Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

CNN-FastText Multi-Input (CFMI) Neural Networks for Social Media Clickbait Classification

Author(s): Chirag Sharma*, Gurneet Singh, Pratibha Singh Muttum and Shubham Mahajan*

Volume 17, Issue 6, 2024

Published on: 25 January, 2024

Article ID: e250124226279 Pages: 12

DOI: 10.2174/0126662558283914231221065437

Price: $65

Abstract

Introduction: User-generated video portals, such as YouTube, are facing the challenge of Clickbait. These are used to lure viewers and gain traffic on specific content. The real content inside the video deviates from its title. and a thumbnail. The consequence of this is poor user experience on the platform.

Methods: The existing identification techniques either use pre-trained models or are restricted to text only. Other video metadata is not considered. To tackle this situation of clickbait, we propose a CNN-Fast Text Multi-Input (CFMI) Neural Network. The method employs a self-developed convolutional model, combined with different other video metadata. The thumbnail of any video plays a vital role in gathering user attention; hence, it should also be addressed. With greater expressiveness, it depicts and captures the parallels between the title and thumbnail and the video content.

Results: This research also compares the proposed system with the previous works on various parameters. With the usage of the proposed network, the platforms can easily analyze the videos during the uploading stage. The future belongs to Post Quantum Cryptography (PWC), we reviewed various encryption standards in this paper.

Conclusion: In Industry 4.0, every data bit is crucial and must be preserved carefully. This industry will surely benefit from the model as it will eliminate false and misleading videos from the platform.

Graphical Abstract

[1]
R. Gothankar, F. Di Troia, and M. Stamp, "Clickbait detection for YouTube videos", In: Advances in information security, 2022, pp. 261-284.
[http://dx.doi.org/10.1007/978-3-030-97087-1_11]
[2]
L. Shang, D.Y. Zhang, M. Wang, S. Lai, and D. Wang, "Towards reliable online clickbait video detection: A content-agnostic approach", Knowl. Base. Syst., vol. 182, p. 104851, 2019.
[http://dx.doi.org/10.1016/j.knosys.2019.07.022]
[3]
S. Mathur, GitHub - saurabhmathur96/clickbait-detector: Detects clickbait headlines using deep learning.. Available from: https://github.com/saurabhmathur96/clickbait-detector
[4]
D. López-Sánchez, J.R. Herrero, A.G. Arrieta, and J.M. Corchado, "Hybridizing metric learning and case-based reasoning for adaptable clickbait detection", Appl. Intell., vol. 48, no. 9, pp. 2967-2982, 2018.
[http://dx.doi.org/10.1007/s10489-017-1109-7]
[5]
A. Chakraborty, B. Paranjape, S. Kakarla, and N. Ganguly, "Stop Clickbait: Detecting and preventing clickbaits in online news media", In: 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2016.
[http://dx.doi.org/10.1109/ASONAM.2016.7752207]
[6]
Y Zhou, "Clickbait detection in tweets using self-attentive network", arXiv, 2017.
[7]
A. Agrawal, "Clickbait detection using deep learning", In: 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), 2016.
[http://dx.doi.org/10.1109/NGCT.2016.7877426]
[8]
V. Piek, "Newsreader: How semantic web helps natural language processing helps semantic web", Special Issue Knowledge Based SystemsElsevier, .
[9]
A. Geçkil, A.A. Munger, E. Gündoğan, and M. Kaya, "A clickbait detection method on news sites", In: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2018.
[http://dx.doi.org/10.1109/ASONAM.2018.8508452]
[10]
V. Kumar, D. Khattar, S. Gairola, Y.K. Lal, and V. Varma, "Identifying Clickbait: A multi-strategy approach using neural networks", arXiv, pp. 1225-1228, 2018.
[http://dx.doi.org/10.1145/3209978.3210144]
[11]
S. Chawda, A. Patil, A. Singh, and A. Save, "A novel approach for clickbait detection", In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), 2019.
[http://dx.doi.org/10.1109/ICOEI.2019.8862781]
[12]
M.A. Shaikh, and S. Annappanavar, "A comparative approach for clickbait detection using deep learning", In: 2020 IEEE Bombay Section Signature Conference (IBSSC), 2020.
[http://dx.doi.org/10.1109/IBSSC51096.2020.9332172]
[13]
"Clickbait challenge", Available from: https://www.clickbait-challenge.org/#data
[14]
V. Vorakitphan, F-Y. Leu, and Y-C. Fan, "Clickbait detection based on word embedding models", In: Innovative Mobile and Internet Services in Ubiquitous Computing, 2018, pp. 557-564.
[http://dx.doi.org/10.1007/978-3-319-93554-6_54]
[15]
P. Thomas, "Clickbait Identification using Neural Networks", arXiv, 2017.
[16]
S. Zannettou, S. Chatzis, K. Papadamou, and M. Sirivianos, "The good, the bad and the bait: detecting and characterizing clickbait on youtube", In: IEEE Symposium on Security and Privacy Workshops, 2018.
[http://dx.doi.org/10.1109/SPW.2018.00018]
[17]
"GitHub - alessiovierti/youtube-clickbait-detector: Automatically detect clickbait Youtube videos from their title with a 96% F1 Score", Available from: https://github.com/alessiovierti/youtube-clickbait-detector
[18]
P. Bojanowski, E. Grave, A. Joulin, and T. Mikolov, "Enriching word vectors with subword information", Trans. Assoc. Comput. Linguist., vol. 5, pp. 135-146, 2017.
[http://dx.doi.org/10.1162/tacl_a_00051]
[19]
F. Peccia, "Batch normalization: Theory and how to use it with Tensorflow", Available from: https://towardsdatascience.com/batch-normalization-theory-and-how-to-use-it-with-tensorflow-1892ca0173ad
[20]
R. Pramoditha, "How to apply L1 and L2 regularization techniques to KERAS models", Available from: https://medium.com/data-science-365/how-to-apply-l1-and-l2-regularization-techniques-to-keras-models-da6249d8a469
[21]
S. Ruder, "An overview of gradient descent optimization algorithms", arXiv, 2016.
[22]
C. Bonnett, "Classifying e-commerce products based on images and text-Adventures in Machine Learning", Available from: http://cbonnett.github.io/Insight.html
[23]
Y. Liu, L. Lin, L. Jiang, W. Zhang, X. Wang, M. Gheisari, T. Gong, C. Gao, and H.E. Najafabadi, "A blockchain‐based privacy‐preserving advertising attribution architecture: Requirements, design, and a prototype implementation", Softw. Pract. Exper., vol. 53, no. 8, pp. 1700-1721, 2023.
[http://dx.doi.org/10.1002/spe.3209]
[24]
M. Gheisari, "Deep learning: Applications, architectures, models, tools, and frameworks: a comprehensive survey", CAAI Transactions on Intelligence Technology, vol. 8, no. 1, pp. 1-26, 2023.
[http://dx.doi.org/10.1049/cit2.12180]
[25]
H. Hajiaghai, R. Rezaei, M. Gheisari, Y. Liu, N. Khodabakhshi-Javinani, and S. Khammar, "A new security alarm based on interaction", Artif. Intell. Appl., 2023.
[http://dx.doi.org/10.47852/bonviewAIA3202594]
[26]
K. Xu, H. Zhang, Y. Li, Y. Zhang, R. Lai, and Y. Liu, "An ultra-low power TinyML System for real-time visual processing at edge", IEEE Trans. Circuits Syst. II Express Briefs, vol. 70, no. 7, pp. 2640-2644, 2023.
[http://dx.doi.org/10.1109/TCSII.2023.3239044]
[27]
Q. Zheng, X. Tian, Z. Yu, N. Jiang, A. Elhanashi, S. Saponara, and R. Yu, "Application of wavelet-packet transform driven deep learning method in PM2.5 concentration prediction: A case study of Qingdao, China", Sustain Cities Soc., vol. 92, p. 104486, 2023.
[http://dx.doi.org/10.1016/j.scs.2023.104486]
[28]
Q. Zheng, X. Tian, Z. Yu, H. Wang, A. Elhanashi, and S. Saponara, "DL-PR: Generalized automatic modulation classification method based on deep learning with priori regularization", Eng. Appl. Artif. Intell., vol. 122, p. 106082, 2023.
[http://dx.doi.org/10.1016/j.engappai.2023.106082]
[29]
H. Yi, "Machine learning method with applications in hardware security of post-quantum cryptography", J. Grid Comput., vol. 21, no. 2, p. 19, 2023.
[http://dx.doi.org/10.1007/s10723-023-09643-4]
[30]
O.O. Kyзнeцoв, D. Zakharov, and E. Frontoni, "Deep learning-based biometric cryptographic key generation with post-quantum security", Research Square, 2023.
[http://dx.doi.org/10.21203/rs.3.rs-2913502/v1]
[31]
S. Marzougui, N. Wisiol, P. Gersch, J. Krämer, and J-P. Seifert, "Machine-Learning Side-Channel attacks on the GALACTICS Constant-time implementation of BLISS", In: Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022.
[http://dx.doi.org/10.1145/3538969.3538980]
[32]
G. Barthe, S. Belaïd, T. Espitau, P-A. Fouque, M. Rossi, and M. Tibouchi, "GALACTICS: Gaussian sampling for lattice-based constant- time implementation of cryptographic signatures, revisited", The 2019 ACM SIGSAC Conference, 2019.
[http://dx.doi.org/10.1145/3319535.3363223]
[33]
M.W. Osborne, "Applications of post-quantum cryptography - survey and application of machine learning", Available from: https://hdl.handle.net/11124/176963
[34]
D.T. Dam, T.H. Tran, V.P. Hoang, C.K. Pham, and T.T. Hoang, "A survey of Post-quantum Cryptography: Start of a new race", Cryptography, vol. 7, no. 3, p. 40, 2023.
[http://dx.doi.org/10.3390/cryptography7030040]
[35]
S. Balogh, O. Gallo, R. Ploszek, P. Špaček, and P. Zajac, "IoT security challenges: Cloud and blockchain, postquantum cryptography, and evolutionary techniques", Electronics, vol. 10, no. 21, p. 2647, 2021.
[http://dx.doi.org/10.3390/electronics10212647]
[36]
P.R. Chandre, B.D. Shendkar, S. Deshmukh, S. Kakade, and S. Potdukhe, "Machine learning-enhanced advancements in quantum cryptography: A comprehensive review and future prospects", Int. J. Recent Innov. Trends Comput. Commun., vol. 11, no. 11s, pp. 642-655, 2023.
[http://dx.doi.org/10.17762/ijritcc.v11i11s.8300]
[37]
F. Valdez, and P. Melín, "A review on quantum computing and deep learning algorithms and their applications", Soft Comput., vol. 27, no. 18, pp. 13217-13236, 2023.
[http://dx.doi.org/10.1007/s00500-022-07037-4] [PMID: 35411203]
[38]
B.S. Rocha, J.A.M. Xexéo, and R.H. Torres, "Post-quantum cryptographic algorithm identification using machine learning", Journal of Information Security and Cryptography, vol. 9, no. 1, pp. 1-8, 2022.
[http://dx.doi.org/10.17648/jisc.v9i1.81]
[39]
G. Yalamuri, P. Honnavalli, and S. Eswaran, "A review of the present cryptographic arsenal to deal with post-quantum threats", Procedia Comput. Sci., vol. 215, pp. 834-845, 2022.
[http://dx.doi.org/10.1016/j.procs.2022.12.086]
[40]
D. Bellizia, N. Mrabet, A. Fournaris, S. Pontie, F. Regazzoni, F. Standaert, E. Tasso, and E. Valea, "Post-Quantum Cryptography: Challenges and opportunities for robust and secure HW Design", In: 2021 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Athens, Greece, 2021, pp. 1-6.
[http://dx.doi.org/10.1109/DFT52944.2021.9568301]
[41]
M. Kumar, "Post-quantum cryptography Algorithm’s standardization and performance analysis", Array, vol. 15, p. 100242, 2022.
[http://dx.doi.org/10.1016/j.array.2022.100242]
[42]
A. Vaishnavi, and S. Pillai, "Cybersecurity in the Quantum Era-A study of perceived risks in conventional cryptography and discussion on post quantum methods", J. Phys. Conf. Ser., vol. 1964, no. 4, p. 042002, 2021.
[http://dx.doi.org/10.1088/1742-6596/1964/4/042002]
[43]
V. Chamola, A. Jolfaei, V. Chanana, P. Parashari, and V. Hassija, "Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography", Comput. Commun., vol. 176, pp. 99-118, 2021.
[http://dx.doi.org/10.1016/j.comcom.2021.05.019]
[44]
J. Madhloom, and G. Ali, "Literature review and comprehensive evaluation security and privacy in wireless network and internet of things (IoT)",
[45]
C. Sharma, A. Bagga, R. Sobti, M. Shabbaz, and R. Amin, "A robust image encrypted watermarking technique for neurodegenerative disorder diagnosis and its applications", Comput. Math. Methods Med., vol. 2021, p. 8081276, 2021.
[http://dx.doi.org/10.1155/2021/8081276]
[46]
C. Sharma, B. Amandeep, R. Sobti, T. Lohani, and M. Shabaz, A secured frame selection based video watermarking technique to address quality loss of data: combining graph based transform, singular valued decomposition, and hyperchaotic encryption., vol. 2021. Security and Communication Networks, 2021.
[47]
C. Sharma, G. Singh, and G. Singh Saini, "Efficient video watermarking technique for quality loss of data", Indian J. Sci. Technol., vol. 9, no. 47, 2016.
[http://dx.doi.org/10.17485/ijst/2015/v8i1/106814]
[48]
C. Sharma, and A. Bagga, "Video watermarking scheme based on DWT, SVD, rail fence for quality loss of data", In: 2018 4th International Conference on Computing Sciences (ICCS), 2018.
[http://dx.doi.org/10.1109/ICCS.2018.00020]

Rights & Permissions Print Cite
© 2025 Bentham Science Publishers | Privacy Policy