{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T06:46:49Z","timestamp":1775630809388,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/icmla66185.2025.00125","type":"proceedings-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:54:58Z","timestamp":1775591698000},"page":"848-852","source":"Crossref","is-referenced-by-count":0,"title":["Toward Unified Moderation of Cyberbullying Across Social Media and Video Games"],"prefix":"10.1109","author":[{"given":"David","family":"Cong","sequence":"first","affiliation":[{"name":"Duke University,Computer Science"}]},{"given":"Keyan","family":"Guo","sequence":"additional","affiliation":[{"name":"University at Buffalo,Computer Science and Engineering"}]},{"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"University at Buffalo,Computer Science and Engineering"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/14550725221074997"},{"key":"ref2","volume-title":"Teens and internet, device access fact sheet","author":"Sidoti","year":"2025"},{"key":"ref3","article-title":"Cyberbullying (for teens)","year":"2025"},{"key":"ref4","article-title":"A majority of teens have experienced some form of cyberbullying","author":"Anderson","year":"2018"},{"key":"ref5","article-title":"Cyberbullying, human rights and bystanders","year":"2024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC51019.2021.9418254"},{"key":"ref7","article-title":"Detection of cyberbullying using nlp and machine learning in social networks for bi-language","year":"2025"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378065"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.52202\/068431-1800"},{"key":"ref11","article-title":"How to filter, block, and report harmful content on social media","year":"2023"},{"key":"ref12","article-title":"Automated vs. manual moderation: Which is effective?","year":"2024"},{"key":"ref13","article-title":"Profanity filters: Advanced detection & filtering solutions","year":"2020"},{"key":"ref14","article-title":"Profanity filters: Tricks to avoid them","volume-title":"chekkee","author":"Walker","year":"2020"},{"key":"ref15","article-title":"Here\u2019s how to report players in valorant","volume-title":"pC Gamer","author":"Matthews","year":"2020"},{"key":"ref16","article-title":"Player reporting guide and faq","year":"2024"},{"key":"ref17","article-title":"Valorant boss announces new measures to crack down on toxic players","volume-title":"pC Gamer","author":"Chalk","year":"2024"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2023.108123"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.woah-1.16"},{"key":"ref20","article-title":"Detecting cyberbullying in online communities","volume-title":"ECIS 2016 Research Papers","author":"Bretschneider","year":"2016"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.18653\/v1\/2021.findings-acl.213","article-title":"Conda: A contextual dual-annotated dataset for in-game toxicity understanding and detection","author":"Weld","year":"2021"},{"key":"ref22","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Advances in neural information processing systems","volume":"33","author":"Brown"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708428"},{"key":"ref24","article-title":"Bayes and naive bayes classifier","author":"Vikramkumar","year":"2014"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1023\/a:1010933404324"}],"event":{"name":"2025 International Conference on Machine Learning and Applications (ICMLA)","location":"Boca Raton, FL, USA","start":{"date-parts":[[2025,12,3]]},"end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Machine Learning and Applications (ICMLA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471302\/11471304\/11471403.pdf?arnumber=11471403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:47:35Z","timestamp":1775627255000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471403\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icmla66185.2025.00125","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}