{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,26]],"date-time":"2024-12-26T05:08:46Z","timestamp":1735189726533,"version":"3.32.0"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1109\/metroxraine62247.2024.10797071","type":"proceedings-article","created":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T19:09:48Z","timestamp":1735067388000},"page":"493-498","source":"Crossref","is-referenced-by-count":0,"title":["A Machine Learning-Based Approach to Detect Cyberbullying Tweets"],"prefix":"10.1109","author":[{"given":"Giuseppe","family":"Prisco","sequence":"first","affiliation":[{"name":"University of Molise,dept. of Medicine and Health Sciences,Campobasso,Italy"}]},{"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[{"name":"University of Molise,dept. of Medicine and Health Sciences,Campobasso,Italy"}]},{"given":"Antonella","family":"Santone","sequence":"additional","affiliation":[{"name":"University of Molise,dept. of Medicine and Health Sciences,Campobasso,Italy"}]},{"given":"Mario","family":"Cesarelli","sequence":"additional","affiliation":[{"name":"University of Sannio,dept. of Engineering,Benevento,Italy"}]}],"member":"263","reference":[{"volume-title":"Cyberbullying: Bullying in the digital age","year":"2012","author":"Agatston","key":"ref1"},{"volume-title":"(2012). Cyberbullying: Bullying in the digital age","author":"Agatston","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1177\/1403494814525004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/01639620701457816"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378065"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.12.021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.51846\/vol3iss2pp45-50"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS48265.2020.9120893"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2019.8833846"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2017.8093411"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v5i3.14209"},{"key":"ref13","first-page":"15","article-title":"Twitter bullying detection","volume":"12","author":"Sanchez","year":"2011","journal-title":"ser. NSDI"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1108\/K-01-2021-0061"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-3972-7_19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-9273-4_9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1006\/csla.2001.0169"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9651-3_23"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-010-0001-0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.21512\/comtech.v7i4.3746"},{"key":"ref21","first-page":"14","article-title":"N-gram-based text categorization","volume-title":"Proceedings of SDAIR-94, 3rd annual symposium on document analysis and information retrieval","volume":"161175","author":"Cavnar","year":"1994"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12228"},{"issue":"1","key":"ref23","first-page":"3","article-title":"Supervised machine learning: A review of classification techniques","volume":"160","author":"Kotsiantis","year":"2007","journal-title":"Emerging artificial intelligence applications in computer engineering"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-X_9"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3389\/fnbot.2013.00021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/01431160412331269698"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19425-7_10"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39964-3_62"},{"issue":"7","key":"ref29","first-page":"579","article-title":"Multilayer perceptron and neural networks","volume":"8","author":"Popescu","year":"2009","journal-title":"WSEAS Transactions on Circuits and Systems"},{"key":"ref30","first-page":"441","article-title":"The\u2019K\u2019in K-fold Cross Validation","volume":"102","author":"Anguita","year":"2012","journal-title":"ESANN"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7138-7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.47738\/jads.v1i1.6"},{"issue":"3","key":"ref33","first-page":"2701","article-title":"A study on normalization techniques for privacy preserving data mining","volume":"5","author":"Saranya","year":"2013","journal-title":"International Journal of Engineering and Technology (IJET)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.47738\/ijiis.v4i1.73"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-56706-x"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s13312-011-0055-4"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11030448"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64610-3_76"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/bioengineering10091103"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MetroXRAINE58569.2023.10405830"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/diagnostics14060576"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MetroXRAINE58569.2023.10405678"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-62520-6_33"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378065"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/BigData55660.2022.10020581"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-022-00934-4"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/GCAIoT57150.2022.10019058"}],"event":{"name":"2024 IEEE International Conference on Metrology for eXtended Reality, Artificial Intelligence and Neural Engineering (MetroXRAINE)","start":{"date-parts":[[2024,10,21]]},"location":"St Albans, United Kingdom","end":{"date-parts":[[2024,10,23]]}},"container-title":["2024 IEEE International Conference on Metrology for eXtended Reality, Artificial Intelligence and Neural Engineering (MetroXRAINE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10795805\/10795809\/10797071.pdf?arnumber=10797071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,25]],"date-time":"2024-12-25T06:23:32Z","timestamp":1735107812000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10797071\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/metroxraine62247.2024.10797071","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]}}}