When Cyber Aggression Prediction Meets BERT on Social Media
- URL: http://arxiv.org/abs/2301.01877v1
- Date: Thu, 5 Jan 2023 02:26:45 GMT
- Title: When Cyber Aggression Prediction Meets BERT on Social Media
- Authors: Zhenkun Zhou and Mengli Yu and Yuxin He and Xingyu Peng
- Abstract summary: We put forward the prediction model for cyber aggression based on the cutting-edge deep learning algorithm.
We elaborate cyber aggression on three dimensions: social exclusion, malicious humour, and guilt induction.
This study offers a solid theoretical model for cyber aggression prediction.
- Score: 1.0323063834827415
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Increasingly, cyber aggression becomes the prevalent phenomenon that erodes
the social media environment. However, due to subjective and expense, the
traditional self-reporting questionnaire is hard to be employed in the current
cyber area. In this study, we put forward the prediction model for cyber
aggression based on the cutting-edge deep learning algorithm. Building on 320
active Weibo users' social media activities, we construct basic, dynamic, and
content features. We elaborate cyber aggression on three dimensions: social
exclusion, malicious humour, and guilt induction. We then build the prediction
model combined with pretrained BERT model. The empirical evidence shows
outperformance and supports a stronger prediction with the BERT model than
traditional machine learning models without extra pretrained information. This
study offers a solid theoretical model for cyber aggression prediction.
Furthermore, this study contributes to cyber aggression behaviors' probing and
social media platforms' organization.
Related papers
- Towards in-situ Psychological Profiling of Cybercriminals Using Dynamically Generated Deception Environments [0.0]
Cybercrime is estimated to cost the global economy almost $10 trillion annually.
Traditional perimeter security approach to cyber defence has so far proved inadequate to combat the growing threat of cybercrime.
Deceptive techniques aim to mislead attackers, diverting them from critical assets whilst simultaneously gathering cyber threat intelligence on the threat actor.
This article presents a proof-of-concept system that has been developed to capture the profile of an attacker in-situ, during a simulated cyber-attack in real time.
arXiv Detail & Related papers (2024-05-19T09:48:59Z) - A Survey on Online User Aggression: Content Detection and Behavioural
Analysis on Social Media Platforms [1.7626756873727654]
The rise of social media platforms has led to an increase in cyber-aggressive behavior, including cyberbullying, online harassment, and the dissemination of offensive and hate speech.
These behaviors have been associated with significant societal consequences, ranging from online anonymity to real-world outcomes such as depression, suicidal tendencies, and, in some instances, offline violence.
This paper delves into the field of Aggression Content Detection and Behavioral Analysis of Aggressive Users, aiming to bridge the gap between disparate studies.
arXiv Detail & Related papers (2023-11-15T20:59:13Z) - Decoding the Silent Majority: Inducing Belief Augmented Social Graph
with Large Language Model for Response Forecasting [74.68371461260946]
SocialSense is a framework that induces a belief-centered graph on top of an existent social network, along with graph-based propagation to capture social dynamics.
Our method surpasses existing state-of-the-art in experimental evaluations for both zero-shot and supervised settings.
arXiv Detail & Related papers (2023-10-20T06:17:02Z) - Designing an attack-defense game: how to increase robustness of
financial transaction models via a competition [69.08339915577206]
Given the escalating risks of malicious attacks in the finance sector, understanding adversarial strategies and robust defense mechanisms for machine learning models is critical.
We aim to investigate the current state and dynamics of adversarial attacks and defenses for neural network models that use sequential financial data as the input.
We have designed a competition that allows realistic and detailed investigation of problems in modern financial transaction data.
The participants compete directly against each other, so possible attacks and defenses are examined in close-to-real-life conditions.
arXiv Detail & Related papers (2023-08-22T12:53:09Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools
Stock Prediction [100.9772316028191]
In this paper, we experiment with a variety of adversarial attack configurations to fool three stock prediction victim models.
Our results show that the proposed attack method can achieve consistent success rates and cause significant monetary loss in trading simulation.
arXiv Detail & Related papers (2022-05-01T05:12:22Z) - Preference Enhanced Social Influence Modeling for Network-Aware Cascade
Prediction [59.221668173521884]
We propose a novel framework to promote cascade size prediction by enhancing the user preference modeling.
Our end-to-end method makes the user activating process of information diffusion more adaptive and accurate.
arXiv Detail & Related papers (2022-04-18T09:25:06Z) - Cyberbullying Indicator as a Precursor to a Cyber Construct Development [0.0]
This study proposes a cyberbullying framework based on the identification of some observable behavioral indicators.
Using a self-administered measurement instrument from 30-respondents, the study observed the probability of a cyberbully construct.
arXiv Detail & Related papers (2022-03-31T07:55:51Z) - Are socially-aware trajectory prediction models really socially-aware? [75.36961426916639]
We introduce a socially-attended attack to assess the social understanding of prediction models.
An attack is a small yet carefully-crafted perturbations to fail predictors.
We show that our attack can be employed to increase the social understanding of state-of-the-art models.
arXiv Detail & Related papers (2021-08-24T17:59:09Z) - Cyberbullying Detection with Fairness Constraints [0.0]
We propose a model training scheme that can employ fairness constraints and validate our approach with different datasets.
We believe our work contributes to the pursuit of unbiased, transparent, and ethical machine learning solutions for cyber-social health.
arXiv Detail & Related papers (2020-05-09T13:04:26Z) - Modeling Aggression Propagation on Social Media [4.99023186931786]
Cyberaggression has been studied in various contexts and online social platforms.
We study propagation of aggression on social media using opinion dynamics.
We propose ways to model how aggression may propagate from one user to another, depending on how each user is connected to other aggressive or regular users.
arXiv Detail & Related papers (2020-02-24T09:50:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.