{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T17:32:17Z","timestamp":1772299937193,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1109\/tcss.2023.3280952","type":"journal-article","created":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T14:16:54Z","timestamp":1687184214000},"page":"5210-5218","source":"Crossref","is-referenced-by-count":16,"title":["Offensive Language Detection for Low Resource Language Using Deep Sequence Model"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0964-4748","authenticated-orcid":false,"given":"Anas Ali","family":"Khan","sequence":"first","affiliation":[{"name":"Department of Information Security, National University of Sciences and Technology (NUST), Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3616-2621","authenticated-orcid":false,"given":"M. Hammad","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Department of Information Security, National University of Sciences and Technology (NUST), Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0311-0876","authenticated-orcid":false,"given":"Shibli","family":"Nisar","sequence":"additional","affiliation":[{"name":"Department of Information Security, National University of Sciences and Technology (NUST), Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5483-2732","authenticated-orcid":false,"given":"Awais","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Information Systems Department, College of Computer and Information Sciences, Imam Mohammed Ibn Saud Islamic University, Riyadh, Saudi Arabia"}]},{"given":"Waseem","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Department of Information Security, National University of Sciences and Technology (NUST), Islamabad, Pakistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-19644-6"},{"issue":"1","key":"ref2","article-title":"Reuters institute digital news report 2021","volume-title":"Reuters Inst. Study Journalism","volume":"1","author":"Newman","year":"2021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0257728"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12590"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2806394"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-2740-1_17"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107856"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5936"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.03.045"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945911"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5909"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.05.006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/cae.22179"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/0165551515591724"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/0165551516677911"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-19807-7_29"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3049734"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2497471"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.15516\/cje.v18i1.1471"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1108\/K-10-2016-0300"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51156-2_197"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3479158"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1177\/20563051211036059"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2954919"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.015"},{"issue":"26","key":"ref27","first-page":"1","article-title":"Social networks and the challenge of hate disguised as fear and politics","volume":"26","author":"Klein","year":"2021","journal-title":"J. Deradicalization"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3421504"},{"key":"ref29","article-title":"HateBR: A large expert annotated corpus of Brazilian Instagram comments for offensive language and hate speech detection","author":"Alves Vargas","year":"2021","journal-title":"arXiv:2103.14972"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.semeval-1.198"},{"key":"ref31","article-title":"HASOCOne@FIRE-HASOC2020: Using BERT and multilingual BERT models for hate speech detection","author":"Dowlagar","year":"2021","journal-title":"arXiv:2101.09007"},{"key":"ref32","first-page":"384","article-title":"NITP-AI-NLP@ HASOC-dravidian-codemix-fire2020: A machine learning approach to identify offensive languages from dravidian code-mixed text","volume-title":"Proc. FIRE (Working Notes)","author":"Kumar"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/GCAT52182.2021.9587652"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.491"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.08.169"},{"key":"ref36","first-page":"95","article-title":"Towards the automatic classification of offensive language and related phenomena in German tweets","volume-title":"Proc. 14th Conf. Natural Lang. Process. (KONVENS)","author":"Schneider"},{"key":"ref37","article-title":"Offensive language and hate speech detection for Danish","author":"Sigurbergsson","year":"2019","journal-title":"arXiv:1908.04531"},{"key":"ref38","first-page":"44","article-title":"Countering the challenges of globalization faced by endangered languages of North Pakistan","volume-title":"Language Documentation and Description","volume":"17","author":"Torwali","year":"2020"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2196\/19145"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC50486.2020.9318069"},{"key":"ref41","volume-title":"Tween Cyberbullying","author":"Patchin","year":"2020"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.47264\/idea.lassij\/5.1.17"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICACI.2017.7974488"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1142\/S0219691318500315"},{"key":"ref45","first-page":"1","article-title":"The current situation of teaching and learning Pashto and Dari languages at primary level in Afghanistan","volume":"13","author":"Zahid","year":"2020","journal-title":"NUE J. Int. Educ. Cooperation"},{"key":"ref46","article-title":"Understanding support vector machine(SVM) algorithm from examples (along with code)","volume":"2017","author":"Sunil","journal-title":"Analytics Vidhya"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3439726"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2020.1790793"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2020.110121"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2021.107371"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.9734\/ajrcos\/2021\/v11i230259"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1140\/epjst\/e2019-900046-x"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s42835-020-00424-7"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"ref56","article-title":"A unified tagging solution: Bidirectional LSTM recurrent neural network with word embedding","author":"Wang","year":"2015","journal-title":"arXiv:1511.00215"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005997"},{"key":"ref58","article-title":"Deep bidirectional and unidirectional LSTM recurrent neural network for network-wide traffic speed prediction","author":"Cui","year":"2018","journal-title":"arXiv:1801.02143"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01398-9"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/10638068\/10155457.pdf?arnumber=10155457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T06:02:22Z","timestamp":1769493742000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10155457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":59,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2023.3280952","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8]]}}}