[1] Semiu Salawu,Yulan He,Joanna Lumsden.Approaches to automated detection of cyberbullying:A survey[J].IEEE Transactions on Affective Computing,2017,99(10):1-10.
[2] Cheng L,Li J,Silva Y,et al.PI-bully:personalized cyberbullying detection with peer influence[A].The International Joint Conference on Artificial Intelligence[C].Palo Alto:AAAI,2019.5829-5835.
[3] Dani H,Li J,Liu H.Sentiment informed cyberbullying detection in social media[A].The European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases[C].Cham:Springer,2017.52-67.
[4] Olweus D.Aggressive Behavior‖Bullying at School[M].Boston,MA:Springer,1994.97-130.
[5] Tokunaga R S.Following you home from school:a critical review and synthesis of research on cyberbullying victimization[J].Computersin Human Behavior,2010,26(3):277-287.
[6] 杨坤玉.青少年网络欺凌行为介入模式的GAM探索[D].兰州:兰州大学哲学,2017.
[7] Wong R Y M,Cheung C M K,Xiao B.Does gender matter in cyberbullying perpetration?An empirical investigation[J].Computers in Human Behavior,2018,79(2):247-257.
[8] Schneider S K,O'donnell L,Stueve A,et al.Cyberbullying,school bullying,and psychological distress:a regional census of high school students[J].American Journal of Public Health,2012,102(1):171-177.
[9] Kowalski R M,Limber S P.Electronic bullying among middle school students[J].Journal of Adolescent Health,2007,41(6):S22-S30.
[10] Slonje R,Smith P K.Cyberbullying:another main type of bullying?[J].Scandinavian Journal of Psychology,2008,49(2):147-154.
[11] Brewer G,Kerslake J.Cyberbullying,self-esteem,empathy and loneliness[J].Computers in Human Behavior,2015,48(1):255-260.
[12] 刘琳.中学生传统欺凌、网络欺凌及其与自尊的关系[D].沈阳:沈阳师范大学,2014.
[13] 苑广哲.大学生大五人格和网络欺凌行为的关系:自我控制的中介作用[D].南京:南京师范大学,2017.
[14] Goodboy A K,Martin M M.The personality profile of a cyberbully:examining the dark triad[J].Computers in Human Behavior,2015,49(4):1-4.
[15] 杨继平,王兴超,高玲.道德推脱对大学生网络偏差行为的影响:道德认同的调节作用[J].心理发展与教育,2015,31(3):311-318.
[16] Winterich K P,Aquino K,Mittal V,et al.When moral identity symbolization motivates prosocial behavior:the role of recognition and moral identity internalization[J].Journal of Applied Psychology,2013,98(5):759.
[17] Zhou Z,Tang H,Tian Y,et al.Cyberbullying and its risk factors among Chinese high school students[J].School Psychology International,2013,34(6):630-647.
[18] Yang X,Wang Z,Chen H,et al.Cyberbullying perpetration among Chinese adolescents:the role of interparental conflict,moral disengagement,and moral identity[J].Children and Youth Services Review,2018,86:256-263.
[19] Zhong H,Li H,Squicciarini A C,et al.Content-driven detection of cyberbullying on theInstagram social network[A].The International Joint Conference on Artificial Intelligence[C].Palo Alto:AAAI Press,2016.3952-3958.
[20] Haidar B,Chamoun M,Yamout F.Cyberbullying detection:a survey on multilingual techniques[A].The European Modelling Symposium on Computer Modelling and Simulation[C].New York:IEEE,2016.165-171.
[21] Dinakar K,Reichart R,Lieberman H.Modeling the detection of textual cyberbullying[A].The International Conference on Weblogs and Social Media[C].CA:AI Access Foundation,2011.11-17.
[22] Pérez P J C,Valdez C J L,Ortiz M G C,et al.MISAAC:Instant messaging tool for cyberbullying detection[A].The International Conference on Artificial Intelligence[C].Las Vegas:CSREA Press,2012.1-4.
[23] Kontostathis A,Reynolds K,Garron A,et al.Detecting cyberbullying:query terms and techniques[A].The Annual Web Science Conference[C].New York:ACM,2013.195-204.
[24] Bretschneider U,Wöhner T,Peters R.Detecting online harassment in social networks[A].The International Conference on Information Systems[C].Auckland:AIS,2014.1-14.
[25] Dadvar M,Trieschnigg D,de Jong F.Experts and machines against bullies:a hybrid approach to detect cyberbullies[A].The Canadian Conference on Artificial Intelligence[C].Cham:Springer,2014.275-281.
[26] Dadvar M,Trieschnigg R B,de Jong F M G.Expert knowledge for automatic detection of bullies in social networks[A].The Benelux Conference on Artificial Intelligence[C].Delft:University of Groningen Press,2013.57-64.
[27] Wulczyn E,Thain N,Dixon L.Ex machina:Personal attacks seen at scale[A].The International World Wide Web Conference[C].New York:ACM,2017.1391-1399.
[28] Zhao R,Mao K.Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder[J].IEEE Transactions on Affective Computing,2016,8(3):328-339.
[29] Yin D,Xue Z,Hong L,et al.Detection of harassment on web 2.0[A].The Content Analysis in the WEB[C].New York:ACM,2009.1-7.
[30] Chavan V S,Shylaja S S.Machine learning approach for detection of cyber-aggressive comments by peers on social media network[A].The International Conference on Advances in Computing,Communications and Informatics[C].DC:IEEE,2015.2354-2358.
[31] Sood S O,Antin J,Churchill E.Using crowdsourcing to improve profanity detection[A].The AAAI Spring Symposium[C].CA:AI Access Foundation,2012.69-74.
[32] Dadvar M,Jong F M G,Ordelman R,et al.Improved cyberbullying detection using gender information[A].The Dutch-Belgian Information Retrieval Workshop[C].Ghent:Ghent University Press,2012.1-3.
[33] Al-garadi M A,Varathan K D,Ravana S D.Cybercrime detection in online communications:the experimental case of cyberbullying detection in the twitter network[J].Computers in Human Behavior,2016,63(C):433-443.
[34] Zhao R,Zhou A,Mao K.Automatic detection of cyberbullying on social networks based on bullying features[A].The International Conference on Distributed Computing and Networking[C].New York:ACM,2016.43-48.
[35] Chelmis C,Zois D S,Yao M.Mining patterns of cyberbullying on twitter[A].The International Conference on Data Mining Workshops[C].New York:IEEE,2017.126-133.
[36] Raisi E,Huang B.Cyberbullying detection with weakly supervised machine learning[A].The International Conference on Advances in Social Networks Analysis and Mining[C].New York:ACM,2017.409-416.
[37] Raisi E,Huang B.Weakly supervised cyberbullying detection with participant-vocabulary consistency[J].Social Network Analysis and Mining,2018,8(1):38-53.
[38] Serra S M,Venter H S.Mobile cyber-bullying:a proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness[A].The Conference on Information Security for South Africa[C].IEEE Computer Society,2011.1-5.
[39] Founta A M,Chatzakou D,Kourtellis N,et al.A unified deep learning architecture for abuse detection[A].The Conference on Web Science[C].New York:ACM,2019.105-114.
[40] Pitsilis G K,Ramampiaro H,Langseth H.Detecting Offensive Language in Tweets Using Deep Learning[DB/OL].https://arxiv.org/abs/1801.04433,2018-08-16/2019-11-28.
[41] Ptaszynski M,Eronen J K K,Masui F.Learning deep on cyberbullying is always better than brute force[A].The Linguistic and Cognitive Approaches to Dialog Agents Workshop[C].Aachen:CEUR-WS,2017.19-25.
[42] Agrawal S,Awekar A.Deep learning for detecting cyberbullying across multiple social media platforms[A].The European Conference on Information Retrieval[C].Cham:Springer,2018.141-153.
[43] Bosse T,Stam S.A normative agent system to prevent cyberbullying[A].The International Conference on Intelligent Agent Technology[C].DC:IEEE,2011.425-430.
[44] Reynolds K,Kontostathis A,Edwards L.Using machine learning to detect cyberbullying[A].The 10th International Conference on Machine Learning and Applications[C].New York:IEEE,2011.241-244.
[45] Bayzick J,Kontostathis A,Edwards L.Detecting the presence of cyberbullying using computer software[A].Web Science Conference[C].New York:ACM,2011.93-96.
[46] Hosseinmardi H,Ghasemianlangroodi A,Han R,et al.Towards understanding cyberbullying behavior in a semi-anonymous social network[A].The International Conference on Advances in Social Networks Analysis and Mining[C].DC:IEEE,2014.244-252.
[47] Hosseinmardi H,Mattson S A,Rafiq R I,et al.Analyzing labeled cyberbullying incidents on the instagram social network[A].The International Conference on Social Informatics[C].Cham:Springer,2015.49-66.
[48] Rafiq R I,Hosseinmardi H,Han R,et al.Careful what you share in six seconds:Detecting cyberbullying instances in vine[A].The International Conference on Advances in Social Networks Analysis and Mining[C].New York:ACM,2015.617-622.
[49] Sui J.Understanding andFighting Bullying with Machine Learning[D].USA WI:The Univ of Wisconsin-Madison,2015.
[50] Bretschneider U,Peters R.Detecting cyberbullying in online communities[A].The European Conference on Information Systems[C].Istanbul:AIS,2016.61-74.
[51] Chatzakou D,Kourtellis N,Blackburn J,et al.Mean birds:Detecting aggression and bullying on Twitter[A].The Web Science Conference[C].New York:ACM,2017.13-22.
[52] Rezvan M,Shekarpour S,Balasuriya L,et al.A quality type-aware annotated corpus and lexicon for harassment research[A].The Conference on Web Science[C].New York:ACM,2018.33-36.
[53] Founta A M,Djouvas C,Chatzakou D,et al.Large scale crowdsourcing and characterization of twitter abusive behavior[A].The AAAI Conference on Web and Social Media[C].Palo Alto:AAAI,2018.491-500.
[54] Cheng L,Li J,Silva Y N,et al.Xbully:cyberbullying detection within a multi-modal context[A].The International Conference on Web Search and Data Mining[C].New York:ACM,2019.339-347. |