{"title":"Role Identification based Method for Cyberbullying Analysis in Social Edge Computing","authors":"Runyu Wang, Tun Lu, Peng Zhang, Ning Gu","doi":"arxiv-2408.03502","DOIUrl":null,"url":null,"abstract":"Over the past few years, many efforts have been dedicated to studying\ncyberbullying in social edge computing devices, and most of them focus on three\nroles: victims, perpetrators, and bystanders. If we want to obtain a deep\ninsight into the formation, evolution, and intervention of cyberbullying in\ndevices at the edge of the Internet, it is necessary to explore more\nfine-grained roles. This paper presents a multi-level method for role feature\nmodeling and proposes a differential evolution-assisted K-means (DEK) method to\nidentify diverse roles. Our work aims to provide a role identification scheme\nfor cyberbullying scenarios for social edge computing environments to alleviate\nthe general safety issues that cyberbullying brings. The experiments on ten\nreal-world datasets obtained from Weibo and five public datasets show that the\nproposed DEK outperforms the existing approaches on the method level. After\nclustering, we obtained nine roles and analyzed the characteristics of each\nrole and their evolution trends under different cyberbullying scenarios. Our\nwork in this paper can be placed in devices at the edge of the Internet,\nleading to better real-time identification performance and adapting to the\nbroad geographic location and high mobility of mobile devices.","PeriodicalId":501032,"journal":{"name":"arXiv - CS - Social and Information Networks","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Social and Information Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2408.03502","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Over the past few years, many efforts have been dedicated to studying
cyberbullying in social edge computing devices, and most of them focus on three
roles: victims, perpetrators, and bystanders. If we want to obtain a deep
insight into the formation, evolution, and intervention of cyberbullying in
devices at the edge of the Internet, it is necessary to explore more
fine-grained roles. This paper presents a multi-level method for role feature
modeling and proposes a differential evolution-assisted K-means (DEK) method to
identify diverse roles. Our work aims to provide a role identification scheme
for cyberbullying scenarios for social edge computing environments to alleviate
the general safety issues that cyberbullying brings. The experiments on ten
real-world datasets obtained from Weibo and five public datasets show that the
proposed DEK outperforms the existing approaches on the method level. After
clustering, we obtained nine roles and analyzed the characteristics of each
role and their evolution trends under different cyberbullying scenarios. Our
work in this paper can be placed in devices at the edge of the Internet,
leading to better real-time identification performance and adapting to the
broad geographic location and high mobility of mobile devices.