{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:28:40Z","timestamp":1740101320171,"version":"3.37.3"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:00:00Z","timestamp":1671235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:00:00Z","timestamp":1671235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007225","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007225","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,17]]},"DOI":"10.1109\/bigdata55660.2022.10020779","type":"proceedings-article","created":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T19:35:23Z","timestamp":1674761723000},"page":"4323-4329","source":"Crossref","is-referenced-by-count":1,"title":["Factor Detection Task of Cyberbullying Using the Deep Learning Model"],"prefix":"10.1109","author":[{"given":"Yu-Hsuan","family":"Wu","sequence":"first","affiliation":[{"name":"Soochow University,Dept. of Data Science,Taipei,Taiwan"}]},{"given":"Sheng-Wei","family":"Huang","sequence":"additional","affiliation":[{"name":"Soochow University,Dept. of Data Science,Taipei,Taiwan"}]},{"given":"Wei-Yi","family":"Chung","sequence":"additional","affiliation":[{"name":"Soochow University,School of Big Data Management,Taipei,Taiwan"}]},{"given":"Chen-Chia","family":"Yu","sequence":"additional","affiliation":[{"name":"The University of Edinburgh,Dept. of Language Science,Taipei,Taiwan"}]},{"given":"Jheng-Long","family":"Wu","sequence":"additional","affiliation":[{"name":"Soochow University,Dept. of Data Science,Taipei,Taiwan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01308-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2020.110123"},{"article-title":"No bullies: Solutions for saving our children from todays bully","year":"2013","author":"Kipper","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph17010045"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/cbm.2116"},{"key":"ref6","article-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding","author":"Devlin","year":"2018","journal-title":"Computation and Language."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-9116-7_5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijchp.2021.100221"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-acl.80"},{"article-title":"Detection of Abusive Records by Analyzing the Tweets in Urdu Language Exploring Transformer Based Models","volume-title":"CEUR Workshop Proceedings","author":"Kalraa","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2022.861823"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489211"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0132"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016910408"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2016.2531682"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3446132.3446412"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11196-020-09790-x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63031-7_22"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08751-6_42"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/app12073502"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3991\/ijep.v10i4.14219"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0633-8_36"},{"issue":"5","key":"ref23","first-page":"1409","article-title":"Cyber-bullying and cyber-harassment detection using supervised machine learning techniques in Arabic social media contents","volume":"21","author":"Kanan","year":"2020","journal-title":"Journal of Internet Technology"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/fi12110187"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105283"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-7106-0_9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-022-00934-4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-12638-3_8"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01308-5"}],"event":{"name":"2022 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2022,12,17]]},"location":"Osaka, Japan","end":{"date-parts":[[2022,12,20]]}},"container-title":["2022 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10020192\/10020156\/10020779.pdf?arnumber=10020779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T07:43:42Z","timestamp":1707810222000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10020779\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,17]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/bigdata55660.2022.10020779","relation":{},"subject":[],"published":{"date-parts":[[2022,12,17]]}}}