Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Innovative deep learning techniques for monitoring aggressive behavior in social media posts

Published: 16 January 2024 Publication History

Abstract

The study aims to evaluate and compare the performance of various machine learning (ML) classifiers in the context of detecting cyber-trolling behaviors. With the rising prevalence of online harassment, developing effective automated tools for aggression detection in digital communications has become imperative. This research assesses the efficacy of Random Forest, Light Gradient Boosting Machine (LightGBM), Logistic Regression, Support Vector Machine (SVM), and Naive Bayes classifiers in identifying cyber troll posts within a publicly available dataset. Each ML classifier was trained and tested on a dataset curated for the detection of cyber trolls. The performance of the classifiers was gauged using confusion matrices, which provide detailed counts of true positives, true negatives, false positives, and false negatives. These metrics were then utilized to calculate the accuracy, precision, recall, and F1 scores to better understand each model’s predictive capabilities. The Random Forest classifier outperformed other models, exhibiting the highest accuracy and balanced precision-recall trade-off, as indicated by the highest true positive and true negative rates, alongside the lowest false positive and false negative rates. LightGBM, while effective, showed a tendency towards higher false predictions. Logistic Regression, SVM, and Naive Bayes displayed identical confusion matrix results, an anomaly suggesting potential data handling or model application issues that warrant further investigation. The findings underscore the effectiveness of ensemble methods, with Random Forest leading in the cyber troll detection task. The study highlights the importance of selecting appropriate ML algorithms for text classification tasks in social media contexts and emphasizes the need for further scrutiny into the anomaly observed among the Logistic Regression, SVM, and Naive Bayes results. Future work will focus on exploring the reasons behind this occurrence and the potential of deep learning techniques in enhancing detection performance.

References

[1]
Garett R, Lord LR, and Young SD Associations between social media and cyberbullying: a review of the literature Mhealth 2016 2 46
[2]
Selkie EM, Kota R, Moreno M, CYBERBULLYING BEHAVIORS AMONG FEMALE, Coll Stud J (2016) Spring ;50(2):278–287
[3]
Leung ANM To help or not to help: intervening in Cyberbullying among Chinese Cyber-bystanders Front Psychol 2021 12 483250
[4]
Doumas DM and Midgett A Witnessing cyberbullying and internalizing symptoms among Middle School Students Eur J Investig Health Psychol Educ 2020 10 4 957-966
[5]
Zhan J, Yang Y, and Lian R The relationship between cyberbullying victimization and cyberbullying perpetration: the role of social responsibility Front Psychiatry 2022 13 995937
[6]
Lam TN, Jensen DB, Hovey JD, and Roley-Roberts ME College students and cyberbullying: how social media use affects social anxiety and social comparison Heliyon 2022 8 12 e12556
[7]
Selkie EM, Kota R, Chan YF, and Moreno M Cyberbullying, depression, and problem alcohol use in female college students: a multisite study Cyberpsychol Behav Soc Netw 2015 18 2 79-86
[8]
Chanda SS and Banerjee DN Omission and commission errors underlying AI failures AI & Soc 2022
[9]
Nizamani AH, Chen Z, Nizamani AA, and Bhatti UA Advance Brain Tumor segmentation using feature fusion methods with deep U-Net model with CNN for MRI data J King Saud University-Computer Inform Sci 2023 35 9 101793
[10]
Zhang Y, Chen J, Ma X, Wang G, Bhatti UA, and Huang M Interactive medical image annotation using improved attention U-net with compound geodesic distance Expert Syst Appl 2024 237 121282
[11]
Chen Y, Zhou Y, Zhu S, Xu H (2012) Detecting Offensive Language in Social Media to protect adolescent online safety. 2012 Int Conf Priv Secur Risk Trust 2012 Int Confernece Social Comput Amsterdam Neth 71–80.
[12]
Gaydhani A, Doma V, Kendre, Shrikant, Laxmi BB (2018) Detecting Hate Speech and Offensive Language on Twitter using Machine Learning: An N-gram and TFIDF based Approach
[13]
Yin W and Zubiaga A Hidden behind the obvious: misleading keywords and implicitly abusive language on social media Online Social Networks and Media Volume 30 2022 100210 2468-6964
[14]
Bohr A, Memarzadeh K (2020) The rise of artificial intelligence in healthcare applications. Artif Intell Healthc 25–60.
[15]
Taherdoost H Enhancing Social Media Platforms with Machine Learning algorithms and neural networks Algorithms 2023 16 271
[16]
Conway M, Hu M, and Chapman WW Recent advances in Using Natural Language Processing To Address Public Health Research Questions Using Social Media and ConsumerGenerated Data Yearb Med Inform 2019 28 1 208-217 Epub 2019 Aug 16
[17]
Agathe Balayn J, Yang Z, Szlavik, Bozzon A (2021) Automatic Identification of Harmful, Aggressive, Abusive, and Offensive Language on the Web: A Survey of Technical Biases Informed by Psychology Literature. Trans. Soc. Comput. 4, 3, Article 11 (September 2021), 56 pages.
[18]
Alrashidi B, Jamal A, Khan I, and Alkhathlan A A review on abusive content automatic detection: approaches, challenges and opportunities PeerJ Comput Sci 2022 8 e1142
[19]
Nascimento FRS, Cavalcanti GDC, Da Costa-Abreu M (2023) Exploring Automatic hate Speech Detection on Social Media: a focus on content-based analysis. SAGE Open 13(2).
[20]
Bhatti UA, Tang H, Wu G, Marjan S, and Hussain A Deep learning with graph convolutional networks: an overview and latest applications in computational intelligence Int J Intell Syst 2023 2023 1-28
[21]
Bhatti UA, Huang M, Neira-Molina H, Marjan S, Baryalai M, Tang H, …Bazai, S. U. (2023) MFFCG–Multi feature fusion for hyperspectral image classification using graph attention network. Expert Syst App 229:120496
[22]
Shickel B, Tighe PJ, Bihorac A, Rashidi P, and Deep EHR A survey of recent advances in Deep Learning Techniques for Electronic Health Record (EHR) analysis IEEE J Biomed Health Inform 2018 22 5 1589-1604
[23]
Le Glaz A, Haralambous Y, Kim-Dufor DH, Lenca P, Billot R, Ryan TC, Marsh J, DeVylder J, Walter M, Berrouiguet S, and Lemey C Machine Learning and Natural Language Processing in Mental Health: systematic review J Med Internet Res 2021 23 5 e15708
[24]
Pennacchiotti M, Popescu A (2011) A Machine Learning Approach to Twitter User Classification. Proceedings of the International AAAI Conference on Web and Social Media
[25]
Sarwar SM, Murdock V (2021) Unsupervised Domain Adaptation for Hate Speech Detection Using a Data Augmentation Approach
[26]
Chen ZS (2022) Prathamesh (Param) Kulkarni, Isaac R. Galatzer-Levy, Benedetta Bigio, Carla Nasca, Yu Zhang. Modern views of machine learning for precision psychiatry. Patterns, Volume 3, Issue 11, 100602, ISSN 2666–3899,
[27]
Muneer A and Fati SM A Comparative Analysis of Machine Learning Techniques for Cyberbullying Detection on Twitter Future Internet 2020 12 187
[28]
Yu J, Lu L, Chen Y, Zhu Y, and Kong L An indirect eavesdropping Attack of keystrokes on Touch screen through Acoustic Sensing IEEE Trans Mob Comput 2021 20 2 337-351
[29]
Zhou, G., Deng, R., Zhou, X., Long, S., Li, W., Lin, G.,… Li, X. (2021). Gaussian Inflection Point Selection for LiDAR Hidden Echo Signal Decomposition. IEEE geoscience and remote sensing letters, 1–5.
[30]
Qi, M., Cui, S., Chang, X., Xu, Y., Meng, H., Wang, Y.,… Arif, M. (2022). Multi-region Nonuniform Brightness Correction Algorithm Based on L-Channel Gamma Transform. Security and communication networks, 2022.
[31]
Cao, K., Wang, B., Ding, H., Lv, L., Tian, J., Hu, H.,… Gong, F. (2021). Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems. IEEE transactions on vehicular technology, 70(2), 1978–1983.
[32]
Wu H, Jin S, and Yue W Pricing policy for a dynamic Spectrum Allocation Scheme with batch requests and impatient packets in Cognitive Radio Networks J Syst Sci Syst Eng 2022 31 2 133-149
[33]
Li, T., Xia, T., Wang, H., Tu, Z., Tarkoma, S., Han, Z.,… Hui, P. (2022). Smartphone App Usage Analysis: Datasets, Methods, and Applications. IEEE Communications Surveys& Tutorials, 24(2), 937–966.
[34]
Jiang Y and Li X Broadband cancellation method in an adaptive co-site interference cancellation system Int J Electron 2022 109 5 854-874
[35]
Huang C, Han Z, Li M, Wang X, and Zhao W Sentiment evolution with interaction levels in blended learning environments: using learning analytics and epistemic network analysis Australasian J Educational Technol 2021 37 2 81-95
[36]
Wu, Z., Cao, J., Wang, Y., Wang, Y., Zhang, L.,… Wu, J. (2020). hPSD: A Hybrid PU-Learning-Based Spammer Detection Model for Product Reviews. IEEE transactions on cybernetics, 50(4),1595–1606.
[37]
Li H, Huang Q, Huang J, and Susilo W Public-key authenticated encryption with Keyword Search supporting constant Trapdoor Generation and fast search IEEE Trans Inf Forensics Secur 2023 18 396-410
[38]
Sun, G., Xu, Z., Yu, H., Chen, X., Chang, V.,… Vasilakos, A. V. (2020). Low-Latency and Resource-Efficient Service Function Chaining Orchestration in Network Function Virtualization. IEEE Internet of Things Journal, 7(7), 5760–5772.
[39]
Sun, G., Zhu, G., Liao, D., Yu, H., Du, X.,… Guizani, M. (2019). Cost-Efficient Service Function Chain Orchestration for Low-Latency Applications in NFV Networks. IEEE Systems Journal, 13(4), 3877–3888.
[40]
Sun G, Li Y, Liao D, and Chang V Service function chain Orchestration Across multiple domains: a full mesh Aggregation Approach IEEE Trans Netw Serv Manage 2018 15 3 1175-1191
[41]
Li, T., Li, Y., Hoque, M. A., Xia, T., Tarkoma, S.,… Hui, P. (2022). To What Extent We Repeat Ourselves? Discovering Daily Activity Patterns Across Mobile App Usage.IEEE Transactions on Mobile Computing, 21(4), 1492–1507.
[42]
Liu H, Xu Y, and Chen F Sketch2Photo: synthesizing photo-realistic images from sketches via global contexts Eng Appl Artif Intell 2023 117 105608
[43]
Liu, X., Zhou, G., Kong, M., Yin, Z., Li, X., Yin, L.,… Zheng, W. (2023). Developing Multi-Labelled Corpus of Twitter Short Texts: A Semi-Automatic Method. Systems, 11(8),390.
[44]
Li D, Ortegas KD, and White M Exploring the computational effects of Advanced Deep neural networks on logical and activity learning for enhanced thinking skills Systems 2023 11 7 319
[45]
Zhang, H., Mi, Y., Fu, Y., Liu, X., Zhang, Y., Wang, J.,… Tan, J. (2023). Security defense decision method based on potential differential game for complex networks.Computers & Security, 129, 103187.
[46]
Qasim M, Khan M, Mehmood W, Sobieczky F, Pichler M, and Moser B A Comparative Analysis of Anomaly Detection Methods for Predictive Maintenance in SME Database and Expert systems Applications - DEXA 2022 Workshops. DEXA 2022 2022 Cham Springer
[47]
Khan M, Liu M, Dou W, Yu S vGraph: Graph Virtualization towards Big Data, 2015 Third International Conference on Advanced Cloud and Big Data, 2015, pp. 153–158,
[48]
Rafique W, Khan M, Sarwar N, Sohail M, and Irshad A Bajwa I, Kamareddine F, and Costa A A Graph Theory based method to Extract Social structure in the Society Intelligent Technologies and Applications. INTAP 2018 2019 Singapore Springer

Cited By

View all
  • (2024)Topic and knowledge-enhanced modeling for edge-enabled IoT user identity linkage across social networksJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00659-z13:1Online publication date: 28-May-2024

Index Terms

  1. Innovative deep learning techniques for monitoring aggressive behavior in social media posts
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Journal of Cloud Computing: Advances, Systems and Applications
        Journal of Cloud Computing: Advances, Systems and Applications  Volume 13, Issue 1
        Nov 2024
        2535 pages

        Publisher

        Hindawi Limited

        London, United Kingdom

        Publication History

        Published: 16 January 2024
        Accepted: 19 December 2023
        Received: 06 December 2023

        Author Tags

        1. Cyber troll detection
        2. Machine learning
        3. Random forest
        4. LightGBM
        5. Logistic regression
        6. SVM
        7. Naive bayes
        8. Text classification
        9. Online harassment

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 22 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Topic and knowledge-enhanced modeling for edge-enabled IoT user identity linkage across social networksJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00659-z13:1Online publication date: 28-May-2024

        View Options

        View options

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media