{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:11:29Z","timestamp":1743048689191,"version":"3.40.3"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T00:00:00Z","timestamp":1740009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T00:00:00Z","timestamp":1740009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,2,20]]},"DOI":"10.1109\/menacomm62946.2025.10911024","type":"proceedings-article","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T17:31:39Z","timestamp":1741887099000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Multi-Level Cyberbullying Detection on Social Media Using Machine and Deep Learning Models"],"prefix":"10.1109","author":[{"given":"Marwa","family":"Hzami","sequence":"first","affiliation":[{"name":"Faculty of Sciences of Bizerte University of Carthage,IDEA Lab.,Tunisia"}]},{"given":"Hela","family":"Mahersia","sequence":"additional","affiliation":[{"name":"Faculty of Sciences of Bizerte University of Carthage,IDEA Lab.,Tunisia"}]},{"given":"Tarek","family":"Bejaoui","sequence":"additional","affiliation":[{"name":"Faculty of Sciences of Bizerte University of Carthage,IDEA Lab.,Tunisia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11203273"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.031848"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcce.2023.11.002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/icccnt56998.2023.10307284"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140761"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s42380-023-00188-4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/math11163567"},{"issue":"1","key":"ref8","first-page":"25","article-title":"Potential cyberbullying detection in social media platforms based on a multi-task learning framework","volume-title":"International Journal of Data and Network Science","volume":"8","author":"Guo","year":"2024"},{"article-title":"Automatic Detection of Cyberbullying on Social Media Using Machine Learning","volume-title":"2023 IEEE 2nd International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA)","author":"Harish","key":"ref9"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1109\/ICPCSN58827.2023.00017","article-title":"Cyber Bullying and Toxicity Detection Using Machine Learning","volume-title":"2023 IEEE 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN)","author":"Jadhav"},{"volume-title":"Automated Decision Support System for Cyberbullying Detection, Procedia Computer Science","year":"2023","author":"Kannammal","key":"ref11"},{"issue":"10","key":"ref12","article-title":"Site Agnostic Approach to Early Detection of Cyberbullying on Social Media Networks","volume-title":"Sensors","volume":"23","author":"L\u00f3pez-Vizca\u00edno","year":"2023"},{"issue":"8","key":"ref13","first-page":"467","article-title":"Cyberbullying Detection on Social Media Using Stacking Ensemble Learning and Enhanced BERT","volume-title":"Information","volume":"14","author":"Muneer","year":"2023"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1109\/ICSCNA58489.2023.10370114","article-title":"Securing Social Spaces: Cyberbullying Detection with ML and DL on Social Media Platforms","volume-title":"Proceedings of the International IEEE Conference on Sustainable Communication Networks and Application","author":"Pahuja"},{"issue":"2","key":"ref15","first-page":"1779","article-title":"Improving cyberbullying detection through multi-level machine learning","volume-title":"International Journal of Electrical and Computer Engineering (IJECE)","volume":"14","author":"Salsabila","year":"2024"},{"issue":"4","key":"ref16","first-page":"36","article-title":"A Comparative Analysis of Machine Learning Techniques for Cyberbullying Detection on FormSpring in Textual Modality","volume-title":"International Journal of Computer Network and Information Security","volume":"15","author":"Sahana","year":"2023"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.2478\/jsiot-2023-0020","article-title":"ML and Natural Language Processing: Cyberbullying Detection System for Safer and Culturally Adaptive Digital Communities","volume-title":"Journal of Smart Internet of Things","author":"Shah","year":"2023"},{"issue":"2","key":"ref18","first-page":"1","article-title":"Machine Learning in Cyberbullying Detection from Social-Media","volume-title":"International Journal of Intelligent Systems and Applications","volume":"15","author":"Sultan","year":"2023"},{"key":"ref19","first-page":"1","article-title":"Cyberbullying Detection in Social Networks: A Comparison Between Machine Learning and Transfer Learning Approaches","volume-title":"2023 IEEE 5th International Conference on Advanced Networks and Telecommunications Systems (ANTS)","author":"Teoh"},{"key":"ref20","first-page":"1699","article-title":"SOSNet: A graph convo-lutional network ap-proach to fine-grained cyberbullying detection","volume-title":"2020 IEEE International Conference on Big Data","volume":"2020","author":"Wang"}],"event":{"name":"2025 5th IEEE Middle East and North Africa Communications Conference (MENACOMM)","start":{"date-parts":[[2025,2,20]]},"location":"Byblos, Lebanon","end":{"date-parts":[[2025,2,22]]}},"container-title":["2025 5th IEEE Middle East and North Africa Communications Conference (MENACOMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10910941\/10910950\/10911024.pdf?arnumber=10911024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:31:38Z","timestamp":1742985098000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10911024\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,20]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/menacomm62946.2025.10911024","relation":{},"subject":[],"published":{"date-parts":[[2025,2,20]]}}}