{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T04:32:15Z","timestamp":1727065935196},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T00:00:00Z","timestamp":1701475200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T00:00:00Z","timestamp":1701475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"DOI":"10.1007\/s13278-023-01158-w","type":"journal-article","created":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T04:27:30Z","timestamp":1701491250000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing cyberbullying detection: a comparative study of ensemble CNN\u2013SVM and BERT models"],"prefix":"10.1007","volume":"14","author":[{"given":"Hiteshi","family":"Saini","sequence":"first","affiliation":[]},{"given":"Himashri","family":"Mehra","sequence":"additional","affiliation":[]},{"given":"Ritu","family":"Rani","sequence":"additional","affiliation":[]},{"given":"Garima","family":"Jaiswal","sequence":"additional","affiliation":[]},{"given":"Arun","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Amita","family":"Dev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,2]]},"reference":[{"key":"1158_CR1","unstructured":"Agarwal A, Xie B, Vovsha I, Rambow O, Passonneau RJ (2011) Sentiment analysis of twitter data. In: Proceedings of the workshop on language in social media (LSM 2011), pp 30\u201338"},{"key":"1158_CR2","unstructured":"Ahmed MF, Mahmud Z, Biash ZT, Ryen AAN, Hossain A, Ashraf FB (2021) Cyberbullying detection using deep neural network from social media comments in bangla language. arXiv preprint arXiv:2106.04506"},{"key":"1158_CR3","doi-asserted-by":"crossref","unstructured":"Al-Ajlan MA, Ykhlef M (2018) Optimized twitter cyberbullying detection based on deep learning. In: 2018 21st Saudi Computer Society National Computer Conference (NCC). IEEE, pp 1\u20135","DOI":"10.1109\/NCG.2018.8593146"},{"key":"1158_CR4","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.chb.2016.05.051","volume":"63","author":"MA Al-Garadi","year":"2016","unstructured":"Al-Garadi MA, Varathan KD, Ravana SD (2016) Cybercrime detection in online communications: the experimental case of cyberbullying detection in the Twitter network. Comput Hum Behav 63:433\u2013443","journal-title":"Comput Hum Behav"},{"issue":"1","key":"1158_CR5","doi-asserted-by":"publisher","first-page":"39","DOI":"10.21608\/ejle.2021.50240.1017","volume":"8","author":"S Almutiry","year":"2021","unstructured":"Almutiry S, Abdel Fattah M (2021) Arabic cyberbullying detection using arabic sentiment analysis. Egypt J Lang Eng 8(1):39\u201350","journal-title":"Egypt J Lang Eng"},{"key":"1158_CR6","unstructured":"Ates EC, Bostanci E, Guzel MS (2021) Comparative performance of machine learning algorithms in cyberbullying detection: using turkish language preprocessing techniques. arXiv preprint arXiv:2101.12718"},{"key":"1158_CR7","doi-asserted-by":"crossref","unstructured":"Banerjee V, Telavane J, Gaikwad P, Vartak P (2019) Detection of cyberbullying using deep neural network. In: 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), IEEE. pp 604\u2013607","DOI":"10.1109\/ICACCS.2019.8728378"},{"key":"1158_CR8","doi-asserted-by":"crossref","unstructured":"Bauman S, Cross D, Walker J (2013) Principles of cyberbullying research. In: definition, methods, and measures, p 2013","DOI":"10.4324\/9780203084601"},{"key":"1158_CR9","unstructured":"Bengio Y, Ducharme R, Vincent P (2000) A neural probabilistic language model. In: Advances in neural information processing systems, vol 13"},{"key":"1158_CR10","doi-asserted-by":"crossref","unstructured":"Chawla NV (2009) Data mining for imbalanced datasets: an overview. In: Data mining and knowledge discovery handbook, pp.875\u2013886","DOI":"10.1007\/978-0-387-09823-4_45"},{"key":"1158_CR11","doi-asserted-by":"crossref","unstructured":"Huang Q, Singh VK, Atrey PK (2014) Cyber bullying detection using social and textual analysis. In: Proceedings of the 3rd international workshop on socially-aware multimedia, pp 3\u20136","DOI":"10.1145\/2661126.2661133"},{"key":"1158_CR12","doi-asserted-by":"crossref","unstructured":"Huang Q, Singh VK, Atrey PK (2014) Cyber bullying detection using social and textual analysis. In: Proceedings of the 3rd international workshop on socially-aware multimedia. pp 3\u20136","DOI":"10.1145\/2661126.2661133"},{"key":"1158_CR13","doi-asserted-by":"crossref","unstructured":"Jain V, Kumar V, Pal V, Vishwakarma DK (2021) Detection of cyberbullying on social media using machine learning. In: 2021 5th International Conference on Computing Methodologies and Communication (ICCMC). IEEE, pp 1091\u20131096","DOI":"10.1109\/ICCMC51019.2021.9418254"},{"issue":"4","key":"1158_CR14","first-page":"50","volume":"27","author":"D Maher","year":"2008","unstructured":"Maher D (2008) Cyberbullying: an ethnographic case study of one Australian upper primary school class. Youth Stud Australia 27(4):50\u201357","journal-title":"Youth Stud Australia"},{"key":"1158_CR15","doi-asserted-by":"crossref","unstructured":"Mangaonkar A, Hayrapetian A, Raje R (2015) Collaborative detection of cyberbullying behavior in Twitter data. In: 2015 IEEE international conference on electro\/information technology (EIT), IEEE, pp 611\u2013616","DOI":"10.1109\/EIT.2015.7293405"},{"key":"1158_CR16","unstructured":"Mikolov T, Sutskever I, Chen K, Corrado GS, Dean J (2013) Distributed representations of words and phrases and their compositionality. In: Advances in neural information processing systems, vol 26"},{"key":"1158_CR17","doi-asserted-by":"crossref","unstructured":"Nandhini BS, Sheeba JI (2015) Cyberbullying detection and classification using information retrieval algorithm. In: Proceedings of the 2015 international conference on advanced research in computer science engineering & technology (ICARCSET 2015), pp 1\u20135","DOI":"10.1145\/2743065.2743085"},{"key":"1158_CR18","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1016\/j.procs.2021.01.207","volume":"181","author":"A Perera","year":"2021","unstructured":"Perera A, Fernando P (2021) Accurate cyberbullying detection and prevention on social media. Procedia Comput Sci 181:605\u2013611","journal-title":"Procedia Comput Sci"},{"issue":"22","key":"1158_CR19","doi-asserted-by":"publisher","first-page":"2810","DOI":"10.3390\/electronics10222810","volume":"10","author":"C Raj","year":"2021","unstructured":"Raj C, Agarwal A, Bharathy G, Narayan B, Prasad M (2021) Cyberbullying detection: hybrid models based on machine learning and natural language processing techniques. Electronics 10(22):2810","journal-title":"Electronics"},{"key":"1158_CR20","doi-asserted-by":"crossref","unstructured":"Reynolds K, Kontostathis A, Edwards L (2011) Using machine learning to detect cyberbullying. In: 2011 10th International conference on machine learning and applications and workshops, vol 2. IEEE, pp 241\u2013244","DOI":"10.1109\/ICMLA.2011.152"},{"key":"1158_CR21","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.chb.2018.12.021","volume":"93","author":"H Rosa","year":"2019","unstructured":"Rosa H, Pereira N, Ribeiro R, Ferreira PC, Carvalho JP, Oliveira S, Coheur L, Paulino P, Sim\u00e3o AV, Trancoso I (2019) Automatic cyberbullying detection: a systematic review. Comput Hum Behav 93:333\u2013345","journal-title":"Comput Hum Behav"},{"issue":"3","key":"1158_CR22","first-page":"315","volume":"25","author":"PK Roy","year":"2022","unstructured":"Roy PK, Singh A, Tripathy AK, Das TK (2022) Cyberbullying detection: an ensemble learning approach. Int J Comput Sci Eng 25(3):315\u2013324","journal-title":"Int J Comput Sci Eng"},{"key":"1158_CR23","doi-asserted-by":"crossref","unstructured":"Sahni A, Raja N (2017) Analyzation and detection of cyberbullying: a Twitter based Indian case study. In: International Conference on Recent Developments in Science, Engineering and Technology, Springer, Singapore, pp 484\u2013497.","DOI":"10.1007\/978-981-10-8527-7_41"},{"issue":"6","key":"1158_CR24","first-page":"26","volume":"6","author":"A Saravanaraj","year":"2016","unstructured":"Saravanaraj A, Sheeba JI, Devaneyan SP (2016) Automatic detection of cyberbullying from twitter. Int J Comput Sci Inf Technol Secur 6(6):26\u201331","journal-title":"Int J Comput Sci Inf Technol Secur"},{"key":"1158_CR25","doi-asserted-by":"crossref","unstructured":"Singh VK, Huang Q, Atrey PK (2016) Cyberbullying detection using probabilistic socio-textual information fusion. In: 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), IEEE, pp 884\u2013887","DOI":"10.1109\/ASONAM.2016.7752342"},{"key":"1158_CR26","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. In: Advances in neural information processing systems, vol 30"},{"key":"1158_CR27","doi-asserted-by":"publisher","unstructured":"Wang J, Fu K, Lu CT (2020) SOSNet: a graph convolutional network approach to fine-grained cyberbullying detection. In: IEEE international conference on big data (Big Data). Atlanta, GA, USA, pp 1699\u20131708. https:\/\/doi.org\/10.1109\/BigData50022.2020.9378065","DOI":"10.1109\/BigData50022.2020.9378065"},{"issue":"3","key":"1158_CR28","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/TAFFC.2016.2531682","volume":"8","author":"R Zhao","year":"2016","unstructured":"Zhao R, Mao K (2016) Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder. IEEE Trans Affect Comput 8(3):328\u2013339","journal-title":"IEEE Trans Affect Comput"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-023-01158-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-023-01158-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-023-01158-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T04:42:03Z","timestamp":1701492123000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-023-01158-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,2]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["1158"],"URL":"https:\/\/doi.org\/10.1007\/s13278-023-01158-w","relation":{},"ISSN":["1869-5469"],"issn-type":[{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,2]]},"assertion":[{"value":"7 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest related to this study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"1"}}