{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T21:07:23Z","timestamp":1777928843060,"version":"3.51.4"},"reference-count":74,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004242","name":"Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia, through the Princess Nourah bint Abdulrahman University Researchers Supporting Project","doi-asserted-by":"publisher","award":["PNURSP2023R104"],"award-info":[{"award-number":["PNURSP2023R104"]}],"id":[{"id":"10.13039\/501100004242","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea (NRF) through the Brain Pool Program","doi-asserted-by":"publisher","award":["2022H1D3A2A02055024"],"award-info":[{"award-number":["2022H1D3A2A02055024"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"Creative Research Project","doi-asserted-by":"publisher","award":["RS-2023-00248526"],"award-info":[{"award-number":["RS-2023-00248526"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004242","name":"Princess Nourah bint Abdulrahman University Researchers Supporting Project number","doi-asserted-by":"publisher","award":["PNURSP2023R104"],"award-info":[{"award-number":["PNURSP2023R104"]}],"id":[{"id":"10.13039\/501100004242","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004242","name":"Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004242","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3329347","type":"journal-article","created":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T18:03:59Z","timestamp":1698948239000},"page":"124524-124541","source":"Crossref","is-referenced-by-count":27,"title":["Safeguarding Online Spaces: A Powerful Fusion of Federated Learning, Word Embeddings, and Emotional Features for Cyberbullying Detection"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5957-1383","authenticated-orcid":false,"given":"Nagwan Abdel","family":"Samee","sequence":"first","affiliation":[{"name":"Department of Information Technology, College of Computer and Information Science, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Umair","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Air University, Islamabad, Aerospace and Aviation Campus, Kamra, Pakistan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Salabat","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Attock Campus, Punjab, Pakistan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9149-2810","authenticated-orcid":false,"given":"Mona M.","family":"Jamjoom","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Muhammad","family":"Sharif","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Attock Campus, Punjab, Pakistan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Do Hyuen","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Jeju National University, Jeju-si, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106485"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2022.101314"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph14080888"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2015.04.011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/02673843.2019.1669059"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2196\/26029"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0102145"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3284976"},{"issue":"3","key":"ref9","first-page":"79","article-title":"The history of social media and its impact on business","volume":"16","author":"Edosomwan","year":"2011","journal-title":"J. Appl. Manage. entrepreneurship"},{"key":"ref10","volume-title":"Cyberbullying: What Counselors Need to Know","author":"Bauman","year":"2014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108867"},{"key":"ref12","first-page":"379","article-title":"Cyberbullying and its consequences: How cyberbullying is contorting the minds of victims and bullies alike, and the law\u2019s limited available redress","volume":"26","author":"Miller","year":"2016","journal-title":"Southern California Interdiscipl. Law J."},{"issue":"2","key":"ref13","first-page":"51","article-title":"Cyberbullying: Experiences, impacts and coping strategies as described by Australian young people","volume":"29","author":"Price","year":"2010","journal-title":"Youth Stud. Aust."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4324\/9780203841372.ch8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref16","article-title":"Word2vec explained: Deriving Mikolov et al.\u2019s negative-sampling word-embedding method","author":"Goldberg","year":"2014","journal-title":"arXiv:1402.3722"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1806-38"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1500356WC"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2014.04.011"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918354"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1504\/IJDATS.2011.041335"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/SERIES1345"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275970"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/books978-3-03842-311-9"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1177\/0706743716684791"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/17482798.2012.739756"},{"key":"ref27","article-title":"Exploring the potential of feature density in estimating machine learning classifier performance with application to cyberbullying detection","author":"Eronen","year":"2022","journal-title":"arXiv:2206.01949"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-1395-1_2"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.01.207"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2849567"},{"issue":"5","key":"ref31","first-page":"238","article-title":"An effective approach for cyberbullying detection","volume":"3","author":"Nahar","year":"2013","journal-title":"Commun. Inf. Sci. Manage. Eng."},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2362394.2362400"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v5i3.14209"},{"key":"ref34","first-page":"1","article-title":"Detection of harassment on web 2.0","volume-title":"Proc. Content Anal. Web","volume":"2","author":"Yin"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3476883.3520222"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-020-00747-5"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04550-x"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2016.2531682"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0132"},{"issue":"7","key":"ref40","first-page":"808","article-title":"A time optimised model for cyberbullying detection","volume":"4","author":"Shriniket","year":"2022","journal-title":"Int. Res. J. Modernization Eng., Technol. Sci."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76941-7_11"},{"key":"ref42","article-title":"Cyberbullying detection in social networks using deep learning based models; a reproducibility study","author":"Dadvar","year":"2018","journal-title":"arXiv:1812.08046"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-020-00710-4"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v16i1.19401"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3098979"},{"key":"ref46","first-page":"26","article-title":"Benchmarking language models for cyberbullying identification and classification from social-media texts","volume-title":"Proc. 1st Workshop Lang. Technol. Resour. Fair, Inclusive, Safe Soc. 13th Lang. Resour. Eval. Conf.","author":"Verma"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-9012-9_32"},{"key":"ref48","first-page":"1","article-title":"Early detection of sexual predators with federated learning","volume-title":"Proc. Workshop Federated Learn., Recent Adv. New Challenges (Conjunct NeurIPS)","author":"Chehbouni"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.1242"},{"key":"ref50","article-title":"End-to-end messaging system enhancement using federated learning for cyberbullying detection","author":"Ram","year":"2022"},{"issue":"8","key":"ref51","article-title":"Learning with privacy at scale","volume":"1","author":"Apple","year":"2017","journal-title":"Apple Mach. Learn. J."},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.privatenlp-1.4"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1602.05629"},{"key":"ref56","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref57","article-title":"Cyberbullying dataset","volume-title":"Cyberbullying","author":"Shahane","year":"2000"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016910408"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.08.063"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2661126.2661133"},{"key":"ref62","first-page":"23","article-title":"Improved cyberbullying detection using gender information","volume-title":"Proc. 12th Dutch-Belgian Inf. Retr. Workshop (DIR)","author":"Dadvar"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2743065.2743085"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1310.4546"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9651-3_23"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/app12105083"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.03.053"},{"key":"ref68","volume-title":"The Psychology and Biology of Emotion","author":"Plutchik","year":"1994"},{"key":"ref69","article-title":"Natural language processing advancements by deep learning: A survey","author":"Torfi","year":"2020","journal-title":"arXiv:2003.01200"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100698"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4380-9_16"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10305070.pdf?arnumber=10305070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T12:01:17Z","timestamp":1709380877000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10305070\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":74,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3329347","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}