{"id":"https://openalex.org/W7124145569","doi":"https://doi.org/10.1109/codit66093.2025.11321840","title":"Cyber-Troll Detection using Deep Learning and NLP: A Comparative Study","display_name":"Cyber-Troll Detection using Deep Learning and NLP: A Comparative Study","publication_year":2025,"publication_date":"2025-07-15","ids":{"openalex":"https://openalex.org/W7124145569","doi":"https://doi.org/10.1109/codit66093.2025.11321840"},"language":null,"primary_location":{"id":"doi:10.1109/codit66093.2025.11321840","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit66093.2025.11321840","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 11th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123053600","display_name":"Djibrim Mahaman Tahir M. Atto","orcid":null},"institutions":[{"id":"https://openalex.org/I166928557","display_name":"University of Monastir","ror":"https://ror.org/00nhtcg76","country_code":"TN","type":"education","lineage":["https://openalex.org/I166928557"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Djibrim Mahaman Tahir M. Atto","raw_affiliation_strings":["University of Monastir,Faculty of Science,Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Monastir,Faculty of Science,Tunisia","institution_ids":["https://openalex.org/I166928557"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037252341","display_name":"Jaouhar Fattahi","orcid":"https://orcid.org/0000-0002-3905-9099"},"institutions":[{"id":"https://openalex.org/I43406934","display_name":"Universit\u00e9 Laval","ror":"https://ror.org/04sjchr03","country_code":"CA","type":"education","lineage":["https://openalex.org/I43406934"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jaouhar Fattahi","raw_affiliation_strings":["Laval University,Department of Computer Science and Software Engineering,Quebec,Canada"],"affiliations":[{"raw_affiliation_string":"Laval University,Department of Computer Science and Software Engineering,Quebec,Canada","institution_ids":["https://openalex.org/I43406934"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103270186","display_name":"Mohamed Mejri","orcid":"https://orcid.org/0000-0002-0455-7880"},"institutions":[{"id":"https://openalex.org/I43406934","display_name":"Universit\u00e9 Laval","ror":"https://ror.org/04sjchr03","country_code":"CA","type":"education","lineage":["https://openalex.org/I43406934"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohamed Mejri","raw_affiliation_strings":["Laval University,Department of Computer Science and Software Engineering,Quebec,Canada"],"affiliations":[{"raw_affiliation_string":"Laval University,Department of Computer Science and Software Engineering,Quebec,Canada","institution_ids":["https://openalex.org/I43406934"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061867528","display_name":"Brahim Hnich","orcid":"https://orcid.org/0000-0001-8875-8390"},"institutions":[{"id":"https://openalex.org/I166928557","display_name":"University of Monastir","ror":"https://ror.org/00nhtcg76","country_code":"TN","type":"education","lineage":["https://openalex.org/I166928557"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Brahim Hnich","raw_affiliation_strings":["University of Monastir,Faculty of Science,Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Monastir,Faculty of Science,Tunisia","institution_ids":["https://openalex.org/I166928557"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115025126","display_name":"Abdoul Majid O. Thiombiano","orcid":null},"institutions":[{"id":"https://openalex.org/I166928557","display_name":"University of Monastir","ror":"https://ror.org/00nhtcg76","country_code":"TN","type":"education","lineage":["https://openalex.org/I166928557"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Abdoul Majid O. Thiombiano","raw_affiliation_strings":["University of Monastir,Faculty of Science,Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Monastir,Faculty of Science,Tunisia","institution_ids":["https://openalex.org/I166928557"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5123053600"],"corresponding_institution_ids":["https://openalex.org/I166928557"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85910048,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.5045999884605408,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.5045999884605408,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.24770000576972961,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.1324000060558319,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7587000131607056},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.40869998931884766},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4065999984741211},{"id":"https://openalex.org/keywords/moderation","display_name":"Moderation","score":0.3862000107765198},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.361299991607666},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.33000001311302185}],"concepts":[{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7587000131607056},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7522000074386597},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.743399977684021},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5059000253677368},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.40869998931884766},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4065999984741211},{"id":"https://openalex.org/C93225998","wikidata":"https://www.wikidata.org/wiki/Q1941972","display_name":"Moderation","level":2,"score":0.3862000107765198},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.361299991607666},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.33000001311302185},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3098999857902527},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3050999939441681},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2935999929904938},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.2718999981880188},{"id":"https://openalex.org/C97385483","wikidata":"https://www.wikidata.org/wiki/Q16954980","display_name":"Deep belief network","level":3,"score":0.2644999921321869},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.25450000166893005},{"id":"https://openalex.org/C11671645","wikidata":"https://www.wikidata.org/wiki/Q5054567","display_name":"Causal model","level":2,"score":0.25360000133514404}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/codit66093.2025.11321840","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit66093.2025.11321840","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 11th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6439490914344788,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1832693441","https://openalex.org/W2064675550","https://openalex.org/W2250539671","https://openalex.org/W2265846598","https://openalex.org/W2340954483","https://openalex.org/W2519091744","https://openalex.org/W2588334501","https://openalex.org/W2595653137","https://openalex.org/W2788708648","https://openalex.org/W2950635152","https://openalex.org/W2962784628","https://openalex.org/W2963341956","https://openalex.org/W3196061737","https://openalex.org/W3201648943","https://openalex.org/W4213311630","https://openalex.org/W4296047714","https://openalex.org/W4297324389","https://openalex.org/W4318320799","https://openalex.org/W4402690141","https://openalex.org/W4403534815"],"related_works":[],"abstract_inverted_index":{"The":[0],"proliferation":[1],"of":[2,21,38,48,116,126],"malicious":[3],"online":[4,14,137],"behaviors,":[5],"particularly":[6],"cyber-trolling,":[7],"presents":[8],"significant":[9],"challenges":[10],"to":[11,60,108,123],"maintaining":[12,133],"healthy":[13],"communities.":[15],"This":[16,120],"paper":[17],"investigates":[18],"the":[19,35,72,77,83,101,113,124],"efficacy":[20],"four":[22],"deep":[23],"learning":[24],"architectures-BERT,":[25],"LSTM,":[26],"GRU,":[27],"and":[28,65,111,129],"Causal":[29,84],"Convolutional":[30],"Networks":[31],"(Causal":[32],"Conv":[33,85],"1D)-for":[34],"automatic":[36],"detection":[37,110],"cyber-trolls":[39],"based":[40],"on":[41,57],"textual":[42],"content.":[43],"Using":[44],"a":[45],"comprehensive":[46],"dataset":[47],"50,000":[49],"social":[50],"media":[51],"comments,":[52],"we":[53],"evaluate":[54],"these":[55],"models":[56],"their":[58],"ability":[59],"distinguish":[61],"between":[62],"normal":[63],"users":[64],"trolls.":[66],"Our":[67],"results":[68],"indicate":[69],"that":[70,104],"while":[71],"pre-trained":[73],"BERT":[74],"model":[75],"achieves":[76],"highest":[78],"overall":[79],"accuracy":[80],"($94.2":[81],"\\%$),":[82],"1D":[86],"architecture":[87],"demonstrates":[88],"competitive":[89],"performance":[90],"$(92.7":[91],"\\%)$":[92],"with":[93],"significantly":[94],"lower":[95],"computational":[96],"requirements.":[97],"We":[98],"also":[99],"analyze":[100],"semantic":[102],"features":[103],"most":[105],"effectively":[106],"contribute":[107],"troll":[109],"discuss":[112],"ethical":[114],"implications":[115],"automated":[117],"moderation":[118],"systems.":[119],"research":[121],"contributes":[122],"development":[125],"more":[127],"efficient":[128],"effective":[130],"methods":[131],"for":[132],"civil":[134],"discourse":[135],"in":[136],"spaces.":[138]},"counts_by_year":[],"updated_date":"2026-01-16T23:16:36.188383","created_date":"2026-01-15T00:00:00"}
