• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Optimal Deep Learning-based Cyberattack Detection and Classification Technique on Social Networks

    2022-08-24 12:58:16AmaniAbdulrahmanAlbraikanSiwarBenHajHassineSulimanMohamedFatiFahdAlWesabiAnwerMustafaHilalAbdelwahedMotwakelManarAhmedHamzaandMesferAlDuhayyim
    Computers Materials&Continua 2022年7期

    Amani Abdulrahman Albraikan, Siwar Ben Haj Hassine, Suliman Mohamed Fati,Fahd N.Al-Wesabi,4, Anwer Mustafa Hilal, Abdelwahed Motwakel, Manar Ahmed Hamzaand Mesfer Al Duhayyim

    1Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, 11671, Saudi Arabia

    2Department of Computer Science, College of Science and Arts, King Khalid University, Mahayil Asir, Saudi Arabia

    3Department of Information Systems, College of Computer and Information Sciences, Prince Sultan University,Saudi Arabia

    4Faculty of Computer and IT, Sana’a University, Sana’a, Yemen

    5Department of Computer and Self-Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University,AlKharj, Saudi Arabia

    6Department of Natural and Applied Sciences, College of Community-Aflaj, Prince Sattam bin Abdulaziz University,Saudi Arabia

    Abstract: Cyberbullying (CB) is a distressing online behavior that disturbs mental health significantly.Earlier studies have employed statistical and Machine Learning (ML) techniques for CB detection.With this motivation,the current paper presents an Optimal Deep Learning-based Cyberbullying Detection and Classification (ODL-CDC) technique for CB detection in social networks.The proposed ODL-CDC technique involves different processes such as pre-processing, prediction, and hyperparameter optimization.In addition, GloVe approach is employed in the generation of word embedding.Besides,the pre-processed data is fed into Bidirectional Gated Recurrent Neural Network(BiGRNN)model for prediction.Moreover,hyperparameter tuning of BiGRNN model is carried out with the help of Search and Rescue Optimization (SRO) algorithm.In order to validate the improved classification performance of ODL-CDC technique, a comprehensive experimental analysis was carried out upon benchmark dataset and the results were inspected under varying aspects.A detailed comparative study portrayed the superiority of the proposed ODL-CDC technique over recent techniques, in terms of performance, with the maximum accuracy of 92.45%.

    Keywords: Cybersecurity; cyberbullying; social networks; parameter tuning;deep learning; metaheuristics

    1 Introduction

    There has been a tremendous increase observed in online activities in the recent years among teenagers.This phenomenon is prevalently found in social media platforms that consistently expose teenagers to Cyber Bullying (CB).Bullying can be determined as an aggressive and intentional behaviour/act which is performed repeatedly by an individual or a group against victim(s) who cannot protect themselves over a period of time [1].Cyberbullying has been documented as a national health problem and is recognized as one of the main mental health problems owing to its continuous increase in social media and other online modes of communication [2].The negative effect of cyberbullying shares multiple similarities with conventional bullying.However, cyberbullying can be increasingly dangerous due to high propagation and frequency empowered by technology at the same time [3].Surveys conducted earlier have related cyberbullying with negative impacts on academic performance,high risk of suicidal ideation, depression psychological and physical health [4].So, early recognition of cyberbullying in social networking sites is paramount to reduce and mitigate its negative impacts upon the victim.Furthermore, the repetitive nature of cyberbullying makes it highly challenging to terminate and detect immediately.Cyber aggression, on one side, helps in detecting the aggressor and on the other side, assist the victim.

    From the perspectives of cyber world, the applications with CB pose significant challenges in terms of lack of straightforward communications, consequences associated over others, self and victim’s identity, and the ignorance of aggressors [5].The failure in straightforward communications disrupts the nature of message and partial interpretation leads to confusion on the interaction messages.Further, the intention of the individual with exchange of messages becomes complicated.Though there are difficulties in identification, when detecting an individual’s behavioral intention, the main reason behind the transition of a harasser from aggression to CB is their intent to harm oneself [6].At present, authors have attempted to innovate technologies for resolving real-time challenges in cyberbullying.Nowadays, the social networking platforms are developed with an automatic behaviour that alerts the moderator to analyze the content [7].But the present architecture lacks an intelligent automation process that can alter and detect the CB content quickly with precision, when compared to conventional reporting method.

    In case of an alert, the moderators respond and take the required action whereas alerts are taken against the user content [8].This study was conventionally performed on the surveyed data/accessible datasets, in which the victims/perpetrators report the impression.Highly accurate and automated recognition process is one another challenge faced in the mitigation of cyber bullying from the accessible dataset.Hence, the difficulty in recognizing activity must be improved [9].The need for advanced tools that can incorporate the features with automatic decision method is increasing.Several studies conducted upon smart CB detection used machine learning methods as well as adapted psychological and common features.However, this smart system is limited one, confined to the comments of an individual, leaving behind their context [10].Another research work reported about the usage of user contexts in action which includes the history of a user’s comments and their characteristics to enhance CB classification or detection accuracy.Currently, the studies conducted earlier have established novel technologies for automatic recognition of CB with real-time challenges.

    Ptaszynski et al.[11] proposed a new approach for automated recognition of cyberbullying entries on internet.In this model, the researchers utilized seed words from three classes to analyze a semantic orientation score and later maximized the significance of classes.The presented model outperformed benchmark settings in real world and laboratory conditions.In practice, the proposed method was tested and deployed.Bozyi?git et al.[12] developed the significance of social networking features in cyberbullying recognition.In this study, a balanced dataset was prepared that consists of 5,000 labelled contents from various social networking attributes.Next, the relationships amid cyberbullying and social networking attributes were investigated using chi-square test.For example, a user with more followers on social media are disinclined towards posting online bullying content.Consequently, ML methods were tested on two distinct kinds of the prepared dataset.

    Chia et al.[13] clarified and reviewed the description of sarcasm and irony by discussing several research terms.Then, the researchers conducted early experiments by comparing different kinds of classification algorithms that involve some common classifiers for text classification process.Next,various kinds of data pre-processing models were analyzed and compared.Lastly, the relationships among cyberbullying, irony, and sarcasm were discussed.Eronen et al.[14] conducted a study using numerous datasets including common datasets like Yelp business review datasets which were utilized to train conventional SA method.Newer datasets attempted to address the problems of cyberbullying since it is a crucial social problem and a complicated problem from the perspective of linguistic representations.

    Balakrishnan et al.[15] proposed an automated cyberbullying recognition method to tap the psychological characteristics of twitter users involving sentiment, emotion, and personalities.In this study,user personality has been definedby Big Fiveand Dark Triad methods,where ML classifiers like NB, RF, and J48 were utilized in the classification of twitters under four classes namely, normal, bully,aggressor, and spammer.This twitter dataset contained 5,453 tweets with the hashtag #Gamergate and was automatically annotated by human expertise.

    1.1 Objectives

    The major objective of this study is to develop Optimal Deep Learning based Cyberbullying Detection and Classification (ODL-CDC) technique for effective identification and classification of different kinds of cyberbullying that exist in social networking sites.

    1.2 Paper Contribution

    The current research work presents an Optimal Deep Learning based Cyberbullying Detection and Classification (ODL-CDC) technique for identifying cyberbullying on social networks.The proposed ODL-CDC technique involves different processes such as pre-processing, prediction, and hyperparameter optimization.In addition, GloVe approach is also employed for the generation of word embedding.Besides, the pre-processed data is fed into Bidirectional Gated Recurrent Neural Network (BiGRNN) model for prediction process.Moreover, hyperparameter tuning of BiGRNN model is carried out with the help of Search and Rescue Optimization (SRO) algorithm.In order to validate the improved classification performance of ODL-CDC technique, a comprehensive experimental analysis was carried out on benchmark dataset and the results were inspected under varying aspects.

    1.3 Paper Organization

    Rest of the sections in this paper is arranged as follows.Section 2 elaborates the proposed ODLCDC technique while the simulation results are discussed in Section 3.Finally, the concluding remarks are identified in Section 4.

    2 The Proposed Model

    In this study, a novelODL-CDC technique is developed to identify the presence of cyberbullying in social networking websites.The proposed ODL-CDC technique comprises of pre-processing, Glovebased word embedding, BiGRNN-based prediction, and SRO-based hyperparameter optimization.SRO algorithm is utilized for proper hyperparameter tuning of BiGRNN parameters which helps in improving the classification performance substantially.Fig.1 illustrates the overall process of ODLCDC model.

    Figure 1: Overall process of ODL-CDC model

    2.1 Pre-processing

    In this primary stage, social networking data is pre-processed under different stages [16] such as text cleaning, tokenization, stemming, lemmatization, and stop word removal.

    2.2 Glove’s Word Embedding Technique

    GloVe word-embedded model is utilized in the presented technique to extract semantic features in text-on-web page.GloVe is an abbreviation of Global Vectors while GloVe embedded model has unsupervised learning technique to distributed word demonstration of the text removed in this web page.GloVe technique is easy to train the information because of its parallel execution method.It takes the semantic connections of words from vector spaces.Global co-occurrence matrix X is generated based on the words established in Wikipedia dataset to train GloVe word-embedded technique [17].

    During co-occurrence matrix, X:Xijimplies the amount of context wordsithat act as word,j.GloVe technique minimizes the subsequent main function.

    2.3 BiGRNN-Based Prediction

    At this stage, the social networking data is classified into normal and insult by BiGRNN model.GRU-NN is a basic form of LSTM while the procedure mimics RNN.In contrast with LSTM, GRU has a combination of input as well as forgetting gates to upgrade gate.Its fundamental framework is demonstrated in Fig.2.

    Figure 2: BiGRU structure

    Considering that the amount of hidden units ish, a small-batch input with provided time step oftisXt∈Rn*d(the amount of instances isn, the amount of inputs isd), and the hidden state at preceding time stept1isHt-1∈Rn*h.The resultant hidden statehof singleGRUat present time steptis as follows[18]:

    where σ refers to sigmoid activation function, for instance,σ(x) = 1/1 +e-x,·Wxr,Whr,WXZ, andWhzdemonstrate the weights of linking input layer and reset gate, hidden layer and reset gate, input layer and update gate, and hidden layer and update gate correspondingly;brandbzsignify the bias of reset as well as updategates;Htimplies the candidate hidingstate at presenttime step,t;⊙standsfor matrix multiplication of two elements whereasTanhrepresents the hyperbolic tangent activation function for which the equation is as follows.

    If water quality time series parameter is forecasted, the value of present time is nearly connected with the values of preceding time and next time.But, GRU is a one-way NN framework due to which BiGRU is utilized.BiGRU is a bidirectional NN which is a collection of collected of forwardpropagating GRU andbackward-propagating GRU units.The present hidden layer stateHtof BiGRU is defined as presenti nputXt,theoutputof forwarding hidden layer, and the outputtofbackward hidden layer at time stept- 1, afterward,

    where GRU (.) function designates that GRU network is utilized for conducting non-linear alteration on input data of water quality whereas the input vector encodes to equivalent GRU hidden state;wtandvtcorrespondingly are the weights of stateof forward hidden layer and the stateofbackward hidden layer equivalent to BiGRU at timet, andbtindicates the bias of state of the hidden layer, at timet.

    2.4 SRO Based Hyperparameter Optimization

    In order to have an appropriate fine tuning of the hyperparameters in BiGRNN model, SRO algorithm is utilized.Shabani et al.[19] presented SAR inspired from the research conducted upon humans at search and rescue processes.Search and rescue process comprises of two stages such as individual phase and social phase.The clues left at the time of search by a group member get stored in memory matrix (O) where the humans’position are stored from position matrix (W).The clue matrixBusing sizeN*Dleft a clue while the humans’position can be expressed in the matrix given below.

    The two stages of human search aremodelled as given herewith i) social stage: The search direction is representedasSDi= (Wi-Bk)whereaski.The novel solution can be attained as given herewith..

    Nowf(Bi) &f(Wi) represent the fitness function values forBi&Wi,r1&r2denote the arbitrary values in the interval of [-1, 1] and [0,1], SE denotes the model variable which lies in the range of 0 & 1.

    ii) Individual Stage: According to the present human position, their novel location is found andithhuman can be represented as follows.

    Each solution must be found in the solution space, when a novel location is present on the outside of solution space as mentioned herewith.

    Here,MEnrepresents thenthstored clues location in memory matrix andnindicates a random integer number in the range of 1 and N.

    At the time of clues’search operation, when better clues are not found near the existing location after some searches, humans move to a novel location.

    While the USN value is high than the maximal unsuccessful search number, the human gets an arbitrary location in searching space as per Eq.(17) while the values ofUSNiare fixed as 0 for that human.

    Here,r4lies in the range of 0 and 1.

    3 Experimental Validation

    The performance validation of the proposed ODL-CDC technique was carried out using Kaggle datasetwhich contains instances under two classes namely, neutral/normal (class 0) and insult (class 1).Most of the words that exist in neural statements are ‘people’, ‘like’, ‘just’, ‘make’, ‘now’, ‘right’, ‘can’, ‘one’ and ‘think’.Similarly, the words that exist in insult statements include ‘people’, ‘shit’, ‘think’, ‘idiot’, ‘life’, ‘bitch’, ‘back’ and ‘dumb’ which are the most frequent words used in bad sentences.The results were examined without hyperparameter tuning, i.e., BiGODL-CDC technique, and with hyperparameter tuning, i.e., ODL-CDC technique under different measures.

    Tab.1 shows the results of classification obtained by BiGODL-CDC technique on test Kaggle dataset.The results portray that BiGODL-CDC technique accomplished an effective performance under all classes.For instance, under run-1 with normal class, BiGODL-CDC technique obtainedPren,Recl, andF1measurevalues such as 91.23%, 90.7%, and 92.98% respectively.At the same time,under run-1 with insult class, the BiGODL-CDC technique has attainedPren,Recl, andF1measureof 92.61%, 92.42%, and 92.48% correspondingly.At the same time, under run-2 with normal class,BiGODL-CDC technique attainedPren,Recl, andF1measurevalues such as 91.49%, 92.26%, and 91.68% correspondingly.In linewith these, under run-2with insult class, BiGODL-CDC methodology reachedPren,Recl, andF1measurevalues like 91.39%, 92.33%, and 90.63% respectively.Followed by, under run-3 with normal class, BiGODL-CDC technique obtainedPren,Recl, andF1measurevalues such as 92.87%,92.27%, and 91.91% correspondingly.Simultaneously, under run-3 with insult class, BiGODL-CDC method attainedPren,Recl, andF1measurevalues such as 92.35%, 91.14%, and 90.76% correspondingly.Moreover, under run-4 with normal class, BiGODL-CDC technique obtainedPren,Recl, andF1measurevalues such as 90.12%, 92.61%, and 91.47% respectively.In addition, under run-4 with insult class,BiGODL-CDC scheme obtainedPren,Recl, andF1measurevalues such as 90.01%, 90.22%, and 91.52%correspondingly.Eventually, under run-5 with normal class, BiGODL-CDC approach obtainedPren,Recl,andF1measurevaluessuchas91.52%,91.08%,and91.32%correspondingly.Then,underrun-5with insult class, BiGODL-CDC technique gainedPren,Recl, andF1measurevalues like 92.51%, 92.76%, and 90.6% respectively.Meanwhile, under run-6 with normal class, BiGODL-CDC technique achievedPren,Recl, andF1measurevalues being 92.65%, 91.47%, and 91.06% correspondingly.Afterward, under run-6 with insult class, BiGODL-CDC system attainedPren,Recl, andF1measurevalues such as 90.42%,90.22%, and 90.04% respectively.

    Table 1: Results of the analysis of BiGODL-CDC model under different runs

    Concurrently, under run-7 with normal class, BiGODL-CDC technique obtainedPren,Recl, andF1measurevalues such as 92.17%, 91.48%, and 90.28% correspondingly.Besides, under run-7 with insult class, BiGODL-CDC technique attainedPren,Recl, andF1measurevalues such as 92.75%, 90.26%,and 91.97% respectively.Simultaneously, under run-8 with normal class, BiGODL-CDC technique obtainedPren,Recl, andF1measurevalues such as 90.08%, 91.54%, and 90.99% respectively.At the same time, under run-8 with insult class, BiGODL-CDC technique attainedPren,Recl, andF1measurevalues such as 92.65%, 92.29%, and 90.58% correspondingly.Furthermore, under run-9 with normal class,BiGODL-CDC technique obtainedPren,Recl,andF1measurevaluesnamely92.46%,92.95%,and92.56%correspondingly.Then, under run-9 with insult class, BiGODL-CDC technique attainedPren,Recl,andF1measurevalues namely 92.08%, 90.97%, and 92.67% respectively.Finally, under run-10 with normal class, BiGODL-CDC technique obtainedPren,Recl, andF1measurevalues such as 91.5%, 92.07%, and 91.74% correspondingly.At last, under run-10 with insult class, BiGODL-CDC technique attainedPren,Recl, andF1measurevalues like 91.51%, 90.23%, and 91.45% respectively.

    Tab.2 and Fig.3 provide the comprehensive classification results offered by BiGODL-CDC technique under ten distinct runs.The results show that the proposed BiGODL-CDC technique accomplished maximum cyberbullying detection performance.For instance, with run-1, BIGODLCDC technique achievedPren,Recl,F1measure, andaccyof 91.92%, 91.56%, 92.73%, and 91.64% correspondingly.In addition,with run-4,BiGODL-CDC method reachedPren,Recl,F1measure,andaccyof 90.07%, 91.42%, 91.50%, and 91.27% correspondingly.In line with these, with run-6, BIGODLCDC algorithm obtainedPren,Recl,F1measure, andaccyvalues such as 91.54%, 90.85%, 90.55%, and 90.90% respectively.Likewise, with run-8, BiGODL-CDC technique reachedPren,Recl,F1measure, andaccysuch as 91.37%, 91.92%, 90.79%, and 91.56% correspondingly.Lastly, with run-10, BiGODLCDC methodology achievedPren,Recl,F1measure, andaccyvalues such as 91.51%, 91.15%, 91.60%, and 91.48% correspondingly.

    Table 2: Classification analysis results of BiGODL-CDC model under varying measures

    Fig.4 illustrates the results for accuracy analysis of BiGODL-CDC technique.The figure implies that the accuracy values increased with an increase in epoch count.It is also noted that the validation accuracy also seemed to be higher than the training accuracy.

    Loss graph analysis results accomplished by BiGODL-CDC technique is illustrated in Fig.5.The figure infers that the loss values are minimal with increasing epoch counts.It is also observed that the validation loss is considerably lower than the training loss.

    Figure 3: Classification analysis results of BiGODL-CDC model under different measures

    Figure 4: Accuracy analysis of BiGODL-CDC model

    Tab.3 shows the classification outcomes obtained by the proposed ODL-CDC system on test Kaggle dataset.The outcomes show that the proposed ODL-CDC technique outperformed all other methods and accomplished an effectual performance under all classes.For instance, under run-1 with normal class, ODL-CDC technique attainedPren,Recl, andF1measurevalues such as 92.04%,91.23%, and 93.61% correspondingly.At the same time, under run-1 with insult class, ODL-CDC technique attainedPren,Recl, andF1measurevalues such as 93.59%, 93.05%, and 93.20% respectively.Simultaneously, under run-2 with normal class, ODL-CDC approach obtainedPren,Recl, andF1measurevalues such as 92.02%, 92.96%, and 92.33% correspondingly.Concurrently, under run-2 with insult class, ODL-CDC approach gainedPren,Recl, andF1measurevalues such as 91.95%, 92.91%, and 91.54%correspondingly.Afterwards, under run-3 with normal class, ODL-CDC method obtainedPren,Recl,andF1measurevalues such as 93.84%, 93.02%, and 92.48% respectively.At the same time, under run-3 with insult class, ODL-CDC technique reachedPren,Recl, andF1measurevalues such as 93.27%,91.74%, and 91.55% correspondingly.Along with that, under run-4 with normal class, ODL-CDC methodology obtainedPren,Recl,andF1measurevaluessuchas90.79%,93.36%,and92.30%respectively.Also, under run-4 with insult class, ODL-CDC system attainedPren,Recl, andF1measurevalues such as 90.63%, 90.99%, and 92.26% correspondingly.In addition, under run-5 with normal class, ODLCDC methodology achievedPren,Recl, andF1measurevalues such as 92.42%, 92.06%, and 91.89%respectively.Then, under run-5 with insult class,ODL-CDC technique attainedPren,Recl,andF1measurevalues such as 93.50%, 93.45%, and 91.47% respectively.In the meantime, under run-6 with normal class, ODL-CDC system gainedPren,Recl, andF1measurevalues such as 93.40%, 92.38%, and 91.80%correspondingly.Afterward, under run-6 with insult class, ODL-CDC algorithm attainedPren,Recl,andF1measurevalues such as 91.09%, 90.81%, and 90.55% respectively.

    Figure 5: Loss analysis of BiGODL-CDC model

    Table 3: Analysis results of ODL-CDC model with different runs

    Also, under run-7 with normal class, ODL-CDC technique gainedPren,Recl, andF1measurevalues such as 92.72%, 92.14%, and 91.27% correspondingly.Then, under run-7 with insult class, ODL-CDC algorithm attainedPren,Recl, andF1measurevalues such as 93.32%, 91.03%, and 92.47% respectively.At the same time, under run-8 with normal class, ODL-CDC technique obtainedPren,Recl, andF1measurevalues such as 90.96%, 92.07%, and 91.59% correspondingly.Also, under run-8 with insult class,ODLCDC system attainedPren,Recl, andF1measurevalues such as 93.36%, 93.02%, and 91.31% respectively.Furthermore, under run-9 with normal class, ODL-CDC method obtainedPren,Recl, andF1measurevalues such as 93.44%, 93.77%, and 93.47% respectively.At the same time, under run-9 with insult class, ODL-CDC method achievedPren,Recl, andF1measurevalues such as 93.08%, 91.49%, and 93.55%correspondingly.At last, under run-10 with normal class,ODL-CDC methodology attainedPren,Recl,andF1measurevalues such as 93.44%, 93.77%, and 93.47% respectively.Besides, under run-10 with insult class,ODL-CDC technique reachedPren,Recl,andF1measurevaluessuchas93.08%,91.49%,and93.55%correspondingly.

    Tab.4 and Fig.6 offer the results for comprehensive classification obtained by the proposed ODL-CDC manner under ten distinct runs.The outcomes showcase that the proposed ODL-CDC technique accomplished the maximal cyberbullying detection performance.For instance, with run-1,ODL-CDC approach gainedPren,Recl,F1measure, andaccyvalues such as 92.82%, 92.14%, 93.41%, and 92.39% correspondingly.Followed by, with run-4, ODL-CDC system achievedPren,Recl,F1measure,andaccyvalues such as 90.71%, 92.18%, 92.28%, and 92.16% respectively.Likewise, with run-6, ODLCDC methodology obtainedPren,Recl,F1measure, andaccyvalues such as 92.25%, 91.60%, 91.18%,and 91.67% correspondingly.At the same time, with run-8, ODL-CDC technique achievedPren,Recl,F1measure, andaccyvalues such as 92.16%, 92.55%, 91.45%, and 92.44% respectively.Eventually, with run-10, ODL-CDC method reachedPren,Recl,F1measure, andaccyvalues such as 93.26%, 92.63%,93.51%, and 92.93% correspondingly.

    Table 4: Classification analysis results of ODL-CDC model with varying measures

    Figure 6: Classification analysis results of ODL-CDC model with different measures

    The results for accuracy graph analysis obtained by ODL-CDC approach is demonstrated in Fig.7.The figure infers that the accuracy values increased with increasing number of epoch counts.It can be also stated that the validation accuracy is superior to training accuracy.

    Figure 7: Accuracy analysis results of ODL-CDC model

    Fig.8 shows the results for loss graph analysis obtained by ODL-CDC manner.The figure infers that the loss values got established to a low, with an increase in epoch count.It is also clear that the validation loss is considerably lesser than the training loss.

    Figure 8: Loss analysis results of ODL-CDC model

    Finally, a brief comparative accuracy analysis was conducted between ODL-CDC and recent approaches and the results are shown in Tab.5 and Fig.9.The results portray that BLSTM, GRU,LSTM, and RNN techniques obtained the least accuracy values such as 82.18%, 81.46%, 80.86%, and 81.01%.Followed by, BiGRNN technique accomplished a moderately reasonable accuracy of 91.66%.However, the proposed ODL-CDC technique resulted in maximum accuracy of 92.45%.These results validate the supremacy of the proposed ODL-CDC technique in tersm of detection and classification of cyberbullying.

    Figure 9: Testing accuracy analysis results of ODL-CDC model

    4 Conclusion

    In this study, a novel ODL-CDC technique is developed to identify the presence of cyberbullying in social networking data.The proposed ODL-CDC technique comprises of pre-processing, Glovebased word embedding, BiGRNN-based prediction, and SRO-based hyperparameter optimization processes.The utilization of SRO algorithm for proper hyperparameter tuning of BiGRNN parameters helps in boost the classification performance substantially.In order to ensure an improved classification performance of ODL-CDC technique, a comprehensive experimental analysis was carried out on benchmark dataset.The resultswere inspected under varying aspectswhile the proposed model achieved a maximum accuracy of 92.45%.A detailed comparative study portrayed the better performance of ODL-CDC technique over recent techniques under different measures.In future,hybrid metaheuristics and outlier detection concepts can be integrated with ODL-CDC technique to increase the detection performance.

    Acknowledgement:The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges (APC) of this publication.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number (GPR/303/42).Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2022R191),Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久久精品免费免费高清| 男人添女人高潮全过程视频| 欧美少妇被猛烈插入视频| 成人国产av品久久久| 亚洲成人一二三区av| 美女国产高潮福利片在线看| svipshipincom国产片| xxxhd国产人妻xxx| 日韩成人av中文字幕在线观看| 国产成人免费观看mmmm| 亚洲激情五月婷婷啪啪| 国产免费现黄频在线看| 日本欧美视频一区| 老熟女久久久| 国产老妇伦熟女老妇高清| 视频区图区小说| av有码第一页| 伊人久久国产一区二区| 超碰97精品在线观看| 少妇人妻精品综合一区二区| 女人爽到高潮嗷嗷叫在线视频| 国产1区2区3区精品| 在线观看国产h片| 在线观看免费午夜福利视频| 中文字幕另类日韩欧美亚洲嫩草| 黄色视频不卡| 青春草视频在线免费观看| av在线app专区| 建设人人有责人人尽责人人享有的| 亚洲欧美一区二区三区久久| av国产精品久久久久影院| 国产成人啪精品午夜网站| 亚洲七黄色美女视频| 久久婷婷青草| 男人爽女人下面视频在线观看| 亚洲天堂av无毛| 在线观看免费视频网站a站| 9191精品国产免费久久| 久久天躁狠狠躁夜夜2o2o | 国产男女内射视频| 国产成人91sexporn| 国产熟女午夜一区二区三区| 亚洲精品视频女| 国产一区二区三区综合在线观看| 伊人久久大香线蕉亚洲五| 美女国产高潮福利片在线看| 色视频在线一区二区三区| 午夜免费鲁丝| 精品第一国产精品| 国产成人91sexporn| 在线观看免费午夜福利视频| 久久久久久久久久久久大奶| 亚洲成人国产一区在线观看 | 伦理电影免费视频| 久久人妻熟女aⅴ| 国产片特级美女逼逼视频| 亚洲精品国产色婷婷电影| 高清av免费在线| svipshipincom国产片| av天堂久久9| 亚洲国产精品一区三区| 男女高潮啪啪啪动态图| 国产男女内射视频| 你懂的网址亚洲精品在线观看| 免费在线观看完整版高清| 午夜免费男女啪啪视频观看| 宅男免费午夜| 九草在线视频观看| 国产av码专区亚洲av| 亚洲精品一二三| 美女中出高潮动态图| 午夜免费观看性视频| videos熟女内射| 精品视频人人做人人爽| tube8黄色片| 极品少妇高潮喷水抽搐| 国产精品麻豆人妻色哟哟久久| 国产乱来视频区| 蜜桃国产av成人99| 久久人人爽人人片av| 欧美日韩亚洲高清精品| 国产日韩欧美视频二区| 又黄又粗又硬又大视频| 最近手机中文字幕大全| 曰老女人黄片| 亚洲国产中文字幕在线视频| 日韩一卡2卡3卡4卡2021年| 男人操女人黄网站| 国产免费现黄频在线看| 国产精品免费视频内射| 啦啦啦视频在线资源免费观看| 亚洲四区av| 午夜免费鲁丝| 搡老乐熟女国产| 中文字幕色久视频| 国产97色在线日韩免费| 色婷婷av一区二区三区视频| 午夜老司机福利片| 少妇被粗大猛烈的视频| 亚洲av电影在线进入| 国产毛片在线视频| 天天躁狠狠躁夜夜躁狠狠躁| 成年av动漫网址| 黄色视频在线播放观看不卡| 中文字幕精品免费在线观看视频| 精品卡一卡二卡四卡免费| 啦啦啦视频在线资源免费观看| av电影中文网址| 大片免费播放器 马上看| 国产精品免费大片| 桃花免费在线播放| 亚洲国产av影院在线观看| 婷婷色麻豆天堂久久| 国产精品国产av在线观看| 一个人免费看片子| 天天影视国产精品| 高清欧美精品videossex| 精品少妇久久久久久888优播| 精品午夜福利在线看| 精品一区二区免费观看| 欧美xxⅹ黑人| 国产又色又爽无遮挡免| h视频一区二区三区| 亚洲精品一二三| 国产乱人偷精品视频| 悠悠久久av| 一区二区三区四区激情视频| 夫妻午夜视频| 亚洲欧洲日产国产| 免费久久久久久久精品成人欧美视频| 婷婷色麻豆天堂久久| 亚洲一区二区三区欧美精品| 精品国产乱码久久久久久男人| 精品福利永久在线观看| 久久天躁狠狠躁夜夜2o2o | 亚洲精品日本国产第一区| 久久久精品94久久精品| 男女高潮啪啪啪动态图| 中文字幕最新亚洲高清| 久久影院123| 国产av国产精品国产| 大片免费播放器 马上看| 9191精品国产免费久久| 99久久99久久久精品蜜桃| 欧美 亚洲 国产 日韩一| 欧美日韩国产mv在线观看视频| 人妻人人澡人人爽人人| 国产99久久九九免费精品| 日本午夜av视频| 观看av在线不卡| 亚洲美女黄色视频免费看| 一级,二级,三级黄色视频| 国产精品久久久久久人妻精品电影 | 男女边吃奶边做爰视频| 七月丁香在线播放| 日本一区二区免费在线视频| 黄片无遮挡物在线观看| 大香蕉久久网| 国产毛片在线视频| 久久毛片免费看一区二区三区| 两个人免费观看高清视频| 午夜影院在线不卡| 亚洲欧美日韩另类电影网站| 一本久久精品| 观看美女的网站| 制服人妻中文乱码| 国产免费视频播放在线视频| 夜夜骑夜夜射夜夜干| 久久久久国产精品人妻一区二区| 欧美日韩亚洲高清精品| 老熟女久久久| 日韩视频在线欧美| 一区福利在线观看| 亚洲欧美色中文字幕在线| av国产久精品久网站免费入址| 少妇的丰满在线观看| 国产av精品麻豆| 久久av网站| 天天影视国产精品| 性色av一级| 在线免费观看不下载黄p国产| 日韩免费高清中文字幕av| 曰老女人黄片| 一区二区三区激情视频| 久久久久久人妻| 搡老岳熟女国产| 成人午夜精彩视频在线观看| 熟女av电影| 狠狠婷婷综合久久久久久88av| 欧美精品人与动牲交sv欧美| 久久99精品国语久久久| 69精品国产乱码久久久| 熟女少妇亚洲综合色aaa.| 综合色丁香网| 亚洲精品国产av成人精品| 中文乱码字字幕精品一区二区三区| 夜夜骑夜夜射夜夜干| 午夜免费鲁丝| 亚洲天堂av无毛| 国产精品国产三级专区第一集| 亚洲人成77777在线视频| 精品人妻熟女毛片av久久网站| 久久婷婷青草| 精品一品国产午夜福利视频| 欧美av亚洲av综合av国产av | 天堂俺去俺来也www色官网| 精品国产国语对白av| 91老司机精品| 黑人欧美特级aaaaaa片| 国产片内射在线| 亚洲av电影在线观看一区二区三区| 欧美少妇被猛烈插入视频| 又粗又硬又长又爽又黄的视频| 国产精品人妻久久久影院| 亚洲精品日韩在线中文字幕| 国产成人精品无人区| 99久久人妻综合| 国产一级毛片在线| 一级a爱视频在线免费观看| 国产精品99久久99久久久不卡 | 两个人免费观看高清视频| 精品亚洲成a人片在线观看| 老司机在亚洲福利影院| 亚洲成人一二三区av| 天天躁狠狠躁夜夜躁狠狠躁| 日韩精品免费视频一区二区三区| 亚洲国产av新网站| 亚洲精品,欧美精品| 一级毛片电影观看| 欧美日韩视频高清一区二区三区二| 国产99久久九九免费精品| 一本久久精品| 韩国高清视频一区二区三区| 国产日韩欧美视频二区| 午夜91福利影院| 在线观看免费午夜福利视频| 看免费av毛片| 老司机深夜福利视频在线观看 | 久久精品国产亚洲av高清一级| 久久天躁狠狠躁夜夜2o2o | 久久久国产欧美日韩av| 欧美黑人欧美精品刺激| 精品国产一区二区三区久久久樱花| 只有这里有精品99| 成人国语在线视频| 国产人伦9x9x在线观看| 精品久久久精品久久久| 韩国高清视频一区二区三区| 天天躁狠狠躁夜夜躁狠狠躁| 久久久久久久久久久免费av| 日韩大码丰满熟妇| 99香蕉大伊视频| xxx大片免费视频| 国产亚洲最大av| 在线观看免费高清a一片| 性色av一级| 久久久久久久大尺度免费视频| 亚洲国产成人一精品久久久| 久久免费观看电影| 午夜福利一区二区在线看| 免费看不卡的av| 欧美日韩亚洲高清精品| 亚洲av成人不卡在线观看播放网 | 亚洲精品美女久久久久99蜜臀 | 国产精品熟女久久久久浪| 色播在线永久视频| 亚洲精品aⅴ在线观看| 欧美精品人与动牲交sv欧美| 男女免费视频国产| 国产一区二区三区av在线| 亚洲av福利一区| 综合色丁香网| 久久97久久精品| 亚洲欧美一区二区三区久久| 在线天堂中文资源库| 尾随美女入室| 尾随美女入室| 欧美黑人精品巨大| 久久久久久免费高清国产稀缺| 国产一级毛片在线| www.自偷自拍.com| 亚洲精品一区蜜桃| 韩国高清视频一区二区三区| 国产成人欧美| 中文字幕精品免费在线观看视频| 色网站视频免费| 国产女主播在线喷水免费视频网站| 少妇人妻 视频| 精品一区二区三区av网在线观看 | 久久久久久人人人人人| 亚洲专区中文字幕在线 | 国产精品.久久久| 伦理电影大哥的女人| 精品国产乱码久久久久久男人| 美女大奶头黄色视频| 免费女性裸体啪啪无遮挡网站| 91成人精品电影| 亚洲五月色婷婷综合| 午夜激情av网站| 妹子高潮喷水视频| 久久久久久久国产电影| 国产亚洲av片在线观看秒播厂| 考比视频在线观看| 亚洲人成网站在线观看播放| 亚洲国产精品999| 中文字幕人妻丝袜一区二区 | 精品午夜福利在线看| 亚洲婷婷狠狠爱综合网| 妹子高潮喷水视频| avwww免费| av.在线天堂| 婷婷色麻豆天堂久久| 亚洲熟女精品中文字幕| 自拍欧美九色日韩亚洲蝌蚪91| 成人国产av品久久久| 三上悠亚av全集在线观看| 久久久久久免费高清国产稀缺| 亚洲精品国产av蜜桃| 国产精品一区二区在线不卡| 国产人伦9x9x在线观看| 大话2 男鬼变身卡| 在线天堂最新版资源| 制服丝袜香蕉在线| 国产精品成人在线| 操美女的视频在线观看| 中文欧美无线码| 精品久久久久久电影网| 精品一区在线观看国产| 日日摸夜夜添夜夜爱| 国产老妇伦熟女老妇高清| 亚洲美女搞黄在线观看| 午夜免费男女啪啪视频观看| 亚洲av电影在线进入| 免费观看av网站的网址| 亚洲欧美成人综合另类久久久| 精品久久蜜臀av无| 两个人看的免费小视频| www日本在线高清视频| 一区二区三区激情视频| 国产日韩欧美亚洲二区| 亚洲国产成人一精品久久久| a级片在线免费高清观看视频| 欧美日韩一区二区视频在线观看视频在线| 国产伦理片在线播放av一区| 欧美激情 高清一区二区三区| 高清黄色对白视频在线免费看| 香蕉国产在线看| 欧美亚洲 丝袜 人妻 在线| 色婷婷av一区二区三区视频| 国产亚洲午夜精品一区二区久久| 少妇猛男粗大的猛烈进出视频| 老司机在亚洲福利影院| 99久久人妻综合| 亚洲中文av在线| 久久久亚洲精品成人影院| 国产精品一国产av| www.av在线官网国产| 欧美在线一区亚洲| 久久精品久久久久久噜噜老黄| 欧美另类一区| 精品国产国语对白av| 一级片'在线观看视频| 久久久久久久精品精品| 无限看片的www在线观看| 晚上一个人看的免费电影| 久久狼人影院| 国产探花极品一区二区| 亚洲av欧美aⅴ国产| 亚洲成色77777| 久久精品国产亚洲av高清一级| 亚洲欧美成人精品一区二区| 最近中文字幕2019免费版| 亚洲美女黄色视频免费看| 日本wwww免费看| 人人澡人人妻人| 丁香六月欧美| 国产片特级美女逼逼视频| 老司机在亚洲福利影院| a 毛片基地| 中文字幕亚洲精品专区| av线在线观看网站| 老司机靠b影院| 日本欧美视频一区| 1024香蕉在线观看| 黄色一级大片看看| 亚洲av日韩在线播放| 亚洲久久久国产精品| 亚洲第一区二区三区不卡| bbb黄色大片| 青春草亚洲视频在线观看| 一二三四中文在线观看免费高清| 99久久99久久久精品蜜桃| 麻豆乱淫一区二区| 91成人精品电影| 亚洲男人天堂网一区| 免费观看人在逋| 男女下面插进去视频免费观看| 国产成人精品久久二区二区91 | 尾随美女入室| 深夜精品福利| 亚洲成av片中文字幕在线观看| 欧美激情极品国产一区二区三区| 母亲3免费完整高清在线观看| 麻豆av在线久日| 日韩大码丰满熟妇| 777米奇影视久久| 精品第一国产精品| 欧美另类一区| 可以免费在线观看a视频的电影网站 | 日日爽夜夜爽网站| 亚洲欧美一区二区三区国产| 亚洲美女搞黄在线观看| 免费在线观看视频国产中文字幕亚洲 | 中文字幕亚洲精品专区| 久久 成人 亚洲| 亚洲精品第二区| 王馨瑶露胸无遮挡在线观看| av国产精品久久久久影院| 亚洲欧美日韩另类电影网站| 人人妻,人人澡人人爽秒播 | av在线观看视频网站免费| 亚洲美女视频黄频| 综合色丁香网| 日日摸夜夜添夜夜爱| 亚洲欧美中文字幕日韩二区| 激情视频va一区二区三区| av天堂久久9| 看免费av毛片| 五月天丁香电影| av线在线观看网站| 一区二区日韩欧美中文字幕| 美女脱内裤让男人舔精品视频| 十八禁人妻一区二区| 一级,二级,三级黄色视频| 美女主播在线视频| 国产黄色免费在线视频| 亚洲伊人久久精品综合| 午夜福利影视在线免费观看| 日韩 欧美 亚洲 中文字幕| 亚洲第一av免费看| 欧美黄色片欧美黄色片| 香蕉国产在线看| 欧美日韩视频高清一区二区三区二| 亚洲国产最新在线播放| 国产无遮挡羞羞视频在线观看| 精品国产超薄肉色丝袜足j| 免费久久久久久久精品成人欧美视频| 久久综合国产亚洲精品| 亚洲欧美精品综合一区二区三区| 国产xxxxx性猛交| 街头女战士在线观看网站| √禁漫天堂资源中文www| 韩国高清视频一区二区三区| 久久精品熟女亚洲av麻豆精品| 国产精品一区二区在线观看99| 午夜老司机福利片| 亚洲 欧美一区二区三区| 国产精品一二三区在线看| 美女高潮到喷水免费观看| 大香蕉久久成人网| 午夜日本视频在线| 久久 成人 亚洲| 丝袜在线中文字幕| 精品人妻在线不人妻| 午夜av观看不卡| 黑人欧美特级aaaaaa片| 亚洲av在线观看美女高潮| 伦理电影大哥的女人| 免费女性裸体啪啪无遮挡网站| 熟女少妇亚洲综合色aaa.| av不卡在线播放| 黄片小视频在线播放| 国产 一区精品| 少妇 在线观看| 97人妻天天添夜夜摸| 精品亚洲成国产av| 黄片无遮挡物在线观看| 国产精品亚洲av一区麻豆 | 韩国精品一区二区三区| 人人妻人人爽人人添夜夜欢视频| 欧美日韩亚洲综合一区二区三区_| 精品一区二区免费观看| 久久 成人 亚洲| 免费看av在线观看网站| 免费观看人在逋| 永久免费av网站大全| 免费观看人在逋| 最新的欧美精品一区二区| 91国产中文字幕| 免费不卡黄色视频| 国产精品 欧美亚洲| 久久久精品区二区三区| 久久精品久久久久久久性| 精品一区二区三卡| 久久久国产精品麻豆| 婷婷色麻豆天堂久久| 丁香六月欧美| 一边摸一边做爽爽视频免费| 亚洲精华国产精华液的使用体验| 免费在线观看黄色视频的| 亚洲一卡2卡3卡4卡5卡精品中文| 日本wwww免费看| 999精品在线视频| 色94色欧美一区二区| 午夜久久久在线观看| 亚洲精品日韩在线中文字幕| 男女之事视频高清在线观看 | 天天躁狠狠躁夜夜躁狠狠躁| 国产欧美亚洲国产| 精品国产一区二区久久| 中文字幕av电影在线播放| 日日啪夜夜爽| 国产av码专区亚洲av| 人人妻人人澡人人看| 成人三级做爰电影| a 毛片基地| 国产高清不卡午夜福利| 免费不卡黄色视频| 性色av一级| 亚洲国产精品999| 十分钟在线观看高清视频www| 亚洲婷婷狠狠爱综合网| 乱人伦中国视频| 51午夜福利影视在线观看| av又黄又爽大尺度在线免费看| 久久久久久久久免费视频了| 久久久久网色| 午夜福利,免费看| 亚洲欧美成人综合另类久久久| a 毛片基地| 男女免费视频国产| 男女高潮啪啪啪动态图| 99热全是精品| 大话2 男鬼变身卡| 大片电影免费在线观看免费| 另类精品久久| 丝袜美腿诱惑在线| 亚洲国产最新在线播放| 美女午夜性视频免费| 久久人妻熟女aⅴ| 丝袜美足系列| 亚洲国产看品久久| 99久久精品国产亚洲精品| 亚洲综合精品二区| 国产在线视频一区二区| 一级毛片 在线播放| 欧美成人精品欧美一级黄| 老司机影院毛片| 2018国产大陆天天弄谢| 午夜精品国产一区二区电影| 国产高清不卡午夜福利| 一边亲一边摸免费视频| 最近手机中文字幕大全| 欧美黑人精品巨大| 多毛熟女@视频| 97在线人人人人妻| 久久久久精品久久久久真实原创| av在线播放精品| 欧美黑人精品巨大| 别揉我奶头~嗯~啊~动态视频 | 丝袜脚勾引网站| 久久99一区二区三区| 国产激情久久老熟女| 亚洲少妇的诱惑av| 日韩制服骚丝袜av| 晚上一个人看的免费电影| 久久精品亚洲av国产电影网| 狂野欧美激情性bbbbbb| 国产福利在线免费观看视频| 亚洲一区中文字幕在线| 亚洲国产精品一区二区三区在线| 女性被躁到高潮视频| 交换朋友夫妻互换小说| av不卡在线播放| 中文字幕另类日韩欧美亚洲嫩草| 精品卡一卡二卡四卡免费| 国产精品.久久久| 国产成人免费无遮挡视频| 亚洲成人av在线免费| av电影中文网址| 国产精品av久久久久免费| 啦啦啦视频在线资源免费观看| 国产成人一区二区在线| 久久午夜综合久久蜜桃| kizo精华| 欧美少妇被猛烈插入视频| 美女午夜性视频免费| 成年女人毛片免费观看观看9 | 国产黄色免费在线视频| 中文乱码字字幕精品一区二区三区| 免费在线观看完整版高清| 久久久国产一区二区| 一级黄片播放器| 国产精品 国内视频| 久久 成人 亚洲| 国产精品国产av在线观看| 国产欧美日韩综合在线一区二区| 欧美成人午夜精品| 中文字幕另类日韩欧美亚洲嫩草| 最近手机中文字幕大全| 深夜精品福利| 国产99久久九九免费精品| 成年动漫av网址| 欧美中文综合在线视频| 国产精品蜜桃在线观看| 看非洲黑人一级黄片| 久久久久精品性色| 欧美精品人与动牲交sv欧美| 丁香六月欧美| 大香蕉久久网| 在线观看三级黄色| 欧美av亚洲av综合av国产av | 高清黄色对白视频在线免费看| 婷婷色综合www| 午夜免费男女啪啪视频观看|