Identification and Classification of Cyberbullying Posts: A Recurrent Neural Network Approach Using Under-Sampling and Class Weighting

被引:6
作者
Agarwal, Ayush [1 ]
Chivukula, Aneesh Sreevallabh [2 ]
Bhuyan, Monowar H. [3 ]
Jan, Tony [4 ]
Narayan, Bhuva [5 ]
Prasad, Mukesh [2 ]
机构
[1] Delhi Technol Univ, Dept Informat Technol, Delhi, India
[2] Univ Technol Sydney, Sch Comp Sci, FEIT, Sydney, NSW, Australia
[3] Umea Univ, Dept Comp Sci, Umea, Sweden
[4] Melbourne Inst Technol, Sch IT & Engn, Sydney, NSW, Australia
[5] Univ Technol Sydney, Sch Commun, FASS, Sydney, NSW, Australia
来源
NEURAL INFORMATION PROCESSING, ICONIP 2020, PT V | 2021年 / 1333卷
关键词
Cyberbullying; Natural language processing; Under-sampling; Recurrent Neural Network; Social media;
D O I
10.1007/978-3-030-63823-8_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the number of users of social media and web platforms increasing day-by-day in recent years, cyberbullying has become a ubiquitous problem on the internet. Controlling and moderating these social media platforms manually for online abuse and cyberbullying has become a very challenging task. This paper proposes a Recurrent Neural Network (RNN) based approach for the identification and classification of cyberbullying posts. In highly imbalanced input data, a Tomek Links approach does under-sampling to reduce the data imbalance and remove ambiguities in class labelling. Further, the proposed classification model uses Max-Pooling in combination with Bi-directional Long Short-Term Memory (LSTM) network and attention layers. The proposed model is evaluated using Wikipedia datasets to establish the effectiveness of identifying and classifying cyberbullying posts. The extensive experimental results show that our approach performs well in comparison to competing approaches in terms of precision, recall, with F1 score as 0.89, 0.86 and 0.88, respectively.
引用
收藏
页码:113 / 120
页数:8
相关论文
共 25 条
[1]  
[Anonymous], 2016, Comment Abuse Classification with Deep Learning
[2]  
[Anonymous], 2016, P 1 WORKSH NLP COMP, P138, DOI [DOI 10.18653/V1/W16-5618, 10.18653/v1/W16-5618]
[3]  
ARoss B, 2017, arXiv
[4]  
Aroyehun S. T., 2018, COLING 2018, P90
[5]  
Chen H., 2019, P INT AAAI C WEB SOC, V13, P125, DOI DOI 10.1609/ICWSM.V13I01.3215
[6]  
Cheng J., 2015, P INT AAAI C WEB SOC, V9, P61, DOI DOI 10.1609/ICWSM.V9I1.14583
[7]  
King DB, 2015, ACS SYM SER, V1214, P1, DOI 10.1021/bk-2015-1214.ch001
[8]  
Kumar R, 2018, P 1 WORKSH TROLL AGG, P1
[9]  
Kwok I., 2013, Proceedings of the AAAI Conference on Artificial Intelligence, DOI DOI 10.1609/AAAI.V27I1.8539
[10]  
Machackova H., 2013, CYBERPSYCHOLOGY, V7, DOI DOI 10.5817/CP2013-3-5