With the increasing popularity of social media network in the recent years, the concerns have been raised for the exposure of cyber bullying. The harmful information brings huge negative impact on the mental health of people who are exposed to them, especially teenagers. Therefore, it is essential to find an effective way of cyber bullying detection. In this paper, we proposed two different models for the text representation and feature extraction. Introduction to the topic and some related work were presented firstly for a better understanding of the topic. Then the concept of the two text representation models Embedding Enhanced Bag-of-Words model and Bullying-Word-Filter model were introduced. In the experiment part, we applied ...
While social media offer great communication opportunities, they also increase the vulnerability of ...
While social media offer great communication opportunities, they also increase the vulnerability of ...
While social media offer great communication opportunities, they also increase the vulnerability of ...
Nowadays, many research tasks are concentrating on Social Media for Analyzing Sentiments and Opinion...
Cybercrimes often happened in social networking sites. Cyber-bullying is a form of cybercrime that r...
Cybercrimes often happened in social networking sites. Cyber-bullying is a form of cybercrime that r...
Modern young people (“digital natives”) have grown in an era dominated by new technologies where com...
Cyberbullying has arisen as a widespread issue for teenagers, particularly children and young adults...
The use of information and technology to bully a person online is referred to as cyberbullying. Indi...
With the widespread use of the Internet in modern times, a massive amount of data has been generated...
The internet has pervaded every part of human life making it easier to link individuals across the g...
Cyberbullying has become a major problem around the world with the increasing usage of social networ...
Usage of internet and social media backgrounds tends in the use of sending, receiving and posting of...
Machine learning techniques can be used to automatically infer information that is not available fro...
Successful prevention of cyberbullying depends on the adequate detection of harmful messages. Given ...
While social media offer great communication opportunities, they also increase the vulnerability of ...
While social media offer great communication opportunities, they also increase the vulnerability of ...
While social media offer great communication opportunities, they also increase the vulnerability of ...
Nowadays, many research tasks are concentrating on Social Media for Analyzing Sentiments and Opinion...
Cybercrimes often happened in social networking sites. Cyber-bullying is a form of cybercrime that r...
Cybercrimes often happened in social networking sites. Cyber-bullying is a form of cybercrime that r...
Modern young people (“digital natives”) have grown in an era dominated by new technologies where com...
Cyberbullying has arisen as a widespread issue for teenagers, particularly children and young adults...
The use of information and technology to bully a person online is referred to as cyberbullying. Indi...
With the widespread use of the Internet in modern times, a massive amount of data has been generated...
The internet has pervaded every part of human life making it easier to link individuals across the g...
Cyberbullying has become a major problem around the world with the increasing usage of social networ...
Usage of internet and social media backgrounds tends in the use of sending, receiving and posting of...
Machine learning techniques can be used to automatically infer information that is not available fro...
Successful prevention of cyberbullying depends on the adequate detection of harmful messages. Given ...
While social media offer great communication opportunities, they also increase the vulnerability of ...
While social media offer great communication opportunities, they also increase the vulnerability of ...
While social media offer great communication opportunities, they also increase the vulnerability of ...