{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:04:13Z","timestamp":1775228653034,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,29]]},"DOI":"10.1109\/is61756.2024.10705230","type":"proceedings-article","created":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T17:45:15Z","timestamp":1728495915000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["Identifying Threats on Social Media to Spot Offensive Behavior"],"prefix":"10.1109","author":[{"given":"Anika Tahsin","family":"Hridi","sequence":"first","affiliation":[{"name":"North South University,Electrical and Computer Engineering Department,Dhaka,Bangladesh"}]},{"given":"Shad","family":"Abdullah","sequence":"additional","affiliation":[{"name":"North South University,Electrical and Computer Engineering Department,Dhaka,Bangladesh"}]},{"given":"Md. Amrin","family":"Ibna Hasnath","sequence":"additional","affiliation":[{"name":"North South University,Electrical and Computer Engineering Department,Dhaka,Bangladesh"}]},{"given":"Rashida Hossain","family":"Adiba","sequence":"additional","affiliation":[{"name":"North South University,Electrical and Computer Engineering Department,Dhaka,Bangladesh"}]},{"given":"Samia","family":"Proma","sequence":"additional","affiliation":[{"name":"North South University,Electrical and Computer Engineering Department,Dhaka,Bangladesh"}]},{"given":"Rashedur M.","family":"Rahman","sequence":"additional","affiliation":[{"name":"North South University,Electrical and Computer Engineering Department,Dhaka,Bangladesh"}]}],"member":"263","reference":[{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijresmar.2018.09.009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3243082.3243111"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/app10186527"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/dsaa53316.2021.9564230"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3134154"},{"key":"ref7","author":"Chen","year":"2012","journal-title":"Detecting Offensive Language in Social Media to Protect Adolescent Online Safety"},{"key":"ref8","volume-title":"Comment abuse classification with Deep Learning","author":"Chu","year":"2023"},{"key":"ref9","author":"Ishmam","journal-title":"Hateful Speech Detection in Public Facebook Pages for the Bengali Language"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/s2196888823500021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2023.027841"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2022.100095"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2022.101404"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/dsaa53316.2021.9564230"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3165563"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2021921854"},{"key":"ref17","volume-title":"ActionAid"},{"key":"ref18","article-title":"Bangla Online Comments Dataset","volume":"1","author":"Ahmed","year":"2021","journal-title":"Mendeley Data"}],"event":{"name":"2024 IEEE 12th International Conference on Intelligent Systems (IS)","location":"Varna, Bulgaria","start":{"date-parts":[[2024,8,29]]},"end":{"date-parts":[[2024,8,31]]}},"container-title":["2024 IEEE 12th International Conference on Intelligent Systems (IS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10705133\/10705164\/10705230.pdf?arnumber=10705230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T17:21:31Z","timestamp":1728580891000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10705230\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,29]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/is61756.2024.10705230","relation":{},"subject":[],"published":{"date-parts":[[2024,8,29]]}}}