{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T04:36:29Z","timestamp":1776141389833,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T00:00:00Z","timestamp":1415318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"University at Albany","award":["640075"],"award-info":[{"award-number":["640075"]}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["371714"],"award-info":[{"award-number":["371714"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,7]]},"DOI":"10.1145\/2661126.2661133","type":"proceedings-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T14:41:51Z","timestamp":1415025711000},"page":"3-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":154,"title":["Cyber Bullying Detection Using Social and Textual Analysis"],"prefix":"10.1145","author":[{"given":"Qianjia","family":"Huang","sequence":"first","affiliation":[{"name":"University of Winnipeg, winnipeg, MAN, Canada"}]},{"given":"Vivek Kumar","family":"Singh","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Pradeep Kumar","family":"Atrey","sequence":"additional","affiliation":[{"name":"University at Albany - SUNY, Albany, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10955-013-0759-z"},{"key":"e_1_3_2_1_2_1","volume-title":"ProQuest","author":"D. C.","year":"2008","unstructured":"D. C. Camp_eld. Cyber bullying and victimization: Psychosocial characteristics of bullies, victims, and bully\/victims . ProQuest , 2008 . D. C. Camp_eld. Cyber bullying and victimization: Psychosocial characteristics of bullies, victims, and bully\/victims. ProQuest, 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-X_40"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the Royal Society B: Biological Sciences, 280(1765)","author":"Barrett T.","year":"2013","unstructured":"T. D_avid- Barrett and R. Dunbar . Processing power limits social group size: computational evidence for the cognitive costs of sociality . Proceedings of the Royal Society B: Biological Sciences, 280(1765) , 2013 . T. D_avid-Barrett and R. Dunbar. Processing power limits social group size: computational evidence for the cognitive costs of sociality. Proceedings of the Royal Society B: Biological Sciences, 280(1765), 2013."},{"key":"e_1_3_2_1_6_1","volume-title":"The Social Mobile Web","author":"Dinakar K.","year":"2011","unstructured":"K. Dinakar , R. Reichart , and H. Lieberman . Modeling the detection of textual cyberbullying . In The Social Mobile Web , 2011 . K. Dinakar, R. Reichart, and H. Lieberman. Modeling the detection of textual cyberbullying. In The Social Mobile Web, 2011."},{"issue":"5","key":"e_1_3_2_1_7_1","first-page":"238","article-title":"An e_ective approach for cyberbullying detection","volume":"3","author":"Nahar V.","year":"2013","unstructured":"V. Nahar , X. Li , and C. Pang . An e_ective approach for cyberbullying detection . Communications in Information Science and Management Engineering , 3 ( 5 ): 238 -- 247 , 2013 . V. Nahar, X. Li, and C. Pang. An e_ective approach for cyberbullying detection. Communications in Information Science and Management Engineering, 3(5):238--247, 2013.","journal-title":"Communications in Information Science and Management Engineering"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"}],"event":{"name":"MM '14: 2014 ACM Multimedia Conference","location":"Orlando Florida USA","acronym":"MM '14","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 3rd International Workshop on Socially-Aware Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2661126.2661133","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2661126.2661133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:46Z","timestamp":1750231186000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2661126.2661133"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,7]]},"references-count":8,"alternative-id":["10.1145\/2661126.2661133","10.1145\/2661126"],"URL":"https:\/\/doi.org\/10.1145\/2661126.2661133","relation":{},"subject":[],"published":{"date-parts":[[2014,11,7]]},"assertion":[{"value":"2014-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}