{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:02:17Z","timestamp":1760709737713,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/ijcnn.2018.8489211","type":"proceedings-article","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T18:25:09Z","timestamp":1539973509000},"page":"1-8","source":"Crossref","is-referenced-by-count":41,"title":["A \u201cDeeper\u201d Look at Detecting Cyberbullying in Social Networks"],"prefix":"10.1109","author":[{"given":"Hugo","family":"Rosa","sequence":"first","affiliation":[]},{"given":"David","family":"Matos","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Ribeiro","sequence":"additional","affiliation":[]},{"given":"Luisa","family":"Coheur","sequence":"additional","affiliation":[]},{"given":"Joao P.","family":"Carvalho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"238","article-title":"An Effective Approach for Cyberbullying Detection","volume":"3","author":"nahar","year":"2014","journal-title":"Communications in Information Science and Management Engineering"},{"key":"ref11","first-page":"4168","article-title":"Common sense reasoning for detection, prevention, and mitigation of cyberbullying","volume":"2015 janua","author":"dinakar","year":"0"},{"key":"ref12","first-page":"1","article-title":"Automatic detection of cyberbullying on social networks based on bullying features","author":"zhao","year":"2016","journal-title":"Proceedings of the 17th International Conference on Distributed Computing and Networking ICDCN '16"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.051"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091487"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref16","first-page":"1","article-title":"Efficient Estimation of Word Representations in Vector Space","author":"mikolov","year":"2013","journal-title":"proc of the International Conference on Learning Representation (ICLR) 2013"},{"key":"ref17","first-page":"1137","article-title":"A Neural Probabilistic Language Model","volume":"3","author":"bengio","year":"2003","journal-title":"Journal of Machine Learning Research 3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767830"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"},{"article-title":"A predictive model to detect online cyberbullying","year":"2015","author":"kasture","key":"ref27"},{"key":"ref3","first-page":"11","article-title":"Detecting the Presence of Cyberbullying Using Computer Software","author":"bayzick","year":"2011","journal-title":"Springer"},{"key":"ref6","first-page":"1","article-title":"Fast learning for sentiment analysis on bullying","author":"xu","year":"0"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/978-3-319-76941-7_11","article-title":"Deep Learning for Detecting Cyberbullying Across Multiple Social Media Platforms","author":"agrawal","year":"2018","journal-title":"Advances in Information Retrieval"},{"key":"ref5","first-page":"11","article-title":"Modeling the Detection of Textual Cyberbullying","author":"dinakar","year":"2011","journal-title":"Association for the Advancement of Artificial Intelligence"},{"key":"ref8","first-page":"2354","article-title":"Machine learning approach for detection of cyber-aggressive comments by peers on social media network","author":"chavan","year":"0"},{"key":"ref7","first-page":"693","article-title":"Improving Cyberbullying Detection with User Context","volume":"7814","author":"dadvar","year":"2013","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref2","first-page":"1","article-title":"Cyberbullying: An emerging threat to the always on generation","author":"belsey","year":"2005","journal-title":"Bullying Org Canada"},{"key":"ref9","first-page":"3","article-title":"Cyber Bullying Detection Using Social and Textual Analysis","author":"huang","year":"0"},{"journal-title":"Ending the torment tackling bullying from the schoolyard to cyberspace","year":"2016","author":"richardson","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/K16-1017"},{"key":"ref22","first-page":"3104","article-title":"Sequence to sequence learning with neural networks","volume":"2","author":"sutskever","year":"2014","journal-title":"Proceedings of the 27th International Conference on Neural Information Processing Systems"},{"key":"ref21","first-page":"357","article-title":"Very Deep Convolutional Networks for Natural Language Processing","volume":"26","author":"conneau","year":"2016","journal-title":"KI-KnstlicheIntelligenz"},{"key":"ref24","article-title":"A C-LSTM Neural Network for Text Classification","author":"zhou","year":"2015","journal-title":"CoRR abs\/1511 08630"},{"key":"ref23","first-page":"1","article-title":"Neural Machine Translation By Jointly Learning To Align and Translate","author":"bahdana","year":"0"},{"key":"ref26","first-page":"740","article-title":"Cyberbullying detection with a pronunciation based convolutional neural network","author":"zhang","year":"2017","journal-title":"Proceedings - 2016 15th IEEE International Conference on Machine Learning and Applications ICMLA 2016"},{"key":"ref25","first-page":"161","article-title":"Fracking Sarcasm using Neural Network","author":"ghosh","year":"0"}],"event":{"name":"2018 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2018,7,8]]},"location":"Rio de Janeiro","end":{"date-parts":[[2018,7,13]]}},"container-title":["2018 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8465565\/8488986\/08489211.pdf?arnumber=8489211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T01:14:51Z","timestamp":1598231691000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8489211\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2018.8489211","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}