{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:05:39Z","timestamp":1764785139828,"version":"3.41.0"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T00:00:00Z","timestamp":1695859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Data and Information Quality"],"published-print":{"date-parts":[[2023,9,30]]},"abstract":"<jats:p>Cyberbullying is a form of abuse, manipulation, or humiliation directed against a single person via the Internet. CB makes use of nasty Internet comments and remarks. It occurs when someone publicly mocks, insults, slanders, criticizes, or mocks another person while remaining anonymous on the Internet. As a result, there is a rising need to create new methods for sifting through data on social media sites for symptoms of cyberbullying. The goal is to lessen the negative consequences of this condition. This article discusses a soft computing-based methodology for detecting cyberbullying in social multimedia data. This model incorporates social media data. Normalization is performed to remove noise from data. To improve a feature, the Particle Swarm Optimization Technique is applied. Feature optimization helps to make cyberbullying detection more accurate. The LSTM model is used to classify things. With the help of social media data, the PSO LSTM model is getting better at finding cyberbullying. The accuracy of PSO LSTM is 99.1%. It is 2.9% higher than the accuracy of the AdaBoost technique and 10.4% more than the accuracy of the KNN technique. The specificity and sensitivity of PSO-based LSTM is also higher in percentage than KNN and AdaBoost algorithm.<\/jats:p>","DOI":"10.1145\/3604617","type":"journal-article","created":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T11:43:24Z","timestamp":1687261404000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Soft Computing Techniques for Detecting Cyberbullying in Social Multimedia Data"],"prefix":"10.1145","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8132-8395","authenticated-orcid":false,"given":"Yang","family":"Jing","sequence":"first","affiliation":[{"name":"Faculty of Computer Science and Information Technology, University of Malaya, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2965-4908","authenticated-orcid":false,"given":"Ma","family":"Haowei","sequence":"additional","affiliation":[{"name":"Department of Mechanical Engineering, Faculty of Engineering, University of Malaya, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5375-0188","authenticated-orcid":false,"given":"Arshiya S.","family":"Ansari","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Al-Majmaah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7861-2451","authenticated-orcid":false,"given":"G.","family":"Sucharitha","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Institute of Aeronautical Engineering, Hyderabad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8341-7113","authenticated-orcid":false,"given":"Batyrkhan","family":"Omarov","sequence":"additional","affiliation":[{"name":"International University of Tourism and Hospitality, Turkistan, Kazakhstan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4550-4814","authenticated-orcid":false,"given":"Sandeep","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Maharaja Surajmal Institute of Technology, New Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3082-5068","authenticated-orcid":false,"given":"Mohammad Sajid","family":"Mohammadi","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computer, Qassim University, Buraydah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6689-1518","authenticated-orcid":false,"given":"Khaled A. Z.","family":"Alyamani","sequence":"additional","affiliation":[{"name":"Applied College, Abqaiq Branch, King Faisal University,  Al-Ahsa, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2023,9,28]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"1","article-title":"Cyberbullying detection solutions based on deep learning architectures","author":"Iwendi C.","year":"2020","unstructured":"C. Iwendi, G. Srivastava, S. Khan, and P. K. R. Maddikunta. 2020. Cyberbullying detection solutions based on deep learning architectures. Multimed. Syst. (2020), 1\u201314.","journal-title":"Multimed. Syst."},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9986920"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107186"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037073"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-019-00745-0"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3144266"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9986920"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102600"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12538"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigMM50055.2020.00052"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.3390\/info12040171"},{"issue":"9","key":"e_1_3_1_13_2","first-page":"656","article-title":"Detection of cyberbullying using machine learning","volume":"12","author":"Kumar R.","year":"2021","unstructured":"R. Kumar. 2021. Detection of cyberbullying using machine learning. Turk. J. Comput. Math. Educ. 12, 9 (2021), 656\u2013661.","journal-title":"Turk. J. Comput. Math. Educ."},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3552512"},{"key":"e_1_3_1_15_2","first-page":"299","article-title":"Detecting cyberbullying across multiple social media platforms using deep learning","author":"Mahat M.","year":"2021","unstructured":"M. Mahat. 2021. Detecting cyberbullying across multiple social media platforms using deep learning. In International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE\u201921). IEEE, 299\u2013301.","journal-title":"International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE\u201921)"},{"key":"e_1_3_1_16_2","first-page":"1","article-title":"Q-bully: A reinforcement learning based cyberbullying detection framework","author":"Aind A. T.","year":"2020","unstructured":"A. T. Aind, A. Ramnaney, and D. Sethia. 2020. Q-bully: A reinforcement learning based cyberbullying detection framework. In International Conference for Emerging Technology (INCET\u201920). IEEE, 1\u20136.","journal-title":"International Conference for Emerging Technology (INCET\u201920)"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/smc.2019.8914010"},{"key":"e_1_3_1_18_2","first-page":"040","article-title":"Multilingual cyberbullying detection system","author":"Pawar R.","year":"2019","unstructured":"R. Pawar and R. R. Raje. 2019. Multilingual cyberbullying detection system. In IEEE International Conference on Electro Information Technology (EIT\u201919). IEEE, 040\u2013044.","journal-title":"IEEE International Conference on Electro Information Technology (EIT\u201919)"},{"key":"e_1_3_1_19_2","first-page":"73","article-title":"Thai defamatory text classification on social media","author":"Arreerard R.","year":"2018","unstructured":"R. Arreerard and T. Senivongse. 2018. Thai defamatory text classification on social media. In IEEE International Conference on Big Data, Cloud Computing, Data Science & Engineering (BCD\u201918). IEEE, 73\u201378.","journal-title":"IEEE International Conference on Big Data, Cloud Computing, Data Science & Engineering (BCD\u201918)"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-9942-8_51"},{"key":"e_1_3_1_21_2","unstructured":"V. K. Gupta. 2019. \u201cHinglish\u201d language\u2014Modeling a messy code-mixed language. arXiv preprint arXiv:1912.13109 (2019)."},{"key":"e_1_3_1_22_2","first-page":"165","article-title":"Cyberbullying detection: A survey on multilingual techniques","author":"Haidar B.","year":"2016","unstructured":"B. Haidar, M. Chamoun, and F. Yamout. 2016. Cyberbullying detection: A survey on multilingual techniques. In European Modelling Symposium (EMS\u201916). IEEE, 165\u2013171.","journal-title":"European Modelling Symposium (EMS\u201916)"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1515\/pjbr-2022-0100"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411620040082"},{"key":"e_1_3_1_25_2","first-page":"1","volume-title":"Multim. Syst.","author":"Paul S.","year":"2020","unstructured":"S. Paul and S. Saha. 2020. CyberBERT: BERT for cyberbullying identification. Multim. Syst. (2020), 1\u20138."},{"key":"e_1_3_1_26_2","article-title":"A multi-label text classification model based on ELMo and attention","author":"Liu W.","year":"2020","unstructured":"W. Liu, B. Wen, S. Gao, J. Zheng, and Y. Zheng. 2020. A multi-label text classification model based on ELMo and attention. In MATEC Web of Conferences. EDP Sciences.","journal-title":"MATEC Web of Conferences"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.3390\/app10238631"},{"key":"e_1_3_1_28_2","first-page":"1","article-title":"Pseudo-conventional approach for cyberbullying and hate-speech detection","author":"Jain N.","year":"2021","unstructured":"N. Jain, A. Hegde, A. Jain, A. Joshi, and J. Madake. 2021. Pseudo-conventional approach for cyberbullying and hate-speech detection. In International Conference on Advances in Computing, Communication, and Control (ICAC3\u201921). IEEE, 1\u20138.","journal-title":"International Conference on Advances in Computing, Communication, and Control (ICAC3\u201921)"},{"key":"e_1_3_1_29_2","first-page":"1","article-title":"Attention based networks for analyzing inappropriate speech in Arabic text","author":"Berrimi M.","year":"2020","unstructured":"M. Berrimi, A. Moussaoui, M. Oussalah, and M. Saidi. 2020. Attention based networks for analyzing inappropriate speech in Arabic text. In 4th International Symposium on Informatics and Its Applications (ISIA\u201920). IEEE, 1\u20136.","journal-title":"4th International Symposium on Informatics and Its Applications (ISIA\u201920)."},{"key":"e_1_3_1_30_2","first-page":"141","article-title":"Deep learning for detecting cyberbullying across multiple social media platforms","author":"Agrawal S.","year":"2018","unstructured":"S. Agrawal and A. Awekar. 2018. Deep learning for detecting cyberbullying across multiple social media platforms. In European Conference on Information Retrieval. Springer, Cham, 141\u2013153.","journal-title":"European Conference on Information Retrieval"},{"key":"e_1_3_1_31_2","first-page":"1","article-title":"Verbal aggression detection on Twitter comments: Convolutional neural network for short-text sentiment analysis","author":"Chen J.","year":"2018","unstructured":"J. Chen, S. Yan, and K. C. Wong. 2018. Verbal aggression detection on Twitter comments: Convolutional neural network for short-text sentiment analysis. Neural Comput. Applic. (2018), 1\u201310.","journal-title":"Neural Comput. Applic"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.10.015"},{"key":"e_1_3_1_33_2","first-page":"1465","article-title":"Do violent people smile: Social media analysis of their profile pictures","author":"Coletto M.","year":"2018","unstructured":"M. Coletto, C. Lucchese, and S. Orlando. 2018. Do violent people smile: Social media analysis of their profile pictures. In the Web Conference. International World Wide Web Conferences Steering Committee, ACM, 1465\u20131468.","journal-title":"the Web Conference"},{"key":"e_1_3_1_34_2","first-page":"265","article-title":"NLP and machine learning techniques for detecting insulting comments on social networking platforms","author":"Sharma H. K.","year":"2018","unstructured":"H. K. Sharma, K. Kshitiz, and Shailendra. 2018. NLP and machine learning techniques for detecting insulting comments on social networking platforms. In International Conference on Advances in Computing and Communication Engineering (ICACCE\u201918). IEEE, 265\u2013272.","journal-title":"International Conference on Advances in Computing and Communication Engineering (ICACCE\u201918)"},{"key":"e_1_3_1_35_2","first-page":"561","article-title":"A hybrid deep learning system of CNN and LRCN to detect cyberbullying from SNS comments","author":"Bu S. J.","year":"2018","unstructured":"S. J. Bu and S. B. Cho. 2018. A hybrid deep learning system of CNN and LRCN to detect cyberbullying from SNS comments. In International Conference on Hybrid Artificial Intelligence Systems. Springer, 561\u2013572.","journal-title":"International Conference on Hybrid Artificial Intelligence Systems"},{"key":"e_1_3_1_36_2","article-title":"Deep learning approaches for cyberbullying detection and classification on social media","author":"Neelakandan S.","year":"2022","unstructured":"S. Neelakandan, M. Sridevi, Saravanan Chandrasekaran, K. Murugeswari, Aditya Kumar Singh Pundir, R. Sridevi, and T. Bheema Lingaiah. 2022. Deep learning approaches for cyberbullying detection and classification on social media. Computat. Intell. Neurosci. (2022).","journal-title":"Computat. Intell. Neurosci."},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3153675"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/CEC45853.2021.9504986"},{"key":"e_1_3_1_39_2","first-page":"2","article-title":"LSTM with compensation method for text classification","volume":"20","author":"Huang W.","year":"2021","unstructured":"W. Huang, M. Liu, W. Shang, H. Zhu, W. Lin, and C. Zhang. 2021. LSTM with compensation method for text classification. Int. J. Wirel. Mob. Comput. 20, 2 (2021), 159.","journal-title":"Int. J. Wirel. Mob. Comput."},{"key":"e_1_3_1_40_2","unstructured":"https:\/\/www.kaggle.com\/datasets\/andrewmvd\/cyberbullying-classification."}],"container-title":["Journal of Data and Information Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604617","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3604617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:04Z","timestamp":1750178764000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604617"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,28]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9,30]]}},"alternative-id":["10.1145\/3604617"],"URL":"https:\/\/doi.org\/10.1145\/3604617","relation":{},"ISSN":["1936-1955","1936-1963"],"issn-type":[{"type":"print","value":"1936-1955"},{"type":"electronic","value":"1936-1963"}],"subject":[],"published":{"date-parts":[[2023,9,28]]},"assertion":[{"value":"2022-11-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-31","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}