{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T14:36:46Z","timestamp":1769179006031,"version":"3.49.0"},"reference-count":26,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Asian Low-Resour. Lang. Inf. Process."],"published-print":{"date-parts":[[2021,1,31]]},"abstract":"<jats:p>With recent developments in online social networks (OSNs), these services are widely applied in daily lives. On the other hand, cyberbullying, which is a relatively new type of harassment through the internet-based electronic devices, is rising in online social networks. Accordingly, scholars are attracted to investigating cyberbullying behaviors. Studies show that cyberbullying has a devastating effect on mental health, especially for teenagers. In order to reduce or even stop cyberbullying, different machine learning techniques are applied and numerous studies have been conducted so far. However, conventional detection schemes still have challenges, such as low accuracy. Therefore, it is of significant importance to find an efficient detection solution in the natural language processing and machine learning communities. In the present study, characteristics of cyberbullying are initially analyzed from vocabulary and syntax points of view. Then a new detection algorithm is proposed based on FastText and word similarity schemes. Finally, experiments are carried out to evaluate the effectiveness and performance of the proposed method. Obtained results show that the proposed algorithm can effectively improve the detection accuracy and recall rate of cyberbullying detection.<\/jats:p>","DOI":"10.1145\/3398191","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T12:39:07Z","timestamp":1594125547000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Cyberbullying Detection, Based on the FastText and Word Similarity Schemes"],"prefix":"10.1145","volume":"20","author":[{"given":"Kun","family":"Wang","sequence":"first","affiliation":[{"name":"Xidian University, Xi\u2019an, Shannxi"}]},{"given":"Yanpeng","family":"Cui","sequence":"additional","affiliation":[{"name":"Xidian University, Xi\u2019an, Shannxi"}]},{"given":"Jianwei","family":"Hu","sequence":"additional","affiliation":[{"name":"Xidian University, Xi\u2019an, Shannxi"}]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xidian University, Xi\u2019an, Shannxi"}]},{"given":"Wei","family":"Zhao","sequence":"additional","affiliation":[{"name":"Xidian University, Xi\u2019an, Shannxi"}]},{"given":"Luming","family":"Feng","sequence":"additional","affiliation":[{"name":"Xidian University, Xi\u2019an, Shannxi"}]}],"member":"320","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.051"},{"key":"e_1_2_2_2_1","volume-title":"A Majority of Teens Have Experienced Some Form of Cyberbullying","author":"Anderson Monica"},{"key":"e_1_2_2_3_1","volume-title":"Detecting the Presence of Cyberbullying Using Computer Software","author":"Bayzick Jennifer"},{"key":"e_1_2_2_4_1","volume-title":"Cyberbullying: An emerging threat to the \u201calways on","author":"Belsey Bill","year":"2005"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"e_1_2_2_6_1","volume-title":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI\u201915)","author":"Chavan Vikas S."},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"e_1_2_2_8_1","volume-title":"Cheating in School","author":"Davis Stephen F."},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12889-015-2239-7"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3192424.3192459"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2018.8530573"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/0143034306064547"},{"key":"e_1_2_2_13_1","first-page":"379","article-title":"Cyberbullying and its consequences: How cyberbullying is contorting the minds of victims and bullies alike, and the law\u2019s limited available redress","volume":"26","author":"Miller Kimberly","year":"2016","journal-title":"Southern California Interdisciplinary Law Journal"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.2147\/AHMT.S36456"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC.2017.7951760"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02791-z"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJIIT.2015100104"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2018.8491557"},{"key":"e_1_2_2_20_1","volume-title":"2018 International Joint Conference on Neural Networks (IJCNN\u201918)","author":"Rosa Hugo"},{"key":"e_1_2_2_21_1","volume-title":"2017 2nd International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM\u201917)","author":"Sadhana S. A."},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1098-2337(2000)26:1<1::AID-AB1>3.0.CO;2-7"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/03075079.2017.1307818"},{"key":"e_1_2_2_24_1","unstructured":"Unicef. 2016. Ending the torment: Tackling bullying from the schoolyard to cyberspace.  Unicef. 2016. Ending the torment: Tackling bullying from the schoolyard to cyberspace."},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2016.2531682"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2849567"}],"container-title":["ACM Transactions on Asian and Low-Resource Language Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3398191","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3398191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:53Z","timestamp":1750199933000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3398191"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,25]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1,31]]}},"alternative-id":["10.1145\/3398191"],"URL":"https:\/\/doi.org\/10.1145\/3398191","relation":{},"ISSN":["2375-4699","2375-4702"],"issn-type":[{"value":"2375-4699","type":"print"},{"value":"2375-4702","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,25]]},"assertion":[{"value":"2020-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-11-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}