Machine learning approach for identification of threat content in audio messages shared on social media

被引:3
作者
Al-Tameem, Ayman bin Abdulaziz [1 ]
Saudagar, Abdul Khader Jilani [2 ]
机构
[1] King Saud Univ, Coll Appl Studies & Community Serv, Dept Comp Sci, Riyadh 22459, Saudi Arabia
[2] Imam Mohammad Ibn Saud Islamic Univ IMSIU, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11432, Saudi Arabia
关键词
Social Media; Hazard; Deep Learning; TensorFlow; Threat;
D O I
10.1080/09720529.2020.1721876
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Now-a-days social media is on boom and it becomes a part of individuals' daily life. All most all the people communicate with their friends, family members, peers etc using any one of the social media tools (e.g. Twitter, Snapchat, Facebook, and Instagram). People not only share their daily routine with others but sometimes share confidential information with each other in the forms of texts, images and audio messages. Depending on the existing political and economic instability in many countries, there is a need to monitor the content shared among users on social media. A lot of research has undergone in the past on how to monitor the shared content on social media, but they only address the text and images to some extent. According to researcher's knowledge there exists no research which address to disclose the content in audio messages which are shared on social media. In this paper the researcher's proposed a methodology which helps in detecting the unusual content shared among users on social media like (hazard, threat etc words) in the form of audio messages using Deep Learning. The results of this research are helpful in monitoring the social media content specially the audio messages by identifying hazards or threats planned before execution and in turn saving the society and mankind from destruction.
引用
收藏
页码:83 / 93
页数:11
相关论文
共 14 条
[1]  
Dong B, 2016, I C COMM SOFTW NET, P581, DOI 10.1109/ICCSN.2016.7586590
[2]  
Islam SMS, 2016, 2016 5TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS AND VISION (ICIEV), P592, DOI 10.1109/ICIEV.2016.7760071
[3]   Sentiment classification of twitter data belonging to renewable energy using machine learning [J].
Jain, Achin ;
Jain, Vanita .
JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2019, 40 (02) :521-533
[4]  
Johansson F., 2012, EUR INT SEC INF C, P189, DOI DOI 10.1109/EISIC.2012.23
[5]  
Kandias M., 2013, Proceedings of the 12th ACM workshop on Workshop on Privacy in the Electronic Society, P261, DOI [10.1145/2517840, DOI 10.1145/2517840]
[6]  
Katherine M. K., 2019, TRANSLATION REV, P1
[7]   A comprehensive keyword analysis of online privacy policies [J].
Kaur, Jasmin ;
Dara, Rozita A. ;
Obimbo, Charlie ;
Song, Fei ;
Menard, Karen .
INFORMATION SECURITY JOURNAL, 2018, 27 (5-6) :260-275
[8]   ImageNet Classification with Deep Convolutional Neural Networks [J].
Krizhevsky, Alex ;
Sutskever, Ilya ;
Hinton, Geoffrey E. .
COMMUNICATIONS OF THE ACM, 2017, 60 (06) :84-90
[9]   Deep learning [J].
LeCun, Yann ;
Bengio, Yoshua ;
Hinton, Geoffrey .
NATURE, 2015, 521 (7553) :436-444
[10]  
Patterson J., 2017, Deep learning: a practitioner's approach