{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:02:15Z","timestamp":1760709735651,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/fuzz-ieee.2018.8491557","type":"proceedings-article","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T18:18:38Z","timestamp":1539973118000},"page":"1-7","source":"Crossref","is-referenced-by-count":32,"title":["Using Fuzzy Fingerprints for Cyberbullying Detection in Social Networks"],"prefix":"10.1109","author":[{"given":"Hugo","family":"Rosa","sequence":"first","affiliation":[]},{"given":"Joao P.","family":"Carvalho","sequence":"additional","affiliation":[]},{"given":"Pavel","family":"Calado","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Martins","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Ribeiro","sequence":"additional","affiliation":[]},{"given":"Luisa","family":"Coheur","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"},{"key":"ref11","first-page":"11","article-title":"Modeling the Detection of Textual Cyberbullying","author":"dinakar","year":"2011","journal-title":"Association for the Advancement of Artificial Intelligence"},{"key":"ref12","first-page":"693","article-title":"Improving Cyberbullying Detection with User Context","volume":"7814","author":"dadvar","year":"2013","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275970"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2661126.2661133"},{"key":"ref15","first-page":"238","article-title":"An Effective Approach for Cyberbullying Detection","volume":"3","author":"nahar","year":"2014","journal-title":"Communications in Information Science and Management Engineering"},{"key":"ref16","first-page":"4168","article-title":"Common sense reasoning for detection, prevention, and mitigation of cyberbullying","volume":"2015","author":"dinakar","year":"2015","journal-title":"IJCAI Int Joint Conf on Artificial Intelligence"},{"key":"ref17","first-page":"1","article-title":"Automatic detection of cyberbullying on social networks based on bullying features","author":"zhao","year":"2016","journal-title":"Proceedings of the 17th International Conference on Distributed Computing and Networking - ICDCN &#x2019;16"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.051"},{"key":"ref19","first-page":"740","article-title":"Cyberbullying detection with a pronunciation based convolutional neural network","author":"zhang","year":"2017","journal-title":"Proceedings - 2016 15th IEEE International Conference on Machine Learning and Applications ICMLA 2016"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2016.7737956"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.05.024"},{"journal-title":"Topic detection within social networks","year":"2014","author":"rosa","key":"ref27"},{"key":"ref3","first-page":"301","article-title":"Cyberbullying: um desafio &#x00E0; investiga&#x00E7;&#x00E3;o e &#x00E0; forma&#x00E7;&#x00E3;o","volume":"13","author":"amado","year":"2009","journal-title":"Revista Interac&#x00E7;&#x00F5;es"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/00131880802309333"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2017.8015604"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9450.2007.00611.x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.059"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.10.007"},{"key":"ref2","first-page":"1","author":"belsey","year":"2005","journal-title":"Cyberbullying An emerging threat to the always on generation"},{"key":"ref9","first-page":"11","article-title":"Detecting the Presence of Cyberbullying Using Computer Software","author":"bayzick","year":"2011"},{"journal-title":"Ending the torment tackling bullying from the schoolyard to cyberspace","year":"2016","author":"richardson","key":"ref1"},{"journal-title":"A predictive model to detect online cyberbullying","year":"2015","author":"kasture","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007733"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041013"},{"key":"ref24","first-page":"180","article-title":"Authorship identification and author fuzzy &#x201D;fingerprints","author":"homem","year":"2011","journal-title":"Annual Conference of the North American Fuzzy Information Processing Society - NAFIPS"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"875","DOI":"10.1007\/978-0-387-09823-4_45","article-title":"Data Mining for Imbalanced Datasets: An Overview","author":"chawla","year":"2009","journal-title":"Data Mining and Knowledge Discovery Handbook"},{"key":"ref26","article-title":"Detecting a tweet&#x2019;s topic within a large number of portuguese twitter trends","volume":"38","author":"rosa","year":"2014","journal-title":"OASlcs-OpenAccess Series in Informatics"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2014.6891781"}],"event":{"name":"2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2018,7,8]]},"location":"Rio de Janeiro","end":{"date-parts":[[2018,7,13]]}},"container-title":["2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8466242\/8491438\/08491557.pdf?arnumber=8491557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:24:58Z","timestamp":1598228698000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8491557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/fuzz-ieee.2018.8491557","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}