{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:42:43Z","timestamp":1773196963636,"version":"3.50.1"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,2,16]]},"DOI":"10.1109\/icnc68183.2026.11416855","type":"proceedings-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:55:54Z","timestamp":1773086154000},"page":"367-371","source":"Crossref","is-referenced-by-count":0,"title":["A Comprehensive Study on the Effectiveness of Machine Learning Models to Mitigate the Impact of Cyberbullying"],"prefix":"10.1109","author":[{"given":"Shweta","family":"Singh","sequence":"first","affiliation":[{"name":"San Jose State University,Department of Aviation and Technology,San Jose,California,USA,95192"}]},{"given":"Fred","family":"Barez","sequence":"additional","affiliation":[{"name":"San Jose State University,Department of Aviation and Technology,San Jose,California,USA,95192"}]},{"given":"Riti","family":"Gour","sequence":"additional","affiliation":[{"name":"San Jose State University,Department of Aviation and Technology,San Jose,California,USA,95192"}]}],"member":"263","reference":[{"issue":"10","key":"ref1","doi-asserted-by":"crossref","DOI":"10.14569\/IJACSA.2023.0141045","article-title":"Cyberbullying detection using machine learning and deep learning","volume":"14","author":"Alabdulwahab","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"5","key":"ref2","doi-asserted-by":"crossref","DOI":"10.3390\/fi15050179","article-title":"A review on deep-learning-based cyberbullying detection","volume":"15","author":"Hasan","year":"2023","journal-title":"Future Internet"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI54926.2021.00098"},{"key":"ref4","first-page":"506","article-title":"Cyberbullying detection system on social media using supervised machine learning","volume-title":"Procedia Computer Science","volume":"239","author":"Perera"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"108123","DOI":"10.1016\/j.chb.2023.108123","article-title":"Towards comprehensive cyberbullying detection: A dataset incorporating aggressive texts, repetition, peerness, and intent to harm","volume":"153","author":"Ejaz","year":"2024","journal-title":"Computers in Human Behavior"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEICT61591.2024.10718535"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3389\/frai.2024.1269366"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"100027","DOI":"10.1016\/j.nlp.2023.100027","article-title":"A robust hybrid machine learning model for bengali cyber bullying detection in social media","volume":"4","author":"Akhter","year":"2023","journal-title":"Natural Language Processing Journal"},{"key":"ref9","first-page":"1","article-title":"Detection of cyberbullying using machine learning and deep learning algorithms","volume-title":"2022 2nd Asian Conference on Innovation in Technology (ASIANCON)","author":"G"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICACITE51222.2021.9404736"},{"key":"ref11","article-title":"Sentiment analysis of cyberbullying data in social media","author":"Susmitha","year":"2024","journal-title":"arXiv preprint arXiv:2411.05958"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3389\/fmed.2024.1379211"}],"event":{"name":"2026 International Conference on Computing, Networking and Communications (ICNC)","location":"Maui, HI, USA","start":{"date-parts":[[2026,2,16]]},"end":{"date-parts":[[2026,2,19]]}},"container-title":["2026 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11416824\/11416825\/11416855.pdf?arnumber=11416855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:53:11Z","timestamp":1773121991000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11416855\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,16]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icnc68183.2026.11416855","relation":{},"subject":[],"published":{"date-parts":[[2026,2,16]]}}}