This document contains a table summarizing 20 research papers on cyberbullying detection. For each paper, it lists the year published, technologies and algorithms used, and potential future work. The technologies used include various deep learning models like CNNs, RNNs, LSTMs, BERT as well as traditional algorithms like SVM, KNN and ensemble methods. Future work suggested includes using newer models, multimodal data, handling bias and under-resourced languages.
This document contains a table summarizing 20 research papers on cyberbullying detection. For each paper, it lists the year published, technologies and algorithms used, and potential future work. The technologies used include various deep learning models like CNNs, RNNs, LSTMs, BERT as well as traditional algorithms like SVM, KNN and ensemble methods. Future work suggested includes using newer models, multimodal data, handling bias and under-resourced languages.
This document contains a table summarizing 20 research papers on cyberbullying detection. For each paper, it lists the year published, technologies and algorithms used, and potential future work. The technologies used include various deep learning models like CNNs, RNNs, LSTMs, BERT as well as traditional algorithms like SVM, KNN and ensemble methods. Future work suggested includes using newer models, multimodal data, handling bias and under-resourced languages.
No published . 1 A Bi-GRU with 2021 Self-attention Bi- Use transformer-based models attention and GRU encoder like BERT CapsNet hybrid Capsule network Fine grain classification into model cyberbullying categories for cyberbullying detection on social media 2 A multi-platform 2020 Convolutional Use this model on multi- dataset for Neural Network platform incorporating data detecting XGBoost like images and video cyberbullying in SVM social media 3 Automatic Cyber 2019 Corpus based N/A Bullying Detection approach in Arabic Social Java environment Media 4 Cyberbullying 2016 Word embeddings Improve the robustness of Detection based Semantic learned representation by on enhanced considering word order in text Semantic- marginalized Enhanced denoising auto Marginalized encoder Denoising Auto-Encoder 5 Cyberbullying 2020 RNN integrate deep learning detection solutions LSTM approach with automatic based on deep GRU detection by tracking and learning Bi-LSTM object identification Architectures mechanism 6 Cyberbullying 2021 Social media Create data sets belonging to detection: Utilizing features like re- different countries that use social media share, likes the same language to compare features Crowdsourcing the effects of social media web annotation features demographically. application Additionally, a fuzzy rule- SVM, LR, KNN, based system can be NBM, AdaBoost, implemented to the current RF approaches using the analysis of social media futures 7 Early detection of 2021 Random Forest, Use of heterogeneous cyberbullying on AdaBoost, Extra combination of ML algorithms social media tree, Linear networks Support Vector Classification, Logistic Regression Applied other features on baseline models Name- Aditya Reg no 19BIT0139
like profile owners
features, Comments features, LDA, BoW 8 Predicting 2019 Random Forest, N/A Cyberbullying on AdaBoost, Extra Social Media in the tree, Linear Big Data Era Using Support Vector Machine Learning machine, Logistic Algorithms: Regression, Naïve Review of Bayes Literature and Open Challenges 9 Social Media 2019 SVM and Neural Use of larger size dataset Cyberbullying network for Detection using classification Machine Learning TF-IDF and sentimental analysis for feature extraction 10 Multi-input 2020 CapsNet, CNN, Use of embeddings from integrative MLP, Bi-LSTM, Language Models (ELMo) and learning using Multi-input bidirectional encoder deep neural integrative representations from networks learning using transformers (BERT) and transfer deep neural learning for networks cyberbullying detection in real-time code-mix data 11 A Multilingual 2017 Hybrid training Use of deep learning methods System for models, such as Cyberbullying combinations of Detection: Arabic Distance Content Detection Functions, NB and using Machine SVM Learning Weka for pre- processing 12 DEA-RNN: A Hybrid 2022 Dolphin Use proposed model for other Deep Learning Echolocation data types like audio, video Approach Algorithm and images for Cyberbullying Recurrent Neural Detection in Network Twitter Social Media Platform 13 Cyberbullying 2020 DistilBERT for combining proposed approach Detection with feature extraction with other bias mitigation Fairness 3-layered Deep methods and establishing a Name- Aditya Reg no 19BIT0139
Constraints neural network comprehensive framework for
unbiased machine learning algorithms in cyber-social health applications 14 Cyberbullying 2021 RNN-LSTM and Use of Ensemble methods detection: RNN-BiLSTM Incorporation of context- advanced pre- specific features and handling processing of morphological variations techniques & deep learning architecture for Roman Urdu data 15 Cyberbullying 2022 2DCNN, VGG16, Use of proposed methodology detection using Inception V3 on textual data deep transfer learning 16 An Application to 2022 CNN-BiLSTM, Analysis of image and video Detect LSTM, GRU Cyberbullying Combination of Using Machine different Learning activation and Deep Learning Techniques 17 Multilingual hope 2022 SVM, LR and Use of larger dataset speech detection ensemble with further fine-grained in English and CNN + BiLSTM classification and content Dravidian m-BERT, Indic- analysis languages BERT, XLNet and XLM-R 18 COVID-19 and 2021 MLP, CNN, Use of multimodal fusion in cyberbullying: BiLSTM, BERT order to predict the instances deep ensemble of cyberbully in a more fine- model grained way to identify Model capable of cyberbullying from understanding sarcasm code-switched languages during the pandemic 19 Keeping Children 2021 CASPER N/A Safe Online With Limited Resources: Analyzing What is Seen and Heard 20 Machine Learning 2021 KNN, Naïve Bayes, explore into larger variety of and feature Random forest, pre-processing methods for engineering-based SVM linear, CNN sarcasm and irony detection study into sarcasm and irony classification with Name- Aditya Reg no 19BIT0139
Download Applications Of Artificial Intelligence In Mining And Geotechnical Geoengineering 1St Edition Hoang Nguyen Xuan Nam Bui Yosoon Choi Wengang Zhang Jian Zhou Erkan Topal online ebook texxtbook full chapter pdf