{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:33:06Z","timestamp":1775665986125,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100007446","name":"King Khalid University","doi-asserted-by":"publisher","award":["RGP2\/17\/45"],"award-info":[{"award-number":["RGP2\/17\/45"]}],"id":[{"id":"10.13039\/501100007446","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Princess Nourah bint Abdulrahman University Researchers","award":["PNURSP2024R729"],"award-info":[{"award-number":["PNURSP2024R729"]}]},{"name":"Princess Nourah bint Abdulrahman University, Riyadh"},{"name":"Abdulaziz University","award":["PSAU\/2024\/R\/1445"],"award-info":[{"award-number":["PSAU\/2024\/R\/1445"]}]},{"DOI":"10.13039\/501100007613","name":"Majmaah University","doi-asserted-by":"publisher","award":["R-2024-1146"],"award-info":[{"award-number":["R-2024-1146"]}],"id":[{"id":"10.13039\/501100007613","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1109\/tbdata.2024.3409939","type":"journal-article","created":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T18:01:07Z","timestamp":1717610467000},"page":"259-270","source":"Crossref","is-referenced-by-count":4,"title":["Automatic Recognition of Cyberbullying in the Web of Things and social media using Deep Learning Framework"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4389-4927","authenticated-orcid":false,"given":"Fahd N.","family":"Al-Wesabi","sequence":"first","affiliation":[{"name":"Department of Computer Science, Applied College at Mahayil, King Khalid University, Abha, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3099-9567","authenticated-orcid":false,"given":"Marwa","family":"Obayya","sequence":"additional","affiliation":[{"name":"Department of Biomedical Engineering, College of Engineering, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"}]},{"given":"Jamal","family":"Alsamri","sequence":"additional","affiliation":[{"name":"Department of Biomedical Engineering, College of Engineering, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2410-486X","authenticated-orcid":false,"given":"Rana","family":"Alabdan","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer and Information Science, Majmaah University, Al-Majmaah, Saudi Arabia"}]},{"given":"Nojood O","family":"Aljehane","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6659-541X","authenticated-orcid":false,"given":"Sana","family":"Alazwari","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4097-2480","authenticated-orcid":false,"given":"Fahad F.","family":"Alruwaili","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computing and Information Technology, Shaqra University, Sharqa, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8743-1174","authenticated-orcid":false,"given":"Manar Ahmed","family":"Hamza","sequence":"additional","affiliation":[{"name":"Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia"}]},{"given":"A","family":"Swathi","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Faculty of Science, University of Hradec Kralove, HradecKralove, Czech Republic"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.chb.2015.03.030","article-title":"Cybervictimization and cyberbullying: The mediating role of anger, don\u2019t anger me!","volume":"49","author":"\u00d6zdemir","year":"2015","journal-title":"Comput. Hum. Behav."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS48265.2020.9120893"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/iCCECE49321.2020.9231167"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04550-x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101710"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.46532\/978-81-950008-1-4_039"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3291037"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCC.2019.8843606"},{"key":"ref10","article-title":"Cyberbullying detection using deep neural network from social media comments in Bangla language","author":"Ahmed","year":"2021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASERT.2019.8934609"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00104"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC3.2017.8318770"},{"key":"ref14","first-page":"409","article-title":"Cyberbullying detection with weakly supervised machine learning","volume-title":"Proc. IEEE\/ACM Int. Conf. Adv. Social Netw. Anal. Mining","author":"Raisi"},{"key":"ref15","article-title":"Cnncomparator: Comparative analytics of convolutional neural networks","author":"Zeng","year":"2017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.26483\/ijarcs.v9i1.5396"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6644652"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5594175"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0240924"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107186"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102600"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1201\/9781003287186-10"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92639-1_47"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1515\/pjbr-2022-0100"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411620040082"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-020-00710-4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/202030903015"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/app10238631"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC353642.2021.9697140"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISIA51297.2020.9416539"},{"key":"ref32","first-page":"1063","article-title":"YOLO based efficient vigorous scene detection and blurring for harmful content management to avoid children\u2019s destruction","volume-title":"Proc. 3rd Int. Conf. Electron. Sustain. Commun. Syst.","author":"Maheswaran"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.05.034"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2013"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052591"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1146"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2018.8477769"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2023.3322784"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687317\/10843063\/10550039.pdf?arnumber=10550039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T19:02:15Z","timestamp":1737399735000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10550039\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":40,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2024.3409939","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2]]}}}