RESEARCH ARTICLES
Published 2025-04-02
Keywords
- Cyberbullying detection,
- multi-modal framework,
- social media,
- natural language processing (NLP),
- artificial intelligence (AI)
How to Cite
M Suchithra, M Sujan, M Bramha Naidu, K Asma, M Lokesh, & C Venkata Subbaiah. (2025). A Comprehensive Multi-Modal Framework For Cyberbullying Detection On Social Media. International Journal of Computational Learning & Intelligence, 4(1), 359–366. https://doi.org/10.5281/zenodo.15123739
Copyright (c) 2025 M Suchithra, M Sujan, M Bramha Naidu, K Asma, M Lokesh, C Venkata Subbaiah

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abstract
The pervasive use of social media has led to an alarming rise in cyberbullying, particularly among younger users, posing significant threats to mental and emotional well-being. Traditional approaches to cyberbullying detection have predominantly focused on textual analysis, which often fails to capture the multi-modal nature of bullying content, including images, videos, and contextual metadata. To address this limitation, we propose a novel multi-modal cyberbullying detection framework that integrates textual, visual, and contextual information to identify bullying behavior more effectively. Our approach leverages advanced deep learning techniques, including Hierarchical Attention Networks (HAN) and Bidirectional Long Short-Term Memory (BiLSTM) networks, to model the complex interactions between different modalities. The framework processes user-generated posts, combining text and image data, along with metadata such as timestamps and user interactions, to predict whether a post constitutes cyberbullying. This research provides a robust, scalable solution for identifying and mitigating harmful content on social networks .References
- Dadvar, M., Trieschnigg, D., & De Jong, F. (2014). Experts and machines against bullies: A hybrid approach to detect cyberbullies. Proceedings of the 27th Canadian Conference on Artificial Intelligence.
- Burnap, P., & Williams, M. L. (2015). Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet.
- Zhao, R., Zhou, A., & Mao, K. (2016). Automatic detection of cyberbullying on social networks based on bullying features. Proceedings of the 17th International Conference on Distributed Computing Networks.
- Al-Garadi, M. A., Varathan, K. D., & Ravana, S. D. (2016). Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network. Computers in Human Behavior.
- Chelmis, C., Zois, D.-S., & Yao, M. (2017). Mining patterns of cyberbullying on Twitter. Proceedings of the IEEE International Conference on Data Mining Workshops.
- Zhang, Z., Robinson, D., & Tepper, J. (2018). Detecting hate speech on Twitter using a convolution-GRU based deep neural network. Proceedings of the European Semantic Web Conference.
- Park, J. H., & Fung, P. (2017). One-step and two-step classification for abusive language detection on Twitter. arXiv preprint arXiv:1706.01206.
- Ahmed, S. T., Sankar, S., & Sandhya, M. (2021).Multi-objective optimal medical data informatics standardization and processing technique for telemedicine via machine learning approach. Journal of Ambient Intelligence and Humanized Computing, 12(5), 5349-5358.
- Zhang, A., Li, B., Wan, S., & Wang, K. (2019). Cyberbullying detection with BIRNN and attention mechanism. Proceedings of the International Conference on Machine Learning and Intelligent Communications.
- Cheng, L., Li, J., Ni, Y., Shao, S., Lin, D., & Liu, H. (2019). XBully: Cyberbullying detection within a multi-modal context. Proceedings of the 12th ACM International Conference on Web Search and Data Mining.
- Soni, D., & Singh, V. K. (2018). See no evil, hear no evil: Audio-visual-textual cyberbullying detection. Proceedings of the ACM on Human-Computer Interaction.
- Yang, Z., Yang, D., Dyer, C., He, X., Smola, A., & Hovy, E. (2016). Hierarchical attention networks for document classification. Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies.
- Ahmed, S. T., Sivakami, R., Banik, D., Khan, S. B., Dhanaraj, R. K., TR, M., & Almusharraf, A. (2024). Federated Learning Framework for Consumer IoMT-Edge Resource Recommendation Under Telemedicine Services. IEEE Transactions on Consumer Electronics.
- Cheng, L., Guo, R., Silva, Y., Hall, D., & Liu, H. (2019). Hierarchical attention networks for cyberbullying detection on the Instagram social network. Proceedings of the SIAM International Conference on Data Mining.
- Yafooz, W. M. S., Al-Dhagan, A., & Alsaeedi, A. (2023). Detecting kids cyberbullying using transfer learning approach: Transformer fine-tuning models. Kids Cybersecurity Using Computational Intelligence Techniques.
- Alotaibi, M., Alotaibi, B., & Razaque, A. (2021). A multichannel deep learning framework for cyberbullying detection on social media. Electronics.
- Burnap, P., & Williams, M. L. (2016). Us and them: Identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science.
- Ahmed, S. T., Priyanka, H. K., Attar, S., & Patted, A. (2017, June). Cataract density ratio analysis under color image processing approach. In 2017 International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 178-180). IEEE.
- Madapuri, Rudra Kumar, and P. C. Senthil Mahesh. “HBS-CRA: Scaling Impact of Change Request Towards Fault Proneness: Defining a Heuristic and Biases Scale (HBS) of Change Request Artifacts (CRA).”Cluster Computing, vol. 22, no. S5, Dec. 2017, pp. 11591–99. https://doi.org/10.1007/s10586-017-1424-0.
- Ahmed, S. T., Basha, S. M., Venkatesan, M., Mathivanan, S. K., Mallik, S., Alsubaie, N., & Alqahtani, M. S. (2023). TVFx–CoVID-19 X-Ray images classification approach using neural networks based feature thresholding technique. BMC Medical Imaging, 23(1), 146.
- Dwaram, Jayanarayana Reddy, and Rudra Kumar Madapuri. “Crop Yield Forecasting by Long Short‐term Memory Network With Adam Optimizer and Huber Loss Function in Andhra Pradesh, India.” Concurrency and Computation Practice and Experience, vol. 34, no. 27, Sept. 2022, https://doi.org/10.1002/cpe.7310.
- Busireddy Seshakagari Haranadha Reddy. “Deep Learning-Based Detection of Hair and Scalp Diseases Using CNN and Image Processing”. Milestone Transactions on Medical Technometrics, vol. 3, no. 1, Mar. 2025, pp. 145-5, doi:10.5281/zenodo.14965660.
- Busireddy Seshakagari Haranadha Reddy, R Venkatramana, & L Jayasree. (2025). Enhancing Apple Fruit Quality Detection with Augmented YOLOv3 Deep Learning Algorithm. International Journal of Human Computations & Intelligence, 4(1), 386–396. https://doi.org/10.5281/zenodo.14998944
- Ahmed, S. T., Ashwini, S., Divya, C., Shetty, M., Anderi, P., & Singh, A. K. (2018). A hybrid and optimized resource scheduling technique using map reduce for larger instruction sets. International Journal of Engineering & Technology, 7(2.33), 843-846.