{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:53:08Z","timestamp":1755838388545,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/pst.2014.6890927","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T15:43:34Z","timestamp":1410363814000},"page":"84-93","source":"Crossref","is-referenced-by-count":18,"title":["Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos"],"prefix":"10.1109","author":[{"given":"Nisha","family":"Aggarwal","sequence":"first","affiliation":[]},{"given":"Swati","family":"Agrawal","sequence":"additional","affiliation":[]},{"given":"Ashish","family":"Sureka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137295"},{"key":"22","first-page":"48","article-title":"Copyright infringement detection of music videos on youtube by mining video and uploader metadata","author":"agrawal","year":"2013","journal-title":"Big Data Analytics 2nd International Conference Springer International Publishing"},{"key":"17","first-page":"19","article-title":"Confronting facebook, youtube and myspace: Cyberbullying in schools","volume":"10","author":"roher","year":"2007","journal-title":"Principal Connections (Catholic Principals' Council of Ontario)"},{"key":"23","first-page":"1","author":"tax","year":"2001","journal-title":"One-Class Classification Concept Learning in the Absence of Counter-Examples"},{"key":"18","article-title":"Fast violence detection in video","author":"deniz","year":"2014","journal-title":"The 9th International Conference on Computer Vision Theory and Applications (VISAPP)"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864770"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21690"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/9780470689646.ch8"},{"key":"13","article-title":"Identifying suitable youtube videos for children","author":"eickhoff","year":"2010","journal-title":"3rd Networked and Electronic Media Summit (NEM)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2013.6596054"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.793"},{"journal-title":"International Workshop on Usage Analysis and the Web of Data (USEWOD)","article-title":"Mining user comment activity for detecting forum spammers in youtube","year":"2011","key":"21"},{"key":"3","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/978-3-642-17080-5_21","article-title":"A survey of recent trends in one class classification","author":"khan","year":"2010","journal-title":"Artificial Intelligence and Cognitive Science"},{"key":"20","article-title":"Improved cyberbullying detection using gender information","author":"dadvar","year":"2012","journal-title":"Proceedings of the 12th-Dutch-Belgian Information Retrieval Workshop (DIR2012)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2009.5174439"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17187-1_2"},{"key":"10","article-title":"Detecting flames and insults in text","author":"mahmud","year":"2008","journal-title":"Proc of 6th International Conference on Natural Language Processing (ICON-2008)"},{"key":"7","article-title":"Modeling the detection of textual cyberbullying","author":"dinakar","year":"2011","journal-title":"International Conference on Weblog and Social Media-Social Mobile Web Workshop"},{"key":"6","first-page":"569","article-title":"Improved textual cyberbullying detection using data mining","volume":"3","author":"singhal","year":"2013","journal-title":"International Journal of Information and Computation Technology ISSN 0974-2239"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1196\/annals.1385.022"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2187995"},{"key":"9","article-title":"Detection of harassment on web 2.0fv","author":"dawei","year":"2009","journal-title":"CAW2 0 Workshop at WWW"},{"key":"8","first-page":"1435","article-title":"Automatic system for filtering obscene video","volume":"2","author":"kim","year":"2008","journal-title":"Advanced Communication Technology 2008 ICACT 2008 10th International Conference on"}],"event":{"name":"2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2014,7,23]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,7,24]]}},"container-title":["2014 Twelfth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883276\/6890911\/06890927.pdf?arnumber=6890927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T20:12:50Z","timestamp":1498162370000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890927\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/pst.2014.6890927","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}