{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T22:40:56Z","timestamp":1760740856086,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819534555"},{"type":"electronic","value":"9789819534562"}],"license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3456-2_31","type":"book-chapter","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:24:15Z","timestamp":1760599455000},"page":"446-460","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Adaptive Federated Framework for\u00a0Trustworthy Multimodal Cyberbullying Detection"],"prefix":"10.1007","author":[{"given":"Weiqi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Youyang","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Anurrop","family":"Gaddam","sequence":"additional","affiliation":[]},{"given":"Asef","family":"Nazari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"31_CR1","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3, 637\u2013646 (2016)","journal-title":"IEEE Internet Things J."},{"key":"31_CR2","first-page":"1","volume":"119","author":"E Union","year":"2016","unstructured":"Union, E.: Regulation (EU) 2016\/679 of the European parliament and of the council (General Data Protection Regulation). Official J. Eur. Union L 119, 1\u201388 (2016)","journal-title":"Official J. Eur. Union L"},{"issue":"22","key":"31_CR3","doi-asserted-by":"publisher","first-page":"2810","DOI":"10.3390\/electronics10222810","volume":"10","author":"C Raj","year":"2021","unstructured":"Raj, C., Agarwal, A., Bharathy, G., Narayan, B., Prasad, M.: Cyberbullying detection: hybrid models based on machine learning and natural language processing techniques. Electronics 10(22), 2810 (2021)","journal-title":"Electronics"},{"key":"31_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2023.100293","volume":"19","author":"A Yao","year":"2023","unstructured":"Yao, A.: Differential privacy in edge computing-based smart city applications: security issues, solutions and future directions. Array 19, 100293 (2023)","journal-title":"Array"},{"key":"31_CR5","doi-asserted-by":"publisher","unstructured":"Pereira, G.: In: Schweiger, G. (ed.) Poverty, Inequality and the Critical Theory of Recognition. PP, vol. 3, pp. 83\u2013106. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45795-2_4","DOI":"10.1007\/978-3-030-45795-2_4"},{"issue":"5","key":"31_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2023.103454","volume":"60","author":"T Mahmud","year":"2023","unstructured":"Mahmud, T., Ptaszynski, M., Eronen, J., Masui, F.: Cyberbullying detection for low-resource languages and dialects: review of the state of the art. Inf. Process. Manag. 60(5), 103454 (2023)","journal-title":"Inf. Process. Manag."},{"key":"31_CR7","first-page":"496","volume":"2021","author":"S Ge","year":"2021","unstructured":"Ge, S., Cheng, L., Liu, H.: Improving cyberbullying detection with user interaction. Proc. Web Conf. 2021, 496\u2013506 (2021)","journal-title":"Proc. Web Conf."},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Wang, J., Fu, K., Lu, C.T.: SOSNet: a graph convolutional network approach to fine-grained cyberbullying detection. In: Proceedings of the 2020 IEEE International Conference on Big Data, pp.\u00a01699\u20131708 (2020)","DOI":"10.1109\/BigData50022.2020.9378065"},{"key":"31_CR9","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.adolescence.2021.10.003","volume":"93","author":"JE Copp","year":"2021","unstructured":"Copp, J.E., Mumford, E.A., Taylor, B.G.: Online sexual harassment and cyberbullying in a nationally representative sample of teens: Prevalence, predictors, and consequences. J. Adolesc. 93, 202\u2013211 (2021)","journal-title":"J. Adolesc."},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"1067484","DOI":"10.3389\/fpsyg.2023.1067484","volume":"14","author":"BP Hendry","year":"2023","unstructured":"Hendry, B.P., Hellsten, L.A.M., McIntyre, L.J., Smith, B.R.R.: Recommendations for cyberbullying prevention and intervention: a Western Canadian perspective from key stakeholders. Front. Psychol. 14, 1067484 (2023)","journal-title":"Front. Psychol."},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Rahman, N.S.A.N.A., Sahabudin, D.N.E., Phon, M.F.A., Razak, Raffei, A.F.M.: Factors affecting cyberbullying behaviours among university students: a review. In: Proceedings of the 2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS), pp. 342\u2013346 (2023)","DOI":"10.1109\/ICSECS58457.2023.10256292"},{"issue":"12","key":"31_CR12","doi-asserted-by":"publisher","first-page":"5281","DOI":"10.1002\/pits.23032","volume":"60","author":"S Halliday","year":"2023","unstructured":"Halliday, S., Taylor, A., Turnbull, D., Gregory, T.: The relationship between early adolescent cyberbullying victimization and later emotional wellbeing and academic achievement. Psychol. Sch. 60(12), 5281\u20135301 (2023)","journal-title":"Psychol. Sch."},{"issue":"5","key":"31_CR13","doi-asserted-by":"publisher","first-page":"179","DOI":"10.3390\/fi15050179","volume":"15","author":"MT Hasan","year":"2023","unstructured":"Hasan, M.T.: A review on deep-learning-based cyberbullying detection. Future Internet 15(5), 179 (2023)","journal-title":"Future Internet"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Dong, C., et al.: A federated multi-modal learning framework powered by distributed ledgers for cyber-safe and efficient UAV delivery systems. In: Proc. 2023 IEEE International Conference on Data Mining Workshops (ICDMW), pp.\u00a01032\u20131039 (2023)","DOI":"10.1109\/ICDMW60847.2023.00136"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Yao, A., et al.: FedShufde: A privacy preserving framework of federated learning for edge-based smart UAV delivery system. Future Gener. Comput. Syst., 107706 (2025)","DOI":"10.1016\/j.future.2025.107706"},{"key":"31_CR16","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2021.681299","volume":"12","author":"L Zhao","year":"2021","unstructured":"Zhao, L., Yu, J.: A meta-analytic review of moral disengagement and cyberbullying. Front. Psychol. 12, 681299 (2021)","journal-title":"Front. Psychol."},{"issue":"20","key":"31_CR17","doi-asserted-by":"publisher","first-page":"10623","DOI":"10.3390\/ijerph182010623","volume":"18","author":"J Lee","year":"2021","unstructured":"Lee, J., Chun, J., Kim, J., Lee, J., Lee, S.: A social-ecological approach to understanding the relationship between cyberbullying victimization and suicidal ideation in South Korean adolescents: The moderating effect of school connectedness. Int. J. Environ. Res. Public Health 18(20), 10623 (2021)","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"31_CR18","unstructured":"Ali, A., Xuan, M.: Fog-Based IoT Data Processing for Cyberbullying Detection: Integrating CNN-BiLSTM-GRU Models and GDPR Compliance. (in press) (2024)"},{"key":"31_CR19","unstructured":"Hussain,T., Wahab, A.: Real-Time Cyberbullying Detection in Online Social Networks with CNN-BiLSTM-GRU Models: A Fog-Based IoT Approach (in press) (2024)"},{"issue":"1","key":"31_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-016-0398-x","volume":"6","author":"RI Rafiq","year":"2016","unstructured":"Rafiq, R.I.: Analysis and detection of labeled cyberbullying instances in Vine, a video-based social network. Soc. Netw. Anal. Min. 6(1), 1\u201316 (2016). https:\/\/doi.org\/10.1007\/s13278-016-0398-x","journal-title":"Soc. Netw. Anal. Min."},{"issue":"3","key":"31_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439726","volume":"54","author":"S Minaee","year":"2021","unstructured":"Minaee, S., et al.: Deep learning-based text classification: a comprehensive review. ACM Comput. Surv. 54(3), 1\u201340 (2021)","journal-title":"ACM Comput. Surv."},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Tsai, Y.H.H., et al.: Multimodal transformer for unaligned multimodal language sequences. In: Proceedings of the Annual Meeting Association Computing Linguistics (ACL), pp.\u00a06558\u20136569 (2019)","DOI":"10.18653\/v1\/P19-1656"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3456-2_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T22:05:15Z","timestamp":1760738715000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3456-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"ISBN":["9789819534555","9789819534562"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3456-2_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"17 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyoto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2025.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}