Please use this identifier to cite or link to this item:
http://hdl.handle.net/1893/36289
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Atif, Ayesha | en_UK |
dc.contributor.author | Zafar, Amna | en_UK |
dc.contributor.author | Wasim, Muhammad | en_UK |
dc.contributor.author | Waheed, Talha | en_UK |
dc.contributor.author | Ali, Amjad | en_UK |
dc.contributor.author | Ali, Hazrat | en_UK |
dc.contributor.author | Shah, Zubair | en_UK |
dc.date.accessioned | 2024-10-08T00:03:44Z | - |
dc.date.available | 2024-10-08T00:03:44Z | - |
dc.date.issued | 2024 | en_UK |
dc.identifier.uri | http://hdl.handle.net/1893/36289 | - |
dc.description.abstract | In today’s digital era, the escalating phenomenon of cyberbullying is a pervasive and growing concern. With the increasing prevalence of social media platforms, such as Twitter, online abusive behavior has become a significant issue that often leads to unpleasant experiences for users. Manual detection of abnormal and bullying behavior within the realm of social media is inherently not scalable. Moreover, most existing studies on cyberbullying detection have been predominantly conducted in English and very limited work has been done on Urdu (a widely used language in Asia). This paper presents an approach for detecting cyberbullying in Roman Urdu tweets and identifying abuser profiles on Twitter. Firstly, we develop a text corpus of Roman Urdu tweets with user profile data. Subsequently, we employ Gated Recurrent Unit (GRU) model coupled with the application of word2vec technique for word embedding to develop a cyberbullying detection model. Furthermore, we present temporal abusive tweet probability analysis method to provide a nuanced analysis of the number of bullying and non-bullying tweets sent by individuals within a specific time interval. To evaluate the performance, we compare the GRU-based approach with other machine learning models. The results show that the GRU model with lexical normalization gives the best results with an accuracy of 97% and F1-measure of 97%. | en_UK |
dc.language.iso | en | en_UK |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_UK |
dc.relation | Atif A, Zafar A, Wasim M, Waheed T, Ali A, Ali H & Shah Z (2024) Cyberbullying Detection and Abuser Profile Identification on Social Media for Roman Urdu. <i>IEEE Access</i>, 12. https://doi.org/10.1109/access.2024.3445288 | en_UK |
dc.rights | CCBY - IEEE is not the copyright holder of this material. Please follow the instructions via https://creativecommons.org/licenses/by/4.0/ to obtain full-text articles and stipulations in the API documentation. | en_UK |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | en_UK |
dc.title | Cyberbullying Detection and Abuser Profile Identification on Social Media for Roman Urdu | en_UK |
dc.type | Journal Article | en_UK |
dc.identifier.doi | 10.1109/access.2024.3445288 | en_UK |
dc.citation.jtitle | IEEE Access | en_UK |
dc.citation.issn | 2169-3536 | en_UK |
dc.citation.volume | 12 | en_UK |
dc.citation.publicationstatus | Published | en_UK |
dc.citation.peerreviewed | Refereed | en_UK |
dc.type.status | VoR - Version of Record | en_UK |
dc.contributor.funder | Qatar National Research Fund | en_UK |
dc.author.email | ali.hazrat@stir.ac.uk | en_UK |
dc.citation.date | 16/08/2024 | en_UK |
dc.contributor.affiliation | University of Engineering and Technology Lahore (UET) | en_UK |
dc.contributor.affiliation | University of Engineering and Technology Lahore (UET) | en_UK |
dc.contributor.affiliation | University of Management and Technology Sialkot Campus | en_UK |
dc.contributor.affiliation | University of Engineering and Technology Lahore (UET) | en_UK |
dc.contributor.affiliation | Hamad Bin Khalifa University (HBKU) | en_UK |
dc.contributor.affiliation | Computing Science | en_UK |
dc.contributor.affiliation | Hamad Bin Khalifa University (HBKU) | en_UK |
dc.identifier.isi | WOS:001311209600001 | en_UK |
dc.identifier.scopusid | 2-s2.0-85201626604 | en_UK |
dc.identifier.wtid | 2042551 | en_UK |
dc.contributor.orcid | 0000-0002-7270-7238 | en_UK |
dc.contributor.orcid | 0000-0002-8350-5914 | en_UK |
dc.contributor.orcid | 0000-0002-5346-1017 | en_UK |
dc.contributor.orcid | 0000-0003-3058-5794 | en_UK |
dc.date.accepted | 2024-08-07 | en_UK |
dcterms.dateAccepted | 2024-08-07 | en_UK |
dc.date.filedepositdate | 2024-10-07 | en_UK |
rioxxterms.apc | not required | en_UK |
rioxxterms.type | Journal Article/Review | en_UK |
rioxxterms.version | VoR | en_UK |
local.rioxx.author | Atif, Ayesha| | en_UK |
local.rioxx.author | Zafar, Amna|0000-0002-7270-7238 | en_UK |
local.rioxx.author | Wasim, Muhammad| | en_UK |
local.rioxx.author | Waheed, Talha|0000-0002-8350-5914 | en_UK |
local.rioxx.author | Ali, Amjad|0000-0002-5346-1017 | en_UK |
local.rioxx.author | Ali, Hazrat|0000-0003-3058-5794 | en_UK |
local.rioxx.author | Shah, Zubair| | en_UK |
local.rioxx.project | Project ID unknown|Qatar National Research Fund|http://dx.doi.org/10.13039/100008982 | en_UK |
local.rioxx.freetoreaddate | 2024-10-07 | en_UK |
local.rioxx.licence | http://creativecommons.org/licenses/by/4.0/|2024-10-07| | en_UK |
local.rioxx.filename | Cyberbullying_Detection_and_Abuser_Profile_Identification_on_Social_Media_for_Roman_Urdu.pdf | en_UK |
local.rioxx.filecount | 1 | en_UK |
local.rioxx.source | 2169-3536 | en_UK |
Appears in Collections: | Computing Science and Mathematics Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Cyberbullying_Detection_and_Abuser_Profile_Identification_on_Social_Media_for_Roman_Urdu.pdf | Fulltext - Published Version | 2.41 MB | Adobe PDF | View/Open |
This item is protected by original copyright |
A file in this item is licensed under a Creative Commons License
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
The metadata of the records in the Repository are available under the CC0 public domain dedication: No Rights Reserved https://creativecommons.org/publicdomain/zero/1.0/
If you believe that any material held in STORRE infringes copyright, please contact library@stir.ac.uk providing details and we will remove the Work from public display in STORRE and investigate your claim.