{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T03:09:08Z","timestamp":1771124948322,"version":"3.50.1"},"reference-count":46,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061674","type":"journal-article","created":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T05:03:11Z","timestamp":1742878991000},"page":"3165-3185","source":"Crossref","is-referenced-by-count":2,"title":["Leveraging Transformers for Detection of Arabic Cyberbullying on Social Media: Hybrid Arabic Transformers"],"prefix":"10.32604","volume":"83","author":[{"given":"Amjad A.","family":"Alsuwaylimi","sequence":"first","affiliation":[]},{"given":"Zaid S.","family":"Alenezi","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"25857","DOI":"10.1109\/ACCESS.2022.3153675","article-title":"DEA-RNN: a hybrid deep learning approach for cyberbullying detection in Twitter social media platform","volume":"10","author":"Murshed","year":"2022","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.chb.2018.12.021","article-title":"Automatic cyberbullying detection: a systematic review","volume":"93","author":"Rosa","year":"2019","journal-title":"Comput Hum Behav"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1839","DOI":"10.1007\/s00530-020-00701-5","article-title":"Cyberbullying detection solutions based on deep learning architectures","volume":"29","author":"Iwendi","year":"2023","journal-title":"Multimed Syst"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"4044","DOI":"10.3390\/app13064044","article-title":"Children\u2019s safety on YouTube: a systematic review","volume":"13","author":"Alqahtani","year":"2023","journal-title":"Appl Sci"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"179","DOI":"10.3390\/fi15050179","article-title":"A review on deep-learning-based cyberbullying detection","volume":"15","author":"Hasan","year":"2023","journal-title":"Fut Internet"},{"key":"ref6","first-page":"703","article-title":"Social media cyberbullying detection using machine learning","volume":"10","author":"Hani","year":"2019","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"45","DOI":"10.51846\/vol3iss2pp45-50","article-title":"Cyberbullying detection using machine learning","volume":"3","author":"Ali","year":"2020","journal-title":"Pakistan J Eng Technol"},{"key":"ref8","series-title":"Proceedings of Third Doctoral Symposium on Computational Intelligence: DoSCI 2022","first-page":"467","article-title":"Detecting hate speech in Arabic tweets during COVID-19 using machine learning approaches","author":"Alhejaili","year":"2022 Nov"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2664","DOI":"10.3390\/electronics10212664","article-title":"A multichannel deep learning framework for cyberbullying detection on social media","volume":"10","author":"Alotaibi","year":"2021","journal-title":"Electronics"},{"key":"ref10","series-title":"European Conference on Information Retrieval","first-page":"141","article-title":"Deep learning for detecting cyberbullying across multiple social media platforms","author":"Agrawal","year":"2018"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"3273","DOI":"10.3390\/electronics11203273","article-title":"Cyberbullying identification system based on deep learning algorithms","volume":"11","author":"Aldhyani","year":"2022","journal-title":"Electronics"},{"key":"ref12","unstructured":"Ahmed MF, Mahmud Z, Biash ZT, Ryen AAN, Hossain A, Ashraf FB. Cyberbullying detection using deep neural network from social media comments in Bangla language. 2021. doi:10.48550\/arXiv.2106.04506."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2810","DOI":"10.3390\/electronics10222810","article-title":"Cyberbullying detection: hybrid models based on machine learning and natural language processing techniques","volume":"10","author":"Raj","year":"2021","journal-title":"Electronics"},{"key":"ref14","first-page":"1069","article-title":"Cyberbullying detection on Twitter using natural language processing and machine learning techniques","volume":"5","author":"Afrifa","year":"2022","journal-title":"Int J Innov Technol Interdiscip Sci"},{"key":"ref15","series-title":"Sustainable Advanced Computing: Select Proceedings of ICSAC 2021","first-page":"397","article-title":"Analysing cyberbullying using natural language processing by understanding jargon in social media","author":"Bhatia","year":"2022"},{"key":"ref16","series-title":"2021 International Conference on Computer Communication and Informatics (ICCCI)","first-page":"1","article-title":"Cyberbullying Detection using LSTM-CNN architecture and its applications","author":"Gada","year":"2021 Jan"},{"key":"ref17","series-title":"Proceedings of International Conference on Communication, Circuits, and Systems: IC3S 2020","first-page":"295","article-title":"Cyberbully detection using 1D-CNN and LSTM","author":"Ghosh","year":"2021"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2024.3431939","article-title":"From text to insight: an integrated CNN-BiLSTM-GRU model for Arabic cyberbullying detection","author":"Daraghmi","year":"2024","journal-title":"IEEE Access"},{"key":"ref19","series-title":"2022 International Conference on Innovations in Science and Technology for Sustainable Development (ICISTSD)","first-page":"293","article-title":"Cyberbullying detection on social networks using LSTM model","author":"Dass","year":"2022"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"887","DOI":"10.18280\/isi.280410","article-title":"Hybrid deep learning approach and Word2Vec feature expansion for cyberbullying detection on Indonesian Twitter","volume":"28","author":"Asqolani","year":"2023","journal-title":"Ing\u00e9nierie des Syst\u00e8mes d\u2019Information"},{"key":"ref21","first-page":"1","article-title":"Cyberbullying detection, based on the fasttext and word similarity schemes","volume":"20","author":"Wang","year":"2020","journal-title":"ACM Trans Asian Low-Resour Lang Info Process"},{"key":"ref22","first-page":"1","article-title":"Cyberbullying detection using PCA extracted GLOVE features and RoBERTaNet transformer learning model","author":"Umer","year":"2024","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.1007\/s00530-020-00710-4","article-title":"CyberBERT: BERT for cyberbullying identification: BERT for cyberbullying identification","volume":"28","author":"Paul","year":"2022","journal-title":"Multimed Syst"},{"key":"ref24","series-title":"2020 International Conference on Electronics and Sustainable Communication Systems (ICESC)","first-page":"1096","article-title":"Cyberbullying detection using pre-trained BERT model","author":"Yadav","year":"2020"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s13278-022-00934-4","article-title":"Performance analysis of transformer-based architectures and their ensembles to detect trait-based cyberbullying","volume":"12","author":"Ahmed","year":"2022","journal-title":"Soc Netw Anal Min"},{"key":"ref26","series-title":"Kids cybersecurity using computational intelligence techniques","first-page":"255","article-title":"Detecting kids\u2019 cyberbullying using transfer learning approach: transformer fine-tuning models","author":"Yafooz","year":"2023"},{"key":"ref27","series-title":"2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","first-page":"1","article-title":"Cyberbullying detection on social networks using machine learning approaches","author":"Islam","year":"2020"},{"key":"ref28","first-page":"1409","article-title":"Cyber-bullying and cyber-harassment detection using supervised machine learning techniques in Arabic social media contents","volume":"21","author":"Kanan","year":"2020","journal-title":"J Internet Technol"},{"key":"ref29","series-title":"2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","first-page":"1","article-title":"Detection of Arabic cyberbullying on social networks using machine learning","author":"Mouheb","year":"2019"},{"key":"ref30","first-page":"2330","article-title":"Automatic cyberbullying detection in Arabic social media","volume":"12","author":"AlHarbi","year":"2019","journal-title":"Int J Eng Res Technol"},{"key":"ref31","series-title":"2020 International Joint Conference on Neural Networks (IJCNN)","first-page":"1","article-title":"Classification of cyberbullying text in Arabic","author":"Rachid","year":"2020"},{"key":"ref32","unstructured":"Husain F. Arabic offensive language detection using machine learning and ensemble machine learning approaches. 2020. doi:10.48550\/arXiv.2005.08946."},{"key":"ref33","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/s42979-022-01308-5","article-title":"An application to detect cyberbullying using machine learning and deep learning techniques","volume":"3","author":"Raj","year":"2022","journal-title":"SN Comput Sci"},{"key":"ref34","article-title":"Enhancing Arabic phishing email detection: a hybrid machine learning based on genetic algorithm feature selection","volume":"15","author":"Alsuwaylimi","year":"2024","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref35","first-page":"735","article-title":"Leveraging user-generated comments and fused BiLSTM models to detect and predict issues with mobile apps","volume":"79","author":"Yafooz","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref36","unstructured":"Inoue G, Alhafni B, Baimukan N, Bouamor H, Habash N. The interplay of variant, size, and task type in Arabic pre-trained language models. 2021. doi:10.48550\/arXiv.2103.06678."},{"key":"ref37","doi-asserted-by":"crossref","first-page":"5720","DOI":"10.3390\/app12115720","article-title":"BERT models for Arabic text classification: a systematic review","volume":"12","author":"Alammary","year":"2022","journal-title":"Appl Sci"},{"key":"ref38","unstructured":"Antoun W, Baly F, Hajj H. AraGPT2: pre-trained transformer for Arabic language generation. 2020. doi:10.48550\/arXiv.2012.15520."},{"key":"ref39","doi-asserted-by":"crossref","first-page":"316","DOI":"10.3390\/info15060316","article-title":"Enhancing Arabic dialect detection on social media: a hybrid model with an attention mechanism","volume":"15","author":"Yafooz","year":"2024","journal-title":"Information"},{"key":"ref40","doi-asserted-by":"crossref","unstructured":"Conneau A. Unsupervised cross-lingual representation learning at scale. 2019. doi:10.48550\/arXiv.1911.02116.","DOI":"10.18653\/v1\/2020.acl-main.747"},{"key":"ref41","series-title":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","first-page":"1","article-title":"Sentiment analysis of the COVID-19 vaccine for Arabic tweets using machine learning","author":"Alhejaili","year":"2021 Sep"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"39","DOI":"10.21608\/ejle.2021.50240.1017","article-title":"Arabic cyberbullying detection using arabic sentiment analysis","volume":"8","author":"Almutiry","year":"2021","journal-title":"Egypt J Lang Eng"},{"key":"ref43","first-page":"1031","article-title":"Arabic cyberbullying detecting using ensemble deep learning","volume":"32","author":"Ahmed","year":"2023","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"29","DOI":"10.3390\/make5010003","article-title":"Detecting arabic cyberbullying tweets using machine learning","volume":"5","author":"Alduailaj","year":"2023","journal-title":"Mach Learn Knowl Extr"},{"key":"ref45","doi-asserted-by":"crossref","unstructured":"Worlali Azumah S, Elsayed N, ElSayed Z, Ozer M, La Guardia A. Deep learning approaches for detecting adversarial cyberbullying and hate speech in social networks. 2024. doi:10.48550\/arXiv.2406.17793.","DOI":"10.1109\/AIBThings63359.2024.10863625"},{"key":"ref46","doi-asserted-by":"crossref","unstructured":"Alqahtani AF, Ilyas M. A machine learning ensemble model for the detection of cyberbullying. 2024. doi:10.48550\/arXiv.2402.12538.","DOI":"10.5121\/ijaia.2024.15108"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_61674\/TSP_CMC_61674.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:07:06Z","timestamp":1763341626000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60559"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":46,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061674","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}