Skip to main content
Top
Published in: Automatic Control and Computer Sciences 1/2020

01-01-2020

Personal-Bullying Detection Based on Multi-Attention and Cognitive Feature

Authors: M. Niu, L. Yu, S. Tian, X. Wang, Q. Zhang

Published in: Automatic Control and Computer Sciences | Issue 1/2020

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The rapid growth of social media in recent years has fed into some anti-social behavior such as kinds of cyberbullying. Previous researches only apply a single network model to complete detection. In this paper, aim to personal-bullying of Chinese social media, we propose a novel network framework with Multi Interactive-Attention and Language-environment Cognitive (MIALC) for personal-bullying detection: (1) we apply three attention features to capture multi-level and deep semantic information without using any external parsing result. Among them, the stroke attention feature can mine internal structural information of Chinese word. Meanwhile, (2) the ParagraphVector aims at extracting language-environment cognitive information from social media text, since the language-environment factors have restrictive effects on the expression of personal-bullying. The experimental results show that our proposed MIALC framework is effective.
Literature
1.
go back to reference Ptaszynski, M., Leliwa, G., and Piech, M., Cyberbullying Detection-Technical Report 2/2018, Department of Computer Science AGH, University of Science and Technology, arXiv preprint arXiv:1808.00926, 2018. Ptaszynski, M., Leliwa, G., and Piech, M., Cyberbullying Detection-Technical Report 2/2018, Department of Computer Science AGH, University of Science and Technology, arXiv preprint arXiv:1808.00926, 2018.
3.
go back to reference Cachola, I., Holgate, E., Preotiuc Pietro, D., et al., Expressively vulgar: The socio-dynamics of vulgarity and its effects on sentiment analysis in social media, Proceedings of the 27th International Conference on Computational Linguistics, 2018, pp. 2927–2938. Cachola, I., Holgate, E., Preotiuc Pietro, D., et al., Expressively vulgar: The socio-dynamics of vulgarity and its effects on sentiment analysis in social media, Proceedings of the 27th International Conference on Computational Linguistics, 2018, pp. 2927–2938.
4.
go back to reference Cao, S., Lu, W., Zhou, J., et al., cw2vec: Learning Chinese word embeddings with stroke n-gram information, Thirty-Second AAAI Conference on Artificial Intelligence, 2018, pp. 5054–5061. Cao, S., Lu, W., Zhou, J., et al., cw2vec: Learning Chinese word embeddings with stroke n-gram information, Thirty-Second AAAI Conference on Artificial Intelligence, 2018, pp. 5054–5061.
5.
go back to reference Servance, R.L., Cyberbullying, cyber-harassment, and the conflict between schools and the first amendment, Wis. Law Rev., 2003, no. 6, pp. 12–13. Servance, R.L., Cyberbullying, cyber-harassment, and the conflict between schools and the first amendment, Wis. Law Rev., 2003, no. 6, pp. 12–13.
6.
go back to reference Patchin, J.W. and Hinduja, S., Bullies move beyond the schoolyard: A preliminary look at cyberbullying, Youth Violence Juv. Justice, 2006, vol. 4, no. 2, pp. 148–169.CrossRef Patchin, J.W. and Hinduja, S., Bullies move beyond the schoolyard: A preliminary look at cyberbullying, Youth Violence Juv. Justice, 2006, vol. 4, no. 2, pp. 148–169.CrossRef
7.
go back to reference Yin, D., Xue, Z., Hong, L., et al., Detection of harassment on web 2.0, Proc. Content Anal. WEB, 2009, vol. 2, pp. 1–7. Yin, D., Xue, Z., Hong, L., et al., Detection of harassment on web 2.0, Proc. Content Anal. WEB, 2009, vol. 2, pp. 1–7.
8.
go back to reference Dinakar, K., Reichart, R., and Lieberman, H., Modeling the detection of textual cyberbullying, Fifth International AAAI Conference on Weblogs and Social Media, 2011, pp. 11–17. Dinakar, K., Reichart, R., and Lieberman, H., Modeling the detection of textual cyberbullying, Fifth International AAAI Conference on Weblogs and Social Media, 2011, pp. 11–17.
9.
go back to reference Dadvar, M., Experts and machines united against cyberbullying, PhD Thesis, University of Twente, 2014. Dadvar, M., Experts and machines united against cyberbullying, PhD Thesis, University of Twente, 2014.
10.
go back to reference Wulczyn, E., Thain, N., and Dixon, L., Ex machina: Personal attacks seen at scale, Proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2017, pp. 1391–1399. Wulczyn, E., Thain, N., and Dixon, L., Ex machina: Personal attacks seen at scale, Proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2017, pp. 1391–1399.
11.
go back to reference Nikhil, N., Pahwa, R., Nirala, M.K., et al., LSTMS with attention for aggression detection, arXiv preprint arXiv:1807.06151, 2018. Nikhil, N., Pahwa, R., Nirala, M.K., et al., LSTMS with attention for aggression detection, arXiv preprint arXiv:1807.06151, 2018.
12.
go back to reference Van Hee, C., Lefever, E., Verhoeven, B., Mennes, J., Desmet, B., De Pauw, G., and Hoste, V., Automatic detection and prevention of cyberbullying, International Conference on Human and Social Analytics, Proceedings, Lorenz, P. and Bourret, C., Eds., 2015, pp. 13–18. Van Hee, C., Lefever, E., Verhoeven, B., Mennes, J., Desmet, B., De Pauw, G., and Hoste, V., Automatic detection and prevention of cyberbullying, International Conference on Human and Social Analytics, Proceedings, Lorenz, P. and Bourret, C., Eds., 2015, pp. 13–18.
13.
go back to reference Reynolds, K., Kontostathis, A., and Edwards, L., Using machine learning to detect cyberbullying, 2011 10th International Conference on Machine Learning and Applications and Workshops. IEEE, 2011, vol. 2, pp. 241–244. Reynolds, K., Kontostathis, A., and Edwards, L., Using machine learning to detect cyberbullying, 2011 10th International Conference on Machine Learning and Applications and Workshops. IEEE, 2011, vol. 2, pp. 241–244.
14.
go back to reference Van Hee, C., Lefever, E., Verhoeven, B., Mennes, J., Desmet, B., De Pauw, G., and Hoste, V., Detection and fine-grained classification of cyberbullying events, Proceedings of Recent Advances in Natural Language Processing, Angelova, G., Bontcheva, K., and Mitkov, R., Eds., 2015, pp. 672–680. Van Hee, C., Lefever, E., Verhoeven, B., Mennes, J., Desmet, B., De Pauw, G., and Hoste, V., Detection and fine-grained classification of cyberbullying events, Proceedings of Recent Advances in Natural Language Processing, Angelova, G., Bontcheva, K., and Mitkov, R., Eds., 2015, pp. 672–680.
15.
go back to reference Nahar, V., Al-Maskari, S., Li, X., et al., Semi-supervised learning for cyberbullying detection in social networks, Australasian Database Conference, Cham, 2014, pp. 160–171. Nahar, V., Al-Maskari, S., Li, X., et al., Semi-supervised learning for cyberbullying detection in social networks, Australasian Database Conference, Cham, 2014, pp. 160–171.
16.
go back to reference Al Garadi, M.A., Varathan, K.D., and Ravana, S.D., Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network, Comput. Hum. Behav., 2016, vol. 63, pp. 433–443.CrossRef Al Garadi, M.A., Varathan, K.D., and Ravana, S.D., Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network, Comput. Hum. Behav., 2016, vol. 63, pp. 433–443.CrossRef
17.
go back to reference Badjatiya, P., Gupta, S., Gupta, M., et al., Deep learning for hate speech detection in tweets, Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 2017, pp. 759–760. Badjatiya, P., Gupta, S., Gupta, M., et al., Deep learning for hate speech detection in tweets, Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 2017, pp. 759–760.
18.
go back to reference Van Hee, C., Jacobs, G., Emmery, C., et al., Automatic detection of cyberbullying in social media text, PLoS ONE, 2018, vol. 13, no. 10. Van Hee, C., Jacobs, G., Emmery, C., et al., Automatic detection of cyberbullying in social media text, PLoS ONE, 2018, vol. 13, no. 10.
19.
go back to reference Agrawal, S. and Awekar, A., Deep learning for detecting cyberbullying across multiple social media platforms, European Conference on Information Retrieval, Cham, 2018, pp. 141–153. Agrawal, S. and Awekar, A., Deep learning for detecting cyberbullying across multiple social media platforms, European Conference on Information Retrieval, Cham, 2018, pp. 141–153.
20.
go back to reference Guo, F., He, R., Jin, D., et al., Implicit discourse relation recognition using neural tensor network with interactive attention and sparse learning, Proceedings of the 27th International Conference on Computational Linguistics, 2018, pp. 547–558. Guo, F., He, R., Jin, D., et al., Implicit discourse relation recognition using neural tensor network with interactive attention and sparse learning, Proceedings of the 27th International Conference on Computational Linguistics, 2018, pp. 547–558.
21.
go back to reference Chen, H., Liang, J., and Liu, H., How does word length evolve in written Chinese?, PloS ONE, 2015, vol. 10, no. 9. Chen, H., Liang, J., and Liu, H., How does word length evolve in written Chinese?, PloS ONE, 2015, vol. 10, no. 9.
22.
go back to reference Mikolov, T., Sutskever, I., Chen, K., et al., Distributed representations of words and phrases and their compositionality, Advances in Neural Information Processing Systems, 2013, pp. 3111–3119. Mikolov, T., Sutskever, I., Chen, K., et al., Distributed representations of words and phrases and their compositionality, Advances in Neural Information Processing Systems, 2013, pp. 3111–3119.
23.
go back to reference Cheng, N., Chandramouli, R., and Subbalakshmi, K.P., Author gender identification from text, Digital Invest., 2011, vol. 8, no. 1, pp. 78–88.CrossRef Cheng, N., Chandramouli, R., and Subbalakshmi, K.P., Author gender identification from text, Digital Invest., 2011, vol. 8, no. 1, pp. 78–88.CrossRef
24.
go back to reference Le, Q. and Mikolov, T., Distributed representations of sentences and documents, International Conference on Machine Learning, 2014, pp. 1188–1196. Le, Q. and Mikolov, T., Distributed representations of sentences and documents, International Conference on Machine Learning, 2014, pp. 1188–1196.
25.
go back to reference Mikolov, T., Chen, K., Corrado, G., and Dean, J., Efficient estimation of word representations in vector space, arXiv preprint arXiv:1301.3781, 2013. Mikolov, T., Chen, K., Corrado, G., and Dean, J., Efficient estimation of word representations in vector space, arXiv preprint arXiv:1301.3781, 2013.
Metadata
Title
Personal-Bullying Detection Based on Multi-Attention and Cognitive Feature
Authors
M. Niu
L. Yu
S. Tian
X. Wang
Q. Zhang
Publication date
01-01-2020
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 1/2020
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411620010083

Other articles of this Issue 1/2020

Automatic Control and Computer Sciences 1/2020 Go to the issue