{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:34:33Z","timestamp":1763458473928,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,24]],"date-time":"2018-03-24T00:00:00Z","timestamp":1521849600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1537924, 1527421"],"award-info":[{"award-number":["1537924, 1527421"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,24]]},"DOI":"10.1145\/3041008.3041013","type":"proceedings-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T10:54:21Z","timestamp":1490352861000},"page":"37-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["MCDefender"],"prefix":"10.1145","author":[{"given":"Nishant","family":"Vishwamitra","sequence":"first","affiliation":[{"name":"Clemson University, Clemson, USA"}]},{"given":"Xiang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, USA"}]},{"given":"Jonathan","family":"Tong","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, USA"}]},{"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, USA"}]},{"given":"Feng","family":"Luo","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, USA"}]},{"given":"Robin","family":"Kowalski","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, USA"}]},{"given":"Joseph","family":"Mazer","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Patchin","author":"Hinduja Sameer","year":"2013","unstructured":"Sameer Hinduja and Justin W. Patchin, (Springer Science+Business Media New York 2013). Social Influences on Cyberbullying Behaviors Among Middle and High School Students."},{"key":"e_1_3_2_1_2_1","volume-title":"Poznan","author":"Lempa P.","year":"2015","unstructured":"P. Lempa, M. Ptaszynski, and F. Masui, \"Cyberbullying Blocker Application for Android,\" presented at the 7th Language & Technology Conference (LTC'15), Poznan, Poland, 2015."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2464464.2464499"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Hosseinmardi H. Mattson S.A. Rafiq R.I. Han R. Lv Q. and Mishra S. 2015. Detection of cyberbullying incidents on the instagram social network. arXiv preprint arXiv:1503.03909.","DOI":"10.1007\/978-3-319-27433-1_4"},{"key":"e_1_3_2_1_5_1","first-page":"02","article-title":"Modeling the detection of Textual Cyberbullying","volume":"11","author":"Dinakar K.","year":"2011","unstructured":"K. Dinakar, R. Reichart, and H. Lieberman, \"Modeling the detection of Textual Cyberbullying,\" The Social Mobile Web, vol. 11, p. 02, 2011.","journal-title":"The Social Mobile Web"},{"key":"e_1_3_2_1_6_1","unstructured":"Prabhu Trisha N \"Method to stop cyber-bullying before it occurs\" United States Patent Application 20150365366 Kind Code: A1."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Y. Kim \"Convolutional neural networks for sentence classification \" arXiv preprint arXiv:1408.5882 2014.","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362394.2362400"},{"key":"e_1_3_2_1_11_1","unstructured":"A. S. Kasture \"A predictive model to detect online cyberbullying \" Auckland University of Technology 2015."},{"key":"e_1_3_2_1_12_1","unstructured":"eSpeak. Available: http:\/\/espeak.sourceforge.net\/"},{"key":"e_1_3_2_1_13_1","first-page":"643","article-title":"Semantic Parsing for Single-Relation Question Answering","author":"Yih W.-t.","year":"2014","unstructured":"W.-t. Yih, X. He, and C. Meek, \"Semantic Parsing for Single-Relation Question Answering,\" in ACL (2), 2014, pp. 643--648.","journal-title":"ACL (2)"},{"key":"e_1_3_2_1_14_1","volume-title":"an adaptive learning rate method,\" arXiv preprint arXiv:1212.5701","author":"Zeiler M. D.","year":"2012","unstructured":"M. D. Zeiler, \"ADADELTA: an adaptive learning rate method,\" arXiv preprint arXiv:1212.5701, 2012."},{"key":"e_1_3_2_1_15_1","unstructured":"Fumito Masui Michal Ptaszynski and Nitta Taisei \"An Apparatus and Method for Detection of Harmful Entries on Internet\". Patent Application No. 2013--245813."},{"key":"e_1_3_2_1_16_1","unstructured":"Samaritan's Radar http:\/\/www.samaritans.org\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2700171.2791023"},{"volume-title":"April","year":"2015","key":"e_1_3_2_1_18_1","unstructured":"Lenhart, Amanda, Pew Research Center, April 2015, \"Teen, Social Media and Technology Overview 2015\"."},{"key":"e_1_3_2_1_19_1","volume-title":"Bullying beyond the schoolyard: Preventing and responding to cyberbullying","author":"Patchin Justin W.","year":"2014","unstructured":"Hinduja, Sameer, and Justin W. Patchin. Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Corwin Press, 2014."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/3061053.3061172"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12045"},{"key":"e_1_3_2_1_22_1","volume-title":"Jamie Macbeth and Edward Dillon. \"Cyberbullying Detection with a Pronunciation Based Convolutional Neural Network\" ICMLA","author":"Zhang Xiang","year":"2016","unstructured":"Xiang Zhang, Jonathan Tong, Nishant Vishwamitra, Elizabeth Whittaker, Joseph P. Mazer, Robin Kowalski, Hongxin Hu, Feng Luo, Jamie Macbeth and Edward Dillon. \"Cyberbullying Detection with a Pronunciation Based Convolutional Neural Network\" ICMLA. 2016."}],"event":{"name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CODASPY '17"},"container-title":["Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041008.3041013","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3041008.3041013","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3041008.3041013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:27:19Z","timestamp":1763458039000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041008.3041013"}},"subtitle":["Toward Effective Cyberbullying Defense in Mobile Online Social Networks"],"short-title":[],"issued":{"date-parts":[[2017,3,24]]},"references-count":22,"alternative-id":["10.1145\/3041008.3041013","10.1145\/3041008"],"URL":"https:\/\/doi.org\/10.1145\/3041008.3041013","relation":{},"subject":[],"published":{"date-parts":[[2017,3,24]]},"assertion":[{"value":"2017-03-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}