Enhancing the Identification of Cyberbullying through Participant Roles
- URL: http://arxiv.org/abs/2010.06640v2
- Date: Fri, 23 Oct 2020 01:15:20 GMT
- Title: Enhancing the Identification of Cyberbullying through Participant Roles
- Authors: Gathika Ratnayaka, Thushari Atapattu, Mahen Herath, Georgia Zhang,
Katrina Falkner
- Abstract summary: This paper proposes a novel approach to enhancing cyberbullying detection through role modeling.
We utilise a dataset from ASKfm to perform multi-class classification to detect participant roles.
- Score: 1.399948157377307
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Cyberbullying is a prevalent social problem that inflicts detrimental
consequences to the health and safety of victims such as psychological
distress, anti-social behaviour, and suicide. The automation of cyberbullying
detection is a recent but widely researched problem, with current research
having a strong focus on a binary classification of bullying versus
non-bullying. This paper proposes a novel approach to enhancing cyberbullying
detection through role modeling. We utilise a dataset from ASKfm to perform
multi-class classification to detect participant roles (e.g. victim, harasser).
Our preliminary results demonstrate promising performance including 0.83 and
0.76 of F1-score for cyberbullying and role classification respectively,
outperforming baselines.
Related papers
- Detecting LGBTQ+ Instances of Cyberbullying [3.5723815685584013]
Cyberbullying poses a significant threat to adolescents globally.
The LGBTQ+ community is particularly at risk, as researchers have uncovered a strong correlation between identifying as LGBTQ+ and suffering from greater online harassment.
It is critical to develop machine learning models that can accurately discern cyberbullying incidents as they happen to LGBTQ+ members.
arXiv Detail & Related papers (2024-09-18T18:49:55Z) - Deep Learning Approaches for Detecting Adversarial Cyberbullying and Hate Speech in Social Networks [0.0]
This paper focuses on detecting cyberbullying in adversarial attack content within social networking site text data, specifically emphasizing hate speech.
An LSTM model with a fixed epoch of 100 demonstrated remarkable performance, achieving high accuracy, precision, recall, F1-score, and AUC-ROC scores of 87.57%, 88.73%, 87.57%, 88.15%, and 91% respectively.
arXiv Detail & Related papers (2024-05-30T21:44:15Z) - Securing Social Spaces: Harnessing Deep Learning to Eradicate Cyberbullying [1.8749305679160366]
cyberbullying is a serious problem that can harm the mental and physical health of people who use social media.
This paper explains just how serious cyberbullying is and how it really affects indi-viduals exposed to it.
It stresses how important it is to find better ways to detect cyberbullying so that online spaces can be safer.
arXiv Detail & Related papers (2024-04-01T20:41:28Z) - Explain Thyself Bully: Sentiment Aided Cyberbullying Detection with
Explanation [52.3781496277104]
Cyberbullying has become a big issue with the popularity of different social media networks and online communication apps.
Recent laws like "right to explanations" of General Data Protection Regulation have spurred research in developing interpretable models.
We develop first interpretable multi-task model called em mExCB for automatic cyberbullying detection from code-mixed languages.
arXiv Detail & Related papers (2024-01-17T07:36:22Z) - A Tale of HodgeRank and Spectral Method: Target Attack Against Rank
Aggregation Is the Fixed Point of Adversarial Game [153.74942025516853]
The intrinsic vulnerability of the rank aggregation methods is not well studied in the literature.
In this paper, we focus on the purposeful adversary who desires to designate the aggregated results by modifying the pairwise data.
The effectiveness of the suggested target attack strategies is demonstrated by a series of toy simulations and several real-world data experiments.
arXiv Detail & Related papers (2022-09-13T05:59:02Z) - Session-based Cyberbullying Detection in Social Media: A Survey [16.39344929765961]
We define the Session-based Cyberbullying Detection framework that encapsulates the different steps and challenges of the problem.
Our review leads us to propose evidence-based criteria for a set of best practices to create session-based cyberbullying datasets.
arXiv Detail & Related papers (2022-07-14T18:56:54Z) - DISARM: Detecting the Victims Targeted by Harmful Memes [49.12165815990115]
DISARM is a framework that uses named entity recognition and person identification to detect harmful memes.
We show that DISARM significantly outperforms ten unimodal and multimodal systems.
It can reduce the relative error rate for harmful target identification by up to 9 points absolute over several strong multimodal rivals.
arXiv Detail & Related papers (2022-05-11T19:14:26Z) - Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
Age of AI-NIDS [70.60975663021952]
We study blackbox adversarial attacks on network classifiers.
We argue that attacker-defender fixed points are themselves general-sum games with complex phase transitions.
We show that a continual learning approach is required to study attacker-defender dynamics.
arXiv Detail & Related papers (2021-11-23T23:42:16Z) - Adversarial Visual Robustness by Causal Intervention [56.766342028800445]
Adversarial training is the de facto most promising defense against adversarial examples.
Yet, its passive nature inevitably prevents it from being immune to unknown attackers.
We provide a causal viewpoint of adversarial vulnerability: the cause is the confounder ubiquitously existing in learning.
arXiv Detail & Related papers (2021-06-17T14:23:54Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z) - Aggressive, Repetitive, Intentional, Visible, and Imbalanced: Refining
Representations for Cyberbullying Classification [4.945634077636197]
We study the nuanced problem of cyberbullying using five explicit factors to represent its social and linguistic aspects.
These results demonstrate the importance of representing and modeling cyberbullying as a social phenomenon.
arXiv Detail & Related papers (2020-04-04T00:35:16Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.