{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:30:52Z","timestamp":1776681052929,"version":"3.51.2"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"rincess Nourah bint Abdulrahman University Researchers Supporting Project","award":["PNURSP2024R77"],"award-info":[{"award-number":["PNURSP2024R77"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3386637","type":"journal-article","created":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T18:22:34Z","timestamp":1712773354000},"page":"58950-58959","source":"Crossref","is-referenced-by-count":25,"title":["RoBERTaNET: Enhanced RoBERTa Transformer Based Model for Cyberbullying Detection With GloVe Features"],"prefix":"10.1109","volume":"12","author":[{"given":"Arwa A.","family":"Jamjoom","sequence":"first","affiliation":[{"name":"Department of Information System, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"}]},{"given":"Hanen","family":"Karamti","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia"}]},{"given":"Muhammad","family":"Umer","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Technology, The Islamia University of Bahawalpur, Bahawalpur, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6584-7400","authenticated-orcid":false,"given":"Shtwai","family":"Alsubai","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Al-Kharj, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0117-8102","authenticated-orcid":false,"given":"Tai-Hoon","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, Yeosu Campus, Chonnam National University, Yeosu-si, Jeollanam-do, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4598-1482","authenticated-orcid":false,"given":"Imran","family":"Ashraf","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Yeungnam University, Gyeongsan, Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2019.1605542"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.05.022"},{"issue":"1","key":"ref3","first-page":"26","article-title":"Strangers intrusion detection detecting spammers and fake profiles in social networks based on topology anomalies","volume":"1","author":"Fire","year":"2012","journal-title":"Human J."},{"key":"ref4","volume-title":"How Many People Use Social Media in 2021","author":"Dean","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1142\/S0219691320500277"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-7131-2_110217"},{"key":"ref7","volume-title":"What is Cyberbullying","year":"2020"},{"key":"ref8","volume-title":"Cyberbullying: Identification, Prevention, and Response","author":"Hinduja","year":"2018"},{"key":"ref9","volume-title":"Cyberbullying Data","author":"Center","year":"2019"},{"key":"ref10","volume-title":"Summary of Our Cyberbullying Research (2007\u20132019)","year":"2007"},{"key":"ref11","volume-title":"Be Internet Awesome: Online Safety & Parents","year":"2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918354"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.9044"},{"key":"ref14","first-page":"656","article-title":"Learning from bullying traces in social media","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Linguistics, Hum. Lang. Technol.","author":"Xu"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1108\/JBIM-04-2013-0095"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76941-7_11"},{"issue":"3","key":"ref17","first-page":"1","article-title":"Social media in higher education","volume":"1","author":"Selwyn","year":"2012","journal-title":"The Europa world Learn."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/10696679.2020.1860683"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091487"},{"key":"ref20","volume-title":"Cyberbullying Detection on Social Platforms Using Large Language Models","author":"Ottosson","year":"2023"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4338998"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378065"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-3306599\/v1","volume-title":"Improving Cyberbullying Detection Through Adaptive External Dictionary in Machine Learning","author":"Qudah","year":"2023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCCC58608.2023.10176416"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10226114"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA55336.2022.10009445"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GCAIoT57150.2022.10019058"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/info14080467"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/math11163567"},{"key":"ref30","volume-title":"Cyberbullying Classification Dataset","year":"2022"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2022.11.012"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/app12063203"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2874063"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/w14172592"},{"issue":"22","key":"ref35","first-page":"41","article-title":"An empirical study of the naive Bayes classifier","volume-title":"Proc. IJCAI Workshop Empirical Methods Artif. Intell.","volume":"3","author":"Rish"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/s22134834"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2022.105418"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2022.100360"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-03775-3"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1469"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10495045.pdf?arnumber=10495045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T03:52:12Z","timestamp":1743220332000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10495045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3386637","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}