{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:52:53Z","timestamp":1766602373670,"version":"3.48.0"},"reference-count":19,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IT Prof."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/mitp.2025.3565036","type":"journal-article","created":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:43:18Z","timestamp":1766428998000},"page":"46-52","source":"Crossref","is-referenced-by-count":0,"title":["The Impact of Artificial Intelligence in Protecting the Online Social Community From Cyberbullying"],"prefix":"10.1109","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4058-2696","authenticated-orcid":false,"given":"Sunil Kumar","family":"Rajak","sequence":"first","affiliation":[{"name":"Department of Information Technology, Dr. B. R. Ambedkar National Institute of Technology, Jalandhar, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6674-0584","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Dr. B. R. Ambedkar National Institute of Technology, Jalandhar, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3460-6989","authenticated-orcid":false,"given":"Vijay","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Dr. B. R. Ambedkar National Institute of Technology, Jalandhar, India"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"Cyber bullying detection","author":"Jadhav","year":"2023","journal-title":"Int. J. Creative Res. Thoughts"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1037\/a0035618"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-5426-8.ch026"},{"volume-title":"How children (10-18) experienced online risks during the Covid-19 lockdown-Spring 2020: Key findings from surveying families in 11 European countries","year":"2021","author":"Lobe","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.03.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S19-2010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.semeval-1.188"},{"key":"ref8","first-page":"1","article-title":"Overview of the Germeval 2018 shared task on the identification of offensive language","volume-title":"Proc. 14th Conf. Natural Lang. Process. (KONVENS)","author":"Wiegand","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/csci51800.2020.00056"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/csci54926.2021.00098"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361351"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/socialcom-passat.2012.55"},{"volume-title":"Teens and video games today","year":"2024","author":"Gottfried","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/isec61299.2024.10665194"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02635-5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/apcit62007.2024.10673574"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85610-6_39"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2918354"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139084789"}],"container-title":["IT Professional"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6294\/11311362\/11311405.pdf?arnumber=11311405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:47:00Z","timestamp":1766602020000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11311405\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":19,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/mitp.2025.3565036","relation":{},"ISSN":["1520-9202","1941-045X"],"issn-type":[{"type":"print","value":"1520-9202"},{"type":"electronic","value":"1941-045X"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}