{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:30:11Z","timestamp":1765269011570,"version":"3.41.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T00:00:00Z","timestamp":1750636800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T00:00:00Z","timestamp":1750636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004564","name":"Ministarstvo Prosvete, Nauke i Tehnolo\u0161kog Razvoja","doi-asserted-by":"publisher","award":["7373","7502"],"award-info":[{"award-number":["7373","7502"]}],"id":[{"id":"10.13039\/501100004564","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04122-x","type":"journal-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T10:36:45Z","timestamp":1750675005000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Detecting Harassment in User Comments: Two-Tier Machine Learning and Metaheuristics Approach with Natural Language Processing"],"prefix":"10.1007","volume":"6","author":[{"given":"Mihailo","family":"Todorovic","sequence":"first","affiliation":[]},{"given":"Stanislava","family":"Kozakijevic","sequence":"additional","affiliation":[]},{"given":"Luka","family":"Jovanovic","sequence":"additional","affiliation":[]},{"given":"Lepa","family":"Babic","sequence":"additional","affiliation":[]},{"given":"Milos","family":"Antonijevic","sequence":"additional","affiliation":[]},{"given":"Vico","family":"Zeljkovic","sequence":"additional","affiliation":[]},{"given":"Miodrag","family":"Zivkovic","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2062-924X","authenticated-orcid":false,"given":"Nebojsa","family":"Bacanin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,23]]},"reference":[{"issue":"CSCW","key":"4122_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3134659","volume":"1","author":"L Blackwell","year":"2017","unstructured":"Blackwell L, Dimond J, Schoenebeck S, Lampe C. Classification and its consequences for online harassment: design insights from heartmob. Proc ACM Hum-Comput Interact. 2017;1(CSCW):1\u201319.","journal-title":"Proc ACM Hum-Comput Interact"},{"issue":"6","key":"4122_CR2","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1089\/cyber.2020.0253","volume":"24","author":"F Stevens","year":"2021","unstructured":"Stevens F, Nurse JR, Arief B. Cyber stalking, cyber harassment, and adult mental health: a systematic review. Cyberpsychol Behav Soc Netw. 2021;24(6):367\u201376.","journal-title":"Cyberpsychol Behav Soc Netw"},{"key":"4122_CR3","unstructured":"Bretschneider U, W\u00f6hner T, Peters R. Detecting online harassment in social networks. 2014."},{"issue":"1","key":"4122_CR4","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/4235.585893","volume":"1","author":"DH Wolpert","year":"1997","unstructured":"Wolpert DH, Macready WG. No free lunch theorems for optimization. IEEE Trans Evol Comput. 1997;1(1):67\u201382.","journal-title":"IEEE Trans Evol Comput"},{"key":"4122_CR5","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.patcog.2017.10.013","volume":"77","author":"J Gu","year":"2018","unstructured":"Gu J, Wang Z, Kuen J, Ma L, Shahroudy A, Shuai B, Liu T, Wang X, Wang G, Cai J, et al. Recent advances in convolutional neural networks. Pattern Recognit. 2018;77:354\u201377.","journal-title":"Pattern Recognit"},{"issue":"3","key":"4122_CR6","doi-asserted-by":"publisher","first-page":"349","DOI":"10.4310\/SII.2009.v2.n3.a8","volume":"2","author":"T Hastie","year":"2009","unstructured":"Hastie T, Rosset S, Zhu J, Zou H. Multi-class adaboost. Stat Interface. 2009;2(3):349\u201360.","journal-title":"Stat Interface"},{"key":"4122_CR7","doi-asserted-by":"crossref","unstructured":"Kennedy J, Eberhart R. Particle swarm optimization. In: Proceedings of ICNN\u201995-international Conference on Neural Networks, vol. 4. IEEE; 1995. p. 1942\u20138.","DOI":"10.1109\/ICNN.1995.488968"},{"issue":"5","key":"4122_CR8","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1108\/02644401211235834","volume":"29","author":"X-S Yang","year":"2012","unstructured":"Yang X-S, Hossein Gandomi A. Bat algorithm: a novel approach for global engineering optimization. Eng Comput. 2012;29(5):464\u201383.","journal-title":"Eng Comput"},{"key":"4122_CR9","doi-asserted-by":"publisher","first-page":"116158","DOI":"10.1016\/j.eswa.2021.116158","volume":"191","author":"L Abualigah","year":"2022","unstructured":"Abualigah L, Abd Elaziz M, Sumari P, Geem ZW, Gandomi AH. Reptile search algorithm (rsa): a nature-inspired meta-heuristic optimizer. Expert Syst Appl. 2022;191:116158.","journal-title":"Expert Syst Appl"},{"issue":"1","key":"4122_CR10","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1016\/j.asoc.2007.05.007","volume":"8","author":"D Karaboga","year":"2008","unstructured":"Karaboga D, Basturk B. On the performance of artificial bee colony (abc) algorithm. Appl Soft Comput. 2008;8(1):687\u201397.","journal-title":"Appl Soft Comput"},{"issue":"1","key":"4122_CR11","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-93025-1_4","volume":"780","author":"S Mirjalili","year":"2019","unstructured":"Mirjalili S, Mirjalili S. Genetic algorithm. Evolutionary algorithms and neural networks: theory and applications. Stud Comput Intell. 2019;780(1):43\u201355.","journal-title":"Stud Comput Intell"},{"key":"4122_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.111081","volume":"282","author":"J Bai","year":"2023","unstructured":"Bai J, Li Y, Zheng M, Khatir S, Benaissa B, Abualigah L, Wahab MA. A sinh cosh optimizer. Knowl-Based Syst. 2023;282: 111081.","journal-title":"Knowl-Based Syst"},{"key":"4122_CR13","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/s10479-009-0657-6","volume":"175","author":"P Hansen","year":"2010","unstructured":"Hansen P, Mladenovi\u0107 N, Moreno Perez JA. Variable neighbourhood search: methods and applications. Ann Oper Res. 2010;175:367\u2013407.","journal-title":"Ann Oper Res"},{"issue":"3","key":"4122_CR14","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3390\/biomimetics9030137","volume":"9","author":"M Hub\u00e1lovsk\u00e1","year":"2024","unstructured":"Hub\u00e1lovsk\u00e1 M, Hub\u00e1lovsk\u1ef3 \u0160, Trojovsk\u1ef3 P. Botox optimization algorithm: a new human-based metaheuristic algorithm for solving optimization problems. Biomimetics. 2024;9(3):137.","journal-title":"Biomimetics"},{"key":"4122_CR15","doi-asserted-by":"crossref","unstructured":"Jovanovic L, Hajdarevic Z, Jovanovic D, Jassim HS, Strumberger I, Bacanin N, Zivkovic M, Antonijevic M. Tuning extreme learning machine by hybrid planet optimization algorithm for diabetes classification. In: Congress on Intelligent Systems. Springer; 2022. p. 23\u201336.","DOI":"10.1007\/978-981-19-9379-4_3"},{"issue":"1","key":"4122_CR16","doi-asserted-by":"publisher","first-page":"82","DOI":"10.31181\/taci1120238","volume":"1","author":"S Kozakijevic","year":"2023","unstructured":"Kozakijevic S, Salb M, Elsadai A, Mani J, Devi K, Sharko AD, Muthusamy S. Seizure detection via time series classification using modified metaheuristic optimized recurrent networks. Theor Appl Comput Intell. 2023;1(1):82\u201394.","journal-title":"Theor Appl Comput Intell"},{"key":"4122_CR17","doi-asserted-by":"crossref","unstructured":"Toskovic A, Kozakijevic S, Jovanovic L, Zivkovic M, Bacanin N, Antonijevic M. Anomaly detection in electroencephalography readings using long short-term memory tuned by modified metaheuristic. In: International Conference on Sustainable and Innovative Solutions for Current Challenges in Engineering & Technology. Springer; 2023. p. 133\u2013148.","DOI":"10.1007\/978-981-97-0327-2_10"},{"issue":"3","key":"4122_CR18","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s10462-023-10678-y","volume":"57","author":"M Pavlov-Kagadejev","year":"2024","unstructured":"Pavlov-Kagadejev M, Jovanovic L, Bacanin N, Deveci M, Zivkovic M, Tuba M, Strumberger I, Pedrycz W. Optimizing long-short-term memory models via metaheuristics for decomposition aided wind energy generation forecasting. Artif Intell Rev. 2024;57(3):45.","journal-title":"Artif Intell Rev"},{"key":"4122_CR19","doi-asserted-by":"publisher","first-page":"e1795","DOI":"10.7717\/peerj-cs.1795","volume":"10","author":"R Dama\u0161evi\u010dius","year":"2024","unstructured":"Dama\u0161evi\u010dius R, Jovanovic L, Petrovic A, Zivkovic M, Bacanin N, Jovanovic D, Antonijevic M. Decomposition aided attention-based recurrent neural networks for multistep ahead time-series forecasting of renewable power generation. PeerJ Comput Sci. 2024;10:e1795.","journal-title":"PeerJ Comput Sci"},{"key":"4122_CR20","first-page":"1","volume":"28","author":"L Jovanovic","year":"2023","unstructured":"Jovanovic L, Bacanin N, Simic V, Mani J, Zivkovic M, Sarac M. Optimizing machine learning for space weather forecasting and event classification using modified metaheuristics. Soft Comput. 2023;28:1\u201320.","journal-title":"Soft Comput"},{"issue":"23","key":"4122_CR21","doi-asserted-by":"publisher","first-page":"12687","DOI":"10.3390\/app132312687","volume":"13","author":"M Salb","year":"2023","unstructured":"Salb M, Jovanovic L, Bacanin N, Antonijevic M, Zivkovic M, Budimirovic N, Abualigah L. Enhancing internet of things network security using hybrid cnn and xgboost model tuned via modified reptile search algorithm. Appl Sci. 2023;13(23):12687.","journal-title":"Appl Sci"},{"key":"4122_CR22","doi-asserted-by":"crossref","unstructured":"Djuric M, Jovanovic L, Zivkovic M, Bacanin N, Antonijevic M, Sarac M. The adaboost approach tuned by sns metaheuristics for fraud detection. In: Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences: PCCDS 2022. Springer; 2023. p. 115\u201328.","DOI":"10.1007\/978-981-19-8742-7_10"},{"key":"4122_CR23","doi-asserted-by":"crossref","unstructured":"Kozakijevic S, Jovanovic L, Babic L, Kaljevi\u0107 J, Zivkovic M, Bacanin N. Machine learning for company review sentiment analysis interpretation. In: International Conference on Multi-Strategy Learning Environment. Springer; 2024. p. 647\u201359.","DOI":"10.1007\/978-981-97-1488-9_47"},{"key":"4122_CR24","doi-asserted-by":"crossref","unstructured":"Anbazhagan K, Kurlekar S, Brindha T, Reddy DS. Twitter based emotion recognition using bi-lstm. In: 2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies. IEEE; 2024. p. 1\u20135.","DOI":"10.1109\/TQCEBT59414.2024.10545185"},{"key":"4122_CR25","first-page":"1","volume":"2025","author":"P Kothandan","year":"2025","unstructured":"Kothandan P, Pushpavalli R, Thirumalaikumari T, Selvanathan P, Sunitha P, Nimmagadda P, Subburayalu G. A chic giza reformed deep attention model (gizram) for opinion mining on twitter with text and emojis. Iran J Comput Sci. 2025;2025:1\u201317.","journal-title":"Iran J Comput Sci"},{"key":"4122_CR26","doi-asserted-by":"crossref","unstructured":"Sasidhar, J., Christy, S.: Text summarization and question-answer generator for real time transfer of media files using websockets with bert and distilbert algorithm. In: AIP Conference Proceedings, vol. 2871. AIP Publishing; 2024.","DOI":"10.1063\/5.0228015"},{"issue":"4","key":"4122_CR27","first-page":"869","volume":"15","author":"VM Jayakumar","year":"2024","unstructured":"Jayakumar VM, Rajakumari R, Sarwar S, Syed DM, Boddupalli S, Baker El-Ebiary YA, et al. Advancing automated and adaptive educational resources through semantic analysis with BERT and GRU in English language learning. Int J Adv Comput Sci Appl. 2024;15(4):869\u201380.","journal-title":"Int J Adv Comput Sci Appl"},{"key":"4122_CR28","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K. Bert: pre-training of deep bidirectional transformers for language understanding. 2018. arXiv preprint arXiv:1810.04805."},{"issue":"4","key":"4122_CR29","first-page":"285","volume":"7","author":"H Christian","year":"2016","unstructured":"Christian H, Agus MP, Suhartono D. Single document automatic text summarization using term frequency-inverse document frequency (tf-idf). ComTech Comput Math Eng Appl. 2016;7(4):285\u201394.","journal-title":"ComTech Comput Math Eng Appl"},{"key":"4122_CR30","doi-asserted-by":"crossref","unstructured":"Cheng S, Shi Y. Diversity control in particle swarm optimization. In: 2011 IEEE Symposium on Swarm Intelligence. IEEE; 2011. p. 1\u20139.","DOI":"10.1109\/SIS.2011.5952581"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04122-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04122-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04122-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T10:36:48Z","timestamp":1750675008000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04122-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":30,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["4122"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04122-x","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,23]]},"assertion":[{"value":"31 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author(s) declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"573"}}