{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:24:04Z","timestamp":1776108244467,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s00530-020-00701-5","type":"journal-article","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T08:06:56Z","timestamp":1602576416000},"page":"1839-1852","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":137,"title":["Cyberbullying detection solutions based on deep learning architectures"],"prefix":"10.1007","volume":"29","author":[{"given":"Celestine","family":"Iwendi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9851-4103","authenticated-orcid":false,"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[]},{"given":"Suleman","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Praveen Kumar Reddy","family":"Maddikunta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,13]]},"reference":[{"key":"701_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Awekar, A.: Deep learning for detecting cyberbullying across multiple social media platforms. In: European Conference on Information Retrieval, pp. 141\u2013153. Springer (2018)","DOI":"10.1007\/978-3-319-76941-7_11"},{"key":"701_CR2","doi-asserted-by":"crossref","unstructured":"Al-Ajlan, M.A., Ykhlef, M.: Optimized twitter cyberbullying detection based on deep learning. In: 2018 21st Saudi Computer Society National Computer Conference (NCC), pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/NCG.2018.8593146"},{"key":"701_CR3","doi-asserted-by":"crossref","unstructured":"Al-Hashedi, M., Soon, L.K., Goh, H.N.: Cyberbullying detection using deep learning and word embeddings: An empirical study. In: Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems, pp. 17\u201321 (2019)","DOI":"10.1145\/3372422.3373592"},{"key":"701_CR4","doi-asserted-by":"crossref","unstructured":"Banerjee, V., Telavane, J., Gaikwad, P., Vartak, P.: Detection of cyberbullying using deep neural network. In: 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), pp. 604\u2013607. IEEE (2019)","DOI":"10.1109\/ICACCS.2019.8728378"},{"key":"701_CR5","unstructured":"Bhaskaran, J., Kamath, A., Paul, S.: DISCo: Detecting insults in social commentary. Stanford CS 229 Repository (2017)"},{"key":"701_CR6","doi-asserted-by":"crossref","unstructured":"Bozyi\u011fit, A., Utku, S., Nasibo\u011flu, E.: Cyberbullying detection by using artificial neural network models. In: 2019 4th International Conference on Computer Science and Engineering (UBMK), pp. 520\u2013524. IEEE (2019)","DOI":"10.1109\/UBMK.2019.8907118"},{"key":"701_CR7","doi-asserted-by":"crossref","unstructured":"Chavan, V.S., Shylaja, S.: Machine learning approach for detection of cyber-aggressive comments by peers on social media network. In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2354\u20132358. IEEE (2015)","DOI":"10.1109\/ICACCI.2015.7275970"},{"key":"701_CR8","doi-asserted-by":"crossref","unstructured":"Chen, H., Mckeever, S., Delany, S.J.: Presenting a labelled dataset for real-time detection of abusive user posts. In: Proceedings of the International Conference on Web Intelligence, pp. 884\u2013890 (2017)","DOI":"10.1145\/3106426.3106456"},{"key":"701_CR9","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zhou, Y., Zhu, S., Xu, H.: Detecting offensive language in social media to protect adolescent online safety. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, pp. 71\u201380. IEEE (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"issue":"1","key":"701_CR10","first-page":"77","volume":"25","author":"JF Chisholm","year":"2014","unstructured":"Chisholm, J.F.: Review of the status of cyberbullying and cyberbullying prevention. J. Inf. Syst. Educ. 25(1), 77 (2014)","journal-title":"J. Inf. Syst. Educ."},{"key":"701_CR11","unstructured":"Dadvar, M., Eckert, K.: Cyberbullying detection in social networks using deep learning based models; a reproducibility study. arXiv preprint arXiv:1812.08046 (2018)"},{"key":"701_CR12","doi-asserted-by":"crossref","unstructured":"Dwivedi, A.D., Malina, L., Dzurenda, P., Srivastava, G.: Optimized blockchain model for internet of things based healthcare applications. In: 2019 42nd International Conference on Telecommunications and Signal Processing (TSP), pp. 135\u2013139 (2019)","DOI":"10.1109\/TSP.2019.8769060"},{"issue":"2","key":"701_CR13","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s13222-016-0221-x","volume":"16","author":"I Frommholz","year":"2016","unstructured":"Frommholz, I., Al-Khateeb, H.M., Potthast, M., Ghasem, Z., Shukla, M., Short, E.: On textual analysis and machine learning for cyberstalking detection. Datenbank-Spektrum 16(2), 127\u2013135 (2016)","journal-title":"Datenbank-Spektrum"},{"key":"701_CR14","doi-asserted-by":"crossref","unstructured":"Haidar, B., Chamoun, M., Serhrouchni, A.: Multilingual cyberbullying detection system: Detecting cyberbullying in arabic content. In: 2017 1st Cyber Security in Networking Conference (CSNet), pp. 1\u20138. IEEE (2017)","DOI":"10.1109\/CSNET.2017.8242005"},{"key":"701_CR15","doi-asserted-by":"publisher","first-page":"72650","DOI":"10.1109\/ACCESS.2020.2988160","volume":"8","author":"C Iwendi","year":"2020","unstructured":"Iwendi, C., Jalil, Z., Javed, A.R., Reddy, T., Kaluri, R., Srivastava, G., Jo, O.: Keysplitwatermark: zero watermarking algorithm for software protection against cyber-attacks. IEEE Access 8, 72650\u201372660 (2020)","journal-title":"IEEE Access"},{"issue":"8","key":"701_CR16","doi-asserted-by":"publisher","first-page":"2216","DOI":"10.3390\/s20082216","volume":"20","author":"AR Javed","year":"2020","unstructured":"Javed, A.R., Sarwar, M.U., Khan, S., Iwendi, C., Mittal, M., Kumar, N.: Analyzing the effectiveness and contribution of each axis of tri-axial accelerometer sensor for accurate activity recognition. Sensors 20(8), 2216 (2020)","journal-title":"Sensors"},{"key":"701_CR17","doi-asserted-by":"crossref","unstructured":"Jeyasheeli, P.G., Selva, J.J.: An iot design for smart lighting in green buildings based on environmental factors. In: 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/ICACCS.2017.8014559"},{"issue":"17","key":"701_CR18","doi-asserted-by":"publisher","first-page":"23973","DOI":"10.1007\/s11042-019-7234-z","volume":"78","author":"A Kumar","year":"2019","unstructured":"Kumar, A., Sachdeva, N.: Cyberbullying detection on social multimedia using soft computing techniques: a meta-analysis. Multimed. Tools Appl. 78(17), 23973\u201324010 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"701_CR19","unstructured":"Livingstone, S., Haddon, L., Hasebrink, U., \u00d3lafsson, K., O\u2019Neill, B., Smahel, D., Staksrud, E.: Eu kids online: Findings, methods, recommendations. LSE, London, EU Kids Online. http:\/\/lsedesignunit.com\/EUKidsOnline (2014). Accessed May 2020"},{"key":"701_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3997","author":"M Mittal","year":"2020","unstructured":"Mittal, M., Iwendi, C., Khan, S., Rehman Javed, A.: Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using levenberg-marquardt neural network and gated recurrent unit for intrusion detection system. Trans. Emerg. Telecommun. Technol. (2020). https:\/\/doi.org\/10.1002\/ett.3997","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"701_CR21","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s42380-019-00025-7","volume":"2","author":"GR Paez","year":"2020","unstructured":"Paez, G.R.: Assessing predictors of cyberbullying perpetration among adolescents: the influence of individual factors, attachments, and prior victimization. Int. J. Bullying Prev. 2, 149\u2013159 (2020). https:\/\/doi.org\/10.1007\/s42380-019-00025-7","journal-title":"Int. J. Bullying Prev."},{"issue":"2","key":"701_CR22","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1177\/1541204006286288","volume":"4","author":"JW Patchin","year":"2006","unstructured":"Patchin, J.W., Hinduja, S.: Bullies move beyond the schoolyard: a preliminary look at cyberbullying. Youth Viol. Juv. Just. 4(2), 148\u2013169 (2006)","journal-title":"Youth Viol. Juv. Just."},{"key":"701_CR23","doi-asserted-by":"crossref","unstructured":"Pawar, R., Raje, R.R.: Multilingual cyberbullying detection system. In: 2019 IEEE International Conference on Electro Information Technology (EIT), pp. 040\u2013044. IEEE (2019)","DOI":"10.1109\/EIT.2019.8833846"},{"key":"701_CR24","doi-asserted-by":"crossref","unstructured":"Rakib, T.B.A., Soon, L.K.: Using the reddit corpus for cyberbully detection. In: Asian Conference on Intelligent Information and Database Systems, pp. 180\u2013189. Springer (2018)","DOI":"10.1007\/978-3-319-75417-8_17"},{"key":"701_CR25","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.chb.2018.12.021","volume":"93","author":"H Rosa","year":"2019","unstructured":"Rosa, H., Pereira, N., Ribeiro, R., Ferreira, P.C., Carvalho, J.P., Oliveira, S., Coheur, L., Paulino, P., Sim\u00e3o, A.V., Trancoso, I.: Automatic cyberbullying detection: a systematic review. Comput. Hum. Behav. 93, 333\u2013345 (2019)","journal-title":"Comput. Hum. Behav."},{"key":"701_CR26","doi-asserted-by":"crossref","unstructured":"Siriaraya, P., Zhang, Y., Wang, Y., Kawai, Y., Mittal, M., Jeszenszky, P., Jatowt, A.: Witnessing crime through tweets: A crime investigation tool based on social media. In: Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 568\u2013571 (2019)","DOI":"10.1145\/3347146.3359082"},{"key":"701_CR27","first-page":"17","volume":"8","author":"R Sugandhi","year":"2016","unstructured":"Sugandhi, R., Pande, A., Agrawal, A., Bhagat, H.: Automatic monitoring and prevention of cyberbullying. Int. J. Comput. Appl. 8, 17\u201319 (2016)","journal-title":"Int. J. Comput. Appl."},{"issue":"2","key":"701_CR28","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s11023-019-09504-8","volume":"29","author":"M Taddeo","year":"2019","unstructured":"Taddeo, M.: Three ethical challenges of applications of artificial intelligence in cybersecurity. Minds Mach. 29(2), 187\u2013191 (2019)","journal-title":"Minds Mach."},{"issue":"3","key":"701_CR29","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.chb.2009.11.014","volume":"26","author":"RS Tokunaga","year":"2010","unstructured":"Tokunaga, R.S.: Following you home from school: a critical review and synthesis of research on cyberbullying victimization. Comput. Hum. Behav. 26(3), 277\u2013287 (2010)","journal-title":"Comput. Hum. Behav."},{"key":"701_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03387-8","author":"G Vallathan","year":"2020","unstructured":"Vallathan, G., John, A., Thirumalai, C., Mohan, S., Srivastava, G., Lin, J.C.W.: Suspicious activity detection using deep learning in secure assisted living iot environments. J. Supercomput. (2020). https:\/\/doi.org\/10.1007\/s11227-020-03387-8","journal-title":"J. Supercomput."},{"key":"701_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-020-09488-3","author":"D Van Bruwaene","year":"2020","unstructured":"Van Bruwaene, D., Huang, Q., Inkpen, D.: A multi-platform dataset for detecting cyberbullying in social media. Lang. Resour. Eval. (2020). https:\/\/doi.org\/10.1007\/s10579-020-09488-3","journal-title":"Lang. Resour. Eval."},{"key":"701_CR32","unstructured":"Van\u00a0der Zwaan, J., Dignum, M., Jonker, C.: Simulating peer support for victims of cyberbullying. In: BNAIC 2010: 22rd Benelux Conference on Artificial Intelligence, Luxembourg, 25\u201326 October 2010. Citeseer (2010)"},{"key":"701_CR33","doi-asserted-by":"crossref","unstructured":"Wulczyn, E., Thain, N., Dixon, L.: Ex machina: Personal attacks seen at scale. In: Proceedings of the 26th International Conference on World Wide Web, pp. 1391\u20131399 (2017)","DOI":"10.1145\/3038912.3052591"},{"key":"701_CR34","doi-asserted-by":"crossref","unstructured":"Yazdinejad, A., HaddadPajouh, H., Dehghantanha, A., Parizi, R.M., Srivastava, G., Chen, M.Y.: Cryptocurrency malware hunting: A deep recurrent neural network approach. Appl, Soft Comput., 106630 (2020)","DOI":"10.1016\/j.asoc.2020.106630"},{"issue":"3","key":"701_CR35","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/TAFFC.2016.2531682","volume":"8","author":"R Zhao","year":"2016","unstructured":"Zhao, R., Mao, K.: Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder. IEEE Trans. Affect. Comput. 8(3), 328\u2013339 (2016)","journal-title":"IEEE Trans. Affect. Comput."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-020-00701-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-020-00701-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-020-00701-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T14:04:27Z","timestamp":1685455467000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-020-00701-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,13]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["701"],"URL":"https:\/\/doi.org\/10.1007\/s00530-020-00701-5","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,13]]},"assertion":[{"value":"1 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}