{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:45:55Z","timestamp":1752360355855,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/icawst.2019.8923186","type":"proceedings-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T02:10:47Z","timestamp":1575598247000},"page":"1-6","source":"Crossref","is-referenced-by-count":20,"title":["Cyberbullying Detection on Twitter using Multiple Textual Features"],"prefix":"10.1109","author":[{"given":"Jianwei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Taiga","family":"Otomo","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shinsuke","family":"Nakajima","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"672","article-title":"Detection and Fine-Grained Classification of Cyberbullying Events","author":"van hee","year":"2015","journal-title":"Proceedings of RANLP 2015"},{"key":"ref11","first-page":"6","article-title":"Measuring the Reliability of Hate Speech Annotations: The Case of the European Refugee Crisis","author":"ross","year":"2017","journal-title":"NLP4CMC 2017"},{"key":"ref12","first-page":"349","article-title":"Automatic Extraction of Harmful Sentence Patterns with Application in Cyberbullying Detection","author":"ptaszynski","year":"2015","journal-title":"LTC-2015"},{"key":"ref13","first-page":"3","article-title":"Learning Deep on Cyberbullying is Always Better Than Brute Force","author":"ptaszynski","year":"2017","journal-title":"LaCATODA 2017"},{"key":"ref14","first-page":"3111","article-title":"Distributed Representations of Words and Phrases and their Compositionality","author":"mikolov","year":"2013","journal-title":"NIPS 2013"},{"key":"ref15","first-page":"1188","article-title":"Distributed Representations of Sentences and Documents","author":"le","year":"2014","journal-title":"ICML 2014"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40511-2_6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3115\/1219840.1219857"},{"key":"ref18","first-page":"579","article-title":"Detecting Cyberbullying Entries on Informal School Websites Based on Category Relevance Maximization","author":"nitta","year":"2013","journal-title":"IJCNLP 2013"},{"key":"ref19","first-page":"165","article-title":"Statistical Analysis of Automatic Seed Word Acquisition to Improve Harmful Expression Extraction in Cyberbullying Detection","volume":"6","author":"hatakeyama","year":"2016","journal-title":"IJET"},{"key":"ref4","first-page":"49","article-title":"Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network","author":"hosseinmardi","year":"2015","journal-title":"SOCIN 2015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/poi3.85"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883062"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809381"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167317"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091487"},{"journal-title":"Investigation results in Japan","year":"2018","key":"ref2"},{"journal-title":"Facts About Bullying","year":"2017","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-1101"},{"key":"ref20","first-page":"230","article-title":"Applying Conditional Random Fields to Japanese Morphological Analysis","author":"kudo","year":"2004","journal-title":"EMNLP 2004"}],"event":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","start":{"date-parts":[[2019,10,23]]},"location":"Morioka, Japan","end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8913318\/8923121\/08923186.pdf?arnumber=8923186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T16:22:59Z","timestamp":1658247779000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8923186\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icawst.2019.8923186","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}