{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T22:16:09Z","timestamp":1777500969339,"version":"3.51.4"},"reference-count":36,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:00:00Z","timestamp":1705017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["MAKE"],"abstract":"<jats:p>The impact of communication through social media is currently considered a significant social issue. This issue can lead to inappropriate behavior using social media, which is referred to as cyberbullying. Automated systems are capable of efficiently identifying cyberbullying and performing sentiment analysis on social media platforms. This study focuses on enhancing a system to detect six types of cyberbullying tweets. Employing multi-classification algorithms on a cyberbullying dataset, our approach achieved high accuracy, particularly with the TF-IDF (bigram) feature extraction. Our experiment achieved high performance compared with that stated for previous experiments on the same dataset. Two ensemble machine learning methods, employing the N-gram with TF-IDF feature-extraction technique, demonstrated superior performance in classification. Three popular multi-classification algorithms: Decision Trees, Random Forest, and XGBoost, were combined into two varied ensemble methods separately. These ensemble classifiers demonstrated superior performance compared to traditional machine learning classifier models. The stacking classifier reached 90.71% accuracy and the voting classifier 90.44%. The results of the experiments showed that the framework can detect six different types of cyberbullying more efficiently, with an accuracy rate of 0.9071.<\/jats:p>","DOI":"10.3390\/make6010009","type":"journal-article","created":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T11:43:53Z","timestamp":1705059833000},"page":"156-170","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["An Ensemble-Based Multi-Classification Machine Learning Classifiers Approach to Detect Multiple Classes of Cyberbullying"],"prefix":"10.3390","volume":"6","author":[{"given":"Abdulkarim Faraj","family":"Alqahtani","sequence":"first","affiliation":[{"name":"Electrical Engineering and Computer Science, Florida Atlantic University, 777 Glades Road, Boca Raton, FL 33431, USA"},{"name":"Ministry of National Guard, King Khalid Military Academy, Riyadh 14625, Saudi Arabia"}]},{"given":"Mohammad","family":"Ilyas","sequence":"additional","affiliation":[{"name":"Electrical Engineering and Computer Science, Florida Atlantic University, 777 Glades Road, Boca Raton, FL 33431, USA"}]}],"member":"1968","published-online":{"date-parts":[[2024,1,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Boyd, D., Golder, S., and Lotan, G. (2010, January 5\u20138). Tweet, tweet, retweet: Conversational aspects of retweeting on twitter. Proceedings of the 2010 43rd Hawaii International Conference on System Sciences, Honolulu, HI, USA.","DOI":"10.1109\/HICSS.2010.412"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1007\/s10639-014-9349-1","article-title":"Adolescents and cyber bullying: The precaution adoption process model","volume":"21","author":"Chapin","year":"2016","journal-title":"Educ. Inf. Technol."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Nobata, C., Tetreault, J., Thomas, A., Mehdad, Y., and Chang, Y. (2016, January 11\u201315). Abusive language detection in online user content. Proceedings of the 25th International Conference on World Wide Web, Montreal, QC, Canada.","DOI":"10.1145\/2872427.2883062"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"109465","DOI":"10.1109\/ACCESS.2021.3101977","article-title":"Un-compromised credibility: Social media based multi-class hate speech classification for text","volume":"9","author":"Qureshi","year":"2021","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Qiu, S., Xu, B., Zhang, J., Wang, Y., Shen, X., De Melo, G., Long, C., and Li, X. (2020, January 20\u201324). Easyaug: An automatic textual data augmentation platform for classification tasks. Proceedings of the Companion Proceedings of the Web Conference, Taipei, Taiwan.","DOI":"10.1145\/3366424.3383552"},{"key":"ref_6","unstructured":"Agrawal, S., and Awekar, A. (2018). Advances in Information Retrieval, Proceedings of the 40th European Conference on IR Research, ECIR 2018, Grenoble, France, 26\u201329 March 2018, Springer."},{"key":"ref_7","unstructured":"Ali, W.N.H.W., Mohd, M., and Fauzi, F. (2018, January 13\u201315). Cyberbullying detection: An overview. Proceedings of the 2018 Cyber Resilience Conference (CRC), Putrajaya, Malaysia."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Alam, K.S., Bhowmik, S., and Prosun, P.R.K. (2021, January 4\u20136). Cyberbullying detection: An ensemble based machine learning approach. Proceedings of the 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), Tirunelveli, India.","DOI":"10.1109\/ICICV50876.2021.9388499"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Muneer, A., and Fati, S.M. (2020). A comparative analysis of machine learning techniques for cyberbullying detection on twitter. Future Internet, 12.","DOI":"10.3390\/fi12110187"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s13278-022-00934-4","article-title":"Performance analysis of transformer-based architectures and their ensembles to detect trait-based cyberbullying","volume":"12","author":"Ahmed","year":"2022","journal-title":"Soc. Netw. Anal. Min."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Mahmud, M.I., Mamun, M., and Abdelgawad, A. (2022, January 18\u201321). A deep analysis of textual features based cyberbullying detection using machine learning. Proceedings of the 2022 IEEE Global Conference on Artificial Intelligence and Internet of Things (GCAIoT), Alamein New City, Egypt.","DOI":"10.1109\/GCAIoT57150.2022.10019058"},{"key":"ref_12","first-page":"703","article-title":"Social media cyberbullying detection using machine learning","volume":"10","author":"Hani","year":"2019","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Hasan, M.T., Hossain, M.A.E., Mukta, M.S.H., Akter, A., Ahmed, M., and Islam, S. (2023). A Review on Deep-Learning-Based Cyberbullying Detection. Future Internet, 15.","DOI":"10.3390\/fi15050179"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Bhatt, C.M., Patel, P., Ghetia, T., and Mazzeo, P.L. (2023). Effective heart disease prediction using machine learning techniques. Algorithms, 16.","DOI":"10.3390\/a16020088"},{"key":"ref_15","unstructured":"Kadamgode Puthenveedu, S. (2022). Cyberbullying Detection Using Ensemble Method. [Ph.D. Thesis, Carleton University]."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Ulus, C., Wang, Z., Iqbal, S.M., Khan, K.M.S., and Zhu, X. (December, January 30). Transfer Na\u00efve Bayes Learning using Augmentation and Stacking for SMS Spam Detection. Proceedings of the 2022 IEEE International Conference on Knowledge Graph (ICKG), Orlando, FL, USA.","DOI":"10.1109\/ICKG55886.2022.00042"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Wang, J., Fu, K., and Lu, C.T. (2020, January 10\u201313). Sosnet: A graph convolutional network approach to fine-grained cyberbullying detection. Proceedings of the 2020 IEEE International Conference on Big Data (Big Data), Atlanta, GA, USA.","DOI":"10.1109\/BigData50022.2020.9378065"},{"key":"ref_18","first-page":"1","article-title":"Predictive analytics in business analytics: Decision Tree","volume":"26","author":"Lee","year":"2022","journal-title":"Adv. Decis. Sci."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"e914","DOI":"10.7717\/peerj-cs.914","article-title":"Classification of movie reviews using term frequency-inverse document frequency and optimized machine learning algorithms","volume":"8","author":"Naeem","year":"2022","journal-title":"PeerJ Comput. Sci."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/s42979-021-00592-x","article-title":"Machine learning: Algorithms, real-world applications and research directions","volume":"2","author":"Sarker","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Qi, Z. (2020, January 27\u201329). The text classification of theft crime based on TF-IDF and XGBoost model. Proceedings of the 2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), Dalian, China.","DOI":"10.1109\/ICAICA50127.2020.9182555"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.inffus.2004.04.008","article-title":"Classifier selection for majority voting","volume":"6","author":"Ruta","year":"2005","journal-title":"Inf. Fusion"},{"key":"ref_23","unstructured":"Rahman, M.M., and Islam, M.N. (2021). Sentimental Analysis and Deep Learning: Proceedings of ICSADL 2021, Springer."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Alotaibi, Y., and Ilyas, M. (2023). Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things\u2019 Devices Security. Sensors, 23.","DOI":"10.3390\/s23125568"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Wu, H., and Yuan, N. (2018, January 19\u201320). An Improved TF-IDF algorithm based on word frequency distribution information and category distribution information. Proceedings of the 3rd International Conference on Intelligent Information Processing, Guilin, China.","DOI":"10.1145\/3232116.3232152"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/S0306-4573(02)00021-3","article-title":"An information-theoretic perspective of tf\u2013idf measures","volume":"39","author":"Aizawa","year":"2003","journal-title":"Inf. Process. Manag."},{"key":"ref_27","first-page":"7","article-title":"On the robustness of authorship attribution based on character n-gram features","volume":"21","author":"Stamatatos","year":"2013","journal-title":"J. Law Policy"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Cheng, L., Guo, R., Silva, Y., Hall, D., and Liu, H. (2019, January 2\u20134). Hierarchical attention networks for cyberbullying detection on the instagram social network. Proceedings of the 2019 SIAM International Conference on Data Mining, Calgary, AB, Canada.","DOI":"10.1137\/1.9781611975673.27"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"012021","DOI":"10.1088\/1742-6596\/2171\/1\/012021","article-title":"Research of text classification based on TF-IDF and CNN-LSTM","volume":"2171","author":"Zhou","year":"2022","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Al-Hashedi, M., Soon, L.K., and Goh, H.N. (2019, January 23\u201325). Cyberbullying detection using deep learning and word embeddings: An empirical study. Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems, Bangkok, Thailand.","DOI":"10.1145\/3372422.3373592"},{"key":"ref_31","first-page":"539","article-title":"An automated approach for identification of non-functional requirements using Word2Vec model","volume":"10","author":"Younas","year":"2019","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Kowsari, K., Jafari Meimandi, K., Heidarysafa, M., Mendu, S., Barnes, L., and Brown, D. (2019). Text classification algorithms: A survey. Information, 10.","DOI":"10.3390\/info10040150"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Sham, N.M., and Mohamed, A. (2022). Climate change sentiment analysis using lexicon, machine learning and hybrid approaches. Sustainability, 14.","DOI":"10.3390\/su14084723"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"29","DOI":"10.3390\/make5010003","article-title":"Detecting arabic cyberbullying tweets using machine learning","volume":"5","author":"Alduailaj","year":"2023","journal-title":"Mach. Learn. Knowl. Extr."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Rustam, F., Khalid, M., Aslam, W., Rupapara, V., Mehmood, A., and Choi, G.S. (2021). A performance comparison of supervised machine learning models for Covid-19 tweets sentiment analysis. PLoS ONE, 16.","DOI":"10.1371\/journal.pone.0245909"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Alalwany, E., and Mahgoub, I. (2022). Classification of Normal and Malicious Traffic Based on an Ensemble of Machine Learning for a Vehicle CAN-Network. Sensors, 22.","DOI":"10.3390\/s22239195"}],"container-title":["Machine Learning and Knowledge Extraction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-4990\/6\/1\/9\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T13:45:56Z","timestamp":1760103956000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-4990\/6\/1\/9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,12]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["make6010009"],"URL":"https:\/\/doi.org\/10.3390\/make6010009","relation":{},"ISSN":["2504-4990"],"issn-type":[{"value":"2504-4990","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,12]]}}}