{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T04:01:07Z","timestamp":1774929667813,"version":"3.50.1"},"reference-count":36,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,7,2]]},"abstract":"<jats:p>Schools and universities shuttered as a result of the worldwide COVID-19 pandemic lockdown, and student screen time skyrocketed. Since the programs are delivered online, a spike in social media use during lockdown resulted in many pupils becoming victims of cyberbullying, which includes criticizing one another, posting sexual comments on images of young ladies, and using fake accounts to bully others. Machine Learning (ML) and Natural Language Processing (NLP) techniques are being used in a growing body of work on automated cyberbullying detection. Different machine learning methods, however, are unable to converge to the requisite accuracy. Thus, numerous classifier systems known as \u201censemble learning\u201d are proposed in order to improve predictive performance by aggregating the predictions from various models. In our proposed system, we use a novel method of detecting online harassment (cyberbullying) on the Instagram dataset. The attributes of abusive words are initially analyzed from feature selection and pre-trained word embedding language models like Bidirectional Encoder Representations from Transformers (BERT) and Embeddings from Language Models (ELMO). A knowledge-based frequent pattern method is used to find the intention of the harasser and is created by the Knowledge-BERT (K-BERT). The unsupervised approaches such as Latent Semantic Analysis (LSA), Frequent pattern growth (FP-Growth), and a clustering technique K-Means. The results from the detection models are ensembled using Extreme Gradient Boosting (XGBoost) for classifying the categories of online harassment. The performance of the ensemble model is then cross-validated using machine learning metrics and compared with various existing techniques. An ensemble model performs better with a higher F1 score of 92.04% with less error rate in the classification of harassment categories.<\/jats:p>","DOI":"10.3233\/jifs-230346","type":"journal-article","created":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T12:16:43Z","timestamp":1683289003000},"page":"13-36","source":"Crossref","is-referenced-by-count":8,"title":["A novel ensemble model for identification and classification of cyber harassment on social media platform"],"prefix":"10.1177","volume":"45","author":[{"given":"S.","family":"Abarna","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering Puducherry Technological University, Puducherry, India"}]},{"given":"J.I.","family":"Sheeba","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering Puducherry Technological University, Puducherry, India"}]},{"given":"S.","family":"Pradeep Devaneyan","sequence":"additional","affiliation":[{"name":"Deparment of Mechanical Engineering, Sri Venkateshwaraa College of Engineering and Technology, Puducherry, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-230346_ref1","doi-asserted-by":"crossref","unstructured":"Quayyum Farzana, Cruzes Daniela S. and Jaccheri Letizia, Cybersecurity awareness for children: A systematicliterature review, International Journal of Child-ComputerInteraction Volume 30, December 2021, https:\/\/doi.org\/10.1016\/j.ijcci.2021.100343","DOI":"10.1016\/j.ijcci.2021.100343"},{"key":"10.3233\/JIFS-230346_ref2","unstructured":"Innes Rory, Belgrove Mark et al., Dealing with online harassment & bullying, The Cyberhelpline, Supporting Victims of Cybercrime, 2022."},{"key":"10.3233\/JIFS-230346_ref3","doi-asserted-by":"crossref","unstructured":"Wang Kun, Cui Yanpeng, Hu Jianwei, Zhang Yu, Zhao Wei and Feng Luming, Cyberbullying Detection, Based on the FastText and Word Similarity Schemes, ACM Trans. Asian Low-Resour. Lang. Inf. Process. 20(1) (2020) 15, Article 6. https:\/\/doi.org\/10.1145\/3398191.","DOI":"10.1145\/3398191"},{"key":"10.3233\/JIFS-230346_ref4","doi-asserted-by":"crossref","unstructured":"Sammons John and Cross Micheal, Beyond technology\u2014dealing with people, The Basics of Cyber Safety, Computer and Mobile Device Safety Made Easy, Pages 179\u2013200, August 2017. https:\/\/doi.org\/10.1016\/B978-0-12-416650-9.00009-7","DOI":"10.1016\/B978-0-12-416650-9.00009-7"},{"key":"10.3233\/JIFS-230346_ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.038"},{"key":"10.3233\/JIFS-230346_ref6","doi-asserted-by":"crossref","unstructured":"Babvey Pouria, Capela Fernanda et al., Using social media data for assessing children\u2019s exposure to violence during the COVID-19 pandemic, Journal of Child Abuse & Neglect, September 2020, https:\/\/doi.org\/10.1016\/j.chiabu.2020.104747","DOI":"10.1016\/j.chiabu.2020.104747"},{"key":"10.3233\/JIFS-230346_ref7","doi-asserted-by":"crossref","unstructured":"Jain Ojasvi, Gupta Muskan, Satam Sidh and Panda Siba, Has the COVID-19 pandemic affected the susceptibility to cyberbullying in India? Journal of Computers in Human Behavior Reports, August 2020. https:\/\/doi.org\/10.1016\/j.chbr.2020.100029","DOI":"10.1016\/j.chbr.2020.100029"},{"key":"10.3233\/JIFS-230346_ref8","doi-asserted-by":"crossref","unstructured":"Pensa Ruggero G. and Blasi Gianpiero Di, A privacy self-assessment framework for online social networks, Journal of Expert Systems with Applications, May 2017, http:\/\/dx.doi.org\/10.1016\/j.eswa.2017.05.054","DOI":"10.1016\/j.eswa.2017.05.054"},{"key":"10.3233\/JIFS-230346_ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3098979"},{"key":"10.3233\/JIFS-230346_ref10","doi-asserted-by":"crossref","unstructured":"Zhihao Hou and Kun Maa, Attention-based learning of self-media data for marketing intention detection, Journal of Engineering Applications of Artificial Intelligence, November 2020, https:\/\/doi.org\/10.1016\/j.engappai.2020.104118","DOI":"10.1016\/j.engappai.2020.104118"},{"key":"10.3233\/JIFS-230346_ref11","doi-asserted-by":"crossref","unstructured":"Sivakumar Soubraylu, Videla Lakshmi Sarvani and Nagaraj J., Review on Word2Vec Word Embedding Neural Net, International Conference on Smart Electronics and Communication (ICOSEC), October 2020.","DOI":"10.1109\/ICOSEC49089.2020.9215319"},{"key":"10.3233\/JIFS-230346_ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3098180"},{"key":"10.3233\/JIFS-230346_ref13","unstructured":"Devlin Jacob, Chang Ming-Wei, Lee Kenton and Toutanova Kristina, \u201cBERT: Pre-training of Deep Bidirectional Transformers for Language Understanding\u201d, arXiv:1810.04805v2, May 2019."},{"key":"10.3233\/JIFS-230346_ref14","doi-asserted-by":"crossref","unstructured":"Liu Jingang, Xia Chunhe and Li Xiaojian, A BERT-based Ensemble Model for Chinese News Topic Prediction, Association for Computing Machinery, May 2020, DOI: https:\/\/doi.org\/10.1145\/3404512.3404524","DOI":"10.1145\/3404512.3404524"},{"key":"10.3233\/JIFS-230346_ref15","doi-asserted-by":"crossref","unstructured":"Zhao Anping and Yu Yu, Knowledge-enabled BERT for aspect-based sentiment analysis, Journal of Science Direct Knowledge-Based Systems, June 2021. https:\/\/doi.org\/10.1016\/j.knosys.2021.107220","DOI":"10.1016\/j.knosys.2021.107220"},{"key":"10.3233\/JIFS-230346_ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965087"},{"key":"10.3233\/JIFS-230346_ref17","doi-asserted-by":"crossref","unstructured":"Lee Jung-Hoon, Kim You-Jin and Cheong Yun-Gyung, Predicting Quality and Popularity of a Movie from Plot Summary and Character Description Using Contextualized Word Embeddings, IEEE Xplore, November 2020.","DOI":"10.1109\/CoG47356.2020.9231541"},{"key":"10.3233\/JIFS-230346_ref18","doi-asserted-by":"publisher","DOI":"10.3390\/fi12110187"},{"key":"10.3233\/JIFS-230346_ref19","doi-asserted-by":"crossref","unstructured":"Rao Sanjeev and Verma Anil Kumar, A review on social spam detection: Challenges, open issues, and future directions, Journal of Expert Systems with Applications, August 2021. https:\/\/doi.org\/10.1016\/j.eswa.2021.115742","DOI":"10.1016\/j.eswa.2021.115742"},{"key":"10.3233\/JIFS-230346_ref20","doi-asserted-by":"crossref","unstructured":"Thun Lee Jia, Teh Phoey Lee and Cheng Chi-Bin, CyberAid: Are your children safe from cyberbullying? Journal of King Saud University \u2013 Computer and Information Sciences, March 2021. https:\/\/doi.org\/10.1016\/j.jksuci.2021.03.001","DOI":"10.1016\/j.jksuci.2021.03.001"},{"key":"10.3233\/JIFS-230346_ref21","doi-asserted-by":"crossref","unstructured":"Wang Yufeng, Maa Kun et al., \u201cA CLSTM-TMN for marketing intention detection\u201d, Journal of Engineering Applications of Artificial Intelligence, March 2020. https:\/\/doi.org\/10.1016\/j.engappai.2020.103595","DOI":"10.1016\/j.engappai.2020.103595"},{"key":"10.3233\/JIFS-230346_ref22","doi-asserted-by":"crossref","unstructured":"Wang Jiangyao and Xu Wenhua, Text Similarity Calculation Method Based on Hybrid Model of LDA and TF-IDF, Association for Computing Machinery, December 2019, https:\/\/doi.org\/10.1145\/3374587.3374590","DOI":"10.1145\/3374587.3374590"},{"key":"10.3233\/JIFS-230346_ref23","unstructured":"Kaur Rajandeep and Kaur Manpreet, Latent semantic analysis: searching technique for text documents, International Journal of Engineering Development and Research, (IJEDR) Volume 3, 2015."},{"key":"10.3233\/JIFS-230346_ref24","doi-asserted-by":"crossref","unstructured":"Zulkarnain and Putri Tsarina Dwi, Intelligent transportation systems (ITS): A systematic review using a Natural Language Processing (NLP) approach, Journal of Heliyon, Science Direct, December 2021, https:\/\/doi.org\/10.1016\/j.heliyon.2021.e08615","DOI":"10.1016\/j.heliyon.2021.e08615"},{"key":"10.3233\/JIFS-230346_ref25","doi-asserted-by":"crossref","unstructured":"Ayo Femi Emmanuel, Folorunso Olusegun et al., A probabilistic clustering model for hate speech classification in twitter, Journal of Expert Systems with Applications, February 2021, https:\/\/doi.org\/10.1016\/j.eswa.2021.114762","DOI":"10.1016\/j.eswa.2021.114762"},{"key":"10.3233\/JIFS-230346_ref26","unstructured":"Tseng Shu-Cih, Lu Yu-Ching and Chakraborty Goutam, Comparison of Sentiment Analysis of Review Comments by Unsupervised Clustering of Features Using LSA and LDA, IEEE access, 2021."},{"key":"10.3233\/JIFS-230346_ref27","doi-asserted-by":"publisher","DOI":"10.33640\/2405-609X.3157"},{"key":"10.3233\/JIFS-230346_ref28","unstructured":"Ghosh Rounak, Nowal Siddhartha et al., Social Media Cyberbullying Detection using Machine Learning in Bengali Language, International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 10 Issue 05, May 2021."},{"key":"10.3233\/JIFS-230346_ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICICV50876.2021.9388499"},{"key":"10.3233\/JIFS-230346_ref30","unstructured":"Khokale Swati R., Gujrathi Vikrant and Thakur Rutik, Review on detection of cyberbullying using machine learning, Journal of Emerging Technologies and Innovative Research (JETIR), Volume 8, April 2021."},{"key":"10.3233\/JIFS-230346_ref31","doi-asserted-by":"crossref","unstructured":"Kim Aleum and Cho Sung-Bae, An ensemble semi-supervised learning method for predicting defaults in social lending, Journal of Engineering Applications of Artificial Intelligence, February 2019, https:\/\/doi.org\/10.1016\/j.engappai.2019.02.014","DOI":"10.1016\/j.engappai.2019.02.014"},{"key":"10.3233\/JIFS-230346_ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3101977"},{"key":"10.3233\/JIFS-230346_ref33","doi-asserted-by":"crossref","unstructured":"Chelmis Charalampos and Yao Mengfan, Minority Report: Cyberbullying Prediction on Instagram. In 11th ACM Conference on Web Science. ACM, 2019.","DOI":"10.1145\/3292522.3326024"},{"key":"10.3233\/JIFS-230346_ref34","doi-asserted-by":"crossref","unstructured":"Rashid Mamoon, Singh Harjeet and Goyal Vishal, The use of machine learning and deep learning algorithms in functional magnetic resonance imaging\u2014A systematic review, Expert Systems, Wiley, 2020.","DOI":"10.1111\/exsy.12644"},{"key":"10.3233\/JIFS-230346_ref35","volume-title":"Engineering Applications of Artificial Intelligence","author":"Abarna","year":"2022"},{"key":"10.3233\/JIFS-230346_ref36","doi-asserted-by":"crossref","unstructured":"Kaur Manpreet and Saini Munish, Indian government initiatives on cyberbullying: A case study on cyberbullying in Indian higher education institutions, Education and Information Technologies, Springer Nature, 2022.","DOI":"10.1007\/s10639-022-11168-4"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-230346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T09:24:11Z","timestamp":1769678651000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-230346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,2]]},"references-count":36,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jifs-230346","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,2]]}}}