Machine+Learning+and+Deep+Learning+Models+for+Detecting+Cyberbullying&rft.au=Lo%2C+Kevin+Alexander&rft.au=Briant+Joe%2C+Cornelius&rft.au=Philip%2C+Samuel&rft.au=Hidayaturrahman&rft.date=2024-08-07&rft.pub=IEEE&rft.spage=138&rft.epage=144&rft_id=info:doi/10.1109%2FIVIT62102.2024.10692892&rft.externalDocID=10692892 |