[1]Belsey B. What is cyberbullying[EBOL]. [20211208]. https:cyberbullying.orgwhatiscyberbullying[2]Smith P K, Mahdavi J, Carvalho M, et al. Cyberbullying: Its nature and impact in secondary school pupils[J]. Journal of Child Psychology and Psychiatry, 2008, 49(4): 376385[3]共青团中央维护青少年权益部. 2020年全国未成年人互联网使用情况研究报告[EBOL]. (20210720)[20211212]. http:www.cnnic.cnhlwfzyjhlwxzbgqsnbg202107P020210720571098696248.pdf[4]曹文, 张香兰. 小学生网络欺凌现状及其对策——基于山东14所小学的调查[J]. 少年儿童研究, 2020, 33(6): 1623[5]黄天红. 联邦与州协同治理:美国防治青少年网络欺凌的立法实践[J]. 世界教育信息, 2021, 34(7): 7377[6]中华人民共和国教育部. 未成年人学校保护规定[EBOL]. (20210601)[20211212]. http:www.moe.gov.cnsrcsiteA02s5911moe_621202106t20210601_534640.html[7]Xu J M, Jun K S, Zhu X, et al. Learning from bullying traces in social media[C] Proc of the 2012 Conf of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Stroudsburg, PA: ACL, 2012: 656666[8]Waseem Z, Hovy D. Hateful symbols or hateful people? Predictive features for hate speech detection on twitter[C] Proc of the NAACL Student Research Workshop. Stroudsburg, PA: ACL, 2016: 8893[9]Bengio Y, Ducharme R, Vincent P, et al. A neural probabilistic language model[J]. Journal of Machine Learning Research, 2003, 3(6): 11371155[10]Mikolov T, Chen K, Corrado G, et al. Efficient estimation of word representations in vector space[J]. arXiv preprint, arXiv:1301.3781, 2013[11]Gada M, Damania K, Sankhe S. Cyberbullying detection using LSTMCNN architecture and its applications[C] Proc of the 2021 Int Conf on Computer Communication and Informatics. Piscataway, NJ: IEEE, 2021: 16[12]Pennington J, Socher R, Manning C D. GloVe: Global vectors for word representation[C] Proc of the 2014 Conf on Empirical Methods in Natural Language Processing. Stroudsburg, PA: ACL, 2014: 15321543[13]Banerjee V,Telavane J, Gaikwad P, et al. Detection of cyberbullying using deep neural network[C] Proc of the 5th Int Conf on Advanced Computing & Communication Systems. Piscataway, NJ: IEEE, 2019: 604607[14]Peters M E, Neumann M, Iyyer M, et al. Deep contextualized word representation[C] Proc of the 2018 Conf of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Stroudsburg, PA: ACL, 2018: 22272237[15]Zhao R, Zhou A, Mao K. Automatic detection of cyberbullying on social networks based on bullying features[C] Proc of the 17th Int Conf on Distributed Computing and Networking. New York: ACM, 2016: 16[16]n E P, Yeniterzi R. Cyberbullying detection using deep learning and word embedding analysis[C] Proc of the 28th Signal Processing and Communications Applications Conf. Piscataway, NJ: IEEE, 2020: 14[17]刘小乐, 方勇, 黄诚, 等. 基于深度图卷积神经网络的Exploit Kit攻击活动检测方法[J]. 信息安全研究, 2022, 8(7): 685693[18]Kim Y. Convolutional neural networks for sentence classification[C] Proc of the 2014 Conf on Empirical Methods in Natural Language Processing. Stroudsburg, PA: ACL, 2014: 17461751[19]Zhang Xiang, Zhao Junbo, LeCun Y. Characterlevel convolutional networks for text classification[C] Proc of the 28th Int Conf on Neural Information Processing Systems. Cambridge, MA: MIT Press, 2015: 649657[20]Le H T, Cerisara C, Denis A. Do convolutional networks need to be deep for text classification[C] Proc of AAAI Workshop on Affective Content Analysis. Menlo Park, CA: AAAI, 2018: 2936[21]Huang Gao, Liu Zhuang, Maaten V, et al. Densely connected convolutional networks[C] Proc of the 2017 IEEE Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2017: 770778[22]Laxmi S T,Rismala R, Nurrahmi H. Cyberbullying detection on Indonesian twitter using Doc2Vec and convolutional neural network[C] Proc of the 9th Int Conf on Information and Communication Technology. Piscataway, NJ: IEEE, 2021: 8286[23]Agrawal S,Awekar A. Deep learning for detecting cyberbullying across multiple social media platforms[C] Proc of the 2018 European Conf on Information Retrieval. Berlin: Springer, 2018: 141153[24]Mahat M. Detecting cyberbullying across multiple social media platforms using deep learning[C] Proc of the 2021 Int Conf on Advance Computing and Innovative Technologies in Engineering. Piscataway, NJ: IEEE, 2021: 299301[25]何力, 郑灶贤, 项凤涛, 等. 基于深度学习的文本分类技术研究进展[J]. 计算机工程, 2021, 47(2): 111[26]Akhter M P, Zheng Jiangbin, Naqvi I R, et al. Abusive language detection from social media comments using conventional machine learning and deep learning approaches[J]. Multimedia Systems, 2021, 27(6): 16[27]Li Chen, Zhang Xu, Qaosar M, et al. Multifactor based stock price prediction using hybrid neural networks with attention mechanism[C] Proc of the 2019 Dependable Autonomic and Secure Computing. Piscataway, NJ: IEEE, 2019: 961966[28]Reynolds K,Kontostathis A, Edwards L. Using machine learning to detect cyberbullying[C] Proc of the 10th Int Conf on Machine Learning and Applications and Workshops. Piscataway, NJ: IEEE, 2011: 241244[29]Hosseinmardi H, Mattson S A, Rafiq R I, et al. Analyzing labeled cyberbullying incidents on the instagram social network[C] Proc of the Int Conf on Social Informatics. Berlin: Springer, 2015: 4966[30]Apeksha K. Cyberbullying detection in tweets[EBOL]. [20211002]. https:github.comapeksha104CyberbullyingDetectioninTweetsblobmasternew_cleaned_data.csv[31]DataTurks. Tweets dataset for detection of cyber trolls[EBOL]. [20210827]. https:www.kaggle.comdataturksdatasetfordetectionofcybertrolls[32]AndrewZ. Cyberbullying detection bot[EBOL]. [20210925]. https:github.comAndrewZeitlerCyberBullyingDetectionBottreemastercyberdata
|