{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T09:19:58Z","timestamp":1763543998929,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308560.3314196","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"61-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Robust Detection of Cyberbullying in Social Media"],"prefix":"10.1145","author":[{"given":"Mengfan","family":"Yao","sequence":"first","affiliation":[{"name":"Univeristy at Albany, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"volume-title":"Dynamic Programming and Optimal Control. Vol.\u00a01","author":"Bertsekas P.","key":"e_1_3_2_1_1_1","unstructured":"D.\u00a0 P. Bertsekas . 2005. Dynamic Programming and Optimal Control. Vol.\u00a01 . Athena Scientific . D.\u00a0P. Bertsekas. 2005. Dynamic Programming and Optimal Control. Vol.\u00a01. Athena Scientific."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091487"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Twelfth International AAAI Conference on Web and Social Media (ICWSM","author":"Devin\u00a0Soni Vivek\u00a0Singh","year":"2018","unstructured":"Vivek\u00a0Singh Devin\u00a0Soni . {n. d.}. Time Reveals AllWounds: Modeling Temporal Dynamics of Cyberbullying Sessions . In Proceedings of the Twelfth International AAAI Conference on Web and Social Media (ICWSM 2018 ). Vivek\u00a0Singh Devin\u00a0Soni. {n. d.}. Time Reveals AllWounds: Modeling Temporal Dynamics of Cyberbullying Sessions. In Proceedings of the Twelfth International AAAI Conference on Web and Social Media (ICWSM 2018)."},{"key":"e_1_3_2_1_4_1","unstructured":"AllSlang family. {n. d.}. Internet Slang Swear Word List & Curse Filter. https:\/\/www.noswearing.com\/dictionary.  AllSlang family. {n. d.}. Internet Slang Swear Word List & Curse Filter. https:\/\/www.noswearing.com\/dictionary."},{"key":"e_1_3_2_1_5_1","volume-title":"Online Learning: A Comprehensive Survey. arXiv preprint arXiv:1802.02871(2018).","author":"Hoi CH","year":"2018","unstructured":"Steven\u00a0 CH Hoi , Doyen Sahoo , Jing Lu , and Peilin Zhao . 2018 . Online Learning: A Comprehensive Survey. arXiv preprint arXiv:1802.02871(2018). Steven\u00a0CH Hoi, Doyen Sahoo, Jing Lu, and Peilin Zhao. 2018. Online Learning: A Comprehensive Survey. arXiv preprint arXiv:1802.02871(2018)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/3192424.3192459"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.137"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Rahat\u00a0Ibn Rafiq Homa Hosseinmardi Richard Han Qin Lv and Shivakant Mishra. 2018. Scalable and Timely Detection of Cyberbullying in Online Social Networks. (2018).  Rahat\u00a0Ibn Rafiq Homa Hosseinmardi Richard Han Qin Lv and Shivakant Mishra. 2018. Scalable and Timely Detection of Cyberbullying in Online Social Networks. (2018).","DOI":"10.1145\/3167132.3167317"},{"volume-title":"Optimal Stopping Rules. Vol.\u00a08","author":"Shiryaev N","key":"e_1_3_2_1_9_1","unstructured":"Albert\u00a0 N Shiryaev . 2007. Optimal Stopping Rules. Vol.\u00a08 . Springer Science & Business Media . Albert\u00a0N Shiryaev. 2007. Optimal Stopping Rules. Vol.\u00a08. Springer Science & Business Media."},{"key":"e_1_3_2_1_10_1","unstructured":"Luis von Ahn. {n. d.}. Offensive\/Profane Word List. https:\/\/www.cs.cmu.edu\/~biglou\/resources\/bad-words.txt.  Luis von Ahn. {n. d.}. Offensive\/Profane Word List. https:\/\/www.cs.cmu.edu\/~biglou\/resources\/bad-words.txt."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3104322.3104469"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313462"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976744"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2016.2531682"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.08.009"}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco USA","acronym":"WWW '19"},"container-title":["Companion Proceedings of The 2019 World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3314196","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308560.3314196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:23Z","timestamp":1750204403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3314196"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":15,"alternative-id":["10.1145\/3308560.3314196","10.1145\/3308560"],"URL":"https:\/\/doi.org\/10.1145\/3308560.3314196","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}