{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T14:10:25Z","timestamp":1727705425005},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T00:00:00Z","timestamp":1659398400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T00:00:00Z","timestamp":1659398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s13278-022-00934-4","type":"journal-article","created":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T08:06:21Z","timestamp":1659427581000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Performance analysis of transformer-based architectures and their ensembles to detect trait-based cyberbullying"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0799-1180","authenticated-orcid":false,"given":"Tasnim","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Shahriar","family":"Ivan","sequence":"additional","affiliation":[]},{"given":"Mohsinul","family":"Kabir","sequence":"additional","affiliation":[]},{"given":"Hasan","family":"Mahmud","sequence":"additional","affiliation":[]},{"given":"Kamrul","family":"Hasan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,2]]},"reference":[{"key":"934_CR1","doi-asserted-by":"crossref","unstructured":"Afsharizadeh M, Ebrahimpour-Komleh H, Bagheri, A (2018) Query-oriented text summarization using sentence extraction technique. In: 2018 4th International Conference on Web Research (ICWR): 128\u2013132 IEEE","DOI":"10.1109\/ICWR.2018.8387248"},{"key":"934_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal S, Awekar A (2018) Deep learning for detecting cyberbullying across multiple social media platforms. In: European Conference on Information Retrieval: 141\u2013153 Springer","DOI":"10.1007\/978-3-319-76941-7_11"},{"key":"934_CR3","doi-asserted-by":"publisher","unstructured":"Ahmed T, Kabir M, Ivan S, Mahmud H, Hasan K (2021) Am i being bullied on social media? an ensemble approach to categorize cyberbullying. In: 2021 IEEE International Conference on Big Data (Big Data): 2442\u20132453 https:\/\/doi.org\/10.1109\/BigData52589.2021.9671594","DOI":"10.1109\/BigData52589.2021.9671594"},{"key":"934_CR4","doi-asserted-by":"crossref","unstructured":"Ali WNHW, Mohd M, Fauzi F (2018) Cyberbullying detection: an overview. In: 2018 Cyber Resilience Conference (CRC): 1\u20133 IEEE","DOI":"10.1109\/CR.2018.8626869"},{"issue":"5","key":"934_CR5","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1007\/s00726-010-0595-2","volume":"39","author":"A Anand","year":"2010","unstructured":"Anand A, Pugalenthi G, Fogel GB, Suganthan P (2010) An approach for classification of highly imbalanced data using weighting and undersampling. Amino acids 39(5):1385\u20131391","journal-title":"Amino acids"},{"key":"934_CR6","doi-asserted-by":"crossref","unstructured":"Badjatiya P, Gupta S, Gupta M, Varma, V Deep (2017) learning for hate speech detection in tweets. In: Proceedings of the 26th International Conference on World Wide Web Companion. WWW \u201917 Companion: 759\u2013760. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva CHE https:\/\/doi.org\/10.1145\/3041021.3054223","DOI":"10.1145\/3041021.3054223"},{"key":"934_CR7","unstructured":"Baldwin T, Cook P, Lui M, MacKinlay A, Wang, L (2013) How noisy social media text, how diffrnt social media sources? In: Proceedings of the Sixth International Joint Conference on Natural Language Processing: 356\u2013364"},{"key":"934_CR8","unstructured":"Bayzick J, Kontostathis A, Edwards L (2011) Detecting the presence of cyberbullying using computer software"},{"key":"934_CR9","unstructured":"Bretschneider U, W\u00f6hner T, Peters R. (2014) Detecting online harassment in social networks"},{"issue":"2","key":"934_CR10","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1002\/poi3.85","volume":"7","author":"P Burnap","year":"2015","unstructured":"Burnap P, Williams ML (2015) Cyber hate speech on twitter: An application of machine classification and statistical modeling for policy and decision making. Policy Int 7(2):223\u2013242","journal-title":"Policy Int"},{"issue":"4","key":"934_CR11","first-page":"719","volume":"21","author":"J Chapin","year":"2016","unstructured":"Chapin J (2016) Adolescents and cyber bullying: The precaution adoption process model. Educat inform technol 21(4):719\u2013728","journal-title":"Educat inform technol"},{"key":"934_CR12","doi-asserted-by":"crossref","unstructured":"Chatzakou, D., Leontiadis, I., Blackburn, J., Cristofaro, E.D., Stringhini, G., Vakali, A., Kourtellis, N.(2019): Detecting cyberbullying and cyberaggression in social media. ACM Trans Web 13(3) doi.org\/10.1145\/3343484","DOI":"10.1145\/3343484"},{"key":"934_CR13","doi-asserted-by":"crossref","unstructured":"Cheng L, Li J, Silva YN, Hall DL, Liu H Xbully (2019): Cyberbullying detection within a multi-modal context. In: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining. WSDM \u201919: 339\u2013347 New York. USA:https:\/\/doi.org\/10.1145\/3289600.3291037","DOI":"10.1145\/3289600.3291037"},{"issue":"2","key":"934_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3441141","volume":"2","author":"L Cheng","year":"2021","unstructured":"Cheng L, Guo R, Silva YN, Hall D, Liu H (2021) Modeling temporal patterns of cyberbullying detection with hierarchical attention networks. ACM\/IMS Transact Data Sci 2(2):1\u201323","journal-title":"ACM\/IMS Transact Data Sci"},{"key":"934_CR15","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-319-71249-9_4","volume-title":"Machine Learning and Knowledge Discovery in Database","author":"H Dani","year":"2017","unstructured":"Dani H, Li J, Liu H (2017) Sentiment informed cyberbullying detection in social media. In: Ceci M, Hollm\u00e9n J, Todorovski L, Vens C, D\u017eeroski S (eds) Machine Learning and Knowledge Discovery in Database. Springer, Cham, pp 52\u201367"},{"issue":"1","key":"934_CR16","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1609\/icwsm.v11i1.14955","volume":"11","author":"T Davidson","year":"2017","unstructured":"Davidson T, Warmsley D, Macy M, Weber I (2017) Automated hate speech detection and the problem of offensive language. Proceed Intern AAAI Conf Web Soc Media 11(1):512\u2013515","journal-title":"Proceed Intern AAAI Conf Web Soc Media"},{"key":"934_CR17","first-page":"235","volume":"12","author":"GL De la Pena Sarrac\u00e9n","year":"2018","unstructured":"De la Pena Sarrac\u00e9n GL, Pons RG, Cuza CEM, Rosso P (2018) Hate speech detection using attention-based lstm. EVALITA Eval NLP Speech Tools Italian 12:235","journal-title":"EVALITA Eval NLP Speech Tools Italian"},{"key":"934_CR18","doi-asserted-by":"crossref","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K 2019 : BERT: Pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: 14171\u20134186https:\/\/doi.org\/10.18653\/v1\/N19-1423.","DOI":"10.18653\/v1\/N19-1423"},{"key":"934_CR19","doi-asserted-by":"publisher","unstructured":"Djuric N, Zhou J, Morris R, Grbovic M, Radosavljevic V, Bhamidipati, N (2015) Hate speech detection with comment embeddings. In: Proceedings of the 24th International Conference on World Wide Web. WWW \u201915 Companion, pp. 29\u201330. Association for Computing Machinery, New York, USA https:\/\/doi.org\/10.1145\/2740908.2742760","DOI":"10.1145\/2740908.2742760"},{"key":"934_CR20","doi-asserted-by":"crossref","unstructured":"Elsafoury F, Katsigiannis S, Wilson SR, Ramzan N, (2021) Does bert pay attention to cyberbullying? In: Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval: 1900\u20131904","DOI":"10.1145\/3404835.3463029"},{"issue":"4","key":"934_CR21","doi-asserted-by":"publisher","first-page":"171","DOI":"10.3390\/info12040171","volume":"12","author":"Y Fang","year":"2021","unstructured":"Fang Y, Yang S, Zhao B, Huang C (2021) Cyberbullying detection in social networks using bi-gru with self-attention mechanism. Information 12(4):171","journal-title":"Information"},{"key":"934_CR22","doi-asserted-by":"crossref","unstructured":"Gamb\u00e4ck B, Sikdar, (2017). UK Using convolutional neural networks to classify hate-speech. In: Proceedings of the First Workshop on Abusive Language Online: 85\u201390","DOI":"10.18653\/v1\/W17-3013"},{"key":"934_CR23","unstructured":"Gupta S, Bolden S, Kachhadia J, Korsunska A, Stromer-Galley J, Polibert (2020) : Classifying political social media messages with bert. In: Social, Cultural and Behavioral Modeling (SBP-BRIMS 2020) Conference. Washington DC"},{"key":"934_CR24","unstructured":"Keskar NS, Mudigere D, Nocedal J, Smelyanskiy M, Tang (2016) PTP On large-batch training for deep learning: Generalization gap and sharp minima. arXiv preprint arXiv:1609.04836"},{"key":"934_CR25","doi-asserted-by":"crossref","unstructured":"Korovesis K, Alexandridis G, Caridakis G, Polydoras P, Tsantilas P. (2020) Leveraging aspect-based sentiment prediction with textual features and document metadata. In: 11th Hellenic Conference on Artificial Intelligence: 168\u2013174","DOI":"10.1145\/3411408.3411433"},{"key":"934_CR26","unstructured":"Liu Y, Ott M, Goyal N, Du J, Joshi M, Chen D, Levy O, Lewis M, Zettlemoyer L, Stoyanov V, Roberta (2019) : A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692"},{"key":"934_CR27","doi-asserted-by":"publisher","unstructured":"Li J, Cheng K, Wang S, Morstatter F, Trevino RP, Tang J, Liu H (2017) Feature selection: A data perspective. ACM Comput. Surv. 50(6) https:\/\/doi.org\/10.1145\/3136625","DOI":"10.1145\/3136625"},{"key":"934_CR28","unstructured":"Loshchilov I, Hutter ,F (2017) Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101"},{"key":"934_CR29","first-page":"13389","volume":"34","author":"J Lun","year":"2020","unstructured":"Lun J, Zhu J, Tang Y, Yang M (2020) Multiple data augmentation strategies for improving performance on automatic short answer scoring. Proceed AAAI Conf Artificial Intell 34:13389\u201313396","journal-title":"Proceed AAAI Conf Artificial Intell"},{"issue":"2","key":"934_CR30","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1080\/0952813X.2017.1409284","volume":"30","author":"S Malmasi","year":"2018","unstructured":"Malmasi S, Zampieri M (2018) Challenges in discriminating profanity from hate speech. J Exp Theor Art Intell 30(2):187\u2013202. https:\/\/doi.org\/10.1080\/0952813X.2017.1409284","journal-title":"J Exp Theor Art Intell"},{"key":"934_CR31","doi-asserted-by":"crossref","unstructured":"Mittos A, Zannettou S, Blackburn J, De Cristofaro, E (2020) and we will fight for our race!\u201d a measurement study of genetic testing conversations on reddit and 4chan. Proceedings of the International AAAI Conference on Web and Social Media 14(1):452\u2013463","DOI":"10.1609\/icwsm.v14i1.7314"},{"key":"934_CR32","doi-asserted-by":"crossref","unstructured":"Nguyen H, Zhang C, Xia C, Yu PS (2020) Dynamic semantic matching and aggregation network for few-shot intent detection. arXiv preprint arXiv:2010.02481","DOI":"10.18653\/v1\/2020.findings-emnlp.108"},{"key":"934_CR33","doi-asserted-by":"publisher","unstructured":"Nobata C, Tetreault J, Thomas A, Mehdad Y, Chang Y (2016) Abusive language detection in online user content. In: Proceedings of the 25th International Conference on World Wide Web. WWW \u201916, pp. 145\u2013153. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE https:\/\/doi.org\/10.1145\/2872427.2883062.","DOI":"10.1145\/2872427.2883062."},{"key":"934_CR34","doi-asserted-by":"publisher","unstructured":"Ottoni R, Cunha E, Magno G, Bernardina P, Meira Jr, W, Almeida V (2018) Analyzing right-wing youtube channels: Hate, violence and discrimination. In: Proceedings of the 10th ACM Conference on Web Science WebSci \u201918: 323\u2013332. Association for Computing Machinery, New York.USA https:\/\/doi.org\/10.1145\/3201064.3201081.","DOI":"10.1145\/3201064.3201081."},{"key":"934_CR35","doi-asserted-by":"crossref","unstructured":"Park JH, Fung P(2017) One-step and Two-step Classification for Abusive Language Detection on Twitter","DOI":"10.18653\/v1\/W17-3006"},{"key":"934_CR36","doi-asserted-by":"crossref","unstructured":"Pradhan, A., Yatam, V.M., Bera, P (2020) : Self-attention for cyberbullying detection. In: 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment: 1\u20136 IEEE","DOI":"10.1109\/CyberSA49311.2020.9139711"},{"key":"934_CR37","first-page":"249","volume":"2020","author":"S Qiu","year":"2020","unstructured":"Qiu S, Xu B, Zhang J, Wang Y, Shen X, De Melo G, Long C, Li X (2020) Easyaug: An automatic textual data augmentation platform for classification tasks. Companion Proceed Web Conf 2020:249\u2013252","journal-title":"Companion Proceed Web Conf"},{"issue":"8","key":"934_CR38","first-page":"9","volume":"1","author":"A Radford","year":"2019","unstructured":"Radford A, Wu J, Child R, Luan D, Amodei D, Sutskever I et al (2019) Language models are unsupervised multitask learners. OpenAI blog 1(8):9","journal-title":"OpenAI blog"},{"key":"934_CR39","doi-asserted-by":"crossref","unstructured":"Rajpurkar P, Zhang J, Lopyrev K, Liang P (2016) Squad: 100,000+ questions for machine comprehension of text. arXiv preprint arXiv:1606.05250","DOI":"10.18653\/v1\/D16-1264"},{"issue":"1","key":"934_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41746-021-00455-y","volume":"4","author":"L Rasmy","year":"2021","unstructured":"Rasmy L, Xiang Y, Xie Z, Tao C, Zhi D (2021) Med-bert: pretrained contextualized embeddings on large-scale structured electronic health records for disease prediction. NPJ digital med 4(1):1\u201313","journal-title":"NPJ digital med"},{"key":"934_CR41","doi-asserted-by":"publisher","unstructured":"Reynolds K, Kontostathis A, Edwards, L. (2011). Using machine learning to detect cyberbullying. In: 2011 10th International Conference on Machine Learning and Applications and Workshops 2: 241\u2013244 https:\/\/doi.org\/10.1109\/ICMLA.2011.152","DOI":"10.1109\/ICMLA.2011.152"},{"key":"934_CR42","doi-asserted-by":"crossref","unstructured":"Rios A, Kavuluru R (2018) Few-shot and zero-shot multi-label learning for structured label spaces. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing. Conference on Empirical Methods in Natural Language Processing 2018: 3132 NIH Public Access","DOI":"10.18653\/v1\/D18-1352"},{"key":"934_CR43","unstructured":"Sanh V, Debut L, Chaumond J, Wolf T Distilbert, a distilled version of bert: smaller, faster, cheaper and lighter. arXiv preprint arXiv:1910.01108"},{"key":"934_CR44","doi-asserted-by":"crossref","unstructured":"Sobhani P, Viktor H, Matwin S (2014) Learning from imbalanced data using ensemble methods and cluster-based undersampling. In: International Workshop on New Frontiers in Mining Complex Patterns: 69\u201383 Springer","DOI":"10.1007\/978-3-319-17876-9_5"},{"key":"934_CR45","doi-asserted-by":"publisher","unstructured":"Squicciarini A, Rajtmajer S, Liu Y, Griffin C (2015) Identification and characterization of cyberbullying dynamics in an online social network. In: Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. ASONAM \u201915: 280\u2013285. Association for Computing Machinery, New York. USA https:\/\/doi.org\/10.1145\/2808797.2809398","DOI":"10.1145\/2808797.2809398"},{"key":"934_CR46","unstructured":"Van\u00a0Hee C, Lefever E, Verhoeven B, Mennes J, Desmet B, De\u00a0Pauw G, Daelemans W, Hoste V (2015) Automatic detection and prevention of cyberbullying. In: International Conference on Human and Social Analytics (HUSO 2015): 13\u201318 IARIA"},{"key":"934_CR47","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L (2017) Polosukhin I attention is all you need. In: Adv Neural Inform ProcessSyst: 5998\u20136008"},{"key":"934_CR48","doi-asserted-by":"publisher","unstructured":"Wang J, Fu K, Lu C-T (2020). Sosnet: A graph convolutional network approach to fine-grained cyberbullying detection. In: 2020 IEEE International Conference on Big Data (Big Data): 1699\u20131708 https:\/\/doi.org\/10.1109\/BigData50022.2020.9378065","DOI":"10.1109\/BigData50022.2020.9378065"},{"key":"934_CR49","unstructured":"Wang J, Fu K, Lu C. (2020) Fine-grained balanced cyberbullying dataset"},{"key":"934_CR50","unstructured":"Waseem Z Are you a racist or am i seeing things? annotator influence on hate speech detection on twitter. In: Proceedings of the First Workshop on NLP and Computational Social Science: 138\u2013142"},{"key":"934_CR51","doi-asserted-by":"crossref","unstructured":"Waseem Z, Hovy D(2016) Hateful symbols or hateful people? predictive features for hate speech detection on twitter. In: Proceedings of the NAACL Student Research Workshop: 88\u201393","DOI":"10.18653\/v1\/N16-2013"},{"key":"934_CR52","unstructured":"Xu J-M, Jun K-S, Zhu X, Bellmore(2012) A Learning from bullying traces in social media. In: Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: 656\u2013666"},{"key":"934_CR53","doi-asserted-by":"crossref","unstructured":"Xu H, Liu B, Shu L, Yu P (2019) Open-world learning and application to product classification. In: The World Wide Web Conference: 3413\u20133419","DOI":"10.1145\/3308558.3313644"},{"key":"934_CR54","unstructured":"Yang, Z., Dai, Z., Yang, Y., Carbonell, J., Salakhutdinov, R.R., Le, Q.V (2019): Xlnet: Generalized autoregressive pretraining for language understanding. Adv neural inform process syst32"},{"issue":"5","key":"934_CR55","doi-asserted-by":"publisher","first-page":"925","DOI":"10.3233\/SW-180338","volume":"10","author":"Z Zhang","year":"2019","unstructured":"Zhang Z, Luo L (2019) Hate speech detection: A solved problem? the challenging case of long tail on twitter. Semantic Web 10(5):925\u2013945","journal-title":"Semantic Web"},{"key":"934_CR56","first-page":"19","volume":"2015","author":"Y Zhu","year":"2015","unstructured":"Zhu Y, Kiros R, Zemel RS, Salakhutdinov R, Urtasun R, Torralba A, Fidler S (2015) Aligning books and movies: Towards story-like visual explanations by watching movies and reading books. IEEE Inter Conf Comput Vision (ICCV) 2015:19\u201327","journal-title":"IEEE Inter Conf Comput Vision (ICCV)"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-022-00934-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-022-00934-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-022-00934-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T13:42:08Z","timestamp":1727703728000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-022-00934-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,2]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["934"],"URL":"https:\/\/doi.org\/10.1007\/s13278-022-00934-4","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"type":"print","value":"1869-5450"},{"type":"electronic","value":"1869-5469"}],"subject":[],"published":{"date-parts":[[2022,8,2]]},"assertion":[{"value":"27 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"99"}}