Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    Enhancing Arabic Cyberbullying Detection with End-to-End Transformer Model

    Mohamed A. Mahdi1, Suliman Mohamed Fati2,*, Mohamed A.G. Hazber1, Shahanawaj Ahamad3, Sawsan A. Saad4

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1651-1671, 2024, DOI:10.32604/cmes.2024.052291 - 27 September 2024

    Abstract Cyberbullying, a critical concern for digital safety, necessitates effective linguistic analysis tools that can navigate the complexities of language use in online spaces. To tackle this challenge, our study introduces a new approach employing Bidirectional Encoder Representations from the Transformers (BERT) base model (cased), originally pretrained in English. This model is uniquely adapted to recognize the intricate nuances of Arabic online communication, a key aspect often overlooked in conventional cyberbullying detection methods. Our model is an end-to-end solution that has been fine-tuned on a diverse dataset of Arabic social media (SM) tweets showing a notable… More >

  • Open Access

    ARTICLE

    Cyberbullying Sexism Harassment Identification by Metaheurustics-Tuned eXtreme Gradient Boosting

    Milos Dobrojevic1,4, Luka Jovanovic1, Lepa Babic3, Miroslav Cajic5, Tamara Zivkovic6, Miodrag Zivkovic2, Suresh Muthusamy7, Milos Antonijevic2, Nebojsa Bacanin2,4,8,9,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4997-5027, 2024, DOI:10.32604/cmc.2024.054459 - 12 September 2024

    Abstract Cyberbullying is a form of harassment or bullying that takes place online or through digital devices like smartphones, computers, or tablets. It can occur through various channels, such as social media, text messages, online forums, or gaming platforms. Cyberbullying involves using technology to intentionally harm, harass, or intimidate others and may take different forms, including exclusion, doxing, impersonation, harassment, and cyberstalking. Unfortunately, due to the rapid growth of malicious internet users, this social phenomenon is becoming more frequent, and there is a huge need to address this issue. Therefore, the main goal of the research… More >

  • Open Access

    ARTICLE

    A Machine Learning Approach to Cyberbullying Detection in Arabic Tweets

    Dhiaa Musleh1, Atta Rahman1,*, Mohammed Abbas Alkherallah1, Menhal Kamel Al-Bohassan1, Mustafa Mohammed Alawami1, Hayder Ali Alsebaa1, Jawad Ali Alnemer1, Ghazi Fayez Al-Mutairi1, May Issa Aldossary2, Dalal A. Aldowaihi1, Fahd Alhaidari3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1033-1054, 2024, DOI:10.32604/cmc.2024.048003 - 18 July 2024

    Abstract With the rapid growth of internet usage, a new situation has been created that enables practicing bullying. Cyberbullying has increased over the past decade, and it has the same adverse effects as face-to-face bullying, like anger, sadness, anxiety, and fear. With the anonymity people get on the internet, they tend to be more aggressive and express their emotions freely without considering the effects, which can be a reason for the increase in cyberbullying and it is the main motive behind the current study. This study presents a thorough background of cyberbullying and the techniques used… More >

  • Open Access

    ARTICLE

    The Relationship between Internet Addiction and Cyberbullying Perpetration: A Moderated Mediation Model of Moral Disengagement and Internet Literacy

    Wan Xiao1,*, Miaoting Cheng2,*

    International Journal of Mental Health Promotion, Vol.25, No.12, pp. 1303-1311, 2023, DOI:10.32604/ijmhp.2023.042976 - 29 December 2023

    Abstract Internet addiction and cyberbullying have emerged as significant global mental health concerns in recent years. Although previous studies have shown a close association between Internet addiction and cyberbullying, the underlying mechanisms connecting these two phenomena remain unclear. Therefore, this study aimed to reveal the mechanisms involved between Internet addiction and cyberbullying perpetration from the perspective of cognition function. This study recruited 976 Chinese youth through online survey, using the short version of Internet Addiction Test (s-IAT), Chinese Cyberbullying Intervention Project Questionnaire (C-CIPQ), Cyberbullying Moral Disengagement Scale (CMDS), and Internet Literacy Questionnaire (ILQ) to investigate the More >

  • Open Access

    ARTICLE

    Cyberbullying Detection and Recognition with Type Determination Based on Machine Learning

    Khalid M. O. Nahar1,*, Mohammad Alauthman2, Saud Yonbawi3, Ammar Almomani4,5

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5307-5319, 2023, DOI:10.32604/cmc.2023.031848 - 29 April 2023

    Abstract Social media networks are becoming essential to our daily activities, and many issues are due to this great involvement in our lives. Cyberbullying is a social media network issue, a global crisis affecting the victims and society as a whole. It results from a misunderstanding regarding freedom of speech. In this work, we proposed a methodology for detecting such behaviors (bullying, harassment, and hate-related texts) using supervised machine learning algorithms (SVM, Naïve Bayes, Logistic regression, and random forest) and for predicting a topic associated with these text data using unsupervised natural language processing, such as More >

  • Open Access

    ARTICLE

    Firefly-CDDL: A Firefly-Based Algorithm for Cyberbullying Detection Based on Deep Learning

    Monirah Al-Ajlan*, Mourad Ykhlef

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 19-34, 2023, DOI:10.32604/cmc.2023.033753 - 06 February 2023

    Abstract There are several ethical issues that have arisen in recent years due to the ubiquity of the Internet and the popularity of social media and community platforms. Among them is cyberbullying, which is defined as any violent intentional action that is repeatedly conducted by individuals or groups using online channels against victims who are not able to react effectively. An alarmingly high percentage of people, especially teenagers, have reported being cyberbullied in recent years. A variety of approaches have been developed to detect cyberbullying, but they require time-consuming feature extraction and selection processes. Moreover, no… More >

  • Open Access

    REVIEW

    A Review of Machine Learning Techniques in Cyberbullying Detection

    Daniyar Sultan1,2,*, Batyrkhan Omarov3, Zhazira Kozhamkulova4, Gulnur Kazbekova5, Laura Alimzhanova1, Aigul Dautbayeva6, Yernar Zholdassov1, Rustam Abdrakhmanov3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5625-5640, 2023, DOI:10.32604/cmc.2023.033682 - 28 December 2022

    Abstract Automatic identification of cyberbullying is a problem that is gaining traction, especially in the Machine Learning areas. Not only is it complicated, but it has also become a pressing necessity, considering how social media has become an integral part of adolescents’ lives and how serious the impacts of cyberbullying and online harassment can be, particularly among teenagers. This paper contains a systematic literature review of modern strategies, machine learning methods, and technical means for detecting cyberbullying and the aggressive command of an individual in the information space of the Internet. We undertake an in-depth review… More >

  • Open Access

    ARTICLE

    Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks

    Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Heba G. Mohamed3, Lubna A. Alharbi4, Mohamed K. Nour5, Abdullah Mohamed6, Ahmed S. Almasoud7, Abdelwahed Motwakel2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2033-2047, 2023, DOI:10.32604/csse.2023.031181 - 03 November 2022

    Abstract Recent developments on Internet and social networking have led to the growth of aggressive language and hate speech. Online provocation, abuses, and attacks are widely termed cyberbullying (CB). The massive quantity of user generated content makes it difficult to recognize CB. Current advancements in machine learning (ML), deep learning (DL), and natural language processing (NLP) tools enable to detect and classify CB in social networks. In this view, this study introduces a spotted hyena optimizer with deep learning driven cybersecurity (SHODLCS) model for OSN. The presented SHODLCS model intends to accomplish cybersecurity from the identification More >

  • Open Access

    ARTICLE

    Search and Rescue Optimization with Machine Learning Enabled Cybersecurity Model

    Hanan Abdullah Mengash1, Jaber S. Alzahrani2, Majdy M. Eltahir3, Fahd N. Al-Wesabi4, Abdullah Mohamed5, Manar Ahmed Hamza6,*, Radwa Marzouk7

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1393-1407, 2023, DOI:10.32604/csse.2023.030328 - 03 November 2022

    Abstract Presently, smart cities play a vital role to enhance the quality of living among human beings in several ways such as online shopping, e-learning, e-healthcare, etc. Despite the benefits of advanced technologies, issues are also existed from the transformation of the physical word into digital word, particularly in online social networks (OSN). Cyberbullying (CB) is a major problem in OSN which needs to be addressed by the use of automated natural language processing (NLP) and machine learning (ML) approaches. This article devises a novel search and rescue optimization with machine learning enabled cybersecurity model for… More >

  • Open Access

    ARTICLE

    Cyberbullying-related Hate Speech Detection Using Shallow-to-deep Learning

    Daniyar Sultan1,2, Aigerim Toktarova3,*, Ainur Zhumadillayeva4, Sapargali Aldeshov5,6, Shynar Mussiraliyeva1, Gulbakhram Beissenova6,7, Abay Tursynbayev8, Gulmira Baenova4, Aigul Imanbayeva6

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2115-2131, 2023, DOI:10.32604/cmc.2023.032993 - 22 September 2022

    Abstract Communication in society had developed within cultural and geographical boundaries prior to the invention of digital technology. The latest advancements in communication technology have significantly surpassed the conventional constraints for communication with regards to time and location. These new platforms have ushered in a new age of user-generated content, online chats, social network and comprehensive data on individual behavior. However, the abuse of communication software such as social media websites, online communities, and chats has resulted in a new kind of online hostility and aggressive actions. Due to widespread use of the social networking platforms… More >

Displaying 1-10 on page 1 of 15. Per Page