Research Articles

Investigation of deep neural network architecture for cyberbullying detection over social media

Vol. 21 No. 3 (2025)
Published: 10-02-2026
Subbaraju Pericharla
SRKR Engineering College
Sivadi Balakrishna
Vignan's Foundation for Science, Technology & Researc

Introduction: Nowadays, there has been a significant increase in cases of cyberbullying on digital devices and platforms such as Facebook, Instagram, Snapchat, and TikTok.
Problem: Many state-of-the-art approaches have been introduced for the detection of cyberbullying activities. However, the affordability of high-quality data resources, along with restrictions on their access, limits the applicability of these state-of-the-art approaches.
Objective: The detection of cyberbullying activities is of societal importance and has gained increasing prominence in research.
Methodology: In this paper, we explored convolutional neural networks for cyberbullying detection (CNN-CBD) architecture for the classification task and reported their performance on real-world databases such as Twitter, Wikipedia, and Formspring. We also compared the CNN-CBD performance with baseline machine learning (ML) models. Various issues regarding the handling of real-world databases and the selection of the most suitable deep neural network (DNN) model are reported and discussed in detail.
Results: Experiments showed that the proposed CNN-CBD model outperformed traditional ML algorithms in cyberbullying detection, achieving an accuracy of 97%.
Conclusions: We concluded that the proposed CNN-CBD model outperformed the existing baseline models.

Keywords: Deep learning, cyberbullying, social media, CNN-CBD, neural networks

How to Cite

[1]
S. Pericharla and S. Balakrishna, “Investigation of deep neural network architecture for cyberbullying detection over social media”, ing. Solidar, vol. 21, no. 3, pp. 1–23, Feb. 2026, doi: 10.16925/2357-6014.2025.03.01.

[1] R. Shetgiri, “Bullying and victimization among children,” Advances in Pediatrics, vol. 60, no. 1, pp. 33–51, jul. 2013. DOI: https://doi.org/10.1016/j.yapd.2013.04.004

[2] D. Halpern, M. Piña y J. Vásquez, “Loneliness, personal and social well-being: Towards a conceptualization of the effects of cyberbullying / Soledad, bienestar social e individual: hacia una conceptualización de los efectos del cyberbullying,” Cultura y Educación, vol. 29, no. 4, pp. 703–727, 2017. DOI: https://doi.org/10.1080/11356405.2017.1370818

[3] S. Balakrishna, Y. Gopi y V. K. Solanki, “Comparative analysis on deep neural network models for detection of cyberbullying on social media,” Ingeniería Solidaria, vol. 18, no. 1, pp. 1–33, 2022. DOI: https://doi.org/10.16925/2357-6014.2022.01.05

[4] U. Bretschneider, T. Wöhner y R. Peters, “Detecting online harassment in social networks,” en Proc. 35th Int. Conf. on Information Systems, 2014, pp. 1–14.

[5] J. Bayzick, A. Kontostathis y L. Edwards, “Detecting the presence of cyberbullying using computer software,” 2011, pp. 1–2.

[6] K. Reynolds, A. Kontostathis y L. Edwards, “Using machine learning to detect cyberbullying,” en Proc. 10th Int. Conf. on Machine Learning and Applications (ICMLA), vol. 2, dic. 2011, pp. 241–244, doi:10.1109/ICMLA.2011.152. DOI: https://doi.org/10.1109/ICMLA.2011.152

[7] J. Xu, K. Jun, X. Zhu y A. Bellmore, “Learning from bullying traces in social media,” en Proc. Assoc. for Computational Linguistics: Human Language Technologies, 2012, pp. 656–666.

[8] A. Kontostathis, L. Edwards y A. Leatherman, “Text mining and cybercrime,” en Text Mining: Applications and Theory. Hoboken, NJ, EE. UU.: Wiley, 2010, pp. 1–14. DOI: https://doi.org/10.1002/9780470689646.ch8

[9] J. Xu, K. Jun, X. Zhu y A. Bellmore, “Learning from bullying traces in social media,” en Proc. Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2012, pp. 656–666.

[10] C. Van Hee et al., “Detection and fine-grained classification of cyber-bullying events,” en Proc. Int. Conf. on Recent Advances in Natural Language Processing (RANLP), 2015, pp. 672–680.

[11] R. Salsabila, R. Sarno, I. Ghozali y K. R. Sungkono, “Improving cyberbullying detection through multi-level machine learning,” International Journal of Emerging Trends in Engineering Research, vol. 14, no. 2, 2024. DOI: https://doi.org/10.11591/ijece.v14i2.pp1779-1787

[12] P. Yi y A. Zubiaga, “D-XCB: Data-independent debiasing for fair and accurate transformer-based cyberbullying detection,” arXiv preprint arXiv:2402.16458, feb. 2024. DOI: https://doi.org/10.1609/icwsm.v19i1.35924

[13] K. Maity, R. Jain, P. Jha y S. Saha, “Explainable cyberbullying detection in Hinglish: A generative approach,” IEEE Transactions on Computational Social Systems, 2023. DOI: https://doi.org/10.1109/TCSS.2023.3333675

[14] A. Almomani et al., “Image cyberbullying detection and recognition using transfer deep machine learning,” International Journal of Cognitive Computing in Engineering, vol. 5, pp. 14–26, 2023. DOI: https://doi.org/10.1016/j.ijcce.2023.11.002

[15] H. Saini, H. Mehra y R. Rani, “Enhancing cyberbullying detection: A comparative study of ensemble CNN–SVM and BERT models,” Social Network Analysis and Mining, vol. 14, no. 1, 2023. DOI: https://doi.org/10.1007/s13278-023-01158-w

[16] R. Kumar y B. Bhat, “A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media,” International Journal of Information Security, vol. 21, pp. 1409–1431, 2022. DOI: https://doi.org/10.1007/s10207-022-00600-y

[17] M. Dadvar, D. Trieschnigg, R. Ordelman y F. de Jong, “Improving cyberbullying detection with user context,” 2015, pp. 2–5.

[18] H. Hosseinmardi et al., “Detection of cyberbullying incidents on the Instagram social network,” 2014. DOI: https://doi.org/10.1007/978-3-319-27433-1_4

[19] V. Nahar, S. Al-Maskari, X. Li y C. Pang, “Semi-supervised learning for cyberbullying detection in social networks,” en Proc. Australasian Database Conf., 2014, pp. 160–171. DOI: https://doi.org/10.1007/978-3-319-08608-8_14

[20] J. M. Hilbe, Logistic Regression Models. Boca Raton, FL, EE. UU.: CRC Press, 2009. DOI: https://doi.org/10.1201/9781420075779

[21] Y. W. Chang y C. J. Lin, “Feature ranking using linear SVM,” en Causation and Prediction Challenge, dic. 2008, pp. 53–64.

[22] J. R. Quinlan, “Simplifying decision trees,” International Journal of Man–Machine Studies, vol. 27, no. 3, pp. 221–234, sep. 1987. DOI: https://doi.org/10.1016/S0020-7373(87)80053-6

[23] B. Xu, X. Guo, Y. Ye y J. Cheng, “An improved random forest classifier for text categorization,” Journal of Computers, vol. 7, no. 12, pp. 2913–2920, 2012. DOI: https://doi.org/10.4304/jcp.7.12.2913-2920

[24] S. Tan, “An effective refinement strategy for KNN text classifier,” Expert Systems with Applications, vol. 30, no. 2, pp. 290–298, 2006. DOI: https://doi.org/10.1016/j.eswa.2005.07.019

[25] A. M. Kibriya, E. Frank, B. Pfahringer y G. Holmes, “Multinomial naive Bayes for text categorization revisited,” en Proc. Australasian Joint Conf. on Artificial Intelligence. Berlín, Alemania: Springer, dic. 2004, pp. 488–499. DOI: https://doi.org/10.1007/978-3-540-30549-1_43

[26] M. Zareapoor y P. Shamsolmoali, “Application of credit card fraud detection based on bagging ensemble classifier,” Procedia Computer Science, vol. 48, pp. 679–685, 2015. DOI: https://doi.org/10.1016/j.procs.2015.04.201

[27] M. A. Al-Ajlan y M. Ykhlef, “A deep learning algorithm for cyberbullying detection,” International Journal of Advanced Computer Science and Applications, no. 9, 2018. DOI: https://doi.org/10.14569/IJACSA.2018.090927

[28] F. Chollet, “Keras,” GitHub, 2015. [En línea]. Disponible en: https://github.com/fchollet/keras

[29] F. Pedregosa et al., “Scikit-learn: Machine learning in Python,” Journal of Machine Learning Research, vol. 12, pp. 2825–2830, nov. 2011.

[30] M. Abadi et al., “TensorFlow: A system for large-scale machine learning,” en Proc. 12th USENIX Symp. on Operating Systems Design and Implementation (OSDI’16), 2016, pp. 265–283.

[31] Y. Bengio, R. Ducharme, P. Vincent y C. Jauvin, “A neural probabilistic language model,” Journal of Machine Learning Research, vol. 3, pp. 1137–1155, feb. 2003.

[32] C. Emmery et al., “Current limitations in cyberbullying detection: On evaluation criteria, reproducibility, and data scarcity,” arXiv preprint arXiv:1910.11922, 2019.

MÉTRICAS
ARTICLE VIEWS: 44
PDF VIEWS: 41