{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T02:18:28Z","timestamp":1775182708888,"version":"3.50.1"},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People&apos;s Republic of China","doi-asserted-by":"publisher","award":["2502003"],"award-info":[{"award-number":["2502003"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Knowledge-Based Systems"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.knosys.2026.115639","type":"journal-article","created":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T23:09:45Z","timestamp":1772320185000},"page":"115639","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["RaSA-BoDX: A meta-cognitive reasoning framework for cyberbullying language detection and mitigation using multi-agent systems"],"prefix":"10.1016","volume":"339","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3566-7078","authenticated-orcid":false,"given":"Muhammad","family":"Nadeem","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8159-4984","authenticated-orcid":false,"given":"Chen","family":"Hongsong","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.knosys.2026.115639_bib0001","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1109\/TAFFC.2022.3219229","article-title":"Pars-OFF: A benchmark for offensive language detection on Farsi social Media","volume":"14","author":"Ataei","year":"2023","journal-title":"IEEe Trans. Affect. Comput."},{"key":"10.1016\/j.knosys.2026.115639_bib0002","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2024.109660","article-title":"Multilingual entity alignment by abductive knowledge reasoning on multiple knowledge graphs","volume":"139","author":"Akhtar","year":"2025","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.knosys.2026.115639_bib0003","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.126285","article-title":"Hierarchical attention-enhanced contextual CapsuleNet for multilingual hope speech detection","volume":"268","author":"Rehman","year":"2025","journal-title":"Expert. Syst. Appl."},{"key":"10.1016\/j.knosys.2026.115639_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2022.109494","article-title":"Entity alignment based on relational semantics augmentation for multilingual knowledge graphs","volume":"252","author":"Akhtar","year":"2022","journal-title":"Knowl. Based. Syst."},{"key":"10.1016\/j.knosys.2026.115639_bib0005","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2025.114689","article-title":"A comprehensive review of LLM-based content moderation: advancements, challenges, and future directions","volume":"330","author":"Chen","year":"2025","journal-title":"Knowl. Based. Syst."},{"key":"10.1016\/j.knosys.2026.115639_bib0006","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2025.113619","article-title":"KALD: A knowledge augmented multi-contrastive learning model for low resource abusive language detection","volume":"321","author":"Song","year":"2025","journal-title":"Knowl. Based. Syst."},{"key":"10.1016\/j.knosys.2026.115639_bib0007","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2025.111952","article-title":"A novel hybrid clustering and classification framework for multi-level depression detection in social media texts","volume":"160","author":"Khodabakhshi","year":"2025","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.knosys.2026.115639_bib0008","doi-asserted-by":"crossref","DOI":"10.1016\/j.chb.2023.108123","article-title":"Towards comprehensive cyberbullying detection: A dataset incorporating aggressive texts, repetition, peerness, and intent to harm","volume":"153","author":"Ejaz","year":"2024","journal-title":"Comput. Human. Behav."},{"key":"10.1016\/j.knosys.2026.115639_bib0009","unstructured":"HTSPTwit (Hate Speech Twitter), thefrankhsu\/hate_speech_twitter, and hugging face, https:\/\/huggingface.co\/datasets\/thefrankhsu\/hate_speech_twitter."},{"key":"10.1016\/j.knosys.2026.115639_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111375","article-title":"Advancing social network security with magteon-turing L3TM: A multi-layered defense system against cyber threats","volume":"267","author":"Nadeem","year":"2025","journal-title":"Comput. Netw."},{"issue":"2","key":"10.1016\/j.knosys.2026.115639_bib0011","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/TCSS.2022.3157474","article-title":"SEHC: A benchmark setup to identify online hate speech in English","volume":"10","author":"Ghosh","year":"2023","journal-title":"IEEe Trans. Comput. Soc. Syst."},{"issue":"1","key":"10.1016\/j.knosys.2026.115639_bib0012","first-page":"19","article-title":"Firefly-CDDL: A Firefly-based algorithm for cyberbullying detection based on deep learning","volume":"75","author":"Al-Ajlan","year":"2023","journal-title":"Comput. Mater. Contin."},{"issue":"2","key":"10.1016\/j.knosys.2026.115639_bib0013","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1109\/TCSS.2023.3275428","article-title":"ICON: Instagram profile classification using image and natural language processing methods","volume":"11","author":"G\u00fcven","year":"2024","journal-title":"IEEe Trans. Comput. Soc. Syst."},{"key":"10.1016\/j.knosys.2026.115639_bib0014","unstructured":"SSEFInsta, SSEF-HG-AC\/cyberbullying-instagram-balanced-1128, and hugging face, https:\/\/huggingface.co\/datasets\/SSEF-HG-AC\/cyberbullying-instagram-balanced-1128."},{"key":"10.1016\/j.knosys.2026.115639_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2020.106458","article-title":"A deep neural network based multi-task learning approach to hate speech detection","volume":"210","author":"Kapil","year":"2020","journal-title":"Knowl. Based. Syst."},{"key":"10.1016\/j.knosys.2026.115639_bib0016","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2022.109965","article-title":"Integrating implicit and explicit linguistic phenomena via multi-task learning for offensive language detection","volume":"258","author":"Plaza-del-Arco","year":"2022","journal-title":"Knowl. Based. Syst."},{"key":"10.1016\/j.knosys.2026.115639_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.112166","article-title":"HA-GCEN: hyperedge-abundant graph convolutional enhanced network for hate speech detection","volume":"300","author":"Mu","year":"2024","journal-title":"Knowl. Based. Syst."},{"issue":"5","key":"10.1016\/j.knosys.2026.115639_bib0018","doi-asserted-by":"crossref","first-page":"5714","DOI":"10.1109\/TCSS.2024.3376958","article-title":"HateThaiSent : sentiment-aided hate speech detection in Thai language","volume":"11","author":"Maity","year":"2024","journal-title":"IEEe Trans. Comput. Soc. Syst."},{"key":"10.1016\/j.knosys.2026.115639_bib0019","doi-asserted-by":"crossref","first-page":"7602","DOI":"10.1109\/TIFS.2025.3588728","article-title":"Assessing text classification methods for cyberbullying detection on social Media platforms","volume":"20","author":"Philipo","year":"2025","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"10.1016\/j.knosys.2026.115639_bib0020","unstructured":"AntiLGBT, jxie\/anti-lgbt-cyberbullying, and hugging face, https:\/\/huggingface.co\/datasets\/jxie\/anti-lgbt-cyberbullying."},{"key":"10.1016\/j.knosys.2026.115639_bib0021","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2023.111023","article-title":"Optimizing fake news detection for Arabic context: A multitask learning approach with transformers and an enhanced Nutcracker Optimization algorithm","volume":"280","author":"Dahou","year":"2023","journal-title":"Knowl. Based. Syst."},{"issue":"3","key":"10.1016\/j.knosys.2026.115639_bib0022","doi-asserted-by":"crossref","first-page":"1247","DOI":"10.1109\/TBDATA.2024.3445372","article-title":"MMFFHS: multi-modal feature fusion for hate speech detection on social Media","volume":"11","author":"Roy","year":"2025","journal-title":"IEEe Trans. Big. Data"},{"key":"10.1016\/j.knosys.2026.115639_bib0023","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.111386","article-title":"Semi-meta-supervised hate speech detection","volume":"287","author":"Putra","year":"2024","journal-title":"Knowl. Based. Syst."},{"key":"10.1016\/j.knosys.2026.115639_bib0024","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2025.127307","article-title":"Protecting social networks against dual-vector attacks using Swarm OpenAI, large language Models, Swarm Intelligence, and Transformers","volume":"278","author":"Nadeem","year":"2025","journal-title":"Expert. Syst. Appl."},{"key":"10.1016\/j.knosys.2026.115639_bib0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.111440","article-title":"Generation of probabilistic synthetic data for serious games: A case study on cyberbullying","volume":"286","author":"P\u00e9rez","year":"2024","journal-title":"Knowl. Based. Syst."},{"key":"10.1016\/j.knosys.2026.115639_bib0026","article-title":"Session-based cyberbullying detection in social media: A survey","volume":"36","author":"Yi","year":"2023","journal-title":"Online Soc. Netw. Media"},{"issue":"6","key":"10.1016\/j.knosys.2026.115639_bib0027","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2024.104013","article-title":"Cyberbullying perpetration on social media: A situational action perspective","volume":"61","author":"Hu","year":"2024","journal-title":"Inf. Manag."},{"key":"10.1016\/j.knosys.2026.115639_bib0028","unstructured":"HTMultiTrain, valurank\/offensive-multi, and hugging Face, \u201chttps:\/\/huggingface.co\/datasets\/valurank\/offensive-multi\u201d."},{"key":"10.1016\/j.knosys.2026.115639_bib0029","unstructured":"S. Yuan et al., \u201cLLM in the loop: creating the ParaDeHate dataset for hate speech mitigation,\u201d arXiv preprint arXiv, 2025. https:\/\/doi.org\/10.48550\/arXiv.2506.01484."},{"key":"10.1016\/j.knosys.2026.115639_bib0030","unstructured":"YTParsed, saurabhshahane\/cyberbullying-dataset, and Kaggle, https:\/\/www.kaggle.com\/datasets\/saurabhshahane\/cyberbullying-dataset."},{"key":"10.1016\/j.knosys.2026.115639_bib0031","series-title":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","first-page":"1","article-title":"Detox: NLP based classification and euphemistic text substitution for toxic comments","author":"Jain","year":"2021"},{"key":"10.1016\/j.knosys.2026.115639_bib0032","series-title":"2023 International Conference on Machine Learning and Applications (ICMLA)","first-page":"1528","article-title":"GPT-DETOX: an In-context learning-based paraphraser for text mitigation","author":"Pesaranghader","year":"2023"},{"issue":"9","key":"10.1016\/j.knosys.2026.115639_bib0033","doi-asserted-by":"crossref","first-page":"54","DOI":"10.3390\/mti5090054","article-title":"Methods for mitigation of texts for the Russian language","volume":"5","author":"Dementieva","year":"2021","journal-title":"Multimodal. Technol. Interact."},{"key":"10.1016\/j.knosys.2026.115639_bib0034","unstructured":"OLID Dataset. Kaggle. https:\/\/www.kaggle.com\/datasets\/weddexofficial\/olid-cyberbullying."},{"key":"10.1016\/j.knosys.2026.115639_bib0035","series-title":"Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing","first-page":"19112","article-title":"DetoxLLM: A framework for mitigation with explanations","author":"Khondaker","year":"2024"},{"key":"10.1016\/j.knosys.2026.115639_bib0036","first-page":"1","article-title":"DeTox: A WebApp for toxic comment detection and moderation","author":"P","year":"2024","journal-title":"IEEE"},{"key":"10.1016\/j.knosys.2026.115639_bib0037","article-title":"Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage","volume":"89","author":"Chen","year":"2025","journal-title":"J. Inf. Secur. Appl."},{"issue":"300","key":"10.1016\/j.knosys.2026.115639_bib0038","article-title":"Hybrid transformer deep neural architectures for enhanced misinformation detection on social media","author":"Shoaib Khan","year":"2026","journal-title":"Expert. Syst. Appl."},{"issue":"27-28","key":"10.1016\/j.knosys.2026.115639_bib0039","article-title":"CrossGuard: runtime-adaptive LLM fuzzing for cross-contract vulnerabilities detection","volume":"37","author":"Mergani","year":"2025","journal-title":"Concurr. Comput.:Pract. Exper."},{"key":"10.1016\/j.knosys.2026.115639_bib0040","unstructured":"What is Swarm-OpenAI. (n.d.). https:\/\/medium.com\/@tahirbalarabe2\/what-is-openai-swarm-multi-agent-systems-explained-0552f30a1095."}],"container-title":["Knowledge-Based Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705126003795?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705126003795?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T21:51:58Z","timestamp":1774043518000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950705126003795"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":40,"alternative-id":["S0950705126003795"],"URL":"https:\/\/doi.org\/10.1016\/j.knosys.2026.115639","relation":{},"ISSN":["0950-7051"],"issn-type":[{"value":"0950-7051","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"RaSA-BoDX: A meta-cognitive reasoning framework for cyberbullying language detection and mitigation using multi-agent systems","name":"articletitle","label":"Article Title"},{"value":"Knowledge-Based Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.knosys.2026.115639","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"115639"}}