{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:20:47Z","timestamp":1767183647368,"version":"3.45.0"},"reference-count":130,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Artif Intell"],"DOI":"10.1007\/s44163-025-00577-2","type":"journal-article","created":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T14:21:20Z","timestamp":1762957280000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Deep learning models for culturally aware cyberbullying detection in Muslim societies: a systematic review"],"prefix":"10.1007","volume":"5","author":[{"given":"Golam Md","family":"Mohiuddin","sequence":"first","affiliation":[]},{"given":"Md Shohel","family":"Sayeed","sequence":"additional","affiliation":[]},{"given":"Ong Lee","family":"Yeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,12]]},"reference":[{"key":"577_CR1","unstructured":"Khalid M. Ethnocentrism as a predictor of cyberbullying and cyber victimization among adults: a cross-cultural study. Department of Forensic Science, Gujarat University. 2019."},{"key":"577_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.avb.2016.02.001","volume":"27","author":"I Awan","year":"2016","unstructured":"Awan I, Zempi I. The affinity between online and offline anti-Muslim hate crime: dynamics and impacts. Aggress Violent Behav. 2016;27:1\u20138.","journal-title":"Aggress Violent Behav"},{"issue":"5","key":"577_CR3","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1177\/1477370818812735","volume":"17","author":"I Awan","year":"2020","unstructured":"Awan I, Zempi I. \u2018You all look the same\u2019: Non-Muslim men who suffer Islamophobic hate crime in the post-Brexit era. Eur J Criminol. 2020;17(5):585\u2013602.","journal-title":"Eur J Criminol"},{"issue":"1","key":"577_CR4","doi-asserted-by":"publisher","first-page":"21","DOI":"10.20355\/jcie29489","volume":"17","author":"A Arshad-Ayaz","year":"2022","unstructured":"Arshad-Ayaz A, Naseem MA, Hizaoui H. Perspectives of Muslim and minority Canadian youth on hate speech and social media. J Contemporary Issues Educ. 2022;17(1):21\u201339.","journal-title":"J Contemporary Issues Educ."},{"issue":"2","key":"577_CR5","first-page":"112","volume":"15","author":"R Erliyani","year":"2022","unstructured":"Erliyani R. Examining religious and justice system in Indonesia to prevent cyberbullying. Int J Cyber Criminol. 2022;15(2):112\u201323.","journal-title":"Int J Cyber Criminol"},{"key":"577_CR6","doi-asserted-by":"crossref","unstructured":"Park MA, Golden K, Vizcaino-Vickers S, Jidong D, Raj S. Sociocultural values, attitudes and risk factors associated with adolescent cyberbullying in East Asia: a systematic review. IRep\u2014Nottingham Trent University. 2021. Ntu.ac.uk.","DOI":"10.5817\/CP2021-1-5"},{"issue":"5","key":"577_CR7","doi-asserted-by":"publisher","first-page":"179","DOI":"10.3390\/fi15050179","volume":"15","author":"MT Hasan","year":"2023","unstructured":"Hasan MT, Hossain MAE, Mukta MSH, Akter A, Ahmed M, Islam S. A review on deep-learning-based cyberbullying detection. Future Internet. 2023;15(5):179.","journal-title":"Future Internet"},{"key":"577_CR8","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1047","volume":"8","author":"J Almalki","year":"2022","unstructured":"Almalki J. A machine learning-based approach for sentiment analysis on distance learning from Arabic tweets. PeerJ Comput Sci. 2022;8:e1047.","journal-title":"PeerJ Comput Sci"},{"key":"577_CR9","unstructured":"Gomez C. Cyberbullying classification: Analysis of text in social media memes. Northeastern Illinois University. 2020."},{"key":"577_CR10","doi-asserted-by":"crossref","unstructured":"Atoum JO. Cyberbullying detection through sentiment analysis. In: 2020 international conference on computational science and computational intelligence (CSCI). IEEE; 2020. pp. 292\u2013297.","DOI":"10.1109\/CSCI51800.2020.00056"},{"key":"577_CR11","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.aej.2023.08.038","volume":"80","author":"M Subramanian","year":"2023","unstructured":"Subramanian M, Easwaramoorthy Sathiskumar V, Deepalakshmi G, Cho J, Manikandan G. A survey on hate speech detection and sentiment analysis using machine learning and deep learning models. Alexandria Eng J. 2023;80:110\u201321.","journal-title":"Alexandria Eng J"},{"key":"577_CR12","doi-asserted-by":"publisher","first-page":"53907","DOI":"10.1109\/ACCESS.2023.3280556","volume":"11","author":"M Al-Hashedi","year":"2023","unstructured":"Al-Hashedi M, Soon LK, Goh HN, Lim AHL, Siew EG. Cyberbullying detection based on emotion. IEEE Access. 2023;11:53907\u201318.","journal-title":"IEEE Access"},{"key":"577_CR13","doi-asserted-by":"crossref","unstructured":"Berjawi O, Khatoun R, Fahs W, Fenza G. Leveraging sentiment and emotion analysis to enhance cyberbullying detection. In: 2024 11th international conference on social networks analysis, management and security (SNAMS). IEEE; 2024. pp. 81\u201386.","DOI":"10.1109\/SNAMS64316.2024.10883815"},{"key":"577_CR14","doi-asserted-by":"crossref","unstructured":"Bisht L, Chaudhary K. Exploring machine learning algorithms for sentiment analysis in the sphere of cyberbullying detection. In: 2025 first international conference on advances in computer science, electrical, electronics, and communication technologies (CE2CT). IEEE; 2025. pp. 446\u2013450.","DOI":"10.1109\/CE2CT64011.2025.10939696"},{"issue":"2","key":"577_CR15","first-page":"100095","volume":"2","author":"M Anwar","year":"2022","unstructured":"Anwar M, Kabir MM, Mridha MF, Ali MA, Hamid MA, Monowar MM. How can we manage offensive text in social media\u2014a text classification approach using LSTM-BOOST. Int J Inf Manag Data Insights. 2022;2(2):100095\u2013100095.","journal-title":"Int J Inf Manag Data Insights"},{"key":"577_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5627","author":"N Lu","year":"2020","unstructured":"Lu N, Wu G, Zhang Z, Zheng Y, Ren Y, Choo KR. Cyberbullying detection in social media text based on character-level convolutional neural network with shortcuts. Concurr Comput Pract Exper. 2020. https:\/\/doi.org\/10.1002\/cpe.5627.","journal-title":"Concurr Comput Pract Exper"},{"issue":"8","key":"577_CR17","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0237861","volume":"15","author":"M Mozafari","year":"2020","unstructured":"Mozafari M, Farahbakhsh R, Crespi N. Hate speech detection and racial bias mitigation in social media based on BERT model. PLoS ONE. 2020;15(8):e0237861.","journal-title":"PLoS ONE"},{"key":"577_CR18","first-page":"928","volume-title":"International conference on complex networks and their applications","author":"M Mozafari","year":"2019","unstructured":"Mozafari M, Farahbakhsh R, Crespi N. A BERT-based transfer learning approach for hate speech detection in online social media. In: International conference on complex networks and their applications. Cham: Springer International Publishing; 2019. p. 928\u201340."},{"key":"577_CR19","doi-asserted-by":"crossref","unstructured":"Aljalaoud H, Dashtipour K, AI-Dubai A. Arabic cyberbullying detection: a comprehensive review of datasets and methodologies. IEEE Access. 2025;1\u20131.","DOI":"10.1109\/ACCESS.2025.3561132"},{"key":"577_CR20","first-page":"1","volume":"99","author":"H Aljalaoud","year":"2025","unstructured":"Aljalaoud H, Dashtipour K, AI-Dubai A. Arabic cyberbullying detection: a comprehensive review of datasets and methodologies. IEEE Access. 2025;99:1\u20131.","journal-title":"IEEE Access"},{"issue":"2","key":"577_CR21","doi-asserted-by":"publisher","DOI":"10.1177\/2056305120916850","volume":"6","author":"S Ozalp","year":"2020","unstructured":"Ozalp S, Williams ML, Burnap P, Liu H, Mostafa M. Antisemitism on Twitter: collective efficacy and the role of community organisations in challenging online hate speech. Social Media+ Soc. 2020;6(2):2056305120916850.","journal-title":"Social Media+ Soc."},{"issue":"1","key":"577_CR22","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1080\/19331681.2019.1702607","volume":"17","author":"B Vidgen","year":"2020","unstructured":"Vidgen B, Yasseri T. Detecting weak and strong Islamophobic hate speech on social media. J Inf Technol Polit. 2020;17(1):66\u201378.","journal-title":"J Inf Technol Polit"},{"key":"577_CR23","doi-asserted-by":"crossref","unstructured":"Aldreabi E, Lee JM, Blackburn J. Using deep learning to detect islamophobia on Reddit. In: International FLAIRS Conference Proceedings, vol. 36. 2023.","DOI":"10.32473\/flairs.36.133324"},{"key":"577_CR24","unstructured":"Aldreabi EA. Ethical algorithms: safeguarding freedom of speech in the detection of islamophobic content (Doctoral dissertation, State University of New York at Binghamton); 2024."},{"key":"577_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3367281","author":"W Sharif","year":"2024","unstructured":"Sharif W, Abdullah S, Iftikhar S, Al-Madani D, Mumtaz S. Enhancing hate speech detection in the digital age: a novel model fusion approach leveraging a comprehensive dataset. IEEE Access. 2024. https:\/\/doi.org\/10.1109\/ACCESS.2024.3367281.","journal-title":"IEEE Access"},{"key":"577_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126232","volume":"546","author":"MS Jahan","year":"2023","unstructured":"Jahan MS, Oussalah M. A systematic review of hate speech automatic detection using natural language processing. Neurocomputing. 2023;546:126232.","journal-title":"Neurocomputing"},{"issue":"5","key":"577_CR27","doi-asserted-by":"publisher","first-page":"6871","DOI":"10.1007\/s11042-020-10037-x","volume":"80","author":"JV Tembhurne","year":"2021","unstructured":"Tembhurne JV, Diwan T. Sentiment analysis in textual, visual and multimodal inputs using recurrent neural networks. Multimedia Tools Appl. 2021;80(5):6871\u2013910.","journal-title":"Multimedia Tools Appl"},{"key":"577_CR28","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv21r3hzg","volume-title":"The racial Muslim: When racism quashes religious freedom","author":"SF Aziz","year":"2021","unstructured":"Aziz SF. The racial Muslim: When racism quashes religious freedom. Univ of California Press; 2021."},{"issue":"22","key":"577_CR29","doi-asserted-by":"publisher","first-page":"2810","DOI":"10.3390\/electronics10222810","volume":"10","author":"C Raj","year":"2021","unstructured":"Raj C, Agarwal A, Bharathy G, Narayan B, Prasad M. Cyberbullying detection: hybrid models based on machine learning and natural language processing techniques. Electronics. 2021;10(22):2810\u20132810.","journal-title":"Electronics"},{"issue":"8","key":"577_CR30","doi-asserted-by":"publisher","first-page":"5789","DOI":"10.1007\/s10462-021-09958-2","volume":"54","author":"FA Acheampong","year":"2021","unstructured":"Acheampong FA, Nunoo-Mensah H, Chen W. Transformer models for text-based emotion detection: a review of BERT-based approaches. Artif Intell Rev. 2021;54(8):5789\u2013829.","journal-title":"Artif Intell Rev"},{"key":"577_CR31","doi-asserted-by":"crossref","unstructured":"Sultan D, Mendes M, Kassenkhan A, Akylbekov O. Hybrid CNN-LSTM network for cyberbullying detection on social networks using textual contents. Int J Adv Comput Sci Appl. 2023;14(9).","DOI":"10.14569\/IJACSA.2023.0140978"},{"issue":"2","key":"577_CR32","first-page":"1","volume":"15","author":"T Sultan","year":"2023","unstructured":"Sultan T, Jahan N, Basak R, Jony MSA, Nabil RH. Machine learning in cyberbullying detection from social-media image or screenshot with optical character recognition. Int J Intell Syst Appl. 2023;15(2):1.","journal-title":"Int J Intell Syst Appl"},{"issue":"9","key":"577_CR33","first-page":"748","volume":"14","author":"D Sultan","year":"2023","unstructured":"Sultan D, Mendes M, Kassenkhan A, Akylbekov O. Hybrid CNN-LSTM network for cyberbullying detection on social networks using textual contents. Int J Adv Comput Sci Appl. 2023;14(9):748\u201356.","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"7","key":"577_CR34","first-page":"1415","volume":"15","author":"T Purnima","year":"2024","unstructured":"Purnima T, Rao CK. Automated detection of offensive images and sarcastic memes in social media through NLP. Int J Adv Comput Sci Appl. 2024;15(7):1415\u201325.","journal-title":"Int J Adv Comput Sci Appl"},{"key":"577_CR35","doi-asserted-by":"crossref","unstructured":"Purnima T, Rao K. Automated detection of offensive images and sarcastic memes in social media through NLP. Int J Adv Comput Sci Appl. 2024;15(7).","DOI":"10.14569\/IJACSA.2024.01507137"},{"key":"577_CR36","doi-asserted-by":"crossref","unstructured":"Howard J, Ruder S. Universal language model fine-tuning for text classification. 2018. arXiv preprint arXiv:1801.06146.","DOI":"10.18653\/v1\/P18-1031"},{"key":"577_CR37","unstructured":"Lee N, Jung C, Myung J, Jin J, Camacho-Collados J, Kim J, Oh A. Exploring cross-cultural differences in english hate speech annotations: from dataset construction to analysis. 2023. ArXiv.org. https:\/\/arxiv.org\/abs\/2308.16705"},{"key":"577_CR38","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.procs.2018.10.491","volume":"142","author":"A Alakrot","year":"2018","unstructured":"Alakrot A, Murray L, Nikolov NS. Towards accurate detection of offensive language in online communication in Arabic. Proc Comput Sci. 2018;142:315\u201320.","journal-title":"Proc Comput Sci"},{"issue":"5","key":"577_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5539\/mas.v13n5p88","volume":"13","author":"AH Mohammad","year":"2019","unstructured":"Mohammad AH. Arabic text classification: a review. Mod Appl Sci. 2019;13(5):1\u201388.","journal-title":"Mod Appl Sci"},{"issue":"2","key":"577_CR40","doi-asserted-by":"publisher","first-page":"163","DOI":"10.21015\/vtse.v10i2.981","volume":"10","author":"M Mashooq","year":"2022","unstructured":"Mashooq M, Riaz S, Farooq MS. Urdu sentiment analysis: future extraction, taxonomy, and challenges. VFAST Trans Softw Eng. 2022;10(2):163\u201378.","journal-title":"VFAST Trans Softw Eng."},{"key":"577_CR41","doi-asserted-by":"crossref","unstructured":"Anindyati L, Purwarianti A, Nursanti A. Optimizing deep learning for detection cyberbullying text in Indonesian language. In: 2019 international conference of advanced informatics: concepts, theory and applications (ICAICTA). IEEE; 2019. pp. 1\u20135.","DOI":"10.1109\/ICAICTA.2019.8904108"},{"key":"577_CR42","doi-asserted-by":"crossref","unstructured":"Pires T, Schlinger E, Garrette D. How multilingual is multilingual BERT? 2019. arXiv preprint arXiv:1906.01502.","DOI":"10.18653\/v1\/P19-1493"},{"issue":"1","key":"577_CR43","doi-asserted-by":"publisher","first-page":"50","DOI":"10.33166\/AETiC.2024.01.005","volume":"8","author":"S Shidul Nath","year":"2024","unstructured":"Shidul Nath S, Karim R, Miraz MH. Deep learning based cyberbullying detection in Bangla language. Ann Emerg Technol Comput. 2024;8(1):50\u201365.","journal-title":"Ann Emerg Technol Comput."},{"issue":"9","key":"577_CR44","doi-asserted-by":"publisher","first-page":"1677","DOI":"10.3390\/electronics13091677","volume":"13","author":"T Mahmud","year":"2024","unstructured":"Mahmud T, Ptaszynski M, Masui F. Exhaustive study into machine learning and deep learning methods for multilingual cyberbullying detection in Bangla and Chittagonian texts. Electronics. 2024;13(9):1677.","journal-title":"Electronics"},{"issue":"2","key":"577_CR45","first-page":"123","volume":"83","author":"A Al-Ajlan","year":"2025","unstructured":"Al-Ajlan A, Alshmrany S, Alzahrani A, Alghamdi A. A deep learning framework for Arabic cyberbullying detection in social media. Comput Mater Contin. 2025;83(2):123\u201340.","journal-title":"Comput Mater Contin"},{"issue":"3","key":"577_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.16925\/2357-6014.2021.03.09","volume":"17","author":"S Pericherla","year":"2021","unstructured":"Pericherla S, Ilavarasan E. Cyberbullying detection on multi-modal data using pre-trained deep learning architectures. Ingenier\u00eda Solidaria. 2021;17(3):1\u201320.","journal-title":"Ingenier\u00eda Solidaria"},{"key":"577_CR47","doi-asserted-by":"publisher","first-page":"1269366","DOI":"10.3389\/frai.2024.1269366","volume":"7","author":"TN Harshitha","year":"2024","unstructured":"Harshitha TN, Prabu M, Suganya E, Sountharrajan S, Prasad DB, Lakshmi S. ProTect: a hybrid deep learning model for proactive detection of cyberbullying on social media. Front Artif Intell. 2024;7:1269366.","journal-title":"Front Artif Intell."},{"issue":"10","key":"577_CR48","first-page":"424","volume":"14","author":"A Alabdulwahab","year":"2023","unstructured":"Alabdulwahab A, Haq MA, Alshehri M. Cyberbullying detection using machine learning and deep learning. Int J Adv Comput Sci Appl. 2023;14(10):424\u201332.","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"9","key":"577_CR49","first-page":"545","volume":"14","author":"MT Ahmed","year":"2023","unstructured":"Ahmed MT, Umi AS, Rahman M, Islam AZMT, Rashed MG. Cyberbullying detection based on hybrid ensemble method using deep learning technique in Bangla dataset. Int J Adv Comput Sci Appl. 2023;14(9):545\u201351.","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"61","key":"577_CR50","first-page":"40","volume":"186","author":"F Akter","year":"2025","unstructured":"Akter F, Jahangir F, Forhad Rabbi Md, Chowdhury RR. Cyberbullying detection on social media platforms utilizing different machine learning approaches. Int J Comput Appl. 2025;186(61):40\u201350.","journal-title":"Int J Comput Appl"},{"key":"577_CR51","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.procs.2024.10.201","volume":"244","author":"M Alkhatib","year":"2024","unstructured":"Alkhatib M, Faisal A, Alfalasi F, Shaalan K, Mohmed A. Deep learning approaches for detecting Arabic cyberbullying social media. Procedia Comput Sci. 2024;244:278\u201386.","journal-title":"Procedia Comput Sci"},{"issue":"16","key":"577_CR52","doi-asserted-by":"publisher","first-page":"3567","DOI":"10.3390\/math11163567","volume":"11","author":"SM Fati","year":"2023","unstructured":"Fati SM, Muneer A, Alwadain A, Balogun AO. Cyberbullying detection on Twitter using deep learning-based attention mechanisms and continuous bag of words feature extraction. Mathematics. 2023;11(16):3567\u20133567.","journal-title":"Mathematics"},{"issue":"0","key":"577_CR53","first-page":"1","volume":"0","author":"AA Alsuwaylimi","year":"2025","unstructured":"Alsuwaylimi AA, Alenezi ZS. Leveraging transformers for detection of Arabic cyberbullying on social media: hybrid Arabic transformers. Comput Mater Contin Comput Mater Contin (Print). 2025;0(0):1\u201310.","journal-title":"Comput Mater Contin Comput Mater Contin (Print)."},{"key":"577_CR54","first-page":"1096","volume":"2020","author":"J Yadav","year":"2020","unstructured":"Yadav J, Kumar D, Chauhan D. Cyberbullying detection using pre-trained BERT model. Int Conf Electron Sustain Commun Syst. 2020;2020:1096\u2013100.","journal-title":"Int Conf Electron Sustain Commun Syst."},{"key":"577_CR55","doi-asserted-by":"publisher","first-page":"103504","DOI":"10.1109\/ACCESS.2024.3431939","volume":"12","author":"E-Y Daraghmi","year":"2024","unstructured":"Daraghmi E-Y, Qadan S, Daraghmi Y-A, Yousuf R, Cheikhrouhou O, Baz M. From text to insight: an integrated CNN-BiLSTM-GRU model for Arabic cyberbullying detection. IEEE Access. 2024;12:103504\u201319.","journal-title":"IEEE Access"},{"issue":"2","key":"577_CR56","doi-asserted-by":"publisher","first-page":"139","DOI":"10.3390\/info16020139","volume":"16","author":"N Hussain","year":"2025","unstructured":"Hussain N, Qasim A, Mehak G, Kolesnikova O, Gelbukh A, Sidorov G. Orud-detect: a comprehensive approach to offensive language detection in roman Urdu using hybrid machine learning-deep learning models with embedding techniques. Information. 2025;16(2):139.","journal-title":"Information"},{"key":"577_CR57","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01308-5","author":"M Raj","year":"2022","unstructured":"Raj M, Singh S, Solanki K, Selvanambi R. An application to detect cyberbullying using machine learning and deep learning techniques. SN Comput Sci. 2022. https:\/\/doi.org\/10.1007\/s42979-022-01308-5.","journal-title":"SN Comput Sci"},{"issue":"1","key":"577_CR58","doi-asserted-by":"publisher","first-page":"965","DOI":"10.12785\/ijcds\/130177","volume":"13","author":"AC Mazari","year":"2023","unstructured":"Mazari AC, Kheddar H. Deep learning-based analysis of Algerian dialect dataset targeted hate speech, offensive language and cyberbullying. Int J Comput Digit Syst. 2023;13(1):965\u201372.","journal-title":"Int J Comput Digit Syst"},{"key":"577_CR59","unstructured":"Yadav A, Gupta M, Shakya B, Pathak A. Leveraging CNN-BiLSTM for multi-class cyberbullying detection in Hindi text. Int J Modern Sci Res Technol. 2025;3(3)."},{"issue":"1","key":"577_CR60","first-page":"1322","volume":"5","author":"P Agrawal","year":"2024","unstructured":"Agrawal P, Kumar A, Tripathi AK. Enhancing cyberbullying detection using ensemble learning and embeddings. ShodhKosh J Vis Perform Arts. 2024;5(1):1322\u201331.","journal-title":"ShodhKosh J Vis Perform Arts."},{"key":"577_CR61","doi-asserted-by":"publisher","first-page":"37418","DOI":"10.1109\/ACCESS.2024.3370232","volume":"12","author":"A Khan","year":"2024","unstructured":"Khan A, Ahmed A, Jan S, Bilal M, Zuhairi MF. Abusive language detection in Urdu text: leveraging deep learning and attention mechanism. IEEE Access. 2024;12:37418\u201331.","journal-title":"IEEE Access"},{"issue":"11","key":"577_CR62","doi-asserted-by":"publisher","first-page":"187","DOI":"10.3390\/fi12110187","volume":"12","author":"A Muneer","year":"2020","unstructured":"Muneer A, Fati SM. A comparative analysis of machine learning techniques for cyberbullying detection on Twitter. Future Internet. 2020;12(11):187\u2013187.","journal-title":"Future Internet"},{"issue":"2","key":"577_CR63","doi-asserted-by":"publisher","first-page":"3113","DOI":"10.32604\/cmc.2025.062724","volume":"83","author":"Y Tashtoush","year":"2025","unstructured":"Tashtoush Y, Banysalim A, Maabreh M, Al-Eidi S, Karajeh O, Zahariev P. A deep learning framework for Arabic cyberbullying detection in social networks. Comput Mater Continua. 2025;83(2):3113\u201334.","journal-title":"Comput Mater Continua"},{"key":"577_CR64","doi-asserted-by":"crossref","unstructured":"Aqeel H, Kamble A. A hybrid classifier of cyber bullying detection in social media platforms. 2022, pp. 1\u20135.","DOI":"10.1109\/ICERECT56837.2022.10060739"},{"key":"577_CR65","first-page":"1","volume":"2021","author":"S Al-Dabet","year":"2023","unstructured":"Al-Dabet S, ElMassry A, Alomar B, Alshamsi A. Transformer-based Arabic offensive speech detection. Int Conf Emerg Smart Comput Inf. 2023;2021:1\u20136.","journal-title":"Int Conf Emerg Smart Comput Inf"},{"key":"577_CR66","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.n71","author":"MJ Page","year":"2021","unstructured":"Page MJ, McKenzie JE, Bossuyt PM, Boutron I, Hoffmann TC, Mulrow CD, et al. The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. BMJ. 2021. https:\/\/doi.org\/10.1136\/bmj.n71.","journal-title":"BMJ"},{"issue":"1","key":"577_CR67","doi-asserted-by":"publisher","first-page":"459","DOI":"10.52131\/pjhss.2025.v13i1.2690","volume":"13","author":"H Hussain","year":"2025","unstructured":"Hussain H, Awan MWI, Rehman L. The role of dark personality traits in shaping bystander behavior to cyberbullying among adults: a systematic literature review. Pak J Humanit Soc Sci. 2025;13(1):459\u201377.","journal-title":"Pak J Humanit Soc Sci."},{"key":"577_CR68","doi-asserted-by":"crossref","unstructured":"Shekhar A, Venkatesan M. A bag-of-phonetic-codes modelfor cyber-bullying detection in twitter. In: 2018 international conference on current trends towards converging technologies (ICCTCT). IEEE; 2018. pp. 1\u20137.","DOI":"10.1109\/ICCTCT.2018.8550938"},{"key":"577_CR69","doi-asserted-by":"crossref","unstructured":"Fattahi J, Sghaier F, Mejri M, Bahroun S, Ghayoula R, Manai E. Cyberbullying detection using bag-of-words, TF-IDF, parallel CNNs and BiLSTM neural networks. In: New trends in intelligent software methodologies, tools and techniques. IOS Press; 2024. pp. 72\u201384.","DOI":"10.3233\/FAIA240357"},{"key":"577_CR70","unstructured":"Mikolov T, Chen K, Corrado G, Dean J. Efficient estimation of word representations in vector space. 2013. arXiv preprint arXiv:1301.3781."},{"key":"577_CR71","doi-asserted-by":"crossref","unstructured":"Pennington J, Socher R, Manning CD. Glove: global vectors for word representation. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP). 2014. pp. 1532\u20131543.","DOI":"10.3115\/v1\/D14-1162"},{"issue":"2","key":"577_CR72","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1007\/s11042-024-19045-7","volume":"84","author":"P Rakshit","year":"2025","unstructured":"Rakshit P, Sarkar A. A supervised deep learning-based sentiment analysis by the implementation of Word2Vec and GloVe embedding techniques. Multimed Tools Appl. 2025;84(2):979\u20131012.","journal-title":"Multimed Tools Appl"},{"key":"577_CR73","doi-asserted-by":"crossref","unstructured":"Sujud R, Fahs W, Khatoun R, Chbib F. Cyberbullying detection using bidirectional encoder representations from transformers (BERT). In: 2024 IEEE international mediterranean conference on communications and networking (MeditCom). IEEE; 2024. pp. 257\u2013262.","DOI":"10.1109\/MeditCom61057.2024.10621093"},{"issue":"2","key":"577_CR74","first-page":"77","volume":"1","author":"D Suraj","year":"2023","unstructured":"Suraj D, Dinesh S, Balaji R, Deepika P, Ajila F. Deciphering product review sentiments using BERT and TensorFlow. FMDB Trans Sustain Comput Syst. 2023;1(2):77\u201388.","journal-title":"FMDB Trans Sustain Comput Syst."},{"key":"577_CR75","doi-asserted-by":"publisher","DOI":"10.17576\/3L-2021-2704-15","author":"N Noor","year":"2021","unstructured":"Noor N, Hamid BA. Cyberbullying in the name of God: critical discourse analysis of online responses to the act of De-Hijabbing in Malaysia. 3L Southeast Asian J Engl Lang Stud. 2021. https:\/\/doi.org\/10.17576\/3L-2021-2704-15.","journal-title":"3L Southeast Asian J Engl Lang Stud."},{"issue":"1","key":"577_CR76","first-page":"88","volume":"11","author":"NABM Nazri","year":"2025","unstructured":"Nazri NABM, Omar AWB. Fine-tuning large language model (BERT) for Islamic moral inquiry and response. Int J Percept Cogn Comput. 2025;11(1):88\u201394.","journal-title":"Int J Percept Cogn Comput"},{"key":"577_CR77","doi-asserted-by":"crossref","unstructured":"Rajput G, Punn NS, Sonbhadra SK, Agarwal S. Hate speech detection using static bert embeddings. In: Big data analytics: 9th international conference, BDA 2021, virtual event, December 15\u201318, 2021, proceedings 9. Springer International Publishing; 2021. pp. 67\u201377.","DOI":"10.1007\/978-3-030-93620-4_6"},{"issue":"5","key":"577_CR78","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2023.103454","volume":"60","author":"T Mahmud","year":"2023","unstructured":"Mahmud T, Ptaszynski M, Eronen J, Masui F. Cyberbullying detection for low-resource languages and dialects: review of the state of the art. Inf Process Manag. 2023;60(5):103454.","journal-title":"Inf Process Manag"},{"key":"577_CR79","unstructured":"Morsi K, Hussein W, Ismail R. Arabic text summarization using transformer-based architectures.\u00a0Int J Comput Their Appl. 2025;32(1)."},{"key":"577_CR80","unstructured":"Ghous H, Malik MH, Altaf J, Nayab S, Sehrish I, Nawaz SA. Navigating sarcasm in multilingual text: an in-depth exploration and evaluation. J Comput Biomed Inf. 2024."},{"key":"577_CR81","doi-asserted-by":"crossref","unstructured":"Ayman U, Khan AR, Mahi MH, Akter T, Koli ZM, Bijoy MHI. Optimizing Bengali sentiment analysis: a comparison of countvectorizer and TF-IDF with machine learning. In: 2025 international conference on electrical, computer and communication engineering (ECCE). IEEE; 2025. pp. 1\u20136.","DOI":"10.1109\/ECCE64574.2025.11013476"},{"key":"577_CR82","doi-asserted-by":"crossref","unstructured":"Saeed A, Khan HU, Shankar A, Imran T, Khan D, Kamran M, Khan MA. Topic modeling based text classification regarding islamophobia using word embedding and transformers techniques. In: ACM transactions on Asian and low-resource language information processing. 2023.","DOI":"10.1145\/3626318"},{"issue":"5","key":"577_CR83","first-page":"4769","volume":"42","author":"N Ashraf","year":"2022","unstructured":"Ashraf N, Rafiq A, Butt S, Shehzad HMF, Sidorov G, Gelbukh A. Youtube based religious hate speech and extremism detection dataset with machine learning baselines. J Intell Fuzzy Syst. 2022;42(5):4769\u201377.","journal-title":"J Intell Fuzzy Syst"},{"key":"577_CR84","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.2486","volume":"10","author":"M Shahid","year":"2024","unstructured":"Shahid M, Umair M, Iqbal MA, Rashid M, Akram S, Zubair M. Leveraging deep learning for toxic comment detection in cursive languages. PeerJ Comput Sci. 2024;10:e2486.","journal-title":"PeerJ Comput Sci"},{"key":"577_CR85","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.048003","author":"D Musleh","year":"2024","unstructured":"Musleh D, Rahman A, Alkherallah MA, Al-Bohassan MK, Alawami MM, Alsebaa HA, et al. A machine learning approach to cyberbullying detection in Arabic tweets. Comput Mater Contin. 2024. https:\/\/doi.org\/10.32604\/cmc.2024.048003.","journal-title":"Comput Mater Contin"},{"key":"577_CR86","first-page":"9","volume-title":"Optical character recognition systems","author":"A Chaudhuri","year":"2017","unstructured":"Chaudhuri A, Mandaviya K, Badelia P, Ghosh SK, Chaudhuri A, Mandaviya K, et al. Optical character recognition systems. Springer International Publishing; 2017. p. 9\u201341."},{"issue":"35","key":"577_CR87","doi-asserted-by":"publisher","first-page":"21923","DOI":"10.1007\/s00521-024-10371-3","volume":"36","author":"S Wang","year":"2024","unstructured":"Wang S, Shibghatullah AS, Iqbal TJ, Keoy KH. A review of multimodal-based emotion recognition techniques for cyberbullying detection in online social media platforms. Neural Comput Appl. 2024;36(35):21923\u201356.","journal-title":"Neural Comput Appl"},{"issue":"1","key":"577_CR88","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-024-06772-9","volume":"81","author":"S MohammedJany","year":"2025","unstructured":"MohammedJany S, Killi CBR, Rafi S, Rizwana S. Detecting multimodal cyber-bullying behaviour in social-media using deep learning techniques. J Supercomput. 2025;81(1):1\u201326.","journal-title":"J Supercomput"},{"issue":"1","key":"577_CR89","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3447651","volume":"21","author":"RS Bhowmick","year":"2021","unstructured":"Bhowmick RS, Ganguli I, Paul J, Sil J. A multimodal deep framework for derogatory social media post identification of a recognized person. ACM Trans Asian Low-Resour Lang Inf Process. 2021;21(1):1\u201319.","journal-title":"ACM Trans Asian Low-Resour Lang Inf Process"},{"issue":"7553","key":"577_CR90","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G. Deep learning. Nature. 2015;521(7553):436\u201344.","journal-title":"Nature"},{"key":"577_CR91","unstructured":"Velioglu R, Rose J. Detecting hate speech in memes using multimodal deep learning approaches: Prize-winning solution to hateful memes challenge. 2020. arXiv preprint arXiv:2012.12975."},{"issue":"9","key":"577_CR92","doi-asserted-by":"publisher","first-page":"4630","DOI":"10.1109\/TCSVT.2023.3245607","volume":"33","author":"J Yao","year":"2023","unstructured":"Yao J, Zhao Y, Bu Y, Kong SG, Chan JCW. Laplacian pyramid fusion network with hierarchical guidance for infrared and visible image fusion. IEEE Trans Circuits Syst Video Technol. 2023;33(9):4630\u201344.","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"577_CR93","doi-asserted-by":"crossref","unstructured":"Liu XM, Ji R, Wang C, Liu W, Zhong B, Huang TS. Understanding image structure via hierarchical shape parsing. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2015. pp. 5042\u20135050.","DOI":"10.1109\/CVPR.2015.7299139"},{"key":"577_CR94","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.neucom.2021.03.066","volume":"450","author":"Z Tong","year":"2021","unstructured":"Tong Z, Xu P, Denoeux T. An evidential classifier based on Dempster-shafer theory and deep learning. Neurocomputing. 2021;450:275\u201393.","journal-title":"Neurocomputing"},{"issue":"24","key":"577_CR95","doi-asserted-by":"publisher","first-page":"3116","DOI":"10.3390\/electronics10243116","volume":"10","author":"S Larabi-Marie-Sainte","year":"2021","unstructured":"Larabi-Marie-Sainte S, Alskireen R, Alhalawani S. Emerging applications of bio-inspired algorithms in image segmentation. Electronics. 2021;10(24):3116.","journal-title":"Electronics"},{"key":"577_CR96","doi-asserted-by":"crossref","unstructured":"Kiela D, Conneau A, Jabri A, Nickel M. Learning visually grounded sentence representations. 2017. arXiv preprint arXiv:1707.06320.","DOI":"10.18653\/v1\/N18-1038"},{"issue":"1","key":"577_CR97","first-page":"359","volume":"4","author":"M Suchithra","year":"2025","unstructured":"Suchithra M, Sujan M, Naidu MB, Asma K, Lokesh M, Subbaiah CV. A comprehensive multi-modal framework for cyberbullying detection on social media. Int J Comput Learn Intell. 2025;4(1):359\u201366.","journal-title":"Int J Comput Learn Intell."},{"key":"577_CR98","doi-asserted-by":"crossref","unstructured":"Roy PK. MMFFHS: multi-modal feature fusion for hate speech detection on social media. IEEE Trans Big Data. 2024","DOI":"10.1109\/TBDATA.2024.3445372"},{"key":"577_CR99","first-page":"1","volume":"0","author":"Y Tashtoush","year":"2025","unstructured":"Tashtoush Y, Banysalim A, Maabreh M, Al-Eidi S, Karajeh O, Zahariev P. A deep learning framework for Arabic cyberbullying detection in social networks. Comput Mater Contin Comput Mater Contin (Print). 2025;0:1\u201310.","journal-title":"Comput Mater Contin Comput Mater Contin (Print)"},{"key":"577_CR100","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2025.062724","author":"Y Tashtoush","year":"2025","unstructured":"Tashtoush Y, Banysalim A, Maabreh M, Al-Eidi S, Karajeh O, Zahariev P. A deep learning framework for Arabic cyberbullying detection in social networks. Comput Mater Continua. 2025. https:\/\/doi.org\/10.32604\/cmc.2025.062724.","journal-title":"Comput Mater Continua"},{"key":"577_CR101","unstructured":"Diaz-Garcia JA, Carvalho JP. A survey of textual cyber abuse detection using cutting-edge language models and large language models. 2025. arXiv preprint arXiv:2501.05443."},{"key":"577_CR102","doi-asserted-by":"publisher","DOI":"10.1016\/j.nlp.2024.100111","volume":"9","author":"S Sifath","year":"2024","unstructured":"Sifath S, Islam T, Erfan M, Dey SK, Islam MMU, Samsuddoha M, et al. Recurrent neural network based multiclass cyber bullying classification. Nat Lang Process J. 2024;9:100111.","journal-title":"Nat Lang Process J."},{"key":"577_CR103","unstructured":"Laraissia LY. Sentiment analysis for Arabic language using advanced deep learning techniques. 2024."},{"key":"577_CR104","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-021-00771-z","author":"MH Zaib","year":"2022","unstructured":"Zaib MH, Bashir F, Qureshi KN, Kausar S, Rizwan M, Jeon G. Deep learning based cyber bullying early detection using distributed denial of service flow. Multimedia Syst. 2022. https:\/\/doi.org\/10.1007\/s00530-021-00771-z.","journal-title":"Multimedia Syst"},{"issue":"1","key":"577_CR105","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1186\/s40537-022-00664-6","volume":"9","author":"D Naik","year":"2022","unstructured":"Naik D, Jaidhar CD. A novel multi-layer attention framework for visual description prediction using bidirectional LSTM. J Big Data. 2022;9(1):104.","journal-title":"J Big Data"},{"issue":"8","key":"577_CR106","doi-asserted-by":"publisher","first-page":"6391","DOI":"10.1007\/s10462-021-09975-1","volume":"54","author":"MM Bejani","year":"2021","unstructured":"Bejani MM, Ghatee M. A systematic review on overfitting control in shallow and deep neural networks. Artif Intell Rev. 2021;54(8):6391\u2013438.","journal-title":"Artif Intell Rev"},{"key":"577_CR107","doi-asserted-by":"crossref","unstructured":"Altayeva A, Abdrakhmanov R, Toktarova A, Tolep A. Cyberbullying detection on social networks using a hybrid deep learning architecture based on convolutional and recurrent models. Int J Adv Comput Sci Appl. 2024;15(10).","DOI":"10.14569\/IJACSA.2024.0151018"},{"key":"577_CR108","doi-asserted-by":"crossref","unstructured":"Jadhav D, Vijayalakshmi S, Palathara TS. Rating-based cyberbullying detection with text, emojis on social media. In: 2024 international conference on electrical electronics and computing technologies (ICEECT), vol. 1, IEEE; 2024. pp. 1\u20136.","DOI":"10.1109\/ICEECT61758.2024.10739238"},{"issue":"2","key":"577_CR109","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1049\/cje.2020.01.001","volume":"29","author":"H Wang","year":"2020","unstructured":"Wang H, He J, Zhang X, Liu S. A short text classification method based on N-gram and CNN. Chin J Electron. 2020;29(2):248\u201354.","journal-title":"Chin J Electron"},{"key":"577_CR110","unstructured":"Jahan M. Cyber bullying identification and tackling using natural language processing techniques (Master\u2019s thesis, M. Jahan). 2020."},{"issue":"5","key":"577_CR111","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.2174\/2213275912666190409152308","volume":"13","author":"A Kumar","year":"2020","unstructured":"Kumar A, Jaiswal A. Deep learning based sentiment classification on user-generated big data. Recent Adv Comput Sci Commun. 2020;13(5):1047\u201356.","journal-title":"Recent Adv Comput Sci Commun"},{"key":"577_CR112","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125641","volume":"262","author":"MK Mali","year":"2025","unstructured":"Mali MK, Pawar RR, Shinde SA, Kale SD, Mulik SV, Jagtap AA, et al. Automatic detection of cyberbullying behaviour on social media using stacked Bi-Gru attention with BERT model. Expert Syst Appl. 2025;262:125641.","journal-title":"Expert Syst Appl"},{"issue":"2","key":"577_CR113","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1017\/S0954579418000068","volume":"31","author":"W Troop-Gordon","year":"2019","unstructured":"Troop-Gordon W, Gordon RD, Schwandt BM, Horvath GA, Lee EE, Visconti KJ. Allocation of attention to scenes of peer harassment: visual\u2013cognitive moderators of the link between peer victimization and aggression. Dev Psychopathol. 2019;31(2):525\u201340.","journal-title":"Dev Psychopathol"},{"key":"577_CR114","doi-asserted-by":"crossref","unstructured":"Bhadgale AM, Maheswari M. A multi model deep learning framework for sarcasm detection in regional social media: an overview. In: 2025 1st international conference on AIML-applications for engineering and technology (ICAET). IEEE; 2025. pp. 1\u201310.","DOI":"10.1109\/ICAET63349.2025.10932319"},{"key":"577_CR115","unstructured":"Tabasshum A, Ashrafi FT, Afreen S. Enhanced hate speech detection in social media using transformer-based models (Doctoral dissertation, Brac University). 2024."},{"key":"577_CR116","unstructured":"Ivan S. Hate speech detection from multimodal memes using vision-language transformer models (Doctoral dissertation, Department of Computer Science and Engineering (CSE), Islamic University of Technology (IUT), Board Bazar, Gazipur-1704, Bangladesh). 2024."},{"issue":"2","key":"577_CR117","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3441141","volume":"2","author":"L Cheng","year":"2021","unstructured":"Cheng L, Guo R, Silva YN, Hall D, Liu H. Modeling temporal patterns of cyberbullying detection with hierarchical attention networks. ACM\/IMS Trans Data Sci. 2021;2(2):1\u201323.","journal-title":"ACM\/IMS Trans Data Sci."},{"issue":"13","key":"577_CR118","doi-asserted-by":"publisher","first-page":"2453003","DOI":"10.1142\/S0218001424530033","volume":"38","author":"A Faraj","year":"2024","unstructured":"Faraj A, Utku S. Global texts, unified action: tackling cyberbullying across multiple languages. Int J Pattern Recognit Artif Intell. 2024;38(13):2453003.","journal-title":"Int J Pattern Recognit Artif Intell"},{"issue":"9","key":"577_CR119","doi-asserted-by":"publisher","first-page":"2695","DOI":"10.1108\/K-01-2021-0061","volume":"51","author":"S Bharti","year":"2022","unstructured":"Bharti S, Yadav AK, Kumar M, Yadav D. Cyberbullying detection from tweets using deep learning. Kybernetes. 2022;51(9):2695\u2013711.","journal-title":"Kybernetes"},{"issue":"3","key":"577_CR120","doi-asserted-by":"publisher","first-page":"1839","DOI":"10.1007\/s00530-020-00701-5","volume":"29","author":"C Iwendi","year":"2023","unstructured":"Iwendi C, Srivastava G, Khan S, Maddikunta PKR. Cyberbullying detection solutions based on deep learning architectures. Multimed Syst. 2023;29(3):1839\u201352.","journal-title":"Multimed Syst"},{"key":"577_CR121","doi-asserted-by":"crossref","unstructured":"Agarwal A, Chivukula AS, Bhuyan MH, Jan T, Narayan B, Prasad M. Identification and classification of cyberbullying posts: a recurrent neural network approach using under-sampling and class weighting. In: Neural information processing: 27th international conference, ICONIP 2020, Bangkok, Thailand, November 18\u201322, proceedings, Part V 27. Springer International Publishing; 2020. pp. 113\u2013120.","DOI":"10.1007\/978-3-030-63823-8_14"},{"issue":"21","key":"577_CR122","doi-asserted-by":"publisher","first-page":"2664","DOI":"10.3390\/electronics10212664","volume":"10","author":"M Alotaibi","year":"2021","unstructured":"Alotaibi M, Alotaibi B, Razaque A. A multichannel deep learning framework for cyberbullying detection on social media. Electronics. 2021;10(21):2664.","journal-title":"Electronics"},{"key":"577_CR123","doi-asserted-by":"crossref","unstructured":"Bu SJ, Cho SB. A hybrid deep learning system of CNN and LRCN to detect cyberbullying from SNS comments. In: International conference on hybrid artificial intelligence systems. Cham: Springer International Publishing; 2018. pp. 561\u2013572.","DOI":"10.1007\/978-3-319-92639-1_47"},{"key":"577_CR124","doi-asserted-by":"publisher","first-page":"25857","DOI":"10.1109\/ACCESS.2022.3153675","volume":"10","author":"BAH Murshed","year":"2022","unstructured":"Murshed BAH, Abawajy J, Mallappa S, Saif MAN, Al-Ariki HDE. DEA-RNN: a hybrid deep learning approach for cyberbullying detection in Twitter social media platform. IEEE Access. 2022;10:25857\u201371.","journal-title":"IEEE Access"},{"issue":"1","key":"577_CR125","first-page":"13","volume":"3","author":"S Zaheri","year":"2020","unstructured":"Zaheri S, Leath J, Stroud D. Toxic comment classification. SMU Data Sci Rev. 2020;3(1):13.","journal-title":"SMU Data Sci Rev."},{"issue":"3","key":"577_CR126","first-page":"399","volume":"28","author":"A Jamatia","year":"2019","unstructured":"Jamatia A, Das A, Gamb\u00e4ck B. Deep learning-based language identification in English-Hindi-Bengali code-mixed social media corpora. J Intell Syst. 2019;28(3):399\u2013408.","journal-title":"J Intell Syst"},{"key":"577_CR127","unstructured":"Daud R, Basir N, Mohd Rafei Heng NFN, Meor Sepli MMS, Melinda M. Large language model versus human: a study of automatic data annotation in islamophobia dataset. Available at SSRN 5045167."},{"key":"577_CR128","doi-asserted-by":"crossref","unstructured":"Gu S. Deep learning-based prediction and intervention model for college students mental health status. Int J High Speed Electron Syst. 2025;2540503.","DOI":"10.1142\/S0129156425405030"},{"issue":"6","key":"577_CR129","doi-asserted-by":"publisher","first-page":"8773","DOI":"10.1007\/s11042-021-11601-9","volume":"82","author":"S Paul","year":"2023","unstructured":"Paul S, Saha S, Singh JP. COVID-19 and cyberbullying: deep ensemble model to identify cyberbullying from code-switched languages during the pandemic. Multimed Tools Appl. 2023;82(6):8773\u201389.","journal-title":"Multimed Tools Appl"},{"key":"577_CR130","first-page":"1","volume":"02","author":"C Diyaolu","year":"2025","unstructured":"Diyaolu C. Multi-agent AI systems for adaptive, culturally-concordant care routing in postpartum depression across medicaid-dependent populations. Int J Adv Res Publ Rev. 2025;02:1\u201320.","journal-title":"Int J Adv Res Publ Rev."}],"container-title":["Discover Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00577-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44163-025-00577-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00577-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T16:04:18Z","timestamp":1762963458000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44163-025-00577-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":130,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["577"],"URL":"https:\/\/doi.org\/10.1007\/s44163-025-00577-2","relation":{},"ISSN":["2731-0809"],"issn-type":[{"type":"electronic","value":"2731-0809"}],"subject":[],"published":{"date-parts":[[2025,11,12]]},"assertion":[{"value":"19 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"322"}}