skip to main content
10.1145/3578741.3578742acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmlnlpConference Proceedingsconference-collections
research-article

BHF: BERT-based Hierarchical Attention Fusion Network for Cyberbullying Remarks Detection

Published:06 March 2023Publication History

ABSTRACT

Cyberbullying remarks based on social media platforms have seriously endangered the physical and mental health of netizens. In order to purify the network environment and create a healthy atmosphere, it needs to be identified. At present, most of the existing studies only analyze the overall features of the text, while ignoring the semantic representation of words at local locations. In order to mine the richer semantic features of text, this paper proposes a BHF model, which uses the BERT pre-training model to extract global semantic feature information, and then uses the Hierarchical Attention Network (HAN) to calculate the two-dimensional space of words and short sentences. Local semantic feature information is obtained by fusing two layers of semantic feature information to obtain three-dimensional semantic feature representation of words, short sentences and full text. The experimental results show that based on the BHF model, the semantic features of the text can be better extracted on the three types of problems of cyberbullying detection, and the accuracy of cyberbullying remarks detection can be greatly improved.

References

  1. [1] Wulczyn E, Thain N, Dixon L. Ex Machina: Personal Attacks Seen at Scale[C]. The Web Conference. International World Wide Web Conferences Steering Committee, 2017, pp. 1391–1399.Google ScholarGoogle Scholar
  2. [2] Zhou J, Shiren Y E, Wang H. Text Sentiment Classification Based on Deep Convolutional Neural Network Model[J]. Computer Engineering, 2019.Google ScholarGoogle Scholar
  3. [3] Shao L, Y Zhou, University L T. Semantic Rules and RNN Based Sentiment Classification for Online Reviews. 2019.Google ScholarGoogle Scholar
  4. [4] Zhou Zhihua, Machine Learning(chinese) [w] Beijing: Tsinghua University Press, 2016, pp. 30–32.Google ScholarGoogle Scholar
  5. [5] Yin D, Xue Z, Hong L. Detection of harassment on Web 2. 0[J]. Proceedings of the Content Analysis in the Web Workshop at Www, 2009, pp. 1–7.Google ScholarGoogle Scholar
  6. [6] Dinakar K, Reichart R, Lieberman H. Modeling the Detection of Textual Cyberbullying[C]. The Social Mobile Web, Papers from the 2011 ICWSM Workshop, Barcelona, Catalonia, Spain, July 21, 2011. DBLP, 2011.Google ScholarGoogle Scholar
  7. [7] Chavan V S, Shylaja S S. Machine learning approach for detection of cyber-aggressive comments by peers on social media network[C]. 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Zhao R, Zhou A, Mao K. Automatic detection of cyberbullying on social networks based on bullying features[C]. ACM. ACM, 2016, pp. 1–6.Google ScholarGoogle Scholar
  9. [9] PJC Pérez, Valdez, C. MISAAC:Instant messaging tool for Ciberbullying Detection.Google ScholarGoogle Scholar
  10. [10] Wang Kun, Cui Yanpeng, Hu Jianwei. Cyberbullying Detection, Based on the FastText and Word Similarity Schemes[J]. ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), 2020.Google ScholarGoogle Scholar
  11. [11] Iwendi C, Srivastava G, Khan S. Cyberbullying detection solutions based on deep learning architectures[J]. Multimedia Systems, 2020.Google ScholarGoogle Scholar
  12. [12] Pitsilis G K, Ramampiaro H, Langseth H. Detecting Offensive Language in Tweets Using Deep Learn [DB/OL]. 2019.Google ScholarGoogle Scholar
  13. [13] M. Mahat, “Detecting Cyberbullying Across Multiple Social Media Platforms Using Deep Learning,” 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), 2021, pp. 299–301, doi: 10.1109/ICACITE51222.2021.9404736.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Karthik D, Roi R, Henry L. Modeling the detection of textual cyberbullying. In Workshop on The Social Mobile Web, ICWSM, 2020.Google ScholarGoogle Scholar
  15. [15] Mohit Chandra, Ashwin Pathak, Eesha Dutta, Paryul Jain, Manish Gupta, Manish Shrivastava, and Ponnurangam Kumaraguru. 2020. AbuseAnalyzer: Abuse Detection, Severity and Target Prediction for Gab Posts. In Proceedings of the 28th International Conference on Computational Linguistics, Barcelona, Spain (Online). International Committee on Computational Linguistics, 2020, pp. 6277–6283.Google ScholarGoogle Scholar
  16. [16] Devlin J, Chang M W, Lee K. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding[J]. 2018.Google ScholarGoogle Scholar
  17. [17] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Łukasz Kaiser, and Illia Polosukhin, 2017, pp. 6000–6010.Google ScholarGoogle Scholar
  18. [18] Nikolaos Pappas, Andrei Popescu-Belis. Multilingual Hierarchical Attention Networks for Document Classification. 8th International Joint Conference on Natural Language Processing, 2017, pp. 1015–1025.Google ScholarGoogle Scholar

Index Terms

  1. BHF: BERT-based Hierarchical Attention Fusion Network for Cyberbullying Remarks Detection

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            MLNLP '22: Proceedings of the 2022 5th International Conference on Machine Learning and Natural Language Processing
            December 2022
            406 pages
            ISBN:9781450399067
            DOI:10.1145/3578741

            Copyright © 2022 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 6 March 2023

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format