{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:11Z","timestamp":1750220351655,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T00:00:00Z","timestamp":1629849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,25]]},"DOI":"10.1145\/3465336.3475105","type":"proceedings-article","created":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T21:11:41Z","timestamp":1629925901000},"page":"265-270","source":"Crossref","is-referenced-by-count":2,"title":["Weakly Supervised Cross-platform Teenager Detection with Adversarial BERT"],"prefix":"10.1145","author":[{"given":"Peiling","family":"Yi","sequence":"first","affiliation":[{"name":"Queen Mary University of London, London, United Kingdom"}]},{"given":"Arkaitz","family":"Zubiaga","sequence":"additional","affiliation":[{"name":"Queen Mary University of London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2021,8,29]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Sophia Alim. 2017. Cyberbullying in the world of teenagers and social media: A literature review. (2017).  Sophia Alim. 2017. Cyberbullying in the world of teenagers and social media: A literature review. (2017)."},{"key":"e_1_3_2_2_2_1","unstructured":"Jennifer Bayzick and April Kontostathis. 2011. Detecting the Presence of Cyberbullying Using Computer Software Submitted to the faculty of Ursinus College in fulfillment of the requirements for Distinguished Honors in Computer Science. (2011). https:\/\/pdfs.semanticscholar.org\/a1bc\/b166d5ddae9dee36ff9b4f1122861ad5bd44.pdf  Jennifer Bayzick and April Kontostathis. 2011. Detecting the Presence of Cyberbullying Using Computer Software Submitted to the faculty of Ursinus College in fulfillment of the requirements for Distinguished Honors in Computer Science. (2011). https:\/\/pdfs.semanticscholar.org\/a1bc\/b166d5ddae9dee36ff9b4f1122861ad5bd44.pdf"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-009-5152-4"},{"volume-title":"Frustratingly Easy Domain Adaptation. ACL 2007 - Proceedings of the 45th Annual Meeting of the Association for Computational Linguistics (jul 2009","year":"2009","author":"Daum\u00e9 Hal","key":"e_1_3_2_2_4_1"},{"volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. NAACL HLT 2019 - 2019 Conference of the North American","year":"2018","author":"Devlin Jacob","key":"e_1_3_2_2_5_1"},{"key":"e_1_3_2_2_6_1","unstructured":"Fatma Elsafoury. [n.d.]. Cyberbullying datasets. https:\/\/doi.org\/10.17632\/jf4pzyvnpj.1  Fatma Elsafoury. [n.d.]. Cyberbullying datasets. https:\/\/doi.org\/10.17632\/jf4pzyvnpj.1"},{"volume-title":"A Comparison of LSTM and BERT for Small Corpus. arXiv (sep","year":"2020","author":"Ezen-Can Aysu","key":"e_1_3_2_2_7_1"},{"key":"e_1_3_2_2_8_1","first-page":"9783319583464","article-title":"Domain-Adversarial Training of Neural Networks","volume":"17","author":"Ganin Yaroslav","year":"2015","journal-title":"Advances in Computer Vision and Pattern Recognition"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1746-1561.2008.00335.x"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.06.024"},{"volume-title":"social media & technology","year":"2018","author":"JiAndersonngjing Jiang Monica","key":"e_1_3_2_2_12_1"},{"volume-title":"Proceedings of the 7th International Conference on Weblogs and Social Media, ICWSM 2013","year":"2013","author":"Nguyen Dong","key":"e_1_3_2_2_13_1"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2107636.2107651"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2011-0054"},{"volume-title":"CLEF Conference on Multilingual and Multimodal Information Access Evaluation. CELCT, 352--365","year":"2013","author":"Rangel Francisco","key":"e_1_3_2_2_18_1"},{"key":"e_1_3_2_2_19_1","volume-title":"CEUR Workshop Proceedings","volume":"1179","author":"Rangel Francisco","year":"2013"},{"volume-title":"CEUR Workshop Proceedings 1609","year":"2016","author":"Rangel Francisco","key":"e_1_3_2_2_20_1"},{"volume-title":"EMNLP 2014 - 2014 Conference on Empirical Methods in Natural Language Processing, Proceedings of the Conference. Association for Computational Linguistics (ACL), 1146--1151","author":"Sap Maarten","key":"e_1_3_2_2_21_1"},{"key":"e_1_3_2_2_22_1","unstructured":"Jonathan Schler Moshe Koppel Shlomo Argamon and James Pennebaker. 2006. Effects of Age and Gender on Blogging. (2006). https:\/\/doi.org\/10.1007\/s11357-007--9034-z  Jonathan Schler Moshe Koppel Shlomo Argamon and James Pennebaker. 2006. Effects of Age and Gender on Blogging. (2006). https:\/\/doi.org\/10.1007\/s11357-007--9034-z"},{"key":"e_1_3_2_2_23_1","series-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","volume-title":"How to Fine-Tune BERT for Text Classification?","author":"Sun Chi","year":"1905"},{"key":"e_1_3_2_2_24_1","series-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","volume-title":"How to Fine-Tune BERT for Text Classification?","author":"Sun Chi","year":"1905"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1093\/jcmc\/zmy022","article-title":"Platform-swinging in a poly-social-media context: How and why users navigate multiple social media platforms","volume":"24","author":"Tandoc Edson C","year":"2019","journal-title":"Journal of Computer-Mediated Communication"},{"volume-title":"Cyberbullying's impact on young people's mental health Inquiry report","year":"2018","author":"The Children's Society and YoungMinds. 2018. Safety Net","key":"e_1_3_2_2_26_1"},{"volume-title":"Proceedings - 30th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017 2017-Janua (feb","year":"2017","author":"Tzeng Eric","key":"e_1_3_2_2_27_1"},{"key":"e_1_3_2_2_28_1","volume-title":"CEUR Workshop Proceedings","volume":"2380","author":"Wiegmann Matti","year":"2019"},{"volume-title":"Towards generalisable hate speech detection: a review on obstacles and solutions. arXiv preprint arXiv:2102.08886","year":"2021","author":"Yin Wenjie","key":"e_1_3_2_2_29_1"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1214\/009053606000000704"},{"volume-title":"Revisiting Few-sample BERT Fine-tuning. arXiv (jun","year":"2020","author":"Zhang Tianyi","key":"e_1_3_2_2_31_1"},{"volume-title":"Cross-platform identification of anonymous identical users in multiple social media networks","year":"2015","author":"Zhou Xiaoping","key":"e_1_3_2_2_32_1"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.3004555"}],"event":{"name":"HT '21: 32nd ACM Conference on Hypertext and Social Media","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Virtual Event USA","acronym":"HT '21"},"container-title":["Proceedings of the 32st ACM Conference on Hypertext and Social Media"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465336.3475105","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:12Z","timestamp":1750191432000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465336.3475105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,25]]},"references-count":31,"alternative-id":["10.1145\/3465336.3475105","10.1145\/3465336"],"URL":"https:\/\/doi.org\/10.1145\/3465336.3475105","relation":{},"subject":[],"published":{"date-parts":[[2021,8,25]]}}}