Detection of Cyber Harassment

  • Authors

    • P. Asha
    • A. Lakshmi Sai Prasanna
    • K. Vennela
    https://doi.org/10.14419/ijet.v7i3.24.22800
  • Bad posts, Cyber harassment, Semantics based De-noising, Social Media.
  • Social media usage is increasing day-by-day, besides its uses, many cyber harassment cases are being filed, leaving many adults as victims. It is better to stop these incidents before they happen. This paper main aim is to provide a secure and safe social media environment for its users. Due to some privacy issues and missing of data when deleted it is difficult to find the convict, so timeline posts are considered rather than messages. This paper uses a method semantic enhanced marginalized De-noising auto-encoder for automatic detection of bad posts which prevent them from being posted on the timeline. Whenever a user tries to post something bad in words or sentences, an alert box will be shown that usage of bad words not allowed. This reduces many vulgar posts in the social media.

     

  • References

    1. [1] Hosseinmardi, Homa, Mattson, S.A., Rafiq, R.I., Han, R., Lv, Q. and Mishra, S(2015), Analyzing labeled cyberbullying incidents on the instagram social network." International Conference on Social Informatics. Springer, Cham, 2015.

      [2] Dinakar, K., Reichart, R. and Lieberman, H., 2011. Modeling the detection of Textual Cyberbullying. The Social Mobile Web, 11(02), pp.11-17.

      [3] Bayzick, J., Kontostathis, A. and Edwards, L., 2011, June. Detecting the presence of cyberbullying using computer software. In 3rd Annual ACM Web Science Conference (WebSci ‘11) (pp. 1-2).

      [4] Godin, F., Vandersmissen, B., De Neve, W. and Van de Walle, R., 2015. Multimedia Lab $@ $ ACL WNUT NER Shared Task: Named Entity Recognition for Twitter Microposts using Distributed Word Representations. In Proceedings of the Workshop on Noisy User-generated Text (pp. 146-153).

      [5] Nandhini, B.S. and Sheeba, J.I., 2015. Online social network bullying detection using intelligence techniques. Procedia Computer Science, 45, pp.485-492.

      [6] Baldi, P., 2012, June. Autoencoders, unsupervised learning, and deep architectures. In Proceedings of ICML Workshop on Unsupervised and Transfer Learning (pp. 37-49).

      [7] Bosacki, S., Dane, A., Marini, Z. and YLCâ€CURA, 2007. Peer relationships and internalizing problems in adolescents: mediating role of selfâ€esteem. Emotional and Behavioural Difficulties, 12(4), pp.261-282.

      [8] Dadvar, M., Trieschnigg, D., Ordelman, R. and de Jong, F., 2013, March. Improving cyberbullying detection with user context. In European Conference on Information Retrieval (pp. 693-696). Springer, Berlin, Heidelberg.

      [9] Kaplan, A.M. and Haenlein, M., 2010. Users of the world, unite! The challenges and opportunities of Social Media. Business horizons, 53(1), pp.59-68.

      [10] Mikolov, T., Chen, K., Corrado, G. and Dean, J., 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781.

      [11] Huang, Q., Singh, V.K. and Atrey, P.K., 2014, November. Cyber bullying detection using social and textual analysis. In Proceedings of the 3rd International Workshop on Socially-Aware Multimedia (pp. 3-6). ACM.

      [12] P. Asha, Roshni Sridhar and Rinnu Rose P. Jose, Click Jacking Prevention in Websites using Iframe Detection and IP Scan Techniques, ARPN Journal of Engineering and Applied Sciences 11(15), 9166-9170, 2016.

      [13] P.Asha, Prasanth R and Pranath P, Ranking the Product Details and its Application using Sentiment Classification, Research Journal of Pharmaceutical, Biological and Chemical Sciences 7(6), 1399-1405, 2016.

      [14] P. Asha, Madhavi N. Latha, and K. Architha, Design And Implementation Of IOT Based Security Aware Architecture Using IDS, Research Journal of Pharmaceutical, Biological and Chemical Sciences 8(2), 2293-2300, 2017.

  • Downloads

  • How to Cite

    Asha, P., Lakshmi Sai Prasanna, A., & Vennela, K. (2018). Detection of Cyber Harassment. International Journal of Engineering & Technology, 7(3.24), 497-500. https://doi.org/10.14419/ijet.v7i3.24.22800