{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:56:24Z","timestamp":1774605384568,"version":"3.50.1"},"reference-count":60,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T00:00:00Z","timestamp":1618531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018YFB0804503"],"award-info":[{"award-number":["2018YFB0804503"]}]},{"name":"Sichuan Science and Technology Program","award":["2020YFG0076"],"award-info":[{"award-number":["2020YFG0076"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>With the propagation of cyberbullying in social networks as a trending subject, cyberbullying detection has become a social problem that researchers are concerned about. Developing intelligent models and systems helps detect cyberbullying automatically. This work focuses on text-based cyberbullying detection because it is the commonly used information carrier in social networks and is the widely used feature in this regard studies. Motivated by the documented success of neural networks, we propose a complete model combining the bidirectional gated recurrent unit (Bi-GRU) and the self-attention mechanism. In detail, we introduce the design of a GRU cell and Bi-GRU\u2019s advantage for learning the underlying relationships between words from both directions. Besides, we present the design of the self-attention mechanism and the benefit of this joining for achieving a greater performance of cyberbullying classification tasks. The proposed model could address the limitation of the vanishing and exploding gradient problems. We avoid using oversampling or downsampling on experimental data which could result in the overestimation of evaluation. We conduct a comparative assessment on two commonly used datasets, and the results show that our proposed method outperformed baselines in all evaluation metrics.<\/jats:p>","DOI":"10.3390\/info12040171","type":"journal-article","created":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T10:20:11Z","timestamp":1618568411000},"page":"171","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":62,"title":["Cyberbullying Detection in Social Networks Using Bi-GRU with Self-Attention Mechanism"],"prefix":"10.3390","volume":"12","author":[{"given":"Yong","family":"Fang","sequence":"first","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu 610065, China"}]},{"given":"Shaoshuai","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu 610065, China"}]},{"given":"Bin","family":"Zhao","sequence":"additional","affiliation":[{"name":"CETC Avionics Co., Ltd., Chengdu 611731, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5871-946X","authenticated-orcid":false,"given":"Cheng","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu 610065, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,4,16]]},"reference":[{"key":"ref_1","unstructured":"Stopbullying.gov (2020). What Is Cyberbullying."},{"key":"ref_2","unstructured":"Hinduja, S., and Patchin, J.W. (2018). Cyberbullying: Identification, Prevention, and Response, Cyberbullying.org."},{"key":"ref_3","unstructured":"Cyberbullying Research Center (2020). 2019 Cyberbullying Data, Cyberbullying.org."},{"key":"ref_4","unstructured":"Cyberbullying Research Center (2020). Summary of Our Cyberbullying Research (2007\u20132019), Cyberbullying.org."},{"key":"ref_5","unstructured":"Google (2019). Be Internet Awesome: Online Safety & Parents, Google."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"70701","DOI":"10.1109\/ACCESS.2019.2918354","article-title":"Predicting cyberbullying on social media in the big data era using machine learning algorithms: Review of literature and open challenges","volume":"7","author":"Hussain","year":"2019","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"e129","DOI":"10.2196\/jmir.9044","article-title":"Self-harm, suicidal behaviours, and cyberbullying in children and young people: Systematic review","volume":"20","author":"John","year":"2018","journal-title":"J. Med. Internet Res."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1080\/13811118.2010.494133","article-title":"Bullying, cyberbullying, and suicide","volume":"14","author":"Hinduja","year":"2010","journal-title":"Arch. Suicide Res."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Sampasa-Kanyinga, H., Roumeliotis, P., and Xu, H. (2014). Associations between Cyberbullying and School Bullying Victimization and Suicidal Ideation, Plans and Attempts among Canadian Schoolchildren. PLoS ONE, 9.","DOI":"10.1371\/journal.pone.0102145"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1027\/0227-5910\/a000536","article-title":"The Association Between Cyberbullying, School Bullying, and Suicidality among Adolescents","volume":"40","author":"Zaborskis","year":"2018","journal-title":"Crisis"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1080\/15388220.2014.949377","article-title":"Cyberbullying via social media","volume":"14","author":"Whittaker","year":"2015","journal-title":"J. Sch. Violence"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.chb.2018.12.021","article-title":"Automatic cyberbullying detection: A systematic review","volume":"93","author":"Rosa","year":"2019","journal-title":"Comput. Hum. Behav."},{"key":"ref_13","unstructured":"Baldwin, T., Cook, P., Lui, M., MacKinlay, A., and Wang, L. (2013, January 14\u201319). How noisy social media text, how diffrnt social media sources?. Proceedings of the Sixth International Joint Conference on Natural Language Processing, Nagoya, Japan."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1177\/1541204006286288","article-title":"Bullies move beyond the schoolyard: A preliminary look at cyberbullying","volume":"4","author":"Patchin","year":"2006","journal-title":"Youth Violence Juv. Justice"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","article-title":"Cyberbullying: Its nature and impact in secondary school pupils","volume":"49","author":"Smith","year":"2008","journal-title":"J. Child Psychol. Psychiatry"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1126\/science.aam7032","article-title":"Predicting human behavior: The next frontiers","volume":"355","author":"Subrahmanian","year":"2017","journal-title":"Science"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1016\/j.chb.2016.05.051","article-title":"Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network","volume":"63","author":"Varathan","year":"2016","journal-title":"Comput. Hum. Behav."},{"key":"ref_18","unstructured":"Xu, J.M., Jun, K.S., Zhu, X., and Bellmore, A. (2012, January 3\u20138). Learning from Bullying Traces in Social Media. Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Montreal, QC, Canada."},{"key":"ref_19","first-page":"238","article-title":"An effective approach for cyberbullying detection","volume":"3","author":"Nahar","year":"2013","journal-title":"Commun. Inf. Sci. Manag. Eng."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Zhao, R., Zhou, A., and Mao, K. (2016, January 4\u20137). Automatic Detection of Cyberbullying on Social Networks Based on Bullying Features. Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore.","DOI":"10.1145\/2833312.2849567"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Waseem, Z., and Hovy, D. (2016, January 12\u201317). Hateful symbols or hateful people? Predictive features for hate speech detection on twitter. Proceedings of the NAACL Student Research Workshop, San Diego, CA, USA.","DOI":"10.18653\/v1\/N16-2013"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.dss.2018.06.009","article-title":"An abusive text detection system based on enhanced abusive and non-abusive word lists","volume":"113","author":"Lee","year":"2018","journal-title":"Decis. Support Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.cose.2018.02.016","article-title":"Machine learning and semantic analysis of in-game chat for cyberbullying","volume":"76","author":"Murnion","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Davidson, T., Warmsley, D., Macy, M., and Weber, I. (2017, January 15\u201318). Automated Hate Speech Detection and the Problem of Offensive Language. Proceedings of the Eleventh International AAAI Conference on Web and Social Media, Montreal, QC, Canada.","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., and Vakali, A. (2017, January 25\u201328). Mean Birds: Detecting Aggression and Bullying on Twitter. Proceedings of the 2017 ACM on Web Science Conference, Troy, NY, USA.","DOI":"10.1145\/3091478.3091487"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1016\/j.paid.2019.01.024","article-title":"Cyberbullying detection on twitter using Big Five and Dark Triad features","volume":"141","author":"Balakrishnan","year":"2019","journal-title":"Personal. Individ. Differ."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1109\/TAFFC.2016.2531682","article-title":"Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder","volume":"8","author":"Zhao","year":"2016","journal-title":"IEEE Trans. Affect. Comput."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Badjatiya, P., Gupta, S., Gupta, M., and Varma, V. (2017, January 3\u20137). Deep Learning for Hate Speech Detection in Tweets. Proceedings of the 26th International Conference on World Wide Web Companion, Perth, Australia.","DOI":"10.1145\/3041021.3054223"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Agrawal, S., and Awekar, A. (2018, January 26\u201329). Deep learning for detecting cyberbullying across multiple social media platforms. Proceedings of the European Conference on Information Retrieval, Grenoble, France.","DOI":"10.1007\/978-3-319-76941-7_11"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Arango, A., P\u00e9rez, J., and Poblete, B. (2019, January 21\u201325). Hate Speech Detection is Not as Easy as You May Think: A Closer Look at Model Validation. Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, Paris, France.","DOI":"10.1145\/3331184.3331262"},{"key":"ref_31","unstructured":"Emmery, C., Verhoeven, B., De Pauw, G., Jacobs, G., Van Hee, C., Lefever, E., Desmet, B., Hoste, V., and Daelemans, W. (2021, April 12). Current Limitations in Cyberbullying Detection: On Evaluation Criteria, Reproducibility, and Data Scarcity. Available online: https:\/\/arxiv.org\/abs\/1910.11922."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"e5627","DOI":"10.1002\/cpe.5627","article-title":"Cyberbullying detection in social media text based on character-level convolutional neural network with shortcuts","volume":"32","author":"Lu","year":"2020","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Robinson, D., and Tepper, J. (2018). Detecting hate speech on twitter using a convolution-gru based deep neural network. European Semantic Web Conference, Springer International Publishing.","DOI":"10.1007\/978-3-319-93417-4_48"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13278-019-0587-5","article-title":"Investigating the effect of combining GRU neural networks with handcrafted features for religious hatred detection on Arabic Twitter space","volume":"9","author":"Albadi","year":"2019","journal-title":"Soc. Netw. Anal. Min."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Cheng, L., Guo, R., Silva, Y., Hall, D., and Liu, H. (2019, January 2\u20134). Hierarchical attention networks for cyberbullying detection on the instagram social network. Proceedings of the 2019 SIAM International Conference on Data Mining, Calgary, AB, Canada.","DOI":"10.1137\/1.9781611975673.27"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Cheng, L., Li, J., Silva, Y.N., Hall, D.L., and Liu, H. (2019, January 11\u201315). Xbully: Cyberbullying detection within a multi-modal context. Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, Melbourne, Australia.","DOI":"10.1145\/3289600.3291037"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"7024","DOI":"10.1109\/JIOT.2020.3037109","article-title":"ComPath: User Interest Mining in Heterogeneous Signed Social Networks for Internet of People","volume":"8","author":"Dhelim","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_38","unstructured":"Dadvar, M., and Eckert, K. (2018). Cyberbullying detection in social networks using deep learning based models; a reproducibility study. arXiv."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Dadvar, M., and Eckert, K. (2020, January 14\u201317). Cyberbullying detection in social networks using deep learning based models. Proceedings of the International Conference on Big Data Analytics and Knowledge Discovery, Bratislava, Slovakia.","DOI":"10.1007\/978-3-030-59065-9_20"},{"key":"ref_40","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., and Polosukhin, I. (2017). Attention is all you need. Advances in Neural Information Processing Systems 30, Curran Associates, Inc."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Alexandridis, G., Michalakis, K., Aliprantis, J., Polydoras, P., Tsantilas, P., and Caridakis, G. (2020, January 5\u20137). A Deep Learning Approach to Aspect-Based Sentiment Prediction. Proceedings of the IFIP International Conference on Artificial Intelligence Applications and Innovations, Neos Marmaras, Greece.","DOI":"10.1007\/978-3-030-49161-1_33"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Korovesis, K., Alexandridis, G., Caridakis, G., Polydoras, P., and Tsantilas, P. (2020, January 2\u20134). Leveraging aspect-based sentiment prediction with textual features and document metadata. Proceedings of the 11th Hellenic Conference on Artificial Intelligence, Athens, Greece.","DOI":"10.1145\/3411408.3411433"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Wang, S., Cui, L., Liu, L., Lu, X., and Li, Q. (2020, January 7\u201311). Personality Traits Prediction Based on Users\u2019 Digital Footprints in Social Networks via Attention RNN. Proceedings of the 2020 IEEE International Conference on Services Computing (SCC), Beijing, China.","DOI":"10.1109\/SCC49832.2020.00015"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Chen, T., Li, X., Yin, H., and Zhang, J. (2018, January 3\u20136). Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection. Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining, Melbourne, VIC, Australia.","DOI":"10.1007\/978-3-030-04503-6_4"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., and Manning, C.D. (2014, January 25\u201329). GloVe: Global Vectors for Word Representation. Proceedings of the Empirical Methods in Natural Language Processing (EMNLP), Doha, Qatar.","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Cho, K., van Merri\u00ebnboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., and Bengio, Y. (2014, January 25\u201329). Learning Phrase Representations using RNN Encoder\u2013Decoder for Statistical Machine Translation. Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), Doha, Qatar.","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter","year":"1997","journal-title":"Neural Comput."},{"key":"ref_48","unstructured":"Jozefowicz, R., Zaremba, W., and Sutskever, I. (2015, January 7\u20139). An empirical exploration of recurrent network architectures. Proceedings of the International Conference on Machine Learning, Lille, France."},{"key":"ref_49","unstructured":"Yin, W., Kann, K., Yu, M., and Sch\u00fctze, H. (2021, April 12). Comparative Study of CNN and RNN for Natural Language Processing. Available online: https:\/\/arxiv.org\/abs\/1702.01923."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"2222","DOI":"10.1109\/TNNLS.2016.2582924","article-title":"LSTM: A search space odyssey","volume":"28","author":"Greff","year":"2016","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_51","unstructured":"Zhang, A., Lipton, Z.C., Li, M., and Smola, A.J. (2021, April 12). Dive into Deep Learning. Available online: https:\/\/d2l.ai."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Ma, C., Yang, C., Yang, F., Zhuang, Y., Zhang, Z., Jia, H., and Xie, X. (2018, January 23\u201327). Trajectory factory: Tracklet cleaving and re-connection by deep siamese bi-gru for multiple object tracking. Proceedings of the 2018 IEEE International Conference on Multimedia and Expo (ICME), San Diego, CA, USA.","DOI":"10.1109\/ICME.2018.8486454"},{"key":"ref_53","unstructured":"Wikipedia (2020). Twitter\u2013Wikipedia, Wikipedia."},{"key":"ref_54","unstructured":"Omnicore (2020). Twitter by the Numbers: Stats, Demographics & Fun Facts, Omnicore."},{"key":"ref_55","unstructured":"Wikipedia (2021). Talk Pages, Wikipedia."},{"key":"ref_56","unstructured":"McIntosh, P. (1988). White Privilege: Unpacking the Invisible Knapsack."},{"key":"ref_57","first-page":"42","article-title":"Unmasking racial micro aggressions","volume":"40","author":"DeAngelis","year":"2009","journal-title":"Monit. Psychol."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Wulczyn, E., Thain, N., and Dixon, L. (2017, January 3\u20137). Ex Machina: Personal Attacks Seen at Scale. Proceedings of the 26th International Conference on World Wide Web, Perth, Australia.","DOI":"10.1145\/3038912.3052591"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Kim, Y. (2014, January 25\u201329). Convolutional Neural Networks for Sentence Classification. Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), Doha, Qatar.","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Goyal, P., Girshick, R., He, K., and Doll\u00e1r, P. (2017, January 22\u201329). Focal loss for dense object detection. Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy.","DOI":"10.1109\/ICCV.2017.324"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/12\/4\/171\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:48:42Z","timestamp":1760161722000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/12\/4\/171"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,16]]},"references-count":60,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,4]]}},"alternative-id":["info12040171"],"URL":"https:\/\/doi.org\/10.3390\/info12040171","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,16]]}}}