{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T21:07:00Z","timestamp":1766869620225,"version":"3.28.0"},"reference-count":75,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T00:00:00Z","timestamp":1643155200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T00:00:00Z","timestamp":1643155200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,26]]},"DOI":"10.1109\/ccwc54503.2022.9720804","type":"proceedings-article","created":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T20:27:19Z","timestamp":1646425639000},"page":"0092-0098","source":"Crossref","is-referenced-by-count":46,"title":["Offensive Language Detection on Social Media Based on Text Classification"],"prefix":"10.1109","author":[{"given":"Parisa","family":"Hajibabaee","sequence":"first","affiliation":[{"name":"University of Massachusetts at Lowell"}]},{"given":"Masoud","family":"Malekzadeh","sequence":"additional","affiliation":[{"name":"University of Massachusetts at Lowell"}]},{"given":"Mohsen","family":"Ahmadi","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"Maryam","family":"Heidari","sequence":"additional","affiliation":[{"name":"George Mason University"}]},{"given":"Armin","family":"Esmaeilzadeh","sequence":"additional","affiliation":[{"name":"University of Nevada Las Vegas"}]},{"given":"Reyhaneh","family":"Abdolazimi","sequence":"additional","affiliation":[{"name":"Syracuse University"}]},{"given":"James H Jr","family":"Jones","sequence":"additional","affiliation":[{"name":"George Mason University"}]}],"member":"263","reference":[{"journal-title":"Transit agencies performance assessment and implications","year":"2020","author":"hajibabaee","key":"ref73"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA52953.2021.00267"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3087730"},{"key":"ref70","article-title":"Bag of tricks for efficient text classification","author":"joulin","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.dash-1.4"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON53756.2021.9623238"},{"key":"ref75","first-page":"26","article-title":"Identifying and ranking critical factors that determine meritocracy using ahp technique in automotive industry in iran","volume":"24","author":"nazari","year":"0","journal-title":"International Conference on Technology and Business Management March"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.37193\/CMI.2015.02.05"},{"journal-title":"Nlp approach for social media bot detection(fake identity detection) to increase security and trust in online platforms","year":"2022","author":"heidari","key":"ref33"},{"key":"ref32","article-title":"Building wikipedia n-grams with apache spark","author":"esmaeilzadeh","year":"2022","journal-title":"Intelligent Computing"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC54503.2022.9720753"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-82199-9_12"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3102736"},{"journal-title":"A test driven approach to develop web-based machine learning applications","year":"2017","author":"esmaeilzadeh","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-2377-6_48"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412818"},{"journal-title":"Offensive behaviour detection on social media platforms by using natural language processing models","year":"2022","author":"heidari","key":"ref60"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1111\/jora.12559"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60936-8_25"},{"key":"ref63","first-page":"2724316211036740","article-title":"Cyberbullying among tweens in the united states: Prevalence, impact, and helping behaviors","author":"patchin","year":"2021","journal-title":"The Journal of Early Adolescence"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON51285.2020.9298158"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2806394"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW51313.2020.00071"},{"journal-title":"Chantelmariediaz","article-title":"Predicting-cyberbulling-on-twitter","year":"0","key":"ref65"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.29007\/lfrr"},{"key":"ref29","article-title":"A superpixel segmentation based technique for multiple sclerosis lesion detection","author":"gheshlaghi","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2013"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1482"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM51629.2021.00065"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.119"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IEMTRONICS52119.2021.9422664"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS50296.2020.9462170"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IEMTRONICS52119.2021.9422649"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0713-3"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC46164.2021.9630678"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP40778.2020.9190753"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4172\/2169-0316.1000147"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON53756.2021.9623078"},{"key":"ref51","article-title":"Mimosa: Reducing malware analysis over-head with coverings","author":"ahmadi","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3372923.3404788"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-019-0242-0"},{"key":"ref57","article-title":"Bayesian learning: A selective overview","author":"hsu","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/AIIoT52608.2021.9454192"},{"journal-title":"High survivable ransomwares detection using bayesian belief network and hybrid behavioral analysis features","year":"0","author":"ahmadian","key":"ref55"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON53757.2021.9666618"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2021.23017"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON53757.2021.9666633"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC54503.2022.9720798"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC54503.2022.9720875"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3233\/IFS-130958"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IEMTRONICS52119.2021.9422605"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cpet.2021.06.005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/bios11060189"},{"key":"ref15","article-title":"Pet image de-noising using unsupervised domain translation","author":"malekzadeh","year":"0","journal-title":"2021 IEEE Nuclear Science Symposium and Medical Imaging Conference Proceedings (NSS\/MIC)"},{"key":"ref16","first-page":"1","article-title":"Output-only entropy-based damage detection using transmissibility function","author":"soofi","year":"2021","journal-title":"Journal of Civil Structural Health Monitoring"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA52953.2021.00267"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/AIIoT52608.2021.9454192"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/AIIoT52608.2021.9454169"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00332-018-9465-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISI49825.2020.9280487"},{"key":"ref6","article-title":"A survey on machine learning techniques for auto labeling of video, audio, and text data","author":"zhang","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref5","first-page":"100","article-title":"Satel-litener: An effective named entity recognition model for the satellite domain","volume":"3","author":"jafari","year":"0","journal-title":"Proceedings of the KMIS 2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671740"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-80285-1_13"},{"journal-title":"Hidden fear Evaluating the effectiveness of messages on social media","year":"2020","author":"ahmadi","key":"ref49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC54503.2022.9720765"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IEMTRONICS52119.2021.9422605"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM49941.2020.9313090"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2016.7736452"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2016.7736452"},{"key":"ref42","article-title":"Deep bayesian active learning, a brief survey on recent advances","author":"mohamadi","year":"2020","journal-title":"ArXiv Preprint"},{"journal-title":"Misinformation detection model to prevent spread of the covid-19 virus during the pandemic","year":"2022","author":"heidari","key":"ref41"},{"journal-title":"Fraud detection to increase customer trust in online shopping experience","year":"2022","author":"heidari","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75762-5_38"}],"event":{"name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","start":{"date-parts":[[2022,1,26]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2022,1,29]]}},"container-title":["2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9720724\/9720434\/09720804.pdf?arnumber=9720804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T23:53:28Z","timestamp":1670284408000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9720804\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,26]]},"references-count":75,"URL":"https:\/\/doi.org\/10.1109\/ccwc54503.2022.9720804","relation":{},"subject":[],"published":{"date-parts":[[2022,1,26]]}}}