Session-based Cyberbullying Detection in Social Media: A Survey
- URL: http://arxiv.org/abs/2207.10639v1
- Date: Thu, 14 Jul 2022 18:56:54 GMT
- Title: Session-based Cyberbullying Detection in Social Media: A Survey
- Authors: Peiling Yi and Arkaitz Zubiaga
- Abstract summary: We define the Session-based Cyberbullying Detection framework that encapsulates the different steps and challenges of the problem.
Our review leads us to propose evidence-based criteria for a set of best practices to create session-based cyberbullying datasets.
- Score: 16.39344929765961
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Cyberbullying is a pervasive problem in online social media, where a bully
abuses a victim through a social media session. By investigating cyberbullying
perpetrated through social media sessions, recent research has looked into
mining patterns and features for modeling and understanding the two defining
characteristics of cyberbullying: repetitive behavior and power imbalance. In
this survey paper, we define the Session-based Cyberbullying Detection
framework that encapsulates the different steps and challenges of the problem.
Based on this framework, we provide a comprehensive overview of session-based
cyberbullying detection in social media, delving into existing efforts from a
data and methodological perspective. Our review leads us to propose
evidence-based criteria for a set of best practices to create session-based
cyberbullying datasets. In addition, we perform benchmark experiments comparing
the performance of state-of-the-art session-based cyberbullying detection
models as well as large pre-trained language models across two different
datasets. Through our review, we also put forth a set of open challenges as
future research directions.
Related papers
- Model Inversion Attacks: A Survey of Approaches and Countermeasures [59.986922963781]
Recently, a new type of privacy attack, the model inversion attacks (MIAs), aims to extract sensitive features of private data for training.
Despite the significance, there is a lack of systematic studies that provide a comprehensive overview and deeper insights into MIAs.
This survey aims to summarize up-to-date MIA methods in both attacks and defenses.
arXiv Detail & Related papers (2024-11-15T08:09:28Z) - A Multi-faceted Semi-Synthetic Dataset for Automated Cyberbullying
Detection [0.0]
This paper provides a description of an extensive semi-synthetic cyberbullying dataset.
It incorporates all of the essential aspects of cyberbullying, including aggression, repetition, peer relationships, and intent to harm.
This accompanying data article provides an in-depth look at the dataset, increasing transparency and enabling replication.
arXiv Detail & Related papers (2024-02-09T16:53:19Z) - Explain Thyself Bully: Sentiment Aided Cyberbullying Detection with
Explanation [52.3781496277104]
Cyberbullying has become a big issue with the popularity of different social media networks and online communication apps.
Recent laws like "right to explanations" of General Data Protection Regulation have spurred research in developing interpretable models.
We develop first interpretable multi-task model called em mExCB for automatic cyberbullying detection from code-mixed languages.
arXiv Detail & Related papers (2024-01-17T07:36:22Z) - Cyberbullying in Text Content Detection: An Analytical Review [0.0]
Online social networks increase the user's exposure to life-threatening situations such as suicide, eating disorder, cybercrime, compulsive behavior, anxiety, and depression.
To tackle the issue of cyberbullying, most existing literature focuses on developing approaches to identifying factors and understanding the textual factors associated with cyberbullying.
This paper conducts a comprehensive literature review to provide an understanding of cyberbullying detection.
arXiv Detail & Related papers (2023-03-18T21:23:06Z) - Self-supervised Hypergraph Representation Learning for Sociological
Analysis [52.514283292498405]
We propose a fundamental methodology to support the further fusion of data mining techniques and sociological behavioral criteria.
First, we propose an effective hypergraph awareness and a fast line graph construction framework.
Second, we propose a novel hypergraph-based neural network to learn social influence flowing from users to users.
arXiv Detail & Related papers (2022-12-22T01:20:29Z) - Aggression and "hate speech" in communication of media users: analysis
of control capabilities [50.591267188664666]
Authors studied the possibilities of mutual influence of users in new media.
They found a high level of aggression and hate speech when discussing an urgent social problem - measures for COVID-19 fighting.
Results can be useful for developing media content in a modern digital environment.
arXiv Detail & Related papers (2022-08-25T15:53:32Z) - Enhancing the Identification of Cyberbullying through Participant Roles [1.399948157377307]
This paper proposes a novel approach to enhancing cyberbullying detection through role modeling.
We utilise a dataset from ASKfm to perform multi-class classification to detect participant roles.
arXiv Detail & Related papers (2020-10-13T19:13:07Z) - HENIN: Learning Heterogeneous Neural Interaction Networks for
Explainable Cyberbullying Detection on Social Media [11.443698975923176]
We propose a novel deep model, HEterogeneous Neural Interaction Networks (HENIN), for explainable cyberbullying detection.
HENIN contains the following components: a comment encoder, a post-comment co-attention sub-network, and session-session and post-post interaction extractors.
arXiv Detail & Related papers (2020-10-09T13:44:34Z) - Sampling Attacks: Amplification of Membership Inference Attacks by
Repeated Queries [74.59376038272661]
We introduce sampling attack, a novel membership inference technique that unlike other standard membership adversaries is able to work under severe restriction of no access to scores of the victim model.
We show that a victim model that only publishes the labels is still susceptible to sampling attacks and the adversary can recover up to 100% of its performance.
For defense, we choose differential privacy in the form of gradient perturbation during the training of the victim model as well as output perturbation at prediction time.
arXiv Detail & Related papers (2020-09-01T12:54:54Z) - Aggressive, Repetitive, Intentional, Visible, and Imbalanced: Refining
Representations for Cyberbullying Classification [4.945634077636197]
We study the nuanced problem of cyberbullying using five explicit factors to represent its social and linguistic aspects.
These results demonstrate the importance of representing and modeling cyberbullying as a social phenomenon.
arXiv Detail & Related papers (2020-04-04T00:35:16Z) - I Know Where You Are Coming From: On the Impact of Social Media Sources
on AI Model Performance [79.05613148641018]
We will study the performance of different machine learning models when being learned on multi-modal data from different social networks.
Our initial experimental results reveal that social network choice impacts the performance.
arXiv Detail & Related papers (2020-02-05T11:10:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.