• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Cyberbullying and Cyberviolence Detection: A Triangular User-Activity-Content View

    2022-08-13 02:08:14ShuwenWangXingquanZhuWeipingDingandAmirAlipourYengejeh
    IEEE/CAA Journal of Automatica Sinica 2022年8期
    關(guān)鍵詞:市經(jīng)肇慶市肇慶

    Shuwen Wang, Xingquan Zhu,, Weiping Ding,, and Amir Alipour Yengejeh

    Abstract—Recent years have witnessed the increasing popularity of mobile and networking devices, as well as social networking sites, where users engage in a variety of activities in the cyberspace on a daily and real-time basis. While such systems provide tremendous convenience and enjoyment for users,malicious usages, such as bullying, cruelty, extremism, and toxicity behaviors, also grow noticeably, and impose significant threats to individuals and communities. In this paper, we review computational approaches for cyberbullying and cyberviolence detection, in order to understand two major factors: 1) What are the defining features of online bullying users, and 2) How to detect cyberbullying and cyberviolence. To achieve the goal, we propose a user-activities-content (UAC) triangular view, which defines that users in the cyberspace are centered around the UAC triangle to carry out activities and generate content. Accordingly,we categorize cyberbully features into three main categories: 1)User centered features, 2) Content centered features, and 3)Activity centered features. After that, we review methods for cyberbully detection, by taking supervised, unsupervised, transfer learning, and deep learning, etc., into consideration. The UAC centered view provides a coherent and complete summary about features and characteristics of online users (their activities),approaches to detect bullying users (and malicious content), and helps defend cyberspace from bullying and toxicity.

    I. INTRODUCTION

    BULLYING is an aggressive and intentional act or behavior frequently conducted by one or a group of individuals against a victim, who often cannot defend him/herself[1]. Bullying can be carried out in many types of forms such as verbal bullying, physical attack, sexual humiliate, social isolation, psychological torment [2]. Cyberbullying is another evolution method from direct physical bullying to electronic devices, i.e., in a cyberspace [3]. National Crime Prevention Council defines cyberbullying as “similar to other types of bullying, except it takes place online and through text messages sent to cell phones. Cyberbullies can be classmates,online acquaintances, and even anonymous users, but most often they do know their victims [4]”. Similar definitions have also been found in several other related online incidents, such as cyberstalking, cyberharassment, online cruelty, or online cruelty in general [3], [5]. In many occasions, online cruelty is also referred to as cyberbullying [3], however, some research considers cyberbullying being part of online cruelty activities.Other online forms of digital activities such as online harassment and online sexual harassment should also be considered as online cruelty [5].

    A. Cyberbullying vs. Cyberviolence

    Cyberviolence is another term relevant but different from cyberbullying. A key difference between them is that the former targets on a group of individuals with strong political preference, whereas the latter is more focused on individuals,as shown in Fig. 1. A categorization and comparison between cyberbullying and cyberviolence are also summarized in Table I.

    Fig. 1. A simple comparison between Cyberbullying and Cyberviolence w.r.t. targeted audience and political polarization.

    In this paper, we consider online cruelty activities along with cyberharassment and cyberstalking part of cyberbullying.Cyberharassment, in general, refers to online interpersonal attacks which occur repetitively, intrusively and provokes anxiety [6]. Cyberstalking is to stalk or harass an individual,group or organization with electronic equipment [7], [8].

    Online extremism, online hate speech and online radicalization are forms of cyberviolence. Online extremism is an express of extreme views of hatred toward some group usinginternet technologies to “advocate violence against, separation from, defamation of, deception about or hostility towards others” [9]–[11]. Online hate speech is an expression of conflict between different groups within and between societies based on race, religion, ethnicity, sexual orientation, disability, or gender. Radicalization is a process in which individuals or groups oppose the political, social, or religious status with increasingly radical views. There exists a strong dependency between cyberbullying and digital media such as hurtful images and comments where those contents can remain online accessible to public before they are reported and deleted. The explosive development of Internet technologies provides people more and more opportunities to be exposed to online information, from daily life to social interaction.

    TABLE I SUMMARY OF CYBERBULLYING AND CYBERVIOLENCE

    Although a large number of audience and users are attracted by continuous and immediate online social media which prompts the wide, quick spread of online contents, due to identification difficulty and loose supervision of the overall internet environment, cyberbullying has become unscrupulous among which, some even mislead to cybercrime, and hate speech. One of the most distinguishing features of cyberbullying is that victims can hardly find an effective solution to get away from it. In other words, even a one time bullying action can lead to continuous ridicule and humiliation for victims,which is possible to result in feelings of powerlessness for the victims. Besides, because of the anonymity feature of cyberbullying, failing to recognize the identity of bully increases feeling of frustration and powerlessness of the victims.According to National Center for Education Statistics, among students ages 12?18 who reported being bullied at school during the school year, 15% were bullied online or by text[12]. Victims of cyberbullying generally develop certain psychological problems such as anxiety, depression, poor performance or committing suicide. Therefore, early cyberbullying detection becomes the utmost important.

    B. Computational Approaches for Cyberbullying Detection

    Computational approaches, such as machine learning, have been used for automatic detection of cyberbullying, and a general framework used by these methods is summarized in Fig. 2. Online social networks contain useful information from user posts, interactions, etc. Those information can be extracted as features which will then be fed into models to learn and make prediction. One typical way of currently existing studies is using machine learning classifier, combined with text mining, as supervised learning approach in social media[13], [14]. For example, Random Forest is used based on user personality features decided by Big Five and Dark Triad models for Twitter cyberbullying detection and achieves up to 96% precision [15]. Deep learning models bidirectional long short-term memory (BLSTM), gated recurrent units (GRU),long short-term memory (LSTM), and recurrent neural network (RNN) are applied in detecting insults in Social Commentary and their results indicate that deep learning models are more effective when compared with other traditional methods [16].

    Fig. 2. A conceptual view of computational framework for Cyberviolence and Cyberbullying detection.

    Many methods exist for cyberbullying detection. While technical solutions vary, these approaches often face and address similar challenges. First of all, due to the limitations of social media, adequate and informative data collection cannot be guaranteed and users can modify, delete their social media content at any time, which means data availability changes with time. Traditional data cleansing methods may mistakenly filter out important information, which will hurt the ability of machine learning models to discriminate bullying and normal expressions. Besides, unstructured content can be found in multiple language formats and styles, which is often grammatically inaccurate. Another common challenge is that cyberbullying content is quite rare and only limited amount of cyberbullying will be found even in large datasets,which poses a great challenge for traditional machine learning models.

    C. Existing Survey, Difference, Contributions

    Fig. 3. The systematic literature review process of the proposed study.

    A handful of survey already exist to focus on cyberbullying detection from different perspectives. Techniques utilized in the field are briefly summarized as two categories, machine learning methods and natural language processing (NLP)methods [17]. A survey of the main algorithms for text mining with a focus on cyberbullying detection is proposed in which the most common methods such as vector space modelling are discussed [18]. Supervised learning, lexicon-based, rulebased, and mixed-initiative classes are proposed in order to categorize approaches used for cyberbullying detection and features in those reviewed papers are separated into four main groups, content-, sentiment-, user- and network-based features[19]. Challenges ranging from definition of cyberbullying,collecting data, feature selection and model selection are surveyed and suggestions for tackling those limitations are proposed in a survey on automated cyberbullying detection[20].

    Although cyberbullying research has received increasing attention for more than a decade, majority of the current survey papers focus on introducing methods used and certain general feature categorization, which is limited to provide detailed, precisely instructions for researchers and practitioners in the field. Many key questions remain unanswered. For example, what is the source of information for cyberbullying detection? What are the essential components of cyberbullying detection and how do these components interplay with each other? Finally, what are available approaches for cyberbullying detection?

    Motivated by the above, in this paper, we propose a triangular user-activity-content view of cyberbullying detection. The unique view defines that users in the cyberspace are centered around this triangle to carry out activities and generate content. The interplay between these three factors(users, activities, and content) essentially sheds the light for designing cyberbullying detection algorithms. Following this triangular view, we further review methods for cyberbully detection, by taking supervised, unsupervised, transfer learning, and deep learning, etc., into consideration. In addition to the introduction of these approaches, we also explain how they focus on different types of features and the common combinations of different types of features, with respect to the proposed UAC triangular view.

    D. Literature Review Process

    To ensure comprehensiveness and completeness, we carried out a literature search strategy to collect papers and set up a selection criterion to choose final reference for this report. Edatabases of IEEE Xplore, Science Direct, PubMed, Google scholar and arXiv were explored in order to collect adequate literature. Snowball sampling method was conducted from the reference of chosen studies to find more related papers. At first, we used keywords like Cyberviolence detection, Cyberbullying, Cyberbullying detection, Cyberbullying prediction to search records. The original research did not bring us enough papers, therefore, we expanded research with more keywords,like Online cruelty, Cyber-harassment, Cyber-stalking, Online extremism, Online hate speech and Online radicalization.Papers containing the above mentioned keywords in tile,abstract, keywords and published in English language are included in our final paper resource. Studies from short paper summaries, magazines, non-machine learning methods are included, incomplete studies or those not published in English language are excluded in this research. The complete selection process of reviewed articles in this research is as shown in Fig. 3. Table II reports the number of papers selected in the review study.

    II. USER-ACTIVITY-CONTENT TRIANGLE

    In cyberspace, the impact of cyberbullying and other harmful materials/activities are facilitated through three major parties: User, Activity and Content, which form a UAC triangle. Fig. 4 shows the relationship between User, Activity and Content. A user is the main part of cyberbullying who carries out activities and form interactions with him/herself and other users. The content produced from user activities is the consequence causing people to suffer from cyberbullyingand affecting subsequent user activities. Despite the actual forms of online harmful activities, e.g., texts, images, symbols, slang, etc., they are always around this UAC triangle.

    TABLE II SUMMARY OF FINAL PAPER NUMBERS FOR REVIEW STUDY

    Fig. 4. The proposed UAC triangle to characterize relationships between users, user activities, and content generated by users.

    Using UAC triangular view, we can further understand the difference between cyberbullying and cybervoilence, as summarized in Table I. Cyberviolence is similar to cyberbullying, but unlike cyberbullying the majority of which happen between individuals (both the activity initiator and target). In most scenarios, online extremist, online hate speech and online radicalization are started by a group of people and aim the abuse at a collective identity for example, specific groups.Once the activity is initiated, the interaction between activity conductor and victims in cyberbullying is more frequent than that in cyberviolence. In general, cyberbullying conductors are aware of their behavior as well as the possible results of them,however, cyberviolence materials are usually considered as educational rather than offensive [11], [21]. In addition, as indicated in our table, cyberviolence activities usually have stronger political overtones as shown in Fig 1. than cyberbullying because the objective of them is trying to spread their beliefs, ideas and alter others’ belief. Most cyberviolence activities do not directly promote violence, and exposure does not necessarily cause trauma or other adverse effects [22]. On the contrary, both mental and physical damage can be observed immediately from cyberbullying victims. Based on the UAC triangle, we propose a cyberbullying feature taxonomy in Fig. 5, where features commonly used in cyberbullying are categorized into three groups, User feature, Activity feature, and Content feature.

    III. USER-CENTERED FEATURES

    User centered features include three main aspects, demographics, behaviors, and physiologic, in an increasing level of intelligence. In an ideal case, such features can help characterize users by answering: who are the authors (gender,locations, etc.), what are their behaviors (online active/inactive, etc.), and what are their personality traits (extroversion/openness, etc.). Table III summarize main user-centered features, including sub-features, strength and weakness of these features.

    A. Demographic

    Demographic features or user characteristics can be defined as one’s personal information such as gender, age, race,education level and profession on the social platforms which usually can be found from user account profile. For online social networks, user profile is a collection of information associated with a user which includes key information used to identify individuals, such as name, portrait photos, number of followers. User profiles most often appear on social media sites such as Facebook, Instagram, and LinkedIn; they serve as individuals’ voluntary digital identities, highlighting their main characteristics and characteristics. Such personal profile information is used as the basis for grouping users, sharing content, and recommending or introducing people who are engaged with direct interaction [23]. However, their reliability has caused major concern because social networks allow individuals to create unlimited personal profiles, making it easy to create false or inconsistent personal information.

    To find out relationship between user profile and cyberbullying, the number of following and followers are integrated as profile feature and the result proves that fake user file is one of the main factors causing cyberbullying because users with fake profiles usually pretend as someone else in order to attack and offend others [24]. User influence in the spreading of cyberbullying is studied to find out how much the contribution the number of followers and friends of a user in Tweeter will be by posting a thread comment by the user.Based on the results, user profile feature is regarded as informative in cyberbullying detection [25]–[27]. Valuable user basic information can be provided by demographic features and using these information can differentiate or compare the behavioral patterns of users based on a group that belong to.Studies have argued that it is common to observe various cyberbullying prevalence rates among different population groups [28]. Study points out that sexual orientation is strongly related with cyberbullying victimization and LGBT identification suffers a higher rate of cyberbullying [29].

    The most commonly used demographic features are gender,age, race/ethnicity, sexual orientation, socioeconomic status,profession, education level, marital status. Dadvaret al.[30]investigated the role of a gender-based feature for extracting the cyberbullying on MySpace dataset. Their first observation shows that the frequency of using unpleasant words among female and males are significantly different. For example,female used to express the profanity words indirectly or in the implicit vein. Thus, SVM classifier is used to confirm that the incorporation of gender-based feature can improve the accuracy of cyberbullying detection. A close tie between age and cyberbullying is realized which means people’s attitude would change over time. Their meta-analysis method represented that cyberbullying can increase among the boys particularly as they start the high school, and goes down as they get older [31]. Gender-based language, age-based language and user location features are added into a semisupervised learning for cyberbullying detection with a fuzzy SVM algorithm. The evaluation conducted on different scenarios shows the performance improvement of the proposed fuzzy SVM with those three features [32].

    Fig. 5. Feature taxonomy for cyberbullying detection.

    TABLE III SUMMARY OF USER-CENTERED FEATURES

    TABLE IV POPULAR POST CONTENT FOR DIFFERENT USER CATEGORIES [34]

    B. Behavior Features

    Behavior features refer to individual user activity mode which contains the information of users’ activities in online environment, such as online social network log in frequency,how long user maintains online status as well as user online language pattern. The history of user comments allows algorithms to monitor user’s activities by considering the average of context features like profane words to find out the established language pattern and further to see whether there is any usage of offensive language. Additionally, the posting behavior also allows to trace user’s reaction toward the bullying or harassing post in different online platforms [33].Through the posting behavior, for example, we can observe what would be the real reflection of one person when they have experienced a harassing post in the YouTube.

    Table IV summarizes popular topics and hashtags posted by four different groups of network users [34], [35]. Normal users prefer to talk about various topics and use different hashtags such as social problems and celebrities while inappropriate content can be found in spammers’ post, by which more attentions can be obtained from other online network users and help them to gain followers. Some sensitive issues are more discussed by bully users such as feminism and religion. Unlike normal users expressing their true feelings about popular topics, aggressor users more tend to deliver negative opinions on those topics.

    C. Psychological Features

    Psychological features are characteristics that define an individual including personality traits and behavioral characteristics. Research has shown that certain groups of people are more inclined to become perpetrators or victims of cyberbullying violence based on their personality traits. In addition, cyberbullying can threat the victims psychological and physical health. Therefore, some studies have started to extract psychological features to make early intervention or prevention of cyberbullying. One of the most comprehensive approaches to recognize personality is based on the Big Five model that describes personality traits from 5 aspects [36],[37]. The Big Five model comes from a statistical study of responses to personality items. Using a technique called factor analysis, researchers can look at people’s responses to hundreds of personality items in a test and ask the question“What is the best way to summarize a person?” [38], [39]

    As shown in Table V, extroversion defines the tendency of outgoing, sociable, interested in others, decisive, positive,caring more about external events and seeking stimulus.Agreeableness measures the tendency to be kind, friendly,gentle, get along with people, and be enthusiastic about people. Conscientiousness feature indicates how much a person care about others when making a decision. The following is called neuroticism that means the tendency to depression,fear, and moodiness. Openness shows the tendency to be creative, insightful, thoughtful, open-minded, and willing to adjust activities based on new ideas [38], [39].

    TABLE V BIG FIVE FEATURES

    Another personality model that has gained momentum in cyberbullying research is the Dark Triad, which pays more attention to the shady characteristics of users’ personalities. It refers to three different but (to others) unwelcome characteristics, namely Machiavellianism (that is, lack of empathy and the tendency to engage in impulsive and stimulus-seeking behaviors), psychosis (that is, strategically the tendency to manipulate others) and narcissism (that is, the tendency to feel superior, magnificent, and empowered) [40]. Similarly to Big Five model, participants are required to answer a series of questions so that researchers are able to calculate their scores[41]. The relationship between Dark Triad and Big Five is presented in Table VI where “–” means negative correlation between two personalities, “+” is positive relationship and “/”is no relationship [40], [42], [43]. Users personality has been linked with cyberbullying with empirical evidence. Cyberbullying detection using the Big Five found that agreeableness and conscientiousness are negatively related to cyberbullies,while extroversion and neuroticism are positively related [44],[45]. Studies exploring the relationship between cyberbullying and darker personalities (Dark Triad) have presented evidence that cyberbullying behavior appears more often with these three traits among which narcissism is found to be more linked with cyberbullying whereas psychopathy is more related to cyber-aggression [46]–[48].

    IV. ACTIVITY-CENTERED FEATURES

    Activity centered features intend to characterize user activities in order to understand how cyberbullying users (and cyberbullying content) different from normal users. Such activities are often studied from two main perspectives 1) how users interact with each others, and 2) how same users behave across temporal or spatial scales. For the former, networks are commonly used to study user interactions. For the latter,users’ activities are considered spatio-temporal, or time series,for analysis.

    A. User Interactions

    We define user interaction feature as the activities conducted between online social network users which focuses on group interaction instead of individuals.

    1) Local Interaction Feature:For online social networks,node degree which means the number of followers or friends can be a proper scale to explore the person social activity to examine their influence on one another. Users are indicated in a weighted direct graph method to detect the cyberbullying,the researchers consider the volume of interactions or conversation among the users, because they believe that the more rate of connection among nodes goes up, the more the probability of bullying would increase [54]. Similarly, pairwise influences such as edge betweeness and peer pressure are taken into consideration for cyberbullying detection because users can make influence on or be influenced by their peers bullying behavior and even follow those to become cyberbullies. They believe that the influence of a user on others is a function of the weight of social relationships of users on their proposed graphs, the time of influence, the probability that influenced user might get involved in cyberbullying, posting content from the influencer, and the social networks of both users [26].

    Fig. 6 shows common social network structure graphs. In the 1.5 ego networks (Fig. 6(a)), 1-ego is for direct and 1.5 for dash connection lines; the combined version defined for the relationships of two users A as a sender and B as a receiver; In the star network (Fig. 6(b)), the neighbors are fully disconnected, but in the near-star few of them are connected; In the clique (Fig. 6(c)), all neighbors are fully connected, but nearclique few of them are disconnected.

    Anomaly detection on multi-layer social network (ADOMS)[58] is a multi-layer method using graph mining to detect cyberbullying. The intuition behind this approach is that in the social network, we can consider users showing abnormal behavior regrading their neighbors as outliers. The study attempts to detect the outliers based on scoring the nodes compare to the predefined social networks like Clique/Nearclique or Star/Near stars to show that to some extent a node can vary from their neighbor nodes. However, since users get involved in various social networks such as Facebook,Twitter, and Instagram, their interactions are considered in different layers through multi-layer networks. In other words,an anomaly score in the individual layer is assigned for each node upon its degree similarity to the Clique/Near-clique or Star/Near stars. The ratio of followers to friends [51] can be computed as an index for users’ popularity, total number of their own and liked tweets [31] as another index for activity rate. The studies prove that closeness, betweeness, out-degreecentrality respectively can be prominent user interaction features in terms of information that provide for cyberbullying detection in Twitter users.

    TABLE VI THE RELATIONSHIP BETWEEN DARK TRIAD AND BIG FIVE

    Fig. 6. Examples of typical social network graph structures: (a) 1.5 and Combines ego-network; (b) Star and Near-star network; (c) Clique and Near-clique network.

    2) Global Interaction Feature:User global feature represents the community feature in which users are located in. User number and user connection level can be described as Vertex and Edge Counts. Cluster coefficient measures a node variety relative to the graph density and density corresponds to the ratio of the number of existing edges to the number of edges in a complete graph containing the same number of vertices. The length of the longest path in a graph is described as diameter [56]. Neighborhood Overlap is used to scale the relative position of receiver and sender users in the direct following network as an adjusted version of Jaccard’s similarity index [55]. In their research, five related measurements of neighborhood overlap are considered for a given author and target, namely Downward, Upward, Inward,Outward, and Bidirectional. Values of downward and upward measurements indicate the low and high position of sender versus receiver, while inward and outward showing the visibility.

    In Table VII, we summarize major features used to characterize user interactions, including their cyberbullying implication, advantage, and disadvantages. The local/global column indicates whether the feature(s) is intended to capture international in a local (a user and his/her surrounding) vs.global scale (the whole community).

    B. Spatio-Temporal Features

    Cyberbullying is normally not an incident occurring only once or in a distinct fashion. Rather, it can be continuous and repeated or persisted over time. Cyberbullying could be conducted on the same victims for several times and some cyberbullying victims even become the perpetrator of cyberbullying [24], [59]. To date, cyberbullying detection using temporal features still remains lots of potential as there are insufficient studies related to this specific aspect.

    In order to model temporal dynamics of cyberbullying sessions, nine temporal features, includingTime to first comment, ICI mean and variance, ICI coefficient of variation,Number of bursts (Commenting behavior trend), and Amountof total activity and its average, are applied to statistically differentiate the bullying and non-bullying comments [60].They use a function δ (t) to denote the number of comments at a given timetas shown in (1) whereNis the subsequent of comments in timeti(hours). They also considered the time between any two consecutive comments as inter comment interval (ICI) andD={?|0

    In a graph temporal model, TGBullying [63], user interaction in the long term is fed into a graph based temporal model to improve the performance of cyberbullying detection.Because cyberbullying is a repetitive action on any social media, the user interaction can pave the road for characterizing it based on analyzing both content and temporal as well as tracking the users’ roles. In this regard, however, they found thesparsityandcharacterizing of repetitionanduser characteristicsas strong challenges to modelling the user interaction.

    V. CONTENT-CENTERED FEATURES

    Content centered features are the main category of features used in majority research, where texts and images are the main source of information implying whether a user’s message contains bullying content. Features in this category areextremely rich, and majority of them are related to natural language processing and image analysis.

    TABLE VII SUMMARY OF USER INTERACTION FEATURES

    A. Textual Features

    Textual features are most commonly used to analyze cyberbullying, a lot of research study papers are using textual features as one part of the processes together with classification algorithms such as deep learning to detect cyberbullying from the raw text data [64]. In this paper, we grouped textual feature into linguistic feature, semantic feature and syntactic feature and summarized them in Table VIII.

    1) Linguistic Feature:Dictionaries are the predefined set of profanity or hate words in the comments or texts, such as swear words. Nadaliet al.[65] reviewed and presented that textual features approach is often categorized as two groups,one is based on a dictionary to filter the cyberbullying posts called “l(fā)exical” features. The other group is called“behavioral” features which happen in conversations.However, the performance of these features limited and might not cover all offensive words, in particular those are ended with the domain of specific-textual orientations.

    Bag-of-words (BOW) are a list of negative words such as swear, profane occurring more frequently in any text or document. It is worth mentioning that, the word and its order,position in the document do not matter [66]. However, there are some concerns regarding the use of the BOW. It turns out that it is susceptible to the sparsity related the dependency of its features (elements), therefore, it is not able to capture the semantic information [66], [67]. To address this, some works use other features alongside BOW, considering BOW as a single feature might cause miss-classification due to the fact that words can have different usage in the texts. For example,the BoW based method is improved by combining other features such as part of speech, negative connotations with BOW [68].

    N-gram is a sequence of n-words or characters allows to count the number of occurrence in size list in the texts. Unlike BoW ignoring the word orders, n-gram can improve the classifier performance thanks to incorporation of some degree in the context for each word [69]. However, n-gram approach is suffering some limitations such that it is not efficient for high level distances [70].

    Term frequency inverse document frequency (tf-idf) is the most common numerical statistic feature applied by textual studies that measures the importance of a word in the comments or documents. The tf-idf value increases in proportion to the number of times the word appears in the document, and is offset by the number of documents in thecorpus containing the word, which helps to adjust the fact that certain words usually appear more frequently. It performs better than the BoW model with considering the importance of words in the document, but still is not able to capture word semantics.

    TABLE VIII SUMMARY OF TExTUAL FEATURES AND THEIR STRENGTH VS. WEAKNESS FOR CYBERBULLYING DETECTION

    2) Semantic Features:Semantic is an element of a word’s denotation or denotative meaning and semantic analysis technology has been considered for cyberbullying detection,such as filtering malicious information and spam in online communication [71], [72]. A novel approach uses word embedding to model words in Tweets [73], so semantics of words is preserved and the feature extraction and selection phases are eliminated. In order to capture semantics, latent semantic indexing (LSI) is used for cyberbullying detection which is able to bring out the latent semantics in a collection of documents [74]. LSI is based on singular value decomposition (SVD) which decomposes a term-by-document matrix,Ainto three matrices: a term-by-dimension matrix,T,a singular-value matrix,S, and a document-by-dimension matrix,D, as shown in (3).

    In addition to above approaches which use latent vector to capture word semantics, some methods use more transparent way to model semantics. Profanity is a lexicon of negative words that is commonly used to detect cyberbullying.Profanity feature together with general features such as tf-idf is categorized and utilized from YouTube dataset to detect the explicit form of abuse verbal by their pattern-based stable patterns [75]. NLP as a supervised classification method is used to detect abusive language over time on the News and Finance comments of Yahoo dataset. In this regard, the researchers use lexicon (Hate speech, Derogatory, and profanity) as a guideline to annotate the data whether the text is clean or abusive from which profanity returns sexual remarks and other negative words [76].

    Sentiment analysis based on user social network post reveals users’ opinions, emotion and behaviors [34]. Sentiment is usually categorized into the three groups which are positive, negative, or neutral and these can indicate how user feels at the moment they conduct post, comments. Naharet alpropose a graphic based approach to detect predator and victim in the collected dataset [54] where sentiment is selected as desired feature. Experiments regarding the sentiment features and results prove that sentiment features can improve classifiers performance in cyberbullying detection. For online bullying activities like cyberbullying, or abusive language,text characters are more frequently used by the people,because of their ambiguity property, non-verbal signs [77].

    Word embedding is a vector exhibition of words in which words are set with degree of similarity. This vectorized representation of words allow us to capture the discriminative features of dataset like the words distance [76], [78].

    3) Syntactic Features:Syntactic features contain typed dependencies and part of speech features extracted from sentences. Part of speech (POS) corresponds words in a text to a specific part of speech such as noun, verb, adjective, and adverbs according to their context and definitions [34].Chatzakouet al.[34] used Tweet NLP’s POS tagging library to extract the POS tag from the contexts. Their descriptive statistics represents that the lower rate of adjective as well as adverbs categories are used in cyberbullying comments. POS is used to determine the score of an aggressive text. Typed dependencies means the syntactic grammatical association in the sentence which can be used as features to extract cyberhate in social media. The Stanford Lexical Parser is used as a popular tool to identify the type dependency. It returns 51 different linguistic labels, namely nsubj, det, dobj,nmod,compound, and advmod. For instance the parser nsubj as an abbreviation of nominal subject provides the relationship of any syntactic subject with other terms or words.

    B. Visual Features

    Visual contents are defined as silent or motion pictures depicting a story or an incident. For example, drawings or depictions can express thoughts, feelings, ideas to be understood by people and by now they have been converted to new forms such as images, videos, or cartoons. Additionally, the rapid and tremendous growth of the technology regarding the telecommunication industry enables users to capture photos,record videos, create animations and to name but a few and instantly shares them with others through online social networks. They have been identified as potential factors in spreading of anti-social movements namely violence, haras-sment, aggression, and bullying in the online social media. In order to reduce the pace of such adverse activities, therefore,content of the visual posts needs to be described and detected automatically. Feature categories, sub-features and their strengths as well as weakness are summarized in Table IX.

    TABLE IX SUMMARY OF VISUAL FEATURE AND THEIR STRENGTH VS. WEAKNESS FOR CYBERBULLYING DETECTION

    1) Image Features:Images are considered as one of the key components in visual features, especially on online social platforms which allow the users to share image-based posts.Although images grab user attentions and promote their engagement in these media, they can foster aggression, hate speech, and cyberbullying in these platforms. We summarize the relationship between commonly used image features and cyberbullying in Table X.

    TABLE X CORRELATION BETWEEN IMAGE FEATURES AND CYBERBULLYING

    a) Body posture:Body posture regards the body pose of people in image in which they are pointing a subject such as a gun to someone else. This feature is highly dependent on the presence of a person. Via the cosine similarity that compares the difference between these features regarding the cyberbullying and non-cybebullying images, Vishwamittaet al.found that there is a strong correlation between cyberbullying images with body-pose when one takes a front pose and pointing a threatening object towards viewers [82], [97].

    b) Facial emotion features:Facial emotion features express one’s feelings or emotions in image. In cyberbullying images,predators might bully their victims by showing aggressive or even happy and joyful facial expressions. For example,aggression in image can covey a threatening action to viewers,while happiness can indicate mocking [82]. Using K2 algorithm which is a Bayesian method for summarizing a structure from given data helps to learn the structure among facial features. Bayesian Information Criterion determines the scoreMof K2, which is denoted by (4), whereNdenotes the size of the database,Diis the size of a data, andP(Di) is the occurrence probability ofDi[106].

    c) Gesture features:Gesture features represent the motions of hand in several poses or gestures that people make in image. Some are not appropriate and even harmful and are used to frighten or mock at the viewers. In the cyberbullying images, the most prevalent gestures can be a loser thumb, a middle finger, a gun gesture, and a thumb down. Based on the cosine similarity, a study [82] shows that there is a strong relationship between hand gesture in images and cyberbullying. Additionally, a study of online involvements [98] on gang violence has shown that the presence of harmful hand gestures is affiliated to the online media images.

    肇慶是珠江下游飲用水源的重要來源地,關(guān)系到2000多萬人口的飲用水安全,水上加油站選址事關(guān)飲用水源安全,肇慶海事局歷來都高度重視。為落實(shí)中央環(huán)保督察回頭看及飲用水源專項(xiàng)督察行動(dòng),肇慶海事局積極主動(dòng)與肇慶市經(jīng)信局、環(huán)保局溝通確定需遷移的水上加油站名單,結(jié)合轄區(qū)通航環(huán)境、港口岸線規(guī)劃、自然保護(hù)區(qū)劃定及加油站選址條件等,充分征求業(yè)主意見,共6次專函向市經(jīng)信部門提供水上加油站調(diào)整選址,有效推進(jìn)遷移工作。

    d) Object features:Object features regard to the objects in images. As for cyberbullying, however, some people post images containing the objects to threaten or intimidate the viewers. The most common attributes of which can be gun,knife, revolver, and so on. Most studies explored the presence such objects in cyberbullying. For instance, a significant correlation between the cyberbullying images and such objects in mage is found [82].

    e) Social features:Social features represent the usage of ant-social symbols in images. In cyberbullying images,perpetrator uses these symbols to demean and offend special groups. Since the range of this factor is very vast, it is so difficult to define any specific dictionary or attributes. So,each study should limit itself to the images containing these symbols in their datasets. The presence of race or adult content in images is considered as one of visual features to detect cyberbullying in a study [100]. Vishwamittaet al.[82]define the presence of anti-black racism as well as anti-LGBT symbols as a sign of cyberbullying.

    f) Taxonomy features:Taxonomy features define the special object in image that can grab the attention of the viewers.They can also happen in the absence of person. Money, drugs,animals, and even celebrities are sample attributes of this feature which can convey an intent of cyberbullying [99].

    g) Profile based features:Profile based features represent the demographic status of people in image such as gender or age. Some studies [100] found that the gender of people in image can lead to the cyberbullying.

    h) Image type features:Image type features define the color of images. Images with black or white colors as well as clip art and line drawing type are considered for cyberbullying detection [100]. Colors like red, green, blue (RGB) can be helpful in identifying bullying and non-bullying images [101].

    i) Image caption features:Image captions are any textual content labeled on images in order to express the image.Studies have explored the role of the caption in cyberbullying involvements and proposed the approaches to extract the main topic of the captions. Caption feature is incorporated in the study for hate detection. The researchers employ Google Vision API Text Detection model to extract the texts from images. Then, these texts are inputted the model to score the relationship between the caption and the area of image where they are appeared [102] and Hossienmardiet al.[99] also the relationship between the presence of captions and cyberbullying is also explored based on Instagram dataset.

    j) Image captioning features:Image-generated features are obtained from the converting the contents or objects of images into the words or sentences. In other words, it provides a verbal representation of images. However, the downside of these features is that lots of information might be lost in this process. To address the issue, therefore, the attention mechanism is proposed where the salient region of an image is calculated. To calculate the attention the encoder-decoder architecture is used to translate images to sentences [103]. In the encoder, the image is encoded to a sequence of words. It generates a caption vector likev={v1,v2,...,vC} , whereviis in RK, andKandCare the size of vocabulary and the length of the caption respectively. Then the annotation vector likea={a1,a2,...,aL} where each aiis in RDand related to each part of the image produced by CNN. Image captioning features are denoted asX1={I1,I2,...,Ii} and text features are presented asX2={T1,T2,...,Ti} in VisualBert architecture in which a image likeIis extracted in the multiple region featuresf={f1,f2,...,fn} by usinf Faster R-CNN. Then it is converted into a visual embeddedevby (5), whereesindicates the input is image or text. Similarly, text inputs are embedded as shown in (6), whereftandepare token embedding and positional embedding (relative position) for each token in the sentence. Finally, it outputs two multi-model representation(t1,t2,t3,...)[107]. Likewise, a vector of captions likeX3={C1,C2,...,Ci}are extracted by the Image Caption model based on the attention mechanism. This vector is fed to the BERT architecture (Language model). It outputs a textual representation (p1,p2,p3,...) having same dimension with VisualBert outputs. Through the concatenation or bilinear transformation, their information is transmitted into one vector[108].

    a) Color:As a low-level feature in this literature, colors can be an indication of different types of scenes in video clips. For example, the distribution of violent scenes is more likely different from that of non-violent in any movie. In general, the global color histogram provides all information of colors of visual feature as a histogram to show how they distributed over different bins. Color histogram is applied to extract the violence and non-violence activities in the cartoons [104],[105]. For image color feature extraction, Fisher kernels are introduced to characterize the dataset samples. Its gradient vector is shown in (7) and the information matrix is illustrated in (8). Fisher kernel is a powerful framework and it combines the advantages of pattern classification generation method and discrimination method. The idea is to use a gradient vector to characterize a signal probability density function modeling the signal generation process (pdf) [109].

    b) Local feature:Local features focus on the specific or exciting regions of a given visual frame. In local features, a patch of a given frame should differ from their immediate surroundings based on the color, texture, shape, etc. Corners,pixels, and blobs can be simple examples of the local features.Thanks to this property, they are usually utilized for the object detection in videos and images and are applied for cyberbullying detection [104].

    VI. FEATURE INTERACTION AND PLATFORM

    A. UAC Feature Interaction

    User-Activity-Content triangle illustrates the interconnection between three types of features. Following the review of features with respect to each vertex of the UAC triangle, we summarize the inter and intra feature interactions between users, activities, and content in Fig. 7. Because UAC futures focus on different aspects, we use two major facets, semantic indication vs. cyberbullying indication, to project them to Fig. 7.More specifically, semantic indication denotes the degree of semantics the feature may imply, and cyberbullying indication represents the strength of correlation that the feature may reflect during a cyberbullying incident.

    Fig. 7. Inter-feature and intra-feature interactions of the UAC triangle vertices with respect to semantic indication (x-axis) and cyberbullying indication (y-axis). Features towards the origin indicate weaker semantic and weaker cyberbully indication.

    For all summarized features, texts are most direct and accurate in capturing semantics because languages are the main form of communications. Visual perception is the second most important source of information acquisition, but understanding semantics of visual objects relies on computer vision and image processing, which are often less accurate in comprehending semantics than texts. Collectively, textual and visual features are the most effective ones in capturing cyberbullying indication, mainly because of their strength of semantic relevance. In addition, content-centered features are much easier to harvest, because majority cyberbullying or cybervoilence actions are carried out through texts, images,and videos, etc.

    Activity centered features can still reflect semantics and shed light for cyberbullying indication. For example, constantly sending messages to a receiver is considered a harassment behavior, especially if the message has no meaning or has a negative sentiment. A person repetitively posting and commenting on pages with aggressive content implies a strong cyberbullying indication. In this case, users’ activities need to be analyzed by social network analysis algorithms [110], in combination with content information.

    User centered features are considered less informative in terms of semantic indication and cyberbullying indication.This is mainly because of: 1) user features are always noisy and inaccurate, containing many missing or incorrect entries;and 2) user personality and characteristics are compounded factors, making it difficult to capture their semantics. Attacker may disguise themselves using very positive profiles, but their actions, and content associated to the actions, will eventually expose their true cyberbullying indication.

    Overall, content features have the strongest semantic indication and cyberbullying indication, in which textual features express a more clear indication than visual features.In contrast, demographic, behavior and psychological features from users are inferior to Content in both aspects, in which behavior shows the best in cyberbullying indication. Behavior trend features from Activity have the strongest cyberbullying indication which surpasses local interaction, global interaction as well as spatio-temporal features.

    B. UAC Features and Platforms

    Features selected from different platforms may vary in terms of availability and quality. For example, users from LinkedIn are more likely to use their real names and provide more personal information. Instagram posts are more imagebased. In Fig. 8 we discuss the common selection of features in UAC triangle in terms of 23 common online platforms subjecting to cyberbullying or cyberviolence. Although majority of selected platforms have social network components,some systems, such as MitBBs, craiglist, SMS, do not have direct social networking functionality.

    Fig. 8. A summary of common online platforms subjecting to cyberbullying or cyberviolence, and their features in terms of the UAC triangle.

    For multimodality-based platforms, such as Instagram and TikTok, studies are more focused on their content features.Multimodality is the interaction between different representational modalities, such as the interaction between textual expressions and videos/images. Features extracted from the majority platforms are content features and user activity features, which makes sense because that is what most people do on online social networks, posting messages/images/videos or interacting with other users through comments, etc.However, for platforms like Linkedin, user-centered and activity-centered features are more important and easier to get such demographic feature.

    VII. CYBERBULLYING DETECTION METHODS

    Following the user-activity-content triangular view, we now review machine learning methods for cyberbullying detection.Majority cyberbullying detection methods are based on supervised learning, in which bullying and non-bullying episodes in online social platforms are differentiated. They are usually classified into supervised learning methods and weakly supervised learning methods.

    A. Supervised Learning Methods

    Numerous supervised machine learning algorithms have been applied for bullying identification in the virtual social media such SVM, Navie Bayes, Random Forest, Logistic,JRip, J48, to name but a few. It is also worth mentioning that the performance of supervised learning dependent upon various factors, in particular the dataset, data labeling, and features selection. Furthermore, most supervised methods in cyberbullying studies have been concentrated on textual features, while some have recently confirmed that considering other features like social networks or temporal can improve the models performance. We will demonstrate supervised learning methods from three aspects.

    1) Text-Based Method:Simple feature based methods are the most common approach for cyberbullying detection. Vast majority of studies have been attempting to identify bullying incidents from textual contents such as comments and posts from online social media. Supervised machine learning combining with a bunch of the textual features, e.g., BoW, ngrams, TF-IDF and word2vector have been exploited to do the classification among bullying and non-bullying incidents,among which SVM is the most frequently used classification method, and Naive classifiers are the most accurate approaches [111]–[113].

    While simple, one major weakness of text based methods is the low accuracy. Most of the text based methods analyze textual features which contain aggressive words, however,under some circumstances, aggressive words do not represent cyberbullying and some real cyberbullying incidents may not contain aggressive words. In addition to the sparsity issue, in many cases, cyberbullying is implied in the sentiment of sentences, pictures, or are tied to the behavior of the senders.Therefore, other types of methods, such as network-based,temporal pattern based approaches are nice complement to simple text-based methods.

    2) Network-Based Method:Social network relationship features are taken into consideration for cyberbullying detection. The use of social network features such as user activities or behaviors, the aggressive level of a social network group in any online social media is combined with other textual features. Node2vec is used to analyze social network relationship features. The nodes in the graph indicates every user in social network and their labels indicate whether the user belongs to a cyberbullying group. Different single classifiers such as Random Forest, J48, Naive Bayes, SMO,Bagging, ZeroR or the combination of them have been applied to apply the extracted information [25], [114]. C4.5 decision tree is considered as a popular tool because it can support both discrete (categorical) and continuous features such as social network features, user demographics [26]. Recently, the integrated supervised learning methods such as Ensemble classifiers as well as Fusion approach are becoming popular for cyberbullying detection, because this kind of methods can support using multiple features like network-based features along with other types of features [34], [115]. Ensemble classifiers are upon on a set of multiple classifiers in which their single decisions (weighted or non-weighted) are combined to classify new data which is able to produce a better performance compared to individual classifiers since the errors of each classifier are eliminated by averaging over the decisions of multiple classifiers.

    3) Temporal-Based Method:The last method is temporal based detection methods. To detect cyberbullying incidents as early as possible, features measuring time difference of the consecutive comments are applied with supervised learning methods. Two different specific early detection models,named threshold and dual are proposed. In threshold method,the decision function for the threshold model is formatted as(9), wheremcan be any machine learning model like Random Forest or Extra tree training the base line features,th+() andth?()are thresholds for negative and positive cases. In this function, the final decision is made based on if there are enough evidence determined by positive and negative class probabilities or not.

    Regarding the dual method, in contrast, two different machine learning models are trained to detect positive and negative cases separately as well as independently as (10),wherem+andm?are positive and negative learning models respectively [116], [117]. These two independent models are trained with an independent set of features separately where one is to detect positive classes and the other detects negative cases.

    B. Weakly Supervised Learning Methods

    Considering that labeling a large dataset is not only time demanding, but also needs a massive budget allocated to cover the expenses, recently, weakly supervised learning models(WSL) have been proposed in which a completely annotated training dataset is no longer needed. In weakly supervised learning, there are three main approaches that can lessen the heavy load of the data labeling process, namely incomplete,inexact, and inaccurate.

    1) Incomplete Process:The incomplete process only allows a small subset of instances being labeled. Inexact labels allow multiple instances to share labels (e.g., multi-instances labels).Inaccurate data are labeled like the strong supervision, but there might be label errors in the data [118].

    Suppose that we have a binary classification problem considering twoYandNclasses, and the task is the learning off:X →Y from a training data set like D. With a strong supervision, an annotated dataset should be a set like D={(x1,y1),...,(xm,ym)} where X is a feature space,Y={Y,N},xi∈X , andyi∈Y. In order to manage the unlabeled dataset, several approaches have been proposed such as active and semi-supervised learning. Active-based learning allows human intervention to annotate selected unlabeled instances with respect to the anticipated costs, while semi-supervised method tries to take advantage of them without human expert, in which the selected unlabeled data can be treated as a test data (transductive) or the test data are considered unknown while unlabeled instances are not selected as test data (pure).

    For pure semi-supervised learning, the question is how the unlabeled instances can get involved in the prediction process to enhance the related model. Recently, some studies have attempted to answer this question by introducing innovative algorithms such as augmented training [32]. In augmented training, the primary training dataset likeTnis initially divided into two groups such asYnas well asNn, that is,Tn=Yn∪Nn, andUndenotes the unlabeled data.

    3) Inaccurate Process:For inaccurate supervision, the training data set is similar to the strong supervision, but the value ofyimay be incorrect, because of annotator errors.Recently, it has been utilized for cyberbullying detection on online social media where labeling the whole data is usually considered as a tedious and time-consuming activity via the traditional learning methods. Among those approaches,participant-vocabulary consistency (PVC) [119] and cotrained ensemble models (CEM) [120] are more popular. PVC attempts to extract cyberbullying involvements in the online platform through evaluating users roles (bullier or victim) and the bullied vocabulary are used in their conversation in the same time. This is because that the bully language strongly depends upon the user role or interactions in a given bully activity.

    C. Unsupervised Learning Methods

    The main shortcoming of supervised learning methods is the labeling of huge and high-dimensional data, because it is time demanding as well as expensive. Even though weakly supervised approaches attempt to alleviate this issue, they still depend upon the labeling of data. Some studies have switched to exploit unsupervised approaches that are mainly based on pattern mining. In general, unsupervised learning methods lie on searching the patterns in the data that share similarities. To our knowledge, several associated methods have been used regarding cyberbullying detection, mapping based method and outlier detection method.

    1) Mapping Based Method:As an unsupervised method,self-organizing mapping (SOM) attempts to project a big dataset into a lower-dimension space of neurons in order to discover any similar patterns [121]. In other words, the dataset mapped on one-single layer of a linear 2D with a fixed number of neurons (units) such that the topology of neurons on the layer can be as a rectangular or hexagonal network.Data are categorized with the same attributes by searching their corresponded neurons’ layer. With the required inputx={x1,x2,...,xn} and model vectorswi=,wi∈Rn, the best matching (winner) should be determined as shown in(14), wheretis a current training iteration. Through training process, learning rate α(t) decreases with time in (15) to reduce the difference between model vector and their corresponding input patterns and

    is a neighbourhood function. When it comes to cyberbullying detection, although SOM is considered as a powerful tool in structure detection for any large dataset, it is neither inherently hierarchical nor random process to provide a distribution of data. Therefore, GHSOM is applied to work with social media to improve the accuracy [122]. GHSOM has a dynamically growing structure which allows the distribution of data presented on hierarchical multi-layers where each layer is working as an independent SOM [123]. The difference between the input vector and model vector of units is checked by mean quantization error (MQE) as indicated in (16). It measures the heterogeneity of projected input data on the unit wherexjandwiare the input and model vectors respectively,Ciis a universe set of all input vectors. The fine-tuned GHSOM model is tested again Twitter, YouTube and Formspring and is proved to be more accurate in cyberbullying detection [122].

    2) Outlier Detection Method:Most studies in unsupervised learning are based on pattern discovery from considerable portion of dataset, while there are some applications in which detecting exception or anomalous cases can be more interesting or useful than the common cases. Local outlier factor (LOF) is a density-based outlier detection technique and considers multivariate outlier detection that can be efficiently used for low-dimensional datasets [91] and it has been employed in cyberbullying detection. LOF assigns anomaly scores to data points and the anomaly score for nodeiin layerlis computed in (17) [58]. Based on this technique, a methodology called ADOMS is proposed and experimental results on several real-world multi-layer network data sets show that this method can effectively detect cyberbullying in multi-layer social networks.

    D. Time Series Method

    The aforementioned methods and algorithms have been mainly focused on the detection task, and views of them try to predict the level or severity of bullying for the future state in terms of the current knowledge. For cyberbullying, apart from detecting it, another important issue is to control and monitor the trend of cyberbullying incident in each platform overtime.To address the above issues, some studies have attempted to take advantage of times series capacities in forecasting [84]and controlling the events overtime [124]. As for cyberbullying detection, the main tendency is based on using dimension reduction in times series data to capture the linguistic behavior of users [124].

    E. Transfer Learning Method

    For cyberbullying detection, the lack of labeled dataset has become one main challenge, therefore, transfer learning is considered as a sophisticated and economical technique to address this issue [130]. Unlike supervised and semisupervised approaches assuming the distributions of both labeled and unlabeled data are the same, the label distribution of both tasks can be completely diffident but related in transfer learning. Transfer learning is based on two main components, domain and task. Domain includes two parts,χis the feature space andP(X) denotes the marginal probability in whichX=(x1,x2,...,xn) is a vector of instances. Similarly,the task is upon two components, Y denotes the label space andf(·) is an objective function from training data that predicts the related label. Therefore, both domain and task can be notated asD={χ,p(X)} and τ ={Y,f(·)} respectively.

    Suppose there are two given concepts such asSandTas source and target withDSandDTrespectively. The transfer learning attempts to enhance the prediction function ofT,fT(·)by applying knowledge ofDSand τs, whereDS≠DT, or τS≠τT. It has been applied in cyberbullying and hate speech detection on online social media. Two different datasets (t1as source andt2as target) are fed into the deep neural network where both pass through the shared task like pre-processing(word token), ELMo embedding (word representation) bidirectional LSTM (BLSTM), max-pooling, but split in the classification phase. The main motivation of using transfer learning in this investigation is that the learning oft1can help to improve the classification of hate speech of the target tweetst2[131]. Their transfer learning model is capable of leveraging several smaller, unrelated data sets to embed the meaning of generic hate speech and achieves the prediction accuracy with macro-averaged F1 from 72% to 78% in detection tasks.

    Three different methods of transfer learning are checked to see how the knowledge gained from applying BLSTM with attention models in one dataset can improve the cyberbullying detection in other different datasets. The first is complete transfer learning (TL1), where a trained model from one data set is directly used to detect cyberbullying in other data sets without any additional training. Next is feature level transfer learning (TL2) and only the information corresponding to the features (word embedding) learned by a model are trained by other datasets. The last one is model level transfer learning(TL3), in which the trained model on one data set and only the learned word embeddings are transferred to another data set to train a new model. These three transfer learning models outperform other machine learning methods on Formspring,Twitter and Wikipedia datasets [132].

    F. Deep Learning Method

    Currently, classical deep learning methods such as CNN,LSTM, BLSTM, and BLSTM have started to contribute in cyberbullying detection. The main advantage of these methods compared with other conventional machine learning approaches is that they do not need feature engineering, but only need the data embedded in the vectors as input to be fed into the algorithms. Since data in cyberbullying detection are mainly textual, social network and visual based contents, and each type might have taken different approaches to be represented as a vector, thus, in this section we explore the current methods proposed for representing those features in deep neural networks (DNN). Before being fed into DNN,data should be reconstructed. For example, textual contents need to be encoded to word vectors, while network information should be reconstructed as a graph.

    2) Network Feature Representation:Complex social network relationships are usually represented in graph structure.Graph embedding is commonly used to convert the graph into low dimensional vectors. Graph auto encoder (GAE) [136]has been known as a powerful tool, which follows the encoded-decoded approach where a given social network is first encoded in the low-dimension representation and then reconstructed in the decoded step. AssumeG=(V,E) withU=|V| users being a given social network,A∈RU×UandX∈RU×Dbeing adjacency and feature matrices to represent the input graph as well as features of nodes in the input graph respectively. These matrices are first taken by graph convolutional network (GCN) to generate a latent matrixZdefined in (27), whereσis the logistic sigmoid function.Decoder reconstructs adjacency matrixAby an inner product between latent variables to minimize error in (28). The second popular way to convert the graph is Node2vec, in which the original graph structures and characteristics are able to be preserved and the transformed vectors will be similar if nodes have similarities. Node2vec uses a random walk to explore the neighbour nodes as shown in Fig. 9. Because of the combination of Breadth-first search and Depth-first search,both time and space complexity are optimized and the efficiency is also improved [113], [137].

    3) Image Feature Representation:When it comes to dealing with unstructured data, especially image data, deep learning models are preferred. For online social networks, images can be found everywhere from users’ posts to their comments.Fine-Tuned VGG-16 is one deep learning method employed for extracting image features to identify cyberbullying [138],[139], which takes an image with spacial dimension and generates a vector To do so, it is constructed from numbers of conventional layers and dense layers. For each hidden layer,ReLU is used as activation function. Recently, genetic algorithm (GA) has been used to optimize the extracted images from VGG-16 to identify cyberbullying detection. It begins with the random initial selection of the population and then combines by the operators like cross-over to expand the size of current population via generating off-springs and mutation that is used to increase the variation in each generation [139]. The process to convert images into vector for further cyberbullying detection is shown in Fig. 10 ([82]),in which after converting to vectors, images with cyberbullying meaning are closer to each other while non-cyberbullying image is far from cyberbullying ones.

    Fig. 9. Random walk for Node2vec: When walking from node t to v, bias α is introduced for each step. The next step is decided by evaluation of the transition probabilities on edges (v,x) determined by return parameter p and in-out parameter q.

    Fig. 10. Image feature representation: The first two images on the left panel have cyberbullying implication while the third image does not. Image feature representation intends to represent each image as a vector, showing on the right panel, with cyberbullying images being close to each other.

    G. Method Summary and Comparison

    In Fig. 11, we summarize and compare different methods,with respect to the UAC triangle, which demonstrates the focus of different methods in using features for learning.

    Fig. 11. A summary of cyberbullying detection methods and their focus on the UAC features.

    To compare the requirements of methods used for cyberbullying detection, we summarize their dependency to labels, features, and their adaptability in Table XI, where a symbol + means positive correlation whereas a symbol ?denotes a negative correlation (the number of +/? denotes the degree of correlation). For example, labels are required for supervised learning methods (+++), but not required forunsupervised learning methods (?).

    TABLE XI METHOD FLExIBILITY REGARDING WITH LABELS, FEATURES AND ADAPTABILITY

    TABLE XII SUMMARY OF CYBERBULLYING DETECTION METHODS

    To further compare the strength and weakness of cyberbullying detection methods, we summarize their advantages and disadvantages in Table XII.

    VIII. CONCLUSION

    In this paper, we conduct a comprehensive review of cyberbullying and cyberviolence, with a focus on identifying key factors associated to cyberbullying and understanding interplay between these factors. We first propose to summarize key factors of cyberbullying as a UAC triangular view.A feature taxonomy with three main categories, user-centered features, activity-centered features, and content-centered features, including sub-features within each category is proposed. Compared to existing work in the field, the UAC triangular view not only dissects seemly complicated features in cyberbullying detection into three major components: user,activity, and content, but also sets forth a clear understanding about how these features interplay with each other. Popular methods for cyberbullying detection are also reviewed,including supervised learning, weakly supervised learning,unsupervised learning, time series method, transfer learning and deep learning. The survey provides a thorough understanding of key factors, their strength and weakness, and available solutions for cyberbullying detection. The survey can also facilitate new designs of computational models for cyberbullying and cyberviolence detection.

    This survey provides many opportunities for future study on cyberbullying detection. First, our proposed UAC triangle organizes features commonly used in this area into three main categories (User, Activity and Content). Cyberbullying continuously evolves with the Internet. New features, such as location sharing, and regulations, like EU general data protection regulation (GDPR), are being continuous made available. It is necessary to consider new feature types in the algorithm designs and system development. Second, due to page limitations, this review largely overlooks performance metrics, research projects, and actions taken by the industry and commercial systems to prevent cyberbullying. Third,literature from non-English sources can also be included to expand and enrich the scope of the review.

    猜你喜歡
    市經(jīng)肇慶市肇慶
    廣東省肇慶市高要區(qū)星科學(xué)校
    大地回春—肇慶十八年林豐俗作品特展
    廣東省肇慶市懷集縣幸福街道中心小學(xué)
    廣東省肇慶市封開縣南豐鎮(zhèn)中心小學(xué)
    肇慶學(xué)院封
    基于指數(shù)模型的R = P(Y <X <Z)統(tǒng)計(jì)推斷
    第四批上海市工藝美術(shù)精品
    肇慶市排舞運(yùn)動(dòng)的推廣及其啟示
    “制度剛性”終結(jié)“作風(fēng)彈性”
    增強(qiáng)服務(wù)企業(yè)意識(shí) 扶持企業(yè)做大做強(qiáng)
    日韩中字成人| 成人国产麻豆网| 精品欧美国产一区二区三| 国产真实伦视频高清在线观看| 国内久久婷婷六月综合欲色啪| 精品免费久久久久久久清纯| 国产爱豆传媒在线观看| 青春草视频在线免费观看| 国产成人a∨麻豆精品| 国产精品一及| 在线观看66精品国产| 麻豆乱淫一区二区| 色综合站精品国产| 在线观看66精品国产| 久久久精品大字幕| 美女cb高潮喷水在线观看| 一区福利在线观看| 亚洲人成网站在线播放欧美日韩| 天堂网av新在线| 一级黄片播放器| 99九九线精品视频在线观看视频| 亚洲自拍偷在线| 国产成人freesex在线 | 久久久精品大字幕| 国内精品宾馆在线| 国国产精品蜜臀av免费| 国产精品综合久久久久久久免费| 小蜜桃在线观看免费完整版高清| 99热全是精品| 日本免费a在线| 男女下面进入的视频免费午夜| 亚洲成人av在线免费| 成熟少妇高潮喷水视频| 99riav亚洲国产免费| 日韩强制内射视频| 欧美日韩一区二区视频在线观看视频在线 | 亚洲欧美日韩无卡精品| 亚洲欧美日韩高清在线视频| 精品一区二区三区视频在线| 观看美女的网站| www.色视频.com| 日韩av不卡免费在线播放| 午夜精品一区二区三区免费看| 久久精品夜色国产| 久久6这里有精品| 三级经典国产精品| 乱码一卡2卡4卡精品| 精品人妻熟女av久视频| 久久久久久大精品| 少妇被粗大猛烈的视频| 亚洲色图av天堂| 美女被艹到高潮喷水动态| 久久精品夜色国产| 亚洲人与动物交配视频| 欧美高清性xxxxhd video| 国产精品久久电影中文字幕| 久久久久免费精品人妻一区二区| 国产男靠女视频免费网站| АⅤ资源中文在线天堂| 亚洲国产色片| 免费一级毛片在线播放高清视频| 22中文网久久字幕| 狂野欧美激情性xxxx在线观看| 最近在线观看免费完整版| 日韩欧美国产在线观看| 亚洲经典国产精华液单| 菩萨蛮人人尽说江南好唐韦庄 | 99精品在免费线老司机午夜| 一级黄色大片毛片| 免费不卡的大黄色大毛片视频在线观看 | 久久精品国产99精品国产亚洲性色| 日韩欧美在线乱码| 亚洲美女黄片视频| 国产一区二区三区在线臀色熟女| av女优亚洲男人天堂| 青春草视频在线免费观看| 日本成人三级电影网站| 色吧在线观看| 午夜精品在线福利| 99热精品在线国产| 欧美+亚洲+日韩+国产| 91久久精品国产一区二区三区| 简卡轻食公司| 国产激情偷乱视频一区二区| 在线观看av片永久免费下载| 国产一区二区三区在线臀色熟女| 亚洲av不卡在线观看| 国产午夜精品论理片| 午夜福利在线在线| 亚洲av第一区精品v没综合| 男人的好看免费观看在线视频| 麻豆av噜噜一区二区三区| 亚洲欧美日韩高清在线视频| 午夜福利在线观看吧| 免费看美女性在线毛片视频| 在线观看美女被高潮喷水网站| 99国产精品一区二区蜜桃av| 乱人视频在线观看| 两个人视频免费观看高清| 日本 av在线| 免费电影在线观看免费观看| 99热只有精品国产| 综合色av麻豆| 岛国在线免费视频观看| 免费看美女性在线毛片视频| 欧美一区二区亚洲| 最新中文字幕久久久久| 嫩草影院精品99| 精品乱码久久久久久99久播| 夜夜爽天天搞| 欧美一区二区精品小视频在线| 成熟少妇高潮喷水视频| 一级黄片播放器| 午夜爱爱视频在线播放| 午夜激情福利司机影院| 亚洲最大成人手机在线| 一个人观看的视频www高清免费观看| or卡值多少钱| 国产成人福利小说| 深夜精品福利| 99久久无色码亚洲精品果冻| 欧美一级a爱片免费观看看| 成人特级黄色片久久久久久久| 国产成人91sexporn| 俺也久久电影网| 亚洲成a人片在线一区二区| 麻豆成人午夜福利视频| 成人鲁丝片一二三区免费| 春色校园在线视频观看| 99热全是精品| 丝袜喷水一区| 欧美最黄视频在线播放免费| 看黄色毛片网站| 天天一区二区日本电影三级| 人妻夜夜爽99麻豆av| 日韩欧美精品v在线| 国产成人91sexporn| 久久久久久伊人网av| 欧美一区二区亚洲| 亚洲最大成人手机在线| 欧美另类亚洲清纯唯美| 天堂av国产一区二区熟女人妻| 久久精品国产亚洲av涩爱 | 中文字幕免费在线视频6| 尤物成人国产欧美一区二区三区| 午夜久久久久精精品| 日本一本二区三区精品| 真人做人爱边吃奶动态| 黄色一级大片看看| 成人亚洲欧美一区二区av| 蜜臀久久99精品久久宅男| 人人妻人人澡欧美一区二区| 国产成人freesex在线 | 色综合亚洲欧美另类图片| 国内少妇人妻偷人精品xxx网站| 永久网站在线| 日韩精品青青久久久久久| av天堂在线播放| 一区二区三区高清视频在线| 22中文网久久字幕| 国产乱人视频| 97碰自拍视频| 精品乱码久久久久久99久播| 非洲黑人性xxxx精品又粗又长| 熟妇人妻久久中文字幕3abv| 99久久中文字幕三级久久日本| 给我免费播放毛片高清在线观看| 欧美日本视频| 久久久成人免费电影| 99久国产av精品国产电影| 欧美最黄视频在线播放免费| 国产不卡一卡二| 一区二区三区免费毛片| 99久久精品一区二区三区| 日本五十路高清| 综合色丁香网| 日本一本二区三区精品| 国产精品无大码| 无遮挡黄片免费观看| 舔av片在线| 国产v大片淫在线免费观看| 日本成人三级电影网站| av在线天堂中文字幕| 人妻久久中文字幕网| 插逼视频在线观看| 中国国产av一级| 99热这里只有精品一区| 国产精品综合久久久久久久免费| 国产高清有码在线观看视频| 淫妇啪啪啪对白视频| 亚洲激情五月婷婷啪啪| 六月丁香七月| 看黄色毛片网站| 一a级毛片在线观看| 久久久久国内视频| 91在线观看av| 丰满人妻一区二区三区视频av| 别揉我奶头~嗯~啊~动态视频| 99热全是精品| 亚洲精品久久国产高清桃花| 日本黄色视频三级网站网址| 一卡2卡三卡四卡精品乱码亚洲| 精品久久久久久久末码| 欧美激情在线99| 国产精品精品国产色婷婷| 欧美成人a在线观看| 成人性生交大片免费视频hd| 久久精品夜色国产| 在线看三级毛片| 晚上一个人看的免费电影| 亚洲图色成人| 亚洲av中文字字幕乱码综合| 少妇丰满av| 一本一本综合久久| 99久久九九国产精品国产免费| 免费不卡的大黄色大毛片视频在线观看 | 综合色av麻豆| 久久精品国产鲁丝片午夜精品| 老司机影院成人| 美女免费视频网站| 久久久午夜欧美精品| 丰满的人妻完整版| 久久午夜福利片| 国产精品一区www在线观看| 欧美极品一区二区三区四区| 人人妻人人看人人澡| 女同久久另类99精品国产91| 国产真实伦视频高清在线观看| 久久久久久大精品| 人妻少妇偷人精品九色| 丝袜喷水一区| 全区人妻精品视频| 草草在线视频免费看| 狠狠狠狠99中文字幕| 久久久国产成人精品二区| 联通29元200g的流量卡| 波野结衣二区三区在线| 日韩强制内射视频| 久久久a久久爽久久v久久| 亚洲自拍偷在线| 久久九九热精品免费| 亚洲性久久影院| 免费电影在线观看免费观看| 免费看av在线观看网站| 国内少妇人妻偷人精品xxx网站| 毛片一级片免费看久久久久| 看黄色毛片网站| 99久久中文字幕三级久久日本| 国产69精品久久久久777片| 夜夜看夜夜爽夜夜摸| 搡老妇女老女人老熟妇| 可以在线观看毛片的网站| eeuss影院久久| 午夜爱爱视频在线播放| 精品不卡国产一区二区三区| 色播亚洲综合网| 国产在线男女| 亚洲熟妇熟女久久| 国产在线精品亚洲第一网站| 亚洲欧美成人综合另类久久久 | 麻豆国产97在线/欧美| 韩国av在线不卡| 国产91av在线免费观看| 国产欧美日韩一区二区精品| 中文在线观看免费www的网站| 精品少妇黑人巨大在线播放 | 18禁在线播放成人免费| 精品久久久久久久久久久久久| 久久精品人妻少妇| 国产淫片久久久久久久久| 黄色配什么色好看| 亚洲性夜色夜夜综合| 亚洲天堂国产精品一区在线| 一a级毛片在线观看| 免费在线观看成人毛片| 22中文网久久字幕| 麻豆成人午夜福利视频| 日本黄色视频三级网站网址| 俺也久久电影网| 大香蕉久久网| 综合色丁香网| 真实男女啪啪啪动态图| 91麻豆精品激情在线观看国产| 精品午夜福利视频在线观看一区| ponron亚洲| 日本一二三区视频观看| 国产亚洲精品久久久久久毛片| 久久6这里有精品| 成人精品一区二区免费| 国产一区二区亚洲精品在线观看| 精品久久久噜噜| 久久人人精品亚洲av| 麻豆国产av国片精品| 亚洲av二区三区四区| 男女之事视频高清在线观看| 日韩成人伦理影院| 欧美性猛交黑人性爽| 国产色婷婷99| 亚洲av美国av| 男女那种视频在线观看| 久久久久久久久大av| 99久国产av精品| 婷婷精品国产亚洲av在线| 99久国产av精品国产电影| 国产高清不卡午夜福利| 中国美女看黄片| 精品少妇黑人巨大在线播放 | 长腿黑丝高跟| 又黄又爽又刺激的免费视频.| 在线观看一区二区三区| 国产精品久久久久久久久免| 亚洲欧美日韩无卡精品| 91久久精品电影网| 日韩欧美精品免费久久| 一个人看视频在线观看www免费| 久久久久久国产a免费观看| 久久久精品大字幕| 黑人高潮一二区| 亚洲精品乱码久久久v下载方式| 久久人人精品亚洲av| 非洲黑人性xxxx精品又粗又长| 悠悠久久av| 毛片女人毛片| 亚洲电影在线观看av| 国产高清有码在线观看视频| 国内精品一区二区在线观看| 日本a在线网址| 国产亚洲精品综合一区在线观看| 久久久久久久午夜电影| 小蜜桃在线观看免费完整版高清| 91久久精品国产一区二区三区| 日韩一区二区视频免费看| 十八禁网站免费在线| 国产高清三级在线| 亚洲熟妇中文字幕五十中出| 亚洲欧美日韩高清在线视频| 国产国拍精品亚洲av在线观看| 午夜精品国产一区二区电影 | 日日摸夜夜添夜夜添av毛片| 99热网站在线观看| 午夜福利成人在线免费观看| 国产高清激情床上av| 亚洲av电影不卡..在线观看| 欧美bdsm另类| 亚洲人成网站在线播| 欧美bdsm另类| 久久精品国产鲁丝片午夜精品| 久久亚洲精品不卡| av黄色大香蕉| 国产精品,欧美在线| 天堂影院成人在线观看| 深夜精品福利| 成人欧美大片| 国国产精品蜜臀av免费| 日韩在线高清观看一区二区三区| 一级毛片久久久久久久久女| av在线亚洲专区| 成人漫画全彩无遮挡| 久久亚洲国产成人精品v| 一级毛片电影观看 | 中文字幕av在线有码专区| av天堂在线播放| 精品久久久久久久人妻蜜臀av| 人人妻人人看人人澡| 日韩av不卡免费在线播放| 免费观看人在逋| 干丝袜人妻中文字幕| 日韩国内少妇激情av| 哪里可以看免费的av片| 真人做人爱边吃奶动态| 亚洲一级一片aⅴ在线观看| 久久人妻av系列| 又粗又爽又猛毛片免费看| 成人性生交大片免费视频hd| 午夜福利高清视频| 毛片女人毛片| 国产乱人视频| 一本久久中文字幕| 寂寞人妻少妇视频99o| 男人和女人高潮做爰伦理| 亚洲av二区三区四区| 一区二区三区免费毛片| 欧美激情国产日韩精品一区| 欧美性猛交╳xxx乱大交人| 欧美日韩国产亚洲二区| 精品久久国产蜜桃| 久久久久久久久中文| 久久久精品94久久精品| 天堂影院成人在线观看| 免费高清视频大片| 国产成人a区在线观看| 天堂动漫精品| 波多野结衣巨乳人妻| 亚洲精品色激情综合| 亚洲欧美日韩高清在线视频| 免费av毛片视频| 亚洲天堂国产精品一区在线| 亚洲精品色激情综合| 精品99又大又爽又粗少妇毛片| 男女做爰动态图高潮gif福利片| 久久久国产成人免费| 12—13女人毛片做爰片一| 99在线视频只有这里精品首页| 看十八女毛片水多多多| 97热精品久久久久久| 国产亚洲精品av在线| 日韩成人av中文字幕在线观看 | 久久精品国产自在天天线| 精品日产1卡2卡| 男人舔奶头视频| 麻豆乱淫一区二区| av在线蜜桃| 国产真实乱freesex| 22中文网久久字幕| 亚洲最大成人手机在线| 欧美+亚洲+日韩+国产| 国产日本99.免费观看| 国产精品一区二区性色av| 国产成人aa在线观看| 亚洲人成网站在线播放欧美日韩| 成人av在线播放网站| 日韩av不卡免费在线播放| 一本一本综合久久| 人人妻,人人澡人人爽秒播| 夜夜夜夜夜久久久久| 国产高潮美女av| 韩国av在线不卡| 久久久久久九九精品二区国产| 少妇熟女欧美另类| 国产精品福利在线免费观看| 亚洲人与动物交配视频| 一级a爱片免费观看的视频| 日韩亚洲欧美综合| 亚洲第一区二区三区不卡| 国产精品美女特级片免费视频播放器| 免费无遮挡裸体视频| 性色avwww在线观看| 12—13女人毛片做爰片一| 亚洲精品国产av成人精品 | 在线免费十八禁| 黄色日韩在线| 亚洲国产精品成人久久小说 | 午夜a级毛片| 日本欧美国产在线视频| 欧美一区二区精品小视频在线| 国产精品一二三区在线看| 寂寞人妻少妇视频99o| 非洲黑人性xxxx精品又粗又长| 亚洲精品日韩av片在线观看| 国产精品一二三区在线看| 色噜噜av男人的天堂激情| 老师上课跳d突然被开到最大视频| 少妇被粗大猛烈的视频| 国产aⅴ精品一区二区三区波| 国产精品av视频在线免费观看| 亚洲人成网站高清观看| 日韩欧美国产在线观看| 久久国产乱子免费精品| 亚洲不卡免费看| 国产精品一区二区性色av| 亚洲va在线va天堂va国产| 免费无遮挡裸体视频| 欧美成人一区二区免费高清观看| 日韩在线高清观看一区二区三区| 嫩草影院精品99| 免费av毛片视频| 成人美女网站在线观看视频| 听说在线观看完整版免费高清| 啦啦啦观看免费观看视频高清| 成人特级av手机在线观看| 91在线观看av| 舔av片在线| 亚洲色图av天堂| 国产精品嫩草影院av在线观看| 亚洲经典国产精华液单| 国产真实乱freesex| 婷婷亚洲欧美| 日本欧美国产在线视频| 亚洲乱码一区二区免费版| 一个人观看的视频www高清免费观看| 寂寞人妻少妇视频99o| 99九九在线精品视频 | 亚洲精品第二区| 男的添女的下面高潮视频| 一级av片app| 亚洲国产精品专区欧美| 中文字幕人妻熟人妻熟丝袜美| 有码 亚洲区| 亚洲欧美成人精品一区二区| 激情五月婷婷亚洲| 亚洲经典国产精华液单| 日韩成人av中文字幕在线观看| 人体艺术视频欧美日本| 国产美女午夜福利| 亚洲精品日韩在线中文字幕| 亚洲欧美日韩另类电影网站| 一级,二级,三级黄色视频| 18禁在线播放成人免费| 视频中文字幕在线观看| 赤兔流量卡办理| www.色视频.com| 丝瓜视频免费看黄片| 男的添女的下面高潮视频| 欧美日韩国产mv在线观看视频| 大香蕉久久网| 人妻少妇偷人精品九色| 大话2 男鬼变身卡| 香蕉精品网在线| 日韩中文字幕视频在线看片| 91成人精品电影| 久久影院123| 99精国产麻豆久久婷婷| 国产乱来视频区| 亚洲伊人久久精品综合| 欧美日韩亚洲高清精品| 久久久国产一区二区| 国产探花极品一区二区| 五月天丁香电影| 午夜av观看不卡| 国产一区有黄有色的免费视频| 国产欧美另类精品又又久久亚洲欧美| 久久久久久久久久成人| 亚洲av免费高清在线观看| 深夜a级毛片| 观看免费一级毛片| 国产日韩一区二区三区精品不卡 | 国产伦精品一区二区三区四那| 97在线视频观看| 亚洲中文av在线| 乱系列少妇在线播放| 日韩人妻高清精品专区| av线在线观看网站| 国产视频首页在线观看| 人妻一区二区av| 国产亚洲精品久久久com| 我的老师免费观看完整版| av国产久精品久网站免费入址| 三上悠亚av全集在线观看 | 99久久精品国产国产毛片| 精品亚洲乱码少妇综合久久| 亚洲精品,欧美精品| 欧美日韩av久久| 伊人久久精品亚洲午夜| 91在线精品国自产拍蜜月| 日本黄色日本黄色录像| 国产高清国产精品国产三级| 欧美老熟妇乱子伦牲交| 亚洲一级一片aⅴ在线观看| 精品一区二区三卡| 成人特级av手机在线观看| 国产色爽女视频免费观看| 少妇人妻一区二区三区视频| 国语对白做爰xxxⅹ性视频网站| 久久国产精品大桥未久av | 2018国产大陆天天弄谢| 大又大粗又爽又黄少妇毛片口| 亚州av有码| 自线自在国产av| 日韩制服骚丝袜av| 亚洲人与动物交配视频| 五月伊人婷婷丁香| 中文字幕免费在线视频6| 国产精品福利在线免费观看| 免费看av在线观看网站| 国产精品成人在线| 天堂俺去俺来也www色官网| 国产黄频视频在线观看| 国产精品嫩草影院av在线观看| 这个男人来自地球电影免费观看 | 亚洲国产精品成人久久小说| 亚洲av国产av综合av卡| 大片免费播放器 马上看| 少妇高潮的动态图| 久久久久久伊人网av| 久久精品久久久久久久性| 一级毛片黄色毛片免费观看视频| 少妇 在线观看| 国产一区二区三区av在线| 久久久久精品性色| 男女边摸边吃奶| 精品国产国语对白av| 纵有疾风起免费观看全集完整版| 乱系列少妇在线播放| 在线天堂最新版资源| 欧美日韩av久久| 日本-黄色视频高清免费观看| 欧美xxxx性猛交bbbb| 国产黄片美女视频| 精品人妻熟女av久视频| 国产真实伦视频高清在线观看| 亚洲国产精品成人久久小说| 只有这里有精品99| 亚洲精品日本国产第一区| 亚洲精品日韩在线中文字幕| 丝袜在线中文字幕| 国产午夜精品久久久久久一区二区三区| 久久久久久人妻| 成人毛片60女人毛片免费| 夜夜骑夜夜射夜夜干| 亚洲激情五月婷婷啪啪| 久久久久精品性色| 国产午夜精品久久久久久一区二区三区| 免费观看的影片在线观看| 国产黄色免费在线视频| 韩国高清视频一区二区三区| 亚洲一区二区三区欧美精品| 美女视频免费永久观看网站| 交换朋友夫妻互换小说| 午夜精品国产一区二区电影| 丰满人妻一区二区三区视频av| 亚洲不卡免费看| 亚洲av男天堂| 天堂俺去俺来也www色官网| 日日撸夜夜添| 丝袜在线中文字幕|