{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T17:28:30Z","timestamp":1777310910809,"version":"3.51.4"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T00:00:00Z","timestamp":1653436800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T00:00:00Z","timestamp":1653436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Social networking platforms like Facebook, Twitter, and others have numerous advantages, but they have many dark sides also. One of the issues on these social platforms is cyberbullying. The impact of cyberbullying is immeasurable on the life of victims as it\u2019s very subjective to how the person would tackle this. The message may be a bully for victims, but it may be normal for others. The ambiguities in cyberbullying messages create a big challenge to find the bully content. Some research has been reported to address this issue with textual posts. However, image-based cyberbullying detection is received less attention. This research aims to develop a model that helps to prevent image-based cyberbullying issues on social platforms. The deep learning-based convolutional neural network is initially used for model development. Later, transfer learning models are utilized in this research. The experimental outcomes of various settings of the hyper-parameters confirmed that the transfer learning-based model is the better choice for this problem. The proposed model achieved a satisfactory accuracy of 89% for the best case, indicating that the system detects most cyberbullying posts.<\/jats:p>","DOI":"10.1007\/s40747-022-00772-z","type":"journal-article","created":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T08:04:02Z","timestamp":1653465842000},"page":"5449-5467","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["Cyberbullying detection using deep transfer learning"],"prefix":"10.1007","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5513-2834","authenticated-orcid":false,"given":"Pradeep Kumar","family":"Roy","sequence":"first","affiliation":[]},{"given":"Fenish Umeshbhai","family":"Mali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,25]]},"reference":[{"issue":"4","key":"772_CR1","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","volume":"49","author":"PK Smith","year":"2008","unstructured":"Smith PK, Mahdavi J, Carvalho M, Fisher S, Russell S, Tippett N (2008) Cyberbullying: its nature and impact in secondary school pupils. J Child Psychol Psychiatry 49(4):376\u2013385","journal-title":"J Child Psychol Psychiatry"},{"key":"772_CR2","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.chb.2015.03.030","volume":"49","author":"\u015eerife Ak","year":"2015","unstructured":"Ak \u015eerife, \u00d6zdemir Y, Kuzucu Y (2015) Cybervictimization and cyberbullying: the mediating role of anger, don\u2019t anger me! Comput Human Behav 49:437\u2013443","journal-title":"Comput Human Behav"},{"issue":"15","key":"772_CR3","doi-asserted-by":"publisher","first-page":"11059","DOI":"10.1007\/s00500-019-04550-x","volume":"24","author":"K Kumari","year":"2020","unstructured":"Kumari K, Singh JP, Dwivedi YK, Rana NP (2020) Towards cyberbullying-free social media in smart cities: a unified multi-modal approach. Soft Comput 24(15):11059\u201311070","journal-title":"Soft Comput"},{"key":"772_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101710","volume":"90","author":"V Balakrishnan","year":"2020","unstructured":"Balakrishnan V, Khan S, Arabnia HR (2020) Improving cyberbullying detection using twitter users\u2019 psychological features and machine learning. Comput Secur 90:101710","journal-title":"Comput Secur"},{"key":"772_CR5","doi-asserted-by":"crossref","unstructured":"Cheng L, Li J, Silva YN, Hall DL, Liu H (2019) Xbully: Cyberbullying detection within a multi-modal context. In Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, pp.\u00a0339\u2013347","DOI":"10.1145\/3289600.3291037"},{"key":"772_CR6","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.chb.2013.10.036","volume":"31","author":"S Bastiaensens","year":"2014","unstructured":"Bastiaensens S, Vandebosch H, Poels K, Van Cleemput K, DeSmet A, De Bourdeaudhuij I (2014) Cyberbullying on social network sites. an experimental study into bystanders\u2019 behavioural intentions to help the victim or reinforce the bully. Comput Hum Behav 31:259\u2013271","journal-title":"Comput Hum Behav"},{"key":"772_CR7","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.future.2021.01.006","volume":"118","author":"MF L\u00f3pez-Vizca\u00edno","year":"2021","unstructured":"L\u00f3pez-Vizca\u00edno MF, N\u00f3voa FJ, Carneiro V, Cacheda F (2021) Early detection of cyberbullying on social media networks. Future Gener Comput Syst 118:219\u2013229","journal-title":"Future Gener Comput Syst"},{"key":"772_CR8","doi-asserted-by":"crossref","unstructured":"Singh VK, Ghosh S, Jose C (2017) Toward multimodal cyberbullying detection. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp.\u00a02090\u20132099","DOI":"10.1145\/3027063.3053169"},{"key":"772_CR9","doi-asserted-by":"crossref","unstructured":"Singh VK, Huang Q, Atrey PK (2016) Cyberbullying detection using probabilistic socio-textual information fusion. In 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp.\u00a0884\u2013887, IEEE","DOI":"10.1109\/ASONAM.2016.7752342"},{"key":"772_CR10","doi-asserted-by":"crossref","unstructured":"Reynolds K, Kontostathis A, Edwards L (2011) Using machine learning to detect cyberbullying. In 10th International Conference on Machine learning and applications and workshops, vol.\u00a02, pp.\u00a0241\u2013244, IEEE","DOI":"10.1109\/ICMLA.2011.152"},{"key":"772_CR11","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1016\/j.future.2019.09.001","volume":"102","author":"PK Roy","year":"2020","unstructured":"Roy PK, Singh JP, Banerjee S (2020) Deep learning to filter sms spam. Future Gener Comput Syst 102:524\u2013533","journal-title":"Future Gener Comput Syst"},{"key":"772_CR12","doi-asserted-by":"publisher","first-page":"10555","DOI":"10.1007\/s00521-019-04592-0","volume":"32","author":"PK Roy","year":"2019","unstructured":"Roy PK, Singh JP (2019) Predicting closed questions on community question answering sites using convolutional neural network. Neural Comput Appl 32:10555\u201310572","journal-title":"Neural Comput Appl"},{"issue":"2","key":"772_CR13","doi-asserted-by":"publisher","first-page":"1633","DOI":"10.1007\/s11063-021-10470-5","volume":"53","author":"PK Roy","year":"2021","unstructured":"Roy PK (2021) Deep neural network to predict answer votes on community question answering sites. Neural Process Lett 53(2):1633\u20131646","journal-title":"Neural Process Lett"},{"issue":"1","key":"772_CR14","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/s11063-020-10284-x","volume":"52","author":"PK Roy","year":"2020","unstructured":"Roy PK (2020) Multilayer convolutional neural network to filter low quality content from quora. Neural Process Lett 52(1):805\u2013821","journal-title":"Neural Process Lett"},{"key":"772_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-020-00244-2","author":"MA Khan","year":"2021","unstructured":"Khan MA, Kadry S, Parwekar P, Dama\u0161evi\u010dius R, Mehmood A, Khan JA, Naqvi SR (2021) Human gait analysis for osteoarthritis prediction: a framework of deep learning and kernel extreme learning machine. Complex Intell Syst. https:\/\/doi.org\/10.1007\/s40747-020-00244-2","journal-title":"Complex Intell Syst"},{"key":"772_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-021-00360-7","author":"X Yu","year":"2021","unstructured":"Yu X, Yang T, Lu J, Shen Y, Lu W, Zhu W, Bao Y, Li H, Zhou J (2021) Deep transfer learning: a novel glucose prediction framework for new subjects with type 2 diabetes. Complex Intell Syst. https:\/\/doi.org\/10.1007\/s40747-021-00360-7","journal-title":"Complex Intell Syst"},{"key":"772_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-021-00376-z","author":"S Li","year":"2021","unstructured":"Li S, Liu B, Li S, Zhu X, Yan Y, Zhang D (2021) A deep learning-based computer-aided diagnosis method of x-ray images for bone age assessment. Complex Intell Syst. https:\/\/doi.org\/10.1007\/s40747-021-00376-z","journal-title":"Complex Intell Syst"},{"issue":"1","key":"772_CR18","doi-asserted-by":"publisher","first-page":"68","DOI":"10.33969\/AIS.2021.31005","volume":"3","author":"H Kaur","year":"2021","unstructured":"Kaur H, Koundal D, Kadyan V, Kaur N, Polat K (2021) Automated multimodal image fusion for brain tumor detection. J Artif Intell Syst 3(1):68\u201382","journal-title":"J Artif Intell Syst"},{"key":"772_CR19","volume":"39","author":"S Aggarwal","year":"2021","unstructured":"Aggarwal S, Gupta S, Alhudhaif A, Koundal D, Gupta R, Polat K (2021) Automated COVID-19 detection in chest x-ray images using fine-tuned deep learning architectures. Expert Syst 39:e12749","journal-title":"Expert Syst"},{"key":"772_CR20","doi-asserted-by":"crossref","unstructured":"\u00c7i\u011fdem A, \u00c7\u00fcr\u00fck E, E\u015fsiz ES (2019) Automatic detection of cyberbullying in formspring.me, myspace and Youtube social networks. Turk J Eng 3(4):168\u2013178","DOI":"10.31127\/tuje.554417"},{"key":"772_CR21","doi-asserted-by":"crossref","unstructured":"Gomez R, Gibert J, Gomez L, Karatzas D (2020) Exploring hate speech detection in multimodal publications. In Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp.\u00a01470\u20131478","DOI":"10.1109\/WACV45572.2020.9093414"},{"key":"772_CR22","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.future.2021.01.014","volume":"118","author":"K Kumari","year":"2021","unstructured":"Kumari K, Singh JP, Dwivedi YK, Rana NP (2021) Multi-modal aggression identification using convolutional neural network and binary particle swarm optimization. Future Gener Comput Syst 118:187\u2013197","journal-title":"Future Gener Comput Syst"},{"key":"772_CR23","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.future.2020.07.050","volume":"114","author":"S Sadiq","year":"2021","unstructured":"Sadiq S, Mehmood A, Ullah S, Ahmad M, Choi GS, On B-W (2021) Aggression detection through deep neural model on Twitter. Future Gener Comput Syst 114:120\u2013129","journal-title":"Future Gener Comput Syst"},{"key":"772_CR24","doi-asserted-by":"crossref","unstructured":"Hosseinmardi H, Rafiq RI, Han R, Lv Q, Mishra S (2016) Prediction of cyberbullying incidents in a media-based social network. In 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp.\u00a0186\u2013192, IEEE","DOI":"10.1109\/ASONAM.2016.7752233"},{"issue":"9","key":"772_CR25","first-page":"199","volume":"9","author":"MA Al-Ajlan","year":"2018","unstructured":"Al-Ajlan MA, Ykhlef M (2018) Deep learning algorithm for cyberbullying detection. Int J Adv Comput Sci Appl 9(9):199\u2013205","journal-title":"Int J Adv Comput Sci Appl"},{"key":"772_CR26","doi-asserted-by":"crossref","unstructured":"Banerjee V, Telavane J, Gaikwad P, Vartak P (2019) Detection of cyberbullying using deep neural network. In 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), pp.\u00a0604\u2013607, IEEE","DOI":"10.1109\/ICACCS.2019.8728378"},{"issue":"15","key":"772_CR27","doi-asserted-by":"publisher","first-page":"10809","DOI":"10.1007\/s00521-018-3442-0","volume":"32","author":"J Chen","year":"2020","unstructured":"Chen J, Yan S, Wong K-C (2020) Verbal aggression detection on twitter comments: convolutional neural network for short-text sentiment analysis. Neural Comput Appl 32(15):10809\u201310818","journal-title":"Neural Comput Appl"},{"key":"772_CR28","doi-asserted-by":"crossref","unstructured":"Ali WNHW, Mohd M, Fauzi F (2018) Cyberbullying detection: an overview. In 2018 Cyber Resilience Conference (CRC), pp.\u00a01\u20133, IEEE","DOI":"10.1109\/CR.2018.8626869"},{"key":"772_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107307","volume":"106","author":"S Bhat","year":"2021","unstructured":"Bhat S, Koundal D (2021) Multi-focus image fusion using neutrosophic based wavelet transform. Appl Soft Comput 106:107307","journal-title":"Appl Soft Comput"},{"issue":"3","key":"772_CR30","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1017\/S0021859618000436","volume":"156","author":"A Kamilaris","year":"2018","unstructured":"Kamilaris A, Prenafeta-Bold\u00fa FX (2018) A review of the use of convolutional neural networks in agriculture. J Agric Sci 156(3):312\u2013322","journal-title":"J Agric Sci"},{"issue":"2","key":"772_CR31","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s40747-020-00225-5","volume":"7","author":"R Udendhran","year":"2021","unstructured":"Udendhran R, Balamurugan M (2021) Towards secure deep learning architecture for smart farming-based applications. Complex Intell Syst 7(2):659\u2013666","journal-title":"Complex Intell Syst"},{"key":"772_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-020-00192-x","author":"G Xue","year":"2020","unstructured":"Xue G, Liu S, Ma Y (2020) A hybrid deep learning-based fruit classification using attention model and convolution autoencoder. Complex Intell Syst. https:\/\/doi.org\/10.1007\/s40747-020-00192-x","journal-title":"Complex Intell Syst"},{"key":"772_CR33","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. Preprint at arXiv:1409.1556,"},{"key":"772_CR34","doi-asserted-by":"crossref","unstructured":"Chollet F (2017) Xception: Deep learning with depthwise separable convolutions. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.\u00a01251\u20131258","DOI":"10.1109\/CVPR.2017.195"},{"key":"772_CR35","doi-asserted-by":"crossref","unstructured":"Szegedy C, Ioffe S, Vanhoucke V, Alemi AA (2017) Inception-v4, inception-resnet and the impact of residual connections on learning. In Thirty-first AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"772_CR36","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.\u00a0770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"772_CR37","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.\u00a02818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"issue":"1","key":"772_CR38","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s40171-017-0172-6","volume":"19","author":"PK Roy","year":"2018","unstructured":"Roy PK, Ahmad Z, Singh JP, Alryalat MAA, Rana NP, Dwivedi YK (2018) Finding and ranking high-quality answers in community question answering sites. Global J Flex Syst Manag 19(1):53\u201368","journal-title":"Global J Flex Syst Manag"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00772-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00772-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00772-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T21:40:55Z","timestamp":1727300455000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00772-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,25]]},"references-count":38,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["772"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00772-z","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,25]]},"assertion":[{"value":"13 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}