Comparison of Machine Learning and Deep Learning Models for Detecting Cyberbullying

Since social media has grown, cyberbullying has become a widespread problem that seriously damages both people and society. This work looks at how deep learning (DL) and machine learning (ML) models might be used to identify cyberbullying on social media. We use advanced DL architectures like Convol...

Full description

Saved in:
Bibliographic Details
Published in2024 International Visualization, Informatics and Technology Conference (IVIT) pp. 138 - 144
Main Authors Lo, Kevin Alexander, Briant Joe, Cornelius, Philip, Samuel, Hidayaturrahman
Format Conference Proceeding
LanguageEnglish
Published IEEE 07.08.2024
Subjects
Online AccessGet full text
DOI10.1109/IVIT62102.2024.10692892

Cover

Abstract Since social media has grown, cyberbullying has become a widespread problem that seriously damages both people and society. This work looks at how deep learning (DL) and machine learning (ML) models might be used to identify cyberbullying on social media. We use advanced DL architectures like Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNN) together with ML methods like Random Forest and Support Vector Machine (SVM) to analyze textual data and find cases of cyberbullying. A dataset of 39,999 tweets classified as cyberbullying is used in the study; to guarantee data quality, it is thoroughly preprocessed, including text normalization, tokenization, and vectorization. We show that, in terms of accuracy, precision, recall, and F1-score, DL models-especially CNN and RNN-far outperform conventional ML models. Higher computational complexity and training time notwithstanding, DL models show better capacity to identify complicated and context-rich cyberbullying cases. The results indicate that the RNN model achieved the highest accuracy of 84.71%, followed closely by the CNN model with 84.01%. The discussion highlights DL models' superior ability to capture complex patterns in textual data, making them more effective for cyberbullying detection, although they require significant computational resources. This study emphasizes the potential of incorporating AI-driven solutions for real-time monitoring and mitigation of cyberbullying, advocating for further optimization of these models and their integration into practical applications to foster safer online environments. Future development will focus on efficiency optimization and the deployment of these models for real-time cyberbullying detection.
AbstractList Since social media has grown, cyberbullying has become a widespread problem that seriously damages both people and society. This work looks at how deep learning (DL) and machine learning (ML) models might be used to identify cyberbullying on social media. We use advanced DL architectures like Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNN) together with ML methods like Random Forest and Support Vector Machine (SVM) to analyze textual data and find cases of cyberbullying. A dataset of 39,999 tweets classified as cyberbullying is used in the study; to guarantee data quality, it is thoroughly preprocessed, including text normalization, tokenization, and vectorization. We show that, in terms of accuracy, precision, recall, and F1-score, DL models-especially CNN and RNN-far outperform conventional ML models. Higher computational complexity and training time notwithstanding, DL models show better capacity to identify complicated and context-rich cyberbullying cases. The results indicate that the RNN model achieved the highest accuracy of 84.71%, followed closely by the CNN model with 84.01%. The discussion highlights DL models' superior ability to capture complex patterns in textual data, making them more effective for cyberbullying detection, although they require significant computational resources. This study emphasizes the potential of incorporating AI-driven solutions for real-time monitoring and mitigation of cyberbullying, advocating for further optimization of these models and their integration into practical applications to foster safer online environments. Future development will focus on efficiency optimization and the deployment of these models for real-time cyberbullying detection.
Author Briant Joe, Cornelius
Philip, Samuel
Lo, Kevin Alexander
Hidayaturrahman
Author_xml – sequence: 1
  givenname: Kevin Alexander
  surname: Lo
  fullname: Lo, Kevin Alexander
  email: kevin.alexander007@binus.ac.id
  organization: Bina Nusantara University,School of Computer Science,Tangerang,Indonesia
– sequence: 2
  givenname: Cornelius
  surname: Briant Joe
  fullname: Briant Joe, Cornelius
  email: cornelius.joe@binus.ac.id
  organization: Bina Nusantara University,School of Computer Science,Tangerang,Indonesia
– sequence: 3
  givenname: Samuel
  surname: Philip
  fullname: Philip, Samuel
  email: samuel.philip@binus.ac.id
  organization: Bina Nusantara University,Computer Science Department,Tangerang,Indonesia
– sequence: 4
  surname: Hidayaturrahman
  fullname: Hidayaturrahman
  email: hidayaturrahman@binus.ac.id
  organization: Bina Nusantara University,Computer Science Department,Tangerang,Indonesia
BookMark eNpFj8tKxDAYhSPoQsd5A8G8QGsuf5NmKfUyhQ4uLG6HTPJXA520pHXRt7ei4upwvg8OnCtyHoeIhNxylnPOzF39VrdKcCZywQTknCkjSiPOyNZoU8qCyQIA9CV5rYbTaFOYhkiHju6t-wgRaYM2xRDfqY2ePiCO_2Q_eOwn2g1pFTO6-RtWyxHT8bPvl7Vdk4vO9hNuf3ND2qfHttplzctzXd03WTB8zhx0vEAJDi1YbZgSXirhrIcSCgcMGFMMvLXaaodCMdNJp_TKvZbeSbkhNz-zAREPYwonm5bD31X5BXTyTj8
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IVIT62102.2024.10692892
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350354447
EndPage 144
ExternalDocumentID 10692892
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i91t-c4f15e34cea4a79062d362cad4845c40400604daa7a7ce2609f3c67040d73dc33
IEDL.DBID RIE
IngestDate Wed Oct 09 06:12:57 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i91t-c4f15e34cea4a79062d362cad4845c40400604daa7a7ce2609f3c67040d73dc33
PageCount 7
ParticipantIDs ieee_primary_10692892
PublicationCentury 2000
PublicationDate 2024-Aug.-7
PublicationDateYYYYMMDD 2024-08-07
PublicationDate_xml – month: 08
  year: 2024
  text: 2024-Aug.-7
  day: 07
PublicationDecade 2020
PublicationTitle 2024 International Visualization, Informatics and Technology Conference (IVIT)
PublicationTitleAbbrev IVIT
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.880945
Snippet Since social media has grown, cyberbullying has become a widespread problem that seriously damages both people and society. This work looks at how deep...
SourceID ieee
SourceType Publisher
StartPage 138
SubjectTerms Accuracy
AI-based Detection Systems
Biological system modeling
Computational modeling
Content Moderation
Convolutional Neural Network (CNN)
Convolutional neural networks
Cyberbullying
Data models
Deep learning
Machine Learning
Natural Language Processing (NLP)
Online Communication
Online Safety
Random Forest
Random forests
Real-time Detection
Real-time systems
Recurrent Neural Network (RNN)
Sentiment Analysis
social media
Support Vector Machine (SVM)
Support vector machines
Title Comparison of Machine Learning and Deep Learning Models for Detecting Cyberbullying
URI https://ieeexplore.ieee.org/document/10692892
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwEA66J59UnPibPPja2rWXpnmejk3YEJyyt5HkEhFHN7R70L_eXNdtKAi-lWsh5S7p5Zrvu4-x64wE3z0i0T7SCARCVAgvIu0NenRJoQsiCg9Hef8J7idi0pDVay6Mc64Gn7mYLuuzfJzbJf0qCys8V6FACF_c3TDPVmStBrPVSdTN4HkwzqmECWVfCvH66R-6KXXa6O2z0XrAFVrkLV5WJrZfv3ox_vuNDlh7y9DjD5vcc8h2XHnEHrsbUUE-93xY4yQdb1qovnBdIr91brG1kBLa7IOHjWu4QccJZOx-GvL1bEYMqDYb9-7G3X7UiCZEr6pTRRZ8R7gMrNOgJTUhxpCirEYoQFigJZsngFpLLa0LxYzymc1lsKPM0GbZMWuV89KdMC5MolKZo0pQAFhlUAEan4YI6sR4OGVtcsh0sWqLMV374uwP-znbo7jU6Dl5wVrV-9Jdhoxemas6kt_TE6Kr
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEF1ED3pSseK3e_CamDazSfZcLa22RTBKb2V3Z1fEkhZND_rr3UnTFgXBW5gEEmbYvEz2vXmMXcVk-O4QSfbRCkAgBJlwIlBOo0MbZSojofBgmHSf4G4kRrVYvdLCWGsr8pkN6bDay8epmdOvMr_CE-kbBP_G3fLAD2Ih16pZW81IXveee3lCTYxv_FoQLq__4ZxSAUdnlw2Xt1zwRd7CealD8_VrGuO_n2mPNdYaPf6wQp99tmGLA_bYXtkK8qnjg4opaXk9RPWFqwL5jbWzdYS80CYf3H-6-hO0oUDB9qembE8mpIFqsLxzm7e7QW2bELzKZhkYcE1hYzBWgUppDDF6kDIKIQNhgBZtEgEqlarUWN_OSBebJPVxTGM0cXzINotpYY8YFzqSrTRBGaEAMFKjBNSu5WuoIu3gmDUoIePZYjDGeJmLkz_il2y7mw_6435veH_KdqhGFZcuPWOb5fvcnnt8L_VFVdVvhz2l-A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+International+Visualization%2C+Informatics+and+Technology+Conference+%28IVIT%29&rft.atitle=Comparison+of+Machine+Learning+and+Deep+Learning+Models+for+Detecting+Cyberbullying&rft.au=Lo%2C+Kevin+Alexander&rft.au=Briant+Joe%2C+Cornelius&rft.au=Philip%2C+Samuel&rft.au=Hidayaturrahman&rft.date=2024-08-07&rft.pub=IEEE&rft.spage=138&rft.epage=144&rft_id=info:doi/10.1109%2FIVIT62102.2024.10692892&rft.externalDocID=10692892