{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T04:09:00Z","timestamp":1751342940148,"version":"3.41.0"},"reference-count":69,"publisher":"Informa UK Limited","issue":"10","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2025,6,15]]},"DOI":"10.1080\/0144929x.2024.2313142","type":"journal-article","created":{"date-parts":[[2024,2,8]],"date-time":"2024-02-08T13:14:19Z","timestamp":1707398059000},"page":"2305-2322","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Class imbalance-sensitive approach based on PLMs for the detection of cyberbullying in English and Arabic datasets"],"prefix":"10.1080","volume":"44","author":[{"given":"Azzeddine Rachid","family":"Benaissa","sequence":"first","affiliation":[{"name":"University of la Manouba","place":["Manouba, Tunisia"]}]},{"given":"Azza","family":"Harbaoui","sequence":"additional","affiliation":[{"name":"University of la Manouba","place":["Manouba, Tunisia"]}]},{"given":"Hajjami Henda","family":"Ben Ghezala","sequence":"additional","affiliation":[{"name":"University of la Manouba","place":["Manouba, Tunisia"]}]}],"member":"301","published-online":{"date-parts":[[2024,2,8]]},"reference":[{"key":"e_1_3_5_2_1","first-page":"141","volume-title":"European Conference on Information Retrieval","author":"Agrawal Sweta","year":"2018","unstructured":"Agrawal, Sweta, and Amit Awekar. 2018. \u201cDeep Learning for Detecting Cyber- Bullying Across Multiple Social Media Platforms.\u201d In European Conference on Information Retrieval, 141\u2013153."},{"key":"e_1_3_5_3_1","doi-asserted-by":"publisher","DOI":"10.36892\/ijlts.v2i3.163"},{"key":"e_1_3_5_4_1","doi-asserted-by":"crossref","unstructured":"ALBayari R. and S. Abdallah. 2022. Instagram-Based Benchmark Dataset for Cyberbullying Detection in Arabic Text. Data. 7 83.","DOI":"10.3390\/data7070083"},{"key":"e_1_3_5_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-76346-6_35"},{"key":"e_1_3_5_6_1","doi-asserted-by":"publisher","DOI":"10.24093\/awej\/vol7no4.13"},{"key":"e_1_3_5_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.286891"},{"key":"e_1_3_5_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297573"},{"key":"e_1_3_5_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-018-09977-1"},{"issue":"5","key":"e_1_3_5_10_1","first-page":"2010","article-title":"Cyberbullying: An Emerging Threat to the \u201cAlways on\u201d Generation","volume":"5","author":"Belsey Bill.","year":"2010","unstructured":"Belsey, Bill. 2010. \u201cCyberbullying: An Emerging Threat to the \u201cAlways on\u201d Generation.\u201d Recuperado el 5 (5): 2010.","journal-title":"Recuperado el"},{"key":"e_1_3_5_11_1","first-page":"1910","article-title":"Neural Word Decomposition Models for Abusive Language Detection","author":"Bodapati Sravan Babu","year":"2019","unstructured":"Bodapati, Sravan Babu, Spandana Gella, Kasturi Bhattacharjee, and Yaser Al-Onaizan. 2019. \u201cNeural Word Decomposition Models for Abusive Language Detection.\u201d arXiv Preprint ArXiv. Proceedings of the Third Workshop on Abusive Language Online: 1910\u20131043.","journal-title":"arXiv Preprint ArXiv"},{"key":"e_1_3_5_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.psychres.2018.05.074"},{"key":"e_1_3_5_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2907070"},{"key":"e_1_3_5_14_1","unstructured":"Cer Daniel Yinfei Yang Sheng-yi Kong Nan Hua Nicole Limtiaco Rhomni John Noah Constant et al. 2018. Universal sentence encoder."},{"key":"e_1_3_5_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-X_40"},{"key":"e_1_3_5_16_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_5_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_5_18_1","doi-asserted-by":"publisher","DOI":"10.4995\/jclr.2019.11112"},{"key":"e_1_3_5_19_1","volume-title":"Big Data Analytics and Knowledge Discovery. DaWaK 2020","author":"Dadvar Maral","year":"2018","unstructured":"Dadvar, Maral, and Kai Eckert. 2018. \u201cCyberbullying Detection in Social Networks Using Deep Learning Based Models; A Reproducibility Study.\u201d In Big Data Analytics and Knowledge Discovery. DaWaK 2020."},{"key":"e_1_3_5_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71249-9_4"},{"key":"e_1_3_5_21_1","unstructured":"Devlin Jacob Ming-Wei Chang Kenton Lee and Kristina Toutanova. 2018. \u201cBert: Pre-Training of Deep Bidirectional Transformers for Language Understanding.\u201d arXiv Preprint ArXiv:1810.04805."},{"key":"e_1_3_5_22_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v5i3.14209"},{"key":"e_1_3_5_23_1","doi-asserted-by":"publisher","DOI":"10.1001\/jamapediatrics.2014.1223"},{"key":"e_1_3_5_24_1","unstructured":"Elkan Charles. 2001. The foundations of cost-sensitive learning. In International joint conference on artificial intelligence vol. 17 973\u2013978. Lawrence Erlbaum Associates."},{"key":"e_1_3_5_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3098979"},{"key":"e_1_3_5_26_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-0425"},{"key":"e_1_3_5_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10995-010-0672-x"},{"key":"e_1_3_5_28_1","article-title":"Learning Word Vectors for 157 Languages","author":"Grave Edouard","year":"2018","unstructured":"Grave, Edouard, Piotr Bojanowski, Prakhar Gupta, Armand Joulin, and Tomas Mikolov. 2018. \u201cLearning Word Vectors for 157 Languages.\u201d Proceedings of the Eleventh International Conference on Language Resources and Evaluation ({LREC} 2018).","journal-title":"Proceedings of the Eleventh International Conference on Language Resources and Evaluation ({LREC} 2018)"},{"key":"e_1_3_5_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/GreenCom\/CPSCom\/SmartData.2019.00074"},{"key":"e_1_3_5_30_1","first-page":"275","article-title":"A Multilingual System for Cyberbullying Detection: Arabic Content Detection Using Machine Learning. Advances in Science","volume":"2","author":"Haidar Batoul","year":"2017","unstructured":"Haidar, Batoul, Chamoun Maroun, and Ahmed Serhrouchni. 2017. \u201cA Multilingual System for Cyberbullying Detection: Arabic Content Detection Using Machine Learning. Advances in Science.\u201d Technology and Engineering Systems Journal 2: 275\u2013284.","journal-title":"Technology and Engineering Systems Journal"},{"key":"e_1_3_5_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCE.2018.8539303"},{"key":"e_1_3_5_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_3_5_33_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-018-0162-3"},{"key":"e_1_3_5_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1746-1561.2008.00335.x"},{"key":"e_1_3_5_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.05.080"},{"key":"e_1_3_5_36_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_5_37_1","unstructured":"Kingma Diederik and Jimmy Ba. 2014. Adam: A method for stochastic optimization. International Conference on Learning Representations 12."},{"key":"e_1_3_5_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/1403494814525004"},{"key":"e_1_3_5_39_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-017-0110-7"},{"key":"e_1_3_5_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_5_41_1","first-page":"1907","article-title":"Roberta: A Robustly Optimized Bert Pretraining Approach","author":"Liu Yinhan","year":"2019","unstructured":"Liu, Yinhan, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. \u201cRoberta: A Robustly Optimized Bert Pretraining Approach.\u201d arXiv Preprint ArXiv 1907\u201311692.","journal-title":"arXiv Preprint ArXiv"},{"key":"e_1_3_5_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA47632.2019.9035276"},{"key":"e_1_3_5_43_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-3008"},{"key":"e_1_3_5_44_1","doi-asserted-by":"publisher","DOI":"10.1177\/1541204006286288"},{"key":"e_1_3_5_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-020-00710-4"},{"key":"e_1_3_5_46_1","unstructured":"Pennebaker James Martha Francis and Roger Booth. 1999. Linguistic inquiry and word count (liwc)."},{"key":"e_1_3_5_47_1","unstructured":"Perone S. Christian Roberto Silveira and Thomas S. Paula. 2018. \u201cEvaluation of Sentence Embeddings in Downstream and Linguistic Probing Tasks.\u201d ArXiv abs\/1806.06259."},{"key":"e_1_3_5_48_1","doi-asserted-by":"crossref","unstructured":"Rachid B. A. H. Azza and H. H. Ben Ghezala. 2020. Classification of cyberbullying text in arabic. In 2020 International Joint Conference on Neural Networks (IJCNN) pages 1\u20137.","DOI":"10.1109\/IJCNN48605.2020.9206643"},{"key":"e_1_3_5_49_1","unstructured":"Rakib Tazeek and Lay-Ki Soon. 2018. \u201cUsing the Reddit Corpus for Cyberbully Detection.\u201d Intelligent Information and Database Systems: 10th Asian Conference ACIIDS.Dong Hoi City Vietnam .March 19\u201321 2018."},{"key":"e_1_3_5_50_1","unstructured":"Ratnayaka Gathika Thushari Atapattu Mahen Herath Georgia Zhang and Katrina Falkner. 2010. \u201cEnhancing the Identification of Cyberbullying Through Participant Roles.\u201d arXiv Preprint arXiv."},{"key":"e_1_3_5_51_1","doi-asserted-by":"crossref","unstructured":"Reynolds Kelly April Edwards and Lynne Edwards. 2011. \u201cUsing machine learning to detect cyberbullying.\u201d Proceedings 10th International Conference on Machine Learning and Applications ICMLA 2.","DOI":"10.1109\/ICMLA.2011.152"},{"key":"e_1_3_5_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2018.8491557"},{"key":"e_1_3_5_53_1","first-page":"1","volume-title":"International Joint Conference on Neural Networks (IJCNN)","author":"Rosa Hugo","year":"2018","unstructured":"Rosa, Hugo, David Martins de Matos, Ricardo Ribeiro, Luisa Coheur, and Joao Carvalho. 2018b. \u201cA \u2018Deeper\u2019 Look at Detecting Cyberbullying in Social Networks.\u201d In International Joint Conference on Neural Networks (IJCNN), 1\u20138. IEEE."},{"key":"e_1_3_5_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.12.021"},{"issue":"7","key":"e_1_3_5_55_1","first-page":"2940","article-title":"Dynamically Weighted Balanced Loss: Class Imbalanced Learning and Confidence Calibration of Deep Neural Networks","volume":"33","author":"Ruwani K.","year":"2021","unstructured":"Ruwani, K., M. Fernando, and Chris P Tsokos. 2021. \u201cDynamically Weighted Balanced Loss: Class Imbalanced Learning and Confidence Calibration of Deep Neural Networks.\u201d IEEE Transactions on Neural Networks and Learning Systems 33 (7): 2940\u20132951.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_3_5_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2017.2761757"},{"key":"e_1_3_5_57_1","unstructured":"Samghabadi Niloofar Safi Suraj Maharjan Alan Sprague Raquel Diaz Sprague and Thamar Solorio. 2017. \u201cDetecting nastiness in social media.\u201d In Proceedings of the First Workshop on Abusive Language Online 63\u201372."},{"key":"e_1_3_5_58_1","unstructured":"Sanchez Huascar and S. T. Sadish Kumar. 2011. Bullying detection."},{"key":"e_1_3_5_59_1","article-title":"Distilbert, a Distilled Version of Bert: Smaller, Faster, Cheaper and Lighter","author":"Sanh Victor","year":"2019","unstructured":"Sanh, Victor, Lysandre Debut, Julien Chaumond, and Thomas Wolf. 2019. \u201cDistilbert, a Distilled Version of Bert: Smaller, Faster, Cheaper and Lighter.\u201d arXiv Preprint ArXiv:1910.01108.","journal-title":"arXiv Preprint ArXiv:1910.01108"},{"key":"e_1_3_5_60_1","unstructured":"Sharma Hitesh Kumar Kshitiz Kshitiz and Shailendra. 2018. Nlp and machine learning techniques for detecting insulting comments on social networking platforms. International Conference on Advances in Computing and Communication Engineering (ICACCE) 265\u2013272."},{"key":"e_1_3_5_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.10.117"},{"key":"e_1_3_5_62_1","doi-asserted-by":"publisher","DOI":"10.29328\/journal.jatr.1001007"},{"key":"e_1_3_5_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.014"},{"key":"e_1_3_5_64_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0203794"},{"key":"e_1_3_5_65_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N. Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In NIPS."},{"key":"e_1_3_5_66_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1670"},{"key":"e_1_3_5_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0132"},{"key":"e_1_3_5_68_1","doi-asserted-by":"crossref","unstructured":"Zhong Haoti David Miller and Anna Squicciarini. 2015. Flexible Inference for Cyberbully Incident Detection: European Conference ECML PKDD 2018 Dublin Ireland September 10\u201314 2018 Proceedings Part III 356\u2013371 2019.","DOI":"10.1007\/978-3-030-10997-4_22"},{"key":"e_1_3_5_69_1","unstructured":"Zhou Chunting Chonglin Sun Zhiyuan Liu and Francis Lau. 2019. A c-lstm neural network for text classification 11."},{"key":"e_1_3_5_70_1","doi-asserted-by":"crossref","unstructured":"Ziems Caleb Ymir Vigfusson and Fred Morstatter. 2020. \u201cAggressive repetitive intentional visible and imbalanced: Refining representations for cyberbullying classification.\u201d In Proceedings of the International AAAI Conference on Web and Social Media 14 808\u2013819.","DOI":"10.1609\/icwsm.v14i1.7345"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2024.2313142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T13:37:20Z","timestamp":1751290640000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2024.2313142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,8]]},"references-count":69,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,6,15]]}},"alternative-id":["10.1080\/0144929X.2024.2313142"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2024.2313142","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"type":"print","value":"0144-929X"},{"type":"electronic","value":"1362-3001"}],"subject":[],"published":{"date-parts":[[2024,2,8]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-08-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-02-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}