IJCOPE Journal

UGC Logo DOI / ISO Logo

International Journal of Creative and Open Research in Engineering and Management

A Peer-Reviewed, Open-Access International Journal Supporting Multidisciplinary Research, Digital Publishing Standards, DOI Registration, and Academic Indexing.
Journal Information
ISSN: 3108-1754 (Online)
Crossref DOI: Available
ISO Certification: 9001:2015
Publication Fee: 599/- INR
Compliance: UGC Journal Norms
License: CC BY 4.0
Peer Review: Double Blind
Volume 02, Issue 04

Published on: April 2026

AUTOMATED CYBERBULLYING DETECTION USING MACHINE LEARNING WITH TF- IDF FEATURES

E.Sai Charan S. Aishwarya k.Shravya G.Varshini

Abdul Majeed

Vidya Jyothi Institute of Technology Hyderabad

Article Status

Plagiarism Passed Peer Reviewed Open Access

Available Documents

Abstract

Cyberbullying has become a serious social issue with the rapid growth of social media platforms. The massive volume of online user-generated content makes manual moderation ineffective and inconsistent. This research proposes an automated cyberbullying detection system using Machine Learning and Natural Language Processing techniques. Textual data is preprocessed and transformed using TF-IDF (Term Frequency–Inverse Document Frequency) vectorization to extract meaningful statistical features. Supervised classification algorithms such as Support Vector Machine (SVM) and Multinomial Naive Bayes are implemented to classify content as bullying or non-bullying.

Experimental evaluation demonstrates that TF-IDF combined with traditional machine learning classifiers provides an efficient and computationally lightweight solution for explicit abuse detection. The study also highlights the limitations of frequency-based approaches in handling sarcasm, contextual ambiguity, and evolving slang. The proposed model offers a scalable framework suitable for real-time deployment in social media platforms.

Keywords: Cyberbullying Detection, Machine Learning, TF-IDF, Natural Language Processing, Text Classification, SVM, Naive Bayes

How to Cite this Paper

Charan, E., Aishwarya, S., k.Shravya, & G.Varshini, (2026). Automated Cyberbullying Detection Using Machine Learning With TF- IDF Features. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.999

Charan, E.Sai, et al.. "Automated Cyberbullying Detection Using Machine Learning With TF- IDF Features." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.999.

Charan, E.Sai,S. Aishwarya, k.Shravya, and G.Varshini. "Automated Cyberbullying Detection Using Machine Learning With TF- IDF Features." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.999.

Search & Index

References


  • Agrawal and A. Awekar, “Deep learning for detecting cyberbullying across multiple social media platforms,” Journal of Information Processing Systems, vol. 14, no. 5, pp. 1026–1045, 2018.

  • Dinakar, R. Reichart, and H. Lieberman, “Modeling the detection of textual cyberbullying,” in Proceedings of the International AAAI Conference on Web and Social Media (ICWSM), 2011, pp. 11–17.

  • Rajaraman and J. D. Ullman, Mining of Massive Datasets. Cambridge University Press, 2011.

  • Pedregosa et al., “Scikit-learn: Machine learning in Python,” Journal of Machine Learning Research, vol. 12, pp. 2825–2830, 2011.

  • Cortes and V. Vapnik, “Support-vector networks,” Machine Learning, vol. 20, no. 3, pp. 273– 297, 1995.

  • Joachims, “Text categorization with Support Vector Machines: Learning with many relevant features,” in Proceedings of the European Conference on Machine Learning (ECML), 1998, pp. 137–142.

  • Bird, E. Klein, and E. Loper, Natural Language Processing with Python. O’Reilly Media, 2009.

  • Devlin, M. Chang, K. Lee, and K. Toutanova, “BERT: Pre-training of deep bidirectional transformers for language understanding,” in Proceedings of NAACL-HLT, 2019, pp. 4171–4186.

Ethical Compliance & Review Process

  • All submissions are screened under plagiarism detection.
  • Review follows editorial policy.
  • Authors retain copyright.
  • Peer Review Type: Double-Blind Peer Review
  • Published on: May 02 2026
CCBYNC

This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

View License
Scroll to Top