{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:31:53Z","timestamp":1764937913927,"version":"3.41.2"},"reference-count":88,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Deanship of Research and Graduate Studies at the King Khalid University through the Large Research Project","award":["RGP2\/456\/46"],"award-info":[{"award-number":["RGP2\/456\/46"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3591143","type":"journal-article","created":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T18:09:47Z","timestamp":1753121387000},"page":"128360-128378","source":"Crossref","is-referenced-by-count":2,"title":["A Comprehensive Survey on Urdu Hate Speech Detection: Methods, Evaluation, and Challenges"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3254-1680","authenticated-orcid":false,"given":"Ijaz","family":"Hussain","sequence":"first","affiliation":[{"name":"Department of Computer and Information Sciences, Pakistan Institute of Engineering and Applied Sciences (PIEAS), Islamabad, Pakistan"}]},{"given":"Umar","family":"Farooq","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, Pakistan Institute of Engineering and Applied Sciences (PIEAS), Islamabad, Pakistan"}]},{"given":"Ammara Nawaz","family":"Cheema","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Air University, Islamabad, Pakistan"}]},{"given":"Ibrahim M.","family":"Almanjahie","sequence":"additional","affiliation":[{"name":"Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sftr.2025.100501"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3916\/C74-2023-10"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare10101836"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00345-018-2254-2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-025-01459-2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1632\/S0030812921000341"},{"key":"ref7","first-page":"97","article-title":"Do platforms have editorial rights","volume":"1","author":"Bhagwat","year":"2021","journal-title":"J. Free Speech L."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5114\/reum.2021.102707"},{"issue":"1","key":"ref9","first-page":"86","article-title":"Social media and adolescent mental health: The role of cyberbullying in depression and self-harm","volume":"2","author":"Mursaleen","year":"2025","journal-title":"Al-Aasar"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/s41398-022-02178-4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2012.07.002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2018.05.003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.woah-1.11"},{"issue":"14","key":"ref14","first-page":"71","article-title":"The essentials of hate speech","volume":"7","author":"Neshkovska","year":"2017","journal-title":"Teacher"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-023-09642-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1963"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2023.103270"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/access.2025.3540939"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2019.90208"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2021.1942955"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2021.101608"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S2542-5196(22)00173-5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-020-03737-6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3126\/informal.v1i1.69165"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4337\/9781803925738.00019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.35484\/ahss.2024(5-i)25"},{"issue":"2","key":"ref27","first-page":"99","article-title":"Hate speech in mosques versus sectarian violence in Pakistan: Causes and recommendations","volume":"16","author":"Shah","year":"2021","journal-title":"Dialogue"},{"issue":"1","key":"ref28","article-title":"Role of misinformation and hate speech on social media in communal violence: The Indian context","volume":"2","author":"Rahman","year":"2024","journal-title":"ASEAN J. Res."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-0728-1.ch012"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.58709\/niujhu.v8i3.1701"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.5176463","article-title":"Empowering safe online spaces: AI in gender violence detection and prevention","author":"Manche","year":"2025","journal-title":"SSRN Electron. J."},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/journalmedia5020031"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-79106-7"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1111\/ijcs.12695"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5195\/jmla.2021.962"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3444188"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/access.2025.3534662"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/access.2025.3532611"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3715139"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-09169-6"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.2486"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/FIT63703.2024.10838452"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3370232"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3432908"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3470901"},{"article-title":"Impact of data augmentation on hate speech detection in Roman Urdu","year":"2024","author":"Maqbool","key":"ref46"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3452987"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3390\/app13042062"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3616111"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3390\/math11040969"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3390\/s23083909"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101606"},{"volume-title":"Emotions & Threat Detection in Urdu Using Transformer Based Models","year":"2022","author":"Bhaumik","key":"ref53"},{"volume-title":"Exploring Data Augmentation Strategies for Hate Speech Detection in Roman Urdu","year":"2022","author":"Azam","key":"ref54"},{"volume-title":"Multi-Label Emotion Classification in Urdu","year":"2022","author":"Madhusankar","key":"ref55"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3216375"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1169"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3575879.3576011"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-021-09530-y"},{"volume-title":"Abusive and Threatening Language Detection in Native Urdu Script Tweets Exploring Four Conventional Machine Learning Techniques and MLP","year":"2021","author":"Karthikraja","key":"ref60"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3087827"},{"key":"ref62","first-page":"784","article-title":"Abusive and threatening language detection from Urdu social media posts: A machine learning approach","volume-title":"Proc. InFIRE","author":"Kumar"},{"key":"ref63","first-page":"799","article-title":"Detection of abusive records by analyzing the tweets in Urdu language: Exploring transformer based models","volume-title":"Proc. InFIRE","author":"Kalra"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00550-7"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3414524"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/inmic50486.2020.9318069"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9482-x"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.52462\/jlls.60"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.2801"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/access.2025.3533257"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.197"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.29007\/1cm6"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/KHI-HTC60760.2024.10482031"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3361322"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33231-9_21"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-023-01051-8"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.23880\/art-16000110"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6634811"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.59646\/efaimltc3\/133"},{"issue":"1","key":"ref80","first-page":"168","article-title":"Enhancing transparency and understanding in AI decision-making processes","volume":"8","author":"Pillai","year":"2024","journal-title":"Iconic Res. Eng. Journals"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3711125"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.nlp.2025.100133"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3554203"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3430848"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.3390\/systems11070319"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.32604\/cmes.2023.046692"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2025.3570355"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2025.3555607"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11087481.pdf?arnumber=11087481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T06:33:50Z","timestamp":1753511630000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11087481\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":88,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3591143","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}