{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:31:01Z","timestamp":1777951861485,"version":"3.51.4"},"reference-count":44,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":31,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.01.096","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:30:19Z","timestamp":1774035019000},"page":"833-842","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Cyberbullying and Harassment Pattern Recognition from Social Media Data Using BiLSTM-CNN Hybrid Model"],"prefix":"10.1016","volume":"275","author":[{"given":"Mustafa Hamid","family":"Abd Alsadh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hayder Makki","family":"Shakir","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Doaa.I.","family":"Hasan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hamsa Emad","family":"Mahmood","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amjed Abbas","family":"Ahmed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aladdin","family":"Al Zahran","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Taher M.","family":"Ghazal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.procs.2026.01.096_bib1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.69987\/JACS.2025.50101","article-title":"\u201cDeepContainer: A Deep Learning-based Framework for Real-time Anomaly Detection in Cloud-Native Container Environments,\u201d","volume":"5","author":"Xiong","year":"2025","journal-title":"Journal of Advanced Computing Systems"},{"key":"10.1016\/j.procs.2026.01.096_bib2","doi-asserted-by":"crossref","unstructured":"N. Akhtar, M. Hussain, and Z. Habib, \u201cDEEP-STA: Deep Learning-Based Detection and Localization of Various Types of Inter-Frame Video Tampering Using Spatiotemporal Analysis,\u201d Mathematics, vol. 12, no. 12, Jun. 2024, doi: 10.3390\/math12121778.","DOI":"10.3390\/math12121778"},{"issue":"3","key":"10.1016\/j.procs.2026.01.096_bib3","doi-asserted-by":"crossref","first-page":"6107","DOI":"10.32604\/cmc.2022.020698","article-title":"\u201cEfficient Deep-Learning-Based Autoencoder Denoising Approach for Medical Image Diagnosis,\u201d","volume":"70","author":"El-Shafai","year":"2022","journal-title":"Computers, Materials & Continua"},{"issue":"1","key":"10.1016\/j.procs.2026.01.096_bib4","first-page":"11","article-title":"\u201cThe Synergistic Role of Machine Learning, Deep Learning, and Reinforcement Learning in Strengthening Cyber Security Measures for Crypto Currency Platforms.,\u201d","volume":"2","author":"Olutimehin","year":"2025","journal-title":"Deep Learning, and Reinforcement Learning in Strengthening Cyber Security Measures for Crypto Currency Platforms"},{"issue":"2","key":"10.1016\/j.procs.2026.01.096_bib5","first-page":"1","article-title":"\u201cReview and Evaluation of End-to-End Video Compression with Deep-Learning,\u201d","volume":"2","author":"Yasin","year":"2021","journal-title":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)"},{"issue":"2","key":"10.1016\/j.procs.2026.01.096_bib6","first-page":"1","article-title":"\u201cA Deep-Learning-Based Watermarking Framework for Robust Image Authentication in Spaceborne Applications,\u201d","volume":"1","author":"Ma","year":"2022","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.procs.2026.01.096_bib7","doi-asserted-by":"crossref","first-page":"196","DOI":"10.3390\/forecast5010010","article-title":"\u201cOn forecasting cryptocurrency prices: A comparison of machine learning, deep learning, and ensembles,\u201d","volume":"5","author":"Murray","year":"2023","journal-title":"Forecasting"},{"key":"10.1016\/j.procs.2026.01.096_bib8","doi-asserted-by":"crossref","unstructured":"Y. Sanjalawe, S. Al-E\u2019mari, S. Fraihat, M. Abualhaj, and E. Alzubi, \u201cA deep learning-driven multi-layered steganographic approach for enhanced data security,\u201d Sci Rep, vol. 15, no. 1, 2025, doi: 10.1038\/s41598-025-89189-5.","DOI":"10.1038\/s41598-025-89189-5"},{"issue":"31","key":"10.1016\/j.procs.2026.01.096_bib9","first-page":"1","article-title":"\u201cMulticlass ai-generated deepfake face detection using patch-wise deep learning model,\u201d","volume":"13","author":"Arshed","year":"2024","journal-title":"Computers"},{"key":"10.1016\/j.procs.2026.01.096_bib10","first-page":"535","article-title":"\u201cDURLD: Malicious URL detection using deep learning-based character level representations,\u201d","author":"Srinivasan","year":"2020","journal-title":"in Malware Analysis Using Artificial Intelligence and Deep Learning, Springer International Publishing"},{"issue":"2","key":"10.1016\/j.procs.2026.01.096_bib11","first-page":"1","article-title":"\u201cA Deep Learning-based Model for P2P Microloan Default Risk Prediction,\u201d","volume":"4","author":"Xia","year":"2024","journal-title":"Spectrum of Research"},{"issue":"1","key":"10.1016\/j.procs.2026.01.096_bib12","first-page":"2","article-title":"\u201cContext-Aware Cyberbullying Detection Using Deep Neural Networks,\u201d","volume":"115","author":"Zhou","year":"2021","journal-title":"Comput Human Behav"},{"issue":"8","key":"10.1016\/j.procs.2026.01.096_bib13","first-page":"678","article-title":"\u201cCyberbullying Detection Using Hybrid BiLSTM-CNN Network with Word Embeddings,\u201d","volume":"37","author":"Banerjee","year":"2022","journal-title":"International Journal of Intelligent Systems"},{"issue":"2","key":"10.1016\/j.procs.2026.01.096_bib14","first-page":"642","article-title":"\u201cReal-Time Cyberbullying Detection Using Deep Learning Techniques,\u201d","volume":"10","author":"Patel","year":"2023","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"1","key":"10.1016\/j.procs.2026.01.096_bib15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3742420","article-title":"\u201cAdvances in Cyberbullying Detection: A Survey on Deep Learning Techniques,\u201d","volume":"58","author":"Wang","year":"2025","journal-title":"ACM Comput Surv"},{"issue":"3","key":"10.1016\/j.procs.2026.01.096_bib16","first-page":"1","article-title":"\u201cAn advanced CNN-LSTM model for cryptocurrency forecasting,\u201d","volume":"10","author":"Livieris","year":"2021","journal-title":"Electronics (Basel)"},{"issue":"9","key":"10.1016\/j.procs.2026.01.096_bib17","doi-asserted-by":"crossref","first-page":"78","DOI":"10.14569\/IJACSA.2023.0140978","article-title":"\u201cHybrid CNN-LSTM Network for Cyberbullying Detection on Social Networks,\u201d","volume":"14","author":"Sultan","year":"2023","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"10.1016\/j.procs.2026.01.096_bib18","doi-asserted-by":"crossref","unstructured":"C. Sharma, G. Singh, P. S. Muttum, and S. Mahajan, \u201cCNN-FastText Multi-Input (CFMI) Neural Networks for Social Media Clickbait Classification,\u201d Recent Advances in Computer Science and Communications, vol. 17, no. 6, 2024, doi: 10.2174\/0126662558283914231221065437.","DOI":"10.2174\/0126662558283914231221065437"},{"issue":"2","key":"10.1016\/j.procs.2026.01.096_bib19","first-page":"533","article-title":"\u201cReal-Time Fraud Prevention in Digital Wallet Transactions Using CNN-RNN Hybrid Networks,\u201d","volume":"54","author":"Lenka","year":"2025","journal-title":"Cuestiones de Fisioterapia"},{"key":"10.1016\/j.procs.2026.01.096_bib20","doi-asserted-by":"crossref","unstructured":"A. Nasayreh et al., \u201cJordanian banknote data recognition: A CNN-based approach with attention mechanism,\u201d Journal of King Saud University - Computer and Information Sciences, vol. 36, no. 4, 2024, doi: 10.1016\/j.jksuci.2024.102038.","DOI":"10.1016\/j.jksuci.2024.102038"},{"issue":"22","key":"10.1016\/j.procs.2026.01.096_bib21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/su132212653","article-title":"\u201cTowards electric price and load forecasting using cnn-based ensembler in smart grid., \u201d","volume":"13","author":"Aslam","year":"2021","journal-title":"Sustainability"},{"issue":"6","key":"10.1016\/j.procs.2026.01.096_bib22","doi-asserted-by":"crossref","first-page":"967","DOI":"10.34028\/iajit\/21\/6\/1","article-title":"\u201cRobust Image Watermarking using DWT, DCT, and PSO with CNN-Based Attack Evaluation,\u201d","volume":"21","author":"Alia","year":"2024","journal-title":"International Arab Journal of Information Technology"},{"key":"10.1016\/j.procs.2026.01.096_bib23","doi-asserted-by":"crossref","unstructured":"M. Deb, K. G. Dhal, A. Das, A. G. Hussien, L. Abualigah, and A. Garai, \u201cA CNN-based model to count the leaves of rosette plants (LC-Net),\u201d Sci Rep, vol. 14, no. 1, 2024, doi: 10.1038\/s41598-024-51983-y.","DOI":"10.1038\/s41598-024-51983-y"},{"issue":"1","key":"10.1016\/j.procs.2026.01.096_bib24","first-page":"25","article-title":"\u201cTemporal Consistency Learning for Video Forgery Localization with 3D CNN., \u201d","volume":"456","author":"Li","year":"2022","journal-title":"Neurocomputing"},{"key":"10.1016\/j.procs.2026.01.096_bib25","doi-asserted-by":"crossref","unstructured":"E. Tamakloe, B. Kommey, J. J. Kponyo, E. T. Tchao, A. S. Agbemenu, and G. S. Klogo, \u201cPredictive AI Maintenance of Distribution Oil-Immersed Transformer via Multimodal Data Fusion: A New Dynamic Multiscale Attention CNN-LSTM Anomaly Detection Model for Industrial Energy Management,\u201d IET Electr Power Appl, vol. 19, no. 1, Jan. 2025, doi: 10.1049\/elp2.70011.","DOI":"10.1049\/elp2.70011"},{"issue":"3","key":"10.1016\/j.procs.2026.01.096_bib26","first-page":"2591","article-title":"\u201cDegradation modeling and restoration of ancient manuscripts using CNNs,\u201d","volume":"52","author":"Das","year":"2020","journal-title":"Neural Process Lett"},{"key":"10.1016\/j.procs.2026.01.096_bib27","doi-asserted-by":"crossref","unstructured":"A. M. Ali et al., \u201cCNNs in Crop Care: A Comparative Analysis of Tomato Disease Detection Models,\u201d 2024, IEEE, AlAhliyya Amman University,Faculty of Engineering,Communications and Computer Engineering Department,Amman,Jordan,19328; Middle East University (MEU),Faculty of Information Technology,Cybersecurity Department,Amman,Jordan,11831; Zarqa University,Faculty o. doi: 10.1109\/ICCR61006.2024.10532837.","DOI":"10.1109\/ICCR61006.2024.10532837"},{"issue":"1","key":"10.1016\/j.procs.2026.01.096_bib28","first-page":"1","article-title":"\u201cSpatio-Temporal Video Tampering Detection via Multi-Scale 3D CNNs,\u201d","volume":"2","author":"Chen","year":"2021","journal-title":"CVPR Workshops"},{"issue":"1","key":"10.1016\/j.procs.2026.01.096_bib29","first-page":"1","article-title":"\u201cSpatio-Temporal Video Tampering Detection via Multi-Scale 3D CNNs,\u201d","volume":"12","author":"Chen","year":"2021","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)"},{"issue":"1","key":"10.1016\/j.procs.2026.01.096_bib30","doi-asserted-by":"crossref","first-page":"75","DOI":"10.18576\/amis\/190107","article-title":"\u201cExploring Deep Learning Methods for Audio Speech Emotion Detection: An Ensemble MFCCs, CNNs and LSTM,\u201d","volume":"19","author":"Basha","year":"2025","journal-title":"Applied Mathematics and Information Sciences"},{"issue":"1","key":"10.1016\/j.procs.2026.01.096_bib31","first-page":"2260","article-title":"\u201cCyberbullying Detection using CNN and LSTM Hybrid Model.,\u201d","volume":"167","author":"Sharma","year":"2020","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"10.1016\/j.procs.2026.01.096_bib32","first-page":"1230","article-title":"\u201cBiLSTM-CNN Based Cyberbullying Detection with Attention Mechanism,\u201d","volume":"53","author":"Das","year":"2023","journal-title":"Applied Intelligence"},{"key":"10.1016\/j.procs.2026.01.096_bib33","unstructured":"E. Y. Chaymae and C. Khalid, \u201cAndroid Malware Detection Through CNN Ensemble Learning on Grayscale Images.\u201d [Online]. Available: www.ijacsa.thesai.org"},{"issue":"1","key":"10.1016\/j.procs.2026.01.096_bib34","first-page":"1","article-title":"\u201cHistorical document forensic authentication using deep CNN and transformer fusion,\u201d","volume":"20","author":"Kumar","year":"2024","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)"},{"key":"10.1016\/j.procs.2026.01.096_bib35","unstructured":"S. Kumar and D. Shah, \u201cHistorical document forensic authentication using deep CNN and transformer fusion.,\u201d pp. 1\u201310, 2024."},{"key":"10.1016\/j.procs.2026.01.096_bib36","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1016\/j.procs.2024.04.262","article-title":"\u201cCNN segmentation of skin melanoma in pre-processed dermoscopy images,\u201d","author":"Kadry","year":"2024","journal-title":"in Procedia Computer Science"},{"issue":"1","key":"10.1016\/j.procs.2026.01.096_bib37","first-page":"101","article-title":"\u201cCyberbullying Detection in Vietnamese Social Media Using BiLSTM-CNN Model,\u201d","volume":"65","author":"Nguyen","year":"2023","journal-title":"J Comput Sci"},{"issue":"3","key":"10.1016\/j.procs.2026.01.096_bib38","first-page":"25","article-title":"\u201cAn Effective Approach for Cyberbullying Detection Using CNN and LSTM Models,\u201d","volume":"175","author":"Kumar","year":"2020","journal-title":"Int J Comput Appl"},{"key":"10.1016\/j.procs.2026.01.096_bib39","doi-asserted-by":"crossref","first-page":"338","DOI":"10.52783\/jisem.v10i18s.2921","article-title":"\u201cComprehensive Evaluation of Transfer-CNN based Models for Breast Cancer Detection,\u201d","volume":"10","author":"Elzaghmouri","year":"2025","journal-title":"Journal of Information Systems Engineering and Management"},{"issue":"1","key":"10.1016\/j.procs.2026.01.096_bib40","first-page":"1126","article-title":"\u201cEnd-to-End Video Forgery Detection with 3D CNN and Temporal Attention,\u201d","volume":"27","author":"Kim","year":"2020","journal-title":"IEEE Signal Process Lett"},{"key":"10.1016\/j.procs.2026.01.096_bib41","series-title":"\u201cA Special Design of Job Dropout Faces Detection and Recognition System (JDFDRs),\u201d presented at the 2021 International Conference on Advanced Computer Applications (ACA)","first-page":"138","author":"Laklook","year":"2021"},{"issue":"6","key":"10.1016\/j.procs.2026.01.096_bib42","article-title":"\u201cA Novel Taneja Distance-based Classifier with PSO-Optimized Feature Selection for Efficient 5G Network Slicing.,\u201d","volume":"18","author":"Malik","year":"2025","journal-title":"International Journal of Intelligent Engineering & Systems"},{"issue":"2","key":"10.1016\/j.procs.2026.01.096_bib43","doi-asserted-by":"crossref","first-page":"100315","DOI":"10.1016\/j.jnlest.2025.100315","article-title":"\u201cEfficient feature selection based on Gower distance for breast cancer diagnosis,\u201d","volume":"23","author":"Baawi","year":"2025","journal-title":"Journal of Electronic Science and Technology"},{"issue":"2","key":"10.1016\/j.procs.2026.01.096_bib44","doi-asserted-by":"crossref","first-page":"462","DOI":"10.21533\/pen.v9.i2.755","article-title":"\u201cEvaluation patterns and algorithm for cancer identifications using dynamic clustering,\u201d","volume":"9","author":"Kurdi","year":"2021","journal-title":"Periodicals of Engineering and Natural Sciences (PEN)"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000979?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000979?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:12:06Z","timestamp":1777893126000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926000979"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":44,"alternative-id":["S1877050926000979"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.096","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Cyberbullying and Harassment Pattern Recognition from Social Media Data Using BiLSTM-CNN Hybrid Model","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.096","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}