{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T13:43:55Z","timestamp":1751291035878,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/ijcnn48605.2020.9206643","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T00:40:33Z","timestamp":1601426433000},"page":"1-7","source":"Crossref","is-referenced-by-count":10,"title":["Classification of Cyberbullying Text in Arabic"],"prefix":"10.1109","author":[{"given":"Benaissa Azzeddine","family":"Rachid","sequence":"first","affiliation":[]},{"given":"Harbaoui","family":"Azza","sequence":"additional","affiliation":[]},{"given":"Hajjami Henda","family":"Ben Ghezala","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref11","article-title":"A C-LSTM Neural Network for Text Classification","volume":"abs 1511 8630","author":"zhou","year":"2015","journal-title":"CoRR"},{"key":"ref12","first-page":"161","article-title":"Fracking Sarcasm using Neural Network, in 7th Workshop on Computational Approaches to Subjectivity","author":"ghosh","year":"2016","journal-title":"Sentiment and Social Media Analysis"},{"journal-title":"Deep Learning for Detecting Cyberbullying Across Multiple Social Media Platforms","year":"2018","author":"agrawal","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref15","first-page":"1555","article-title":"Learning sentiment-specic word embedding for twitter sentiment classication","author":"tang","year":"2014","journal-title":"ACL"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0132"},{"journal-title":"Flexible Inference for Cyberbully Incident Detection European Conference ECML PKDD 2018","year":"2018","author":"zhong","key":"ref17"},{"journal-title":"Hierarchical Attention Networks for Cyberbullying Detection on the Instagram Social Network","year":"2019","author":"cheng","key":"ref18"},{"key":"ref19","first-page":"52","author":"mubarak","year":"2017","journal-title":"Abusive Language Detection on Arabic Social Media"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5220\/0007187603240331"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.genhosppsych.2015.12.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2019.8763808"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.25046\/aj020634"},{"key":"ref8","first-page":"83","author":"al-hassan","year":"2019","journal-title":"DETECTION OF HATE SPEECH IN SOCIAL NETWORKS A SURVEY ON MUL-TILINGUAL CORPUS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMAPP.2017.8079791"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"10","DOI":"10.29328\/journal.jatr.1001007","article-title":"Cyberbullying: A narrative review","volume":"2","author":"field","year":"2018","journal-title":"J Addict Res Ther"},{"key":"ref9","first-page":"1","author":"rosa","year":"2018","journal-title":"A Deeper Look at Detecting Cyberbullying in Social Networks"},{"key":"ref1","article-title":"Cyberbullying Identification, Prevention, and Response","author":"hinduja","year":"2019","journal-title":"Cyberbullying Research Center"},{"key":"ref20","first-page":"1","author":"rosa","year":"2018","journal-title":"Using Fuzzy Fingerprints for Cyberbullying Detection in Social Networks"},{"key":"ref22","volume":"7","author":"alhanjouri","year":"2017","journal-title":"International Journal of Engineering and Management Research (IJEMR)"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"27","DOI":"10.3390\/a9020027","article-title":"The Effect of Preprocessing on Arabic Document Categorization","volume":"9","author":"ayedh","year":"2016","journal-title":"Algorithms"},{"journal-title":"Learning Word Vectors for 157 Languages","year":"2018","author":"grave","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.10.117"},{"key":"ref26","first-page":"785","author":"chen","year":"2016","journal-title":"XGBoost A Scalable Tree Boosting System"},{"key":"ref25","article-title":"Enriching Word Vectors with Subword Information","volume":"5","author":"bojanowski","year":"2016","journal-title":"Transactions of the Association for Computational Linguistics"}],"event":{"name":"2020 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2020,7,19]]},"location":"Glasgow, United Kingdom","end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200848\/9206590\/09206643.pdf?arnumber=9206643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:53:04Z","timestamp":1656453184000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9206643\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ijcnn48605.2020.9206643","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}