{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:41:30Z","timestamp":1773481290851,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s11042-021-11601-9","type":"journal-article","created":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T21:25:45Z","timestamp":1641677145000},"page":"8773-8789","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["COVID-19 and cyberbullying: deep ensemble model to identify cyberbullying from code-switched languages during the pandemic"],"prefix":"10.1007","volume":"82","author":[{"given":"Sayanta","family":"Paul","sequence":"first","affiliation":[]},{"given":"Sriparna","family":"Saha","sequence":"additional","affiliation":[]},{"given":"Jyoti Prakash","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,8]]},"reference":[{"key":"11601_CR1","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.chb.2016.05.051","volume":"63","author":"MA Al-garadi","year":"2016","unstructured":"Al-garadi MA, Varathan KD, Ravana SD (2016) Cybercrime detection in online communications: The experimental case of cyberbullying detection in the twitter network. Comput Hum Behav 63:433\u2013443","journal-title":"Comput Hum Behav"},{"key":"11601_CR2","unstructured":"Bai S, Kolter JZ, Koltun V (2018) An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. In: arXiv preprint arXiv:180301271"},{"key":"11601_CR3","doi-asserted-by":"crossref","unstructured":"Bansal S et al (2020) Code-switching patterns can be an effective route to improve performance of downstream NLP applications: A case study of humour, sarcasm and hate speech detection. In: arXiv preprint arXiv:200502295","DOI":"10.18653\/v1\/2020.acl-main.96"},{"issue":"3","key":"11601_CR4","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00994018","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273\u2013297","journal-title":"Mach Learn"},{"key":"11601_CR5","unstructured":"Devlin J et al (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. In: arXiv preprint arXiv:181004805"},{"key":"11601_CR6","first-page":"1871","volume":"9","author":"RE Fan","year":"2008","unstructured":"Fan RE et al (2008) Liblinear: A library for large linear classification. J Mach Learn Res 9:1871\u20131874","journal-title":"J Mach Learn Res"},{"key":"11601_CR7","doi-asserted-by":"crossref","unstructured":"Faruqui M, Dyer C (2014) Improving vector space word representations using multilingual correlation. In: Proceedings of the 14th Conference of the European Chapter of the Association for Computational Linguistics, pp 462\u2013471","DOI":"10.3115\/v1\/E14-1049"},{"issue":"3","key":"11601_CR8","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1198\/004017007000000245","volume":"49","author":"A Genkin","year":"2007","unstructured":"Genkin A, Lewis DD, Madigan D (2007) Large-scale bayesian logistic regression for text categorization. Technometrics 49(3), 291\u2013304","journal-title":"Technometrics"},{"key":"11601_CR9","unstructured":"Glorot X, Bengio Y (2010) Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the thirteenth international conference on artificial intelligence and statistics. pp 249\u2013256"},{"key":"11601_CR10","unstructured":"Grave E et al (2018) Learning word vectors for 157 languages. In: arXiv preprint arXiv:180206893"},{"key":"11601_CR11","doi-asserted-by":"crossref","unstructured":"Hosseinmardi H et al. (2016) Prediction of cyberbullying incidents in a media-based social network. In: 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, pp 186\u2013192","DOI":"10.1109\/ASONAM.2016.7752233"},{"key":"11601_CR12","doi-asserted-by":"crossref","unstructured":"Jacovi A, Shalom OS, Goldberg Y (2018) Understanding convolutional neural networks for text classification. In: arXiv preprint arXiv:180908037","DOI":"10.18653\/v1\/W18-5408"},{"key":"11601_CR13","doi-asserted-by":"crossref","unstructured":"Jaech A et al (2016) Hierarchical character-word models for language identification. In: arXiv preprint arXiv:160803030","DOI":"10.18653\/v1\/W16-6212"},{"key":"11601_CR14","doi-asserted-by":"crossref","unstructured":"Krishnan J et al (2021) Multilingual code-switching for zero-shot cross-lingual intent prediction and slot filling. In: arXiv preprint arXiv:210307792","DOI":"10.18653\/v1\/2021.mrl-1.18"},{"key":"11601_CR15","unstructured":"Mikolov T et al (2013) Distributed representations of words and phrases and their compositionality. In: Advances in neural information processing systems. pp 3111\u20133119"},{"key":"11601_CR16","unstructured":"Myers-Scotton C (1997) Duelling languages: Grammatical structure in codeswitching. Oxford University Press"},{"key":"11601_CR17","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.physa.2016.01.015","volume":"449","author":"RD Parshad","year":"2016","unstructured":"Parshad RD, Bhowmick S, Chand V, Kumari N, Sinha N (2016) What is india speaking? exploring the \u201chinglish\u201d invasion. Physica A: Statistical Mechanics and its Applications 449:375\u2013389","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"key":"11601_CR18","unstructured":"Rao PR, Devi SL (2016) CMEE-IL: Code mix entity extraction in Indian languages from social media text@ FIRE\u00a02016-An overview. In: FIRE (Working Notes). pp 289\u2013295"},{"key":"11601_CR19","doi-asserted-by":"crossref","unstructured":"Rosa H et al (2018) A \u201cdeeper\u201d look at detecting cyberbullying in social networks. In: 2018 International Joint Conference on Neural Networks (IJCNN). IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN.2018.8489211"},{"key":"11601_CR20","doi-asserted-by":"crossref","unstructured":"Rudra K et al (2016) Understanding language preference for expression of opinion and sentiment: What do Hindi-English speakers do on twitter? In: Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing. pp 1131\u20131141","DOI":"10.18653\/v1\/D16-1121"},{"key":"11601_CR21","unstructured":"Settles B, Craven M, Friedland L (2008) Active learning with real annotation costs. In: Proceedings of the NIPS workshop on cost-sensitive learning. Vancouver, CA, pp 1\u201310"},{"key":"11601_CR22","doi-asserted-by":"crossref","unstructured":"Shakeel MH, Karim A (2020) Adapting deep learning for sentiment classification of code-switched informal short text. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing. pp 903\u2013906","DOI":"10.1145\/3341105.3374091"},{"issue":"4","key":"11601_CR23","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","volume":"49","author":"PK Smith","year":"2008","unstructured":"Smith PK et al (2008) Cyberbullying: Its nature and impact in secondary school pupils. J Child Psychol Psychiatry 49(4):376\u2013385","journal-title":"J Child Psychol Psychiatry"},{"key":"11601_CR24","first-page":"45","volume":"2","author":"S Tong","year":"2001","unstructured":"Tong S, Koller D (2001) Support vector machine active learning with applications to text classification. J Mach Learn Res 2:45\u201366","journal-title":"J Mach Learn Res"},{"key":"11601_CR25","unstructured":"Vaswani A et al (2017) Attention is all you need. In: Advances in neural information processing systems. pp 5998\u20136008"},{"key":"11601_CR26","doi-asserted-by":"crossref","unstructured":"Zhang X et al (2016) Cyberbullying detection with a pronunciation based convolutional neural network. In: 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, pp 740\u2013745","DOI":"10.1109\/ICMLA.2016.0132"},{"key":"11601_CR27","doi-asserted-by":"crossref","unstructured":"Zhao R, Zhou A, Mao K (2016) Automatic detection of cyberbullying on social networks based on bullying features. In: Proceedings of the 17th international conference on distributed computing and networking. pp 1\u20136","DOI":"10.1145\/2833312.2849567"},{"key":"11601_CR28","unstructured":"Zhou P et al (2016) Text classification improved by integrating bidirectional LSTM with two-dimensional max pooling. arXiv preprint arXiv:161106639"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11601-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11601-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11601-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T09:17:53Z","timestamp":1677057473000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11601-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,8]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["11601"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11601-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,8]]},"assertion":[{"value":"6 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}