Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Adarsh Kumar, Yashwanth Kumar Chakka, Faraz Khan, Anvesh Kumar Reddy Ravulacheruvu, Prof. Srinivas Murthy H
DOI Link: https://doi.org/10.22214/ijraset.2023.52269
Certificate: View Certificate
One of the most pernicious consequences of social media Is the Rise Of Cyberbullying And Tends To Be More Evil than traditional bullying because online records are usually available Lived on the Internet for a long time and are hard to reach Control. This article presents a three-phase algorithm. Called BullyNet to detect cyberbullying on the Social media Communication network. Use your bullying tendencies to make powerful suggestions Instructions for building a cyberbullying signed network (SN). Analyze Social media to determine their relevance to cyberbullying Considering the context in which social media exist in succession Optimize your bully score. Also, suggest centrality Measures detect and display cyberbullying from cyberbullying SNs Better than other existing metrics
I. INTRODUCTION
The Internet has created unprecedented opportunities for human interaction and socialization .Over the decades, social media in particular has enjoyed great popularity explosion. From MySpace to Facebook, Social media and Flickr. On Instagram, people connect and interact that way Previously it was not possible. Spread of social Media across all age groups is a plethora of data on multiple research topics, including recommendations system, link prediction, visualization and analysis social networks.
The growth of social media has created an excellent platform for communication and information sharing, but also new platforms for malicious activities such as spam [4], trolling [5], and cyberbullying .According to the Cyberbullying Research Center (CRC), cyberbullying occurs when someone uses technology to send messages to harass, abuse, or threaten an individual or group. Popular social media platforms such as Facebook and Social media are highly vulnerable to cyberbullying. The popularity of these social media sites and the anonymity that the Internet offers perpetrators. Although there are strong laws to punish cyberbullying, there are few tools to effectively combat cyberbullying. Social media platforms offer users the ability to self-report abusive behavior and content, and also provide tools for dealing with bullying .Work produced by the research community related to cyberbullying in social networks also needs to be scaled up to provide better insights and aid in the development of effective tools and techniques to address the problem To identify cyberbullying on social media, first Understand how to model social media.
Average Methods of Relational Modeling in Social Psychology [9].Represent as a signed graph with a positive slope corresponding to goodwill and a negative slope corresponding to goodwill. To malice among people. Using signed charts We model the social network Social media as SN to represent it. User Behavior [10] node corresponds to the user ,Directed edges correspond to communication and/or relationships Among users assigned weights in the range [−1, 1],As shown in Figure 1.
Definition 1: A signed social network (SSN) is a directed, weighted graph G = (V, E, W), where V is the set of users and E ⊆ V ×V is the set of edges with an edge weight w ∈ W in the range of [−1,1].
Mining social media networks to identify cyberbullying presents several challenges and concerns. First, it is usually the messages of social media users (posts,Usually short social media or comments that use slang .May include language or multimedia content such as images and videos. For example, Social media limits users' messages to her 140 characters. This can be a mix of text, slang, emojis, and gifs. As a result, it is difficult to correctly judge the opinion expressed in the message. To do this, we use sentiment analysis (SA) , to determine whether a user's attitude towards other users is positive, negative, or neutral. Second, bullies can be difficult to spot, regardless of whether the bully is disguised with techniques such as sarcasm or passive aggression. In this situation, a single text (message) cannot determine the user's intent. Therefore, capture entire conversations between two or more users to identify the context in which user preferences exist. Third, the scale and dynamic complex structure of social media networks Makes it difficult to identify cyberbullying. For example, Social media sends hundreds of millions of social media every day on the social networking platform. In this case we build Graph social networks and assign values ??based on user malice. Network analysis reduces complex relationships between users, Simple existence of vertices and edges. There are several studies in the literature on malicious user detection from unsigned networks with positive edge weights, such as community detection, node classification [14], and link prediction. On the other hand, methods to analyze SSN are rare.
This article examines the issue of cyberbullying .Social media trying to answer the following studies listen: Tweet context (conversation) can help improve this Identify cyberbullying on Social media? Our intuition is that Not all social media should be judged solely on their contents well as based on the context in which it exists. we call it like that .A conversation consisting of a series of social media Two or more people exchanging information about a particular person theme. Therefore, our solution he consists of three parts. first A conversation chart is generated based on each conversation About the mood of the tweet and the language of bullying. number two ,Calculate the bullying score for each pair of users Create conversation charts and combine all charts to create one An SSN called Mobbing-SN (B). Include Negative Links Reveals information that is often over looked Positive link only [16]. Finally, I propose centrality A scale called Attitude and Merit (A&M) for detecting bullying User of SN B.
Our main contributions are organized as follows.
a. Built conversation.
b. Constructed bullying SN. c) Proposed A&M centrality.
3. Experimented on 5.6 million social media collected over six months. The results show that our approach can detect cyberbullies with high accuracy while being scalable with respect to the number of social media .
II. RELATED WORKS
In this section, we review the literature on areas related to cyberbullying detection and SSNs.
A. Cyberbullying Detection
The literature on using SN to detect cyberbullying is sparse. Aim to detect trolls within the SN. Wu et al. [17] proposed a node ranking method to identify trolls without using PageRank algorithm. Kumar et al. [6] proposed an iterative algorithm involving new simplification operations and various centrality measures to detect vandalism. Unlike the method suggested in this article, the author starts the process from an already created SN. In general, much work has been done in the last decade in the area of ??cyberbullying detection. There are two common ways to identify bullies. One aims to identify bullying messages [18]–[21], and the other approach is to identify the cyberbullying that causes the messages [22]–[25]. The first method of identifying bullying messages is text-based analysis and text and user functions. Zhao et al. [18] proposed a text-based one Enhanced Bag-of-Words(EBoW) model of embedding, characteristics of bullying, vocabulary, Potential semantic features for definitive representation It is then run through a classifier to identify cyberbullying. Xu et al. [21] Using Textual Information to Identify Emotions On the bully track instead of judging whether There was no news of bullying. Shin et al. [19] proposed Probabilistic Social Text Information Fusion for Cyberbullying recognition. This fusion uses derived features of social networks. Density from 1.5 Ego Networks and Textual Features Swear words and part-of-speech tags. Hossein Mardi et al. [20]We used images and text to identify cyberbullying incidents. Of Text and image features were collected from media sessions With photos and relevant comments .It was then input into various classifiers. Chen et al. [twenty five]proposed a new method for identifying cyberbullying in a multimodal context. To understand cyberbullying, Kao et al. [26] Considering social issues and proposing a framework role recognition.
Use words and comments in a timely manner Session features and social information Peer influence Cheng et al. [27], [28] Proposed framework Detect cyberbullying. Second method for identity verification Behind the cyberbullying incident. Schiccharini et al.Use MySpace data to create user-integrated graphs, Text and network capabilities. This graph was used to detect Cyberbullying and anticipating the spread of bullying behavio rBy node classification. Garan Garcia et al.[23] Used Supervised Machine Learning to Detect Real Users Behind It demonstrated the technique in one by vandalizing his Social media profile .An example of cyberbullying. In a recent article on aggression, Bullying on Social media, Chatzakou et al. [24] Internet Bully Discovered Attackers using user, text, and network-based functionality. From the method above, I found these things An approach that focuses on how aggressive the content of the message is Based on identification of cyber attackers, but not taken into account Why the message was offensive, i.e. the above paper was not Analyze the context of the entire conversation, not just the content message. Our approach uses a bag of words Text to identify curse words and judge them using SA Analyze the sender's emotions and attitudes and finally analyze them The entire context in which senders and receivers communicate. These overlooked factors can be significant or global Change cyberbullying detection results.
B. SSNs
This section reviews the previous work done on SNs [6], [10], [15], [17], [29]. The idea of SNs is not new, but its application and analysis of them were only developed in recent years. We extended its application to establish node classification in our model. Previously, in 2010, Leskovec et al. [10] reviewed the balance and status theory and their relation to social media and proposed a modified status theory that better reflects patterns found in SNs in social media. Tang et al. [15], [29] have done a broad survey of SNs in social media and proposed a new framework for node classification in SSNs. The authors incorporated negative links in the SN and proposed an approach to mathematically model both independent and dependent information from the links. Over the last few years, a number of methods have been designed for SN analysis with both positive and negative links [30]–[33]. Most of these methods are based on simple modifications of the PageRank or eigenvector centrality that accounts for negative weights on the links. However, some of these measures do not consider how the incoming edges of a node depend on the outgoing edges from the same node and vice versa, i.e., interactions between incoming and outgoing links in SNs. Mishra and Bhattacharya [34] employed this scenario and proposed bias and deserve (BAD) measures. The deserve of a node depends on the opinions of other nodes, whereas the trustworthiness of a node depends on how a node gives a correct opinion about other nodes., we can find that the BAD measures are not effective for identifying bullies in the network. Table I provides a comparative evaluation of main features in related approaches including our proposed approach. III. PROBLEM FORMULATION In this section, the Social media social network is represented as a directed, weighted graph G = (U, E) with U being the set of users (represented as nodes) and E being the set of social media T sent between the users(represented as edges). Each user u ∈ U has a set of features, including an ID, the number of followers, the number of friends, and the number of the social media that they sent. Each tweet t ∈ T is associated with certain features: source ID (SID), destination ID (DID), the date of creation, a user ID (UID), a reply ID (RID), and mentions (MID). If the tweet includes mentions (i.e., if a given @username is included in a tweet anywhere else but at the very start), then Social media interprets this as a mention and the user gets a notification that someone has mentioned them. As shown in Fig. 2, the notation ei j represents a tweet t directed edge from node (user) i to node (user) j. The existence of an edge ei j denotes an interaction from node i to node j which is t. Each tweet has a set of features, as shown in Table II. (SID) is assigned when a new tweet is created; in this case, it is 101. (DID) is an ID to which this current tweet is in response to where the destination ID is 3001. (UID), (RID), and (MID) correspond to IDs of that particular users/nodes. Finally, the text is the content of the tweet sent from node i to node j.
Extract conversations from the above Social media data, Create a directed weighted graph for each conversation C = {c1, c2,... c|C|}. In our model, each ci is a set of her 2 or more social media between her 2 or more users.
Definition 2:Conversation c is a set of time series Tweet
c = {t1,t2,... t|c|} , so
a. DID(t1) = NULL, and MID(t1) or RID(t1) is not zero.
b. DID(t1) = NULL and ∀t ⊆ T :SID(t) =DID(t1).
2. All social media in c satisfy the following conditions:
SID(ti) = DID(ti+1) :1 ≤ i ≤ |c| − 1
Our model analyzes nodes and conversions, Output a list of results of detecting cyberbullying on Social media social network
L = {(u1,s1), (u2,s2), . . . , (u|L|,s|L|)}
where ui is the user (node) and si is the node's trust value. Probability that UI is a bully.
III. OUR SOLUTION: BULLYNET ALGORITHM
This section provides an overview of what was originally proposed using a 3-step Bully Detection Algorithm (BFA), with steps for each phase. Our solution aims to identify bullies. Raw Social media data based on context and content where the tweet resides. Given a set of social media containing T For Social media features such as user ID, reply ID, etc., the proposed approach consists of three algorithms.
The first algorithm is directed Weighted conversation graph Gc with efficient reconstruction Conversations from raw Social media data while enabling more An accurate model of human interaction. second algorithm Build bullying SN B to analyze user behavior on social media. The third algorithm consists of the proposed algorithms A&M centrality measure for identifying bullies from B. Figure Shows the BullyNet process flow where the raw data is located. extracted from Social media using the Social media API and from there conversation chart is created for each conversation used Algorithm 1. Next, bullying from the conversation graph SN is generated by Algorithm 2. Bully at the end of Social media is identified using Algorithm 3.
A. Algorithm 1 Conversational graph generationentry
input:set of social media,T = {t1,...,tn}
output:Conversation graph Gc = {gc1 ,..., gcm }
a if ti does not belong to the conversation, Create a new conversation c ∈ C and associate ti with c.
b. Given a tweet t={ti,ti+1,...,t|T |} (DID(ti) = SID(t)), associate t with all conversations of ti.
3. For every conversation ci ∈ C:
a. Construct a conversation graph gci ∈ Gc.Users are represented as nodes and social media as edges.
b. For each edge e = (u,v) of gci:
c. Calculate the bullying index Iti (weight).Edge as follows: Iuv = β ∗ S A + γ ∗ C
4. return Gc
Algorithm 1—Conversation Graph Generation
Algorithm 1's conversation graph generation consists of a set of social media T and generates directed weights. Conversation graphs Gc for each conversation. weightbetween nodes or between users Examine the text of social media and the sentiment behind the swear words. Then it gives a score based on the formula the text represents. ti in T in each tweet is a conversation constructed by binary search DID(ti) using the SIDs frest of the social media. if a match is found as t , then Add ti to form a new conversation. if binary Search match was found in an existing Tweet For conversation ci, ti is appended to the social media in ci. Graphic Expressed as Gc = (V, E, I).
where V is the set of users .joins the conversation and E represents the set of edges Social media within a conversation, each edge has With the bullying index value I as the edge weight, Range [−1, +1]. If ii j = -1, this indicates negative eThe interaction of i with j, if Ii j = 1, then a.positive interaction. The bullying index for each tweet is SA [Valence Aware Dictionary and sentiment Reasoner (VADER)] and cosine Similarity (CS) containing a list of commonly used insult swords. The coefficients for β and γ are 0.9 and 0.1 respectively. This is determined experimentally (see Section VI-C).
B. Algorithm 2—Bullying SN Generation
In many real social systems the relationship is between two Nodes can be represented as positive and negative SNs.connection. Because this study focuses on identifying bullying,A node in the network, algorithm 2 is The weight of the final outgoing edge of the user in conversation wi j Graph Gc.
Algorithm 2 Bullying SN Generation
Input: Set of conversation graphs, Gc
Output: Bullying Signed Network B
a) a sorted set of same-ordered edges Calculate source bullying scores in ascending ordernode u to goal node v of each edge e =(u,v) as follows: Suv = Iuv + α(Iuv − Svu ).Determine the average rating of node u. same edge.
b) Calculate the total bullying score S for each nodein gci as follows:
i) the knot is For the root node:S=S1+2.2(n-1)ii) otherwise:S =S.2.2(n)
2. Merge them all to build bullying SN graph B Conversation graph together.
3. return B
In step 1(a) of Algorithm 2, for any conversation graph gci,A bullying score S is calculated based on how the node/user was attacked.Interact with other nodes/users in the chart based on their social mediaorder (sorted in ascending order), i.e. the social media are sortedConversation based. For edges e = (u,v), mobbingIf the edge to v is not a response from u, the result Suv ≡ Iuv.Otherwise, the bullying score Suv is Iuv + α(Iuv −Svu ), where α is a constant determined by experiment.0.6 where α is used to give You have to consider the difference between transmitter and receiver Determine the bullying score S. Iuv is a bullying indicatorBetween nodes u and v, Svu is the mobbing score between them.Node v to u. The difference between Iuv and Suv is Iuv to calculate content score of social media Based on SA and CS, SUVs will calculate a score based on.the whole conversation between u and v, i.e. the context Your opinion is v. Multiple edges Mean bullying score for users of the same order It is calculated for the same set of commands depending on the bully score. Evaluated.
C. Algorithm 3 - Bullying Detection
This work consists of identifying bullies in B based on centrality middle. Since this article is about social networks, Importance is defined as action. among the many Mishra and Bhattacharya [34] State-of-the-art methods for treating SN Because its measure is computed like the output edge Connections from one node/user depend on incoming edges from other nodes node/user. However, BAD is modeled on a trust basis. Network, i.e. H. Trusted/Distrusted Users other users. In addition, edge weights indicate confidence values. It's not a bullying score like in this study. Therefore, we proposed a centrality measure similar to A&M. Until then of BAD for identifying bullies from proposed SN B. Merit is a measure of the other person's opinion (good or bad).A node should be a specific node, attitude is a measure A node's behavior with respect to other nodes. However, in one Face bullying net, attitude, likes and dislikes A node's relationship to other nodes in the network is unknown. Hence the formulas for calculating income and employment mutually recursive metrics
Let in(j) be the set of all incoming edges to node j out(i) denotes the set of all outgoing edges from node i. Normalization is performed to keep values ??within the range of .[−1, 1]. An auxiliary variable Xi j is introduced for the measurement. Influence of performance score of node j on input edge to node i. Because whether it is a knot or not is an advantage Good or bad is calculated as the sum of everything. Incoming edges from other nodes. as well as posture Computed if it is about each node's view of other nodes Using a node's outgoing edge to other nodes and its Corresponding merit score in the network. although we useTwo metrics similar to BAD to calculate incoming. The output edges of the nodes are different. Since the BAD bias
is about how much it evaluates other nodes, so it's calculated as follows:The difference between edge weights and true confidence in knots (obtain).
Here are the suggested metric descriptions:From the above formula, The outgoing edge weight from node i to node j is positivevalue and the merit score of node j is also positive.The positions of nodes i to j are computed from the sum of both. value. if the weight of the outgoing edge from node i to j is negative if the performance score of node j is positive and vice versa The positions of nodes i to j are Merit score from edge weights. in short, nodes have positive edge weights for benign merit nodes, Then the set value is increased. also have a negative Benign Merit An edge weight to a knot reduces that knot's edge weight setting score. However, if the node's edge weight is positive-negative benefits Towards the node, the node's attitude declines. From (1) and (2), node hiring depends on merit its neighbors and vice versa. Fixed-point iterative method Used to get the solution. Advantages and Attitudes of Node I Iteration n is denoted by An(i) and Mn(i) respectively. Proposed algorithm 3 has merits and Settings for each node in the network. let's get started If the Merit and Attitude values ??are -1 (that is, the first iteration)Step 1. In step 2a, the power value for each node is updated. Use the settings from the previous iteration. In step 2b,The setting value will be updated with the newly updated earnings Score the same repetition. Both Merit and Attitude Scores Mutually recursive and updates until both scores are updated It converges in step 3. Merit and Attitude Grades The final iteration is the final result. In the final step 4 all Nodes with set value less than zero are added List L with the user's preference score.
D. Algorithm 3 BFA
entry: Signed network bullying Gs = (V, E, W)
Exit:List of bullies and their attitude values ??L = [(u1,s1), (u2,s2), . . . , (u|L|,s|L|)]
a) Compute the merit score for each v ∈ V Married(v) = 12|inch (v)| u∈in(v)(wuv )(Ai−1(u)) where |i n(v)| is the number of incoming edges to node v.b) Compute a setting for each u ∈ V oi(c) = 1
2. to (u)| v∈out(u)(wuv + Xuv ) where |out(u)| is the number of edges emanating from node u.
3. If there is at least one v ∈ V:Married(v) = Mi−1(v) or Ai(v) = Ai−1(v)a) increase the iteration index i = i + 1b) Repeat steps 2a and 2b for each iteration.
4. For each v ∈ V, add a node and its corresponding pose value greater than 0 to the list L.
5. return El
IV. ALGORITHM ANALYSIS
A. Convergence of Centrality Measure
We start the proof of convergence by showing the difference between the pose of the node at each iteration and infinity Iterations are constrained and lead to convergence proof of margin of error,1.After a given iteration, t is the set value for that iteration. Approach A∞. There may also be benefits of knots Expressed in terms of configuring other nodes, Quality values ??have similar properties. Suggestion 1:A&M of the node at each iteration n and Infinite iterations are bounded by the inverse exponential function from n.
Complexity Analysis
The overall complexity of our proposed approach in the average case is O(k × l + log n)n. We can determine the time complexity of the proposed approach in three phases: constructing conversation graph, constructing bullying SN, and bully finding.
V. EXPERIMENTAL EVALUATION
This section proposes algorithm. First, we present the data used for the analysis. Now let's discuss the implementation details and paths Process it to create ground truth. lastly, Experimental results including coefficient determination alpha, beta, gamma, utility and scalability.
A. Data Set
This article relies on Social media's streaming API. Get free access to 1% of all social media. the API returns each tweet in JSON format containing the content of the tweet,Metadata (e.g. creation time, source id, target id, replies/resocial media) and information about the author (e.g. username, followers, friends). To protect ourselves from our own prejudices, We first randomly selected 5000 connected users and collected all social media in her JSON format for a total of 5.6 million.6 months from May to October 2017.We then extracted features such as username, body, reply name, mentions, and network-based features such as source ID and the target ID from the Social media JSON. was about2% of the social media were in a language other than English.Looking at users, about 90% of regions locations were in the US and 6% of user locations were in the UK.The remaining 4% of him were from Ecuador, Japan and China.
B. Implementation and Setup
I implemented the algorithm in Java and did some experiments It ran on a computer with Intel Corei7-8550U CPU with 2.00 GHz processor and 16.0 GB RAM, On Windows 10 64-bit operating system. We have hired staff from Amazon Mechanical Turk (MTurk).To respond to online surveys developed by us. provided2700 surveys, each survey consisting of 10 interviews with him. Each vote he was assigned to three workers to classify User bullying behavior on conversation accounts Her 4 Predefined Designations (Very Positive, Possibly Positive, Possibly Positive)negative and strongly negative) to avoid biased interpretation From bullies. In total, the worker rated his 27,000 conversations His 1700 users extracted from the set From his Social media raw data using Algorithm 1. M Turk UI Allows requesters to create and publish surveys (HITs) Batch when processing many HITs of the same type to save time. For our investigation, we created a csv file with the following contents:2700 hits. MTurk automatically created another HIT for her.
Each set of conversations in the CSV file, as shown in Figure 7Results of evaluating each user participating in a group of conversations Obtained from workers. a good percentage Survey participants were from the United States, Canada, Europe, and India. There was no noticeable change in the evaluation provided by workers. was about 7978 strong negative, 47 426 probably negative, 56 704 probably positive, 23,762 highly positive user interactions. some of them Users rarely appear in conversations. These ratings are based on the number of users and number of employees .Calculated using metrics to identify 569 users as bullies. finally, The results are normalized to form the ground truth. Analyze Computing the ground truth of the metric yields: Bullying and non-bullying users. in the calculation result As ground truth, we evaluated key performance indicators. Experiments on the results of the proposed algorithm The number of users increases linearly from 500 to 1700.
C. Determining Optimal Values for Coefficients α, β, and γ
Iuv for Algorithm 1 = β x S A + γ x C S and Suv =Iuv + α(Iuv - Svu) for Algorithm 2. To determine the coefficientβ and γ of bullying index I, α of bullying score S, Generate input social media of varying length and performance Experiment with different values ??of α, β, and γ. Recorded 5.7 million social media and conducted a tweet experiment different α, β, and gamma value. After trying various values, Coefficient values ??for β ≥ 0.6, γ ≤ 0.4, and α ≤ 0.6Provides maximum precision. Accuracy measurement for β ≥ 0.6 and γ ≤ 0.4 for each α ≤ 0.6 with respect to Ground truth from F1 measurements [41].timid. 8 is the coefficients α, β, γ for the β and γ values ??set by60 to 90 or 40 to 10. Use 3 different alphas. Values ??for each of the bullying index coefficients β and γ It varies from 0.4 to 0.6. in our approach, The F1 metric increases linearly as the factor β increases. and γ decrease. I also observe this when increasing it The α value increases the F1 measure in all cases. The impact of SA on the bullying index is CS. SA not only analyzes text, Emojis, emoticons, CS decisions alone hurt performance. Therefore, we use both SA and SA. cosine. Responses to social media also have a direct impact About the bullying score.
Despite the digital revolution and the rise of social media, Enabling major advances in communication platforms and social Wider spread of interactions, harmful behaviors are known Because I was bullied. This article introduces the novel BullyNet\'s Framework for Identifying Social media Bully Users social network. We have done extensive research on mining SN to better understand the relationship between Social media users building SN based on bullying tendency. I observed this by constructing a conversation Can be effective, based on context and content Identify the emotions and behaviors behind bullying. in us Experimental study evaluating proposed centrality Measures to detect bullying from SN, and reached around80 - 81% accuracy in identifying bullies .various cases. There are still some outstanding issues worthy of further consideration investigation. First, our approach focuses on extracting sentiment and behavior from text and emojis within social media. but, It would be interesting to see your photos and videos Many users use them to bully others. number two, It doesn\'t distinguish between tyrannical and aggressive users. Development of new algorithms and techniques to identify bullies of attackers will prove important to improve identification by cyberbullying. Another interesting topic is studying Conversational graph dynamics and Geographic location and how this dynamic is affected Geographic distribution of users? it\'s close Will bullying increase?
[1] J. Tang, C. Aggarwal, and H. Liu, “Recommendations in signed social networks,” in Proc. 25th Int. Conf. World Wide Web, Apr. 2016, pp. 31–40. [2] D. Liben-Nowell and J. Kleinberg, “The link-prediction problem for social networks,” J. Amer. Soc. Inf. Sci. Technol., vol. 58, no. 7, pp. 1019–1031, 2007. [3] U. Brandes and D. Wagner, “Analysis and visualization of social networks,” in Graph Drawing Software. Amsterdam, The Netherlands: Elsevier, 2004, pp. 321–340. [4] X. Hu, J. Tang, H. Gao, and H. Liu, “Social spammer detection with sentiment information,” in Proc. IEEE Int. Conf. Data Mining, Dec. 2014, pp. 180–189. [5] E. E. Buckels, P. D. Trapnell, and D. L. Paulhus, Trolls Just Want to Have Fun. Springer, 2014, pp. 67:97–102. [6] S. Kumar, F. Spezzano, and V. S. Subrahmanian, “Accurately detecting trolls in slashdot zoo via decluttering,” in Proc. IEEE/ACM Int. Conf. Adv. Social Netw. Anal. Mining (ASONAM), Aug. 2014, pp. 188–195. [7] J. W. Patchin and S. Hinduja, “2016 cyberbullying data,” Cyberbullying Res. Center, Tech. Rep. 2016, 2017. [8] Cyberbullying Research Center. State Bullying Laws in America. Accessed: Jul. 1, 2020. [Online]. Available: https://cyberbullying. org/bullying-laws [9] D. Cartwright and F. Harary, “Structural balance: A generalization of Heider’s theory,” Psychol. Rev., vol. 63, no. 5, p. 277, Sep. 1956. [10] J. Leskovec, D. Huttenlocher, and J. Kleinberg, “Signed networks in social media,” in Proc. 28th Int. Conf. Hum. Factors Comput. Syst. (CHI), 2010, pp. 1361–1370. [11] R. Plutchik, “A general psychoevolutionary theory of emotion,” in Theories of Emotion. 1980, pp. 3–33. [12] W. Medhat, A. Hassan, and H. Korashy, “Sentiment analysis algorithms and applications: A survey,” Ain Shams Eng. J., vol. 5, no. 4, pp. 1093–1113, Dec. 2014. [13] L. Tang and H. Liu, “Community detection and mining in social media,” Synth. Lectures Data Mining Knowl. Discovery, vol. 2, no. 1, pp. 1–137, Jan. 2010. [14] S. Bhagat, G. Cormode, and S. Muthukrishnan, “Node classification in social networks,” in Social Network Data Analytics. 2011, pp. 115–148. [15] J. Tang, Y. Chang, C. Aggarwal, and H. Liu, “A survey of signed network mining in social media,” in Proc. ACM Comput. Surv., vol. 3, 2016, pp. 42:1–42:37
Copyright © 2023 Adarsh Kumar, Yashwanth Kumar Chakka, Faraz Khan, Anvesh Kumar Reddy Ravulacheruvu, Prof. Srinivas Murthy H. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET52269
Publish Date : 2023-05-14
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here