{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:03:44Z","timestamp":1770750224651,"version":"3.50.0"},"reference-count":42,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062724","type":"journal-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:16:11Z","timestamp":1744085771000},"page":"3113-3134","source":"Crossref","is-referenced-by-count":4,"title":["A Deep Learning Framework for Arabic Cyberbullying Detection in Social Networks"],"prefix":"10.32604","volume":"83","author":[{"given":"Yahya","family":"Tashtoush","sequence":"first","affiliation":[]},{"given":"Areen","family":"Banysalim","sequence":"additional","affiliation":[]},{"given":"Majdi","family":"Maabreh","sequence":"additional","affiliation":[]},{"given":"Shorouq","family":"Al-Eidi","sequence":"additional","affiliation":[]},{"given":"Ola","family":"Karajeh","sequence":"additional","affiliation":[]},{"given":"Plamen","family":"Zahariev","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","unstructured":"Salem F. Arab social media report 2017: social media and the internet of things: towards data-driven policymaking in the Arab world: potential, limits and concerns; 2017. [Internet]. [cited 2025 Feb 25]. Available from: https:\/\/mbrsg.ae\/en\/research\/innovation-and-future-governments\/arab-social-media-report-2017?id=70493&rel=4228."},{"key":"ref2","series-title":"ICT Analysis and Applications: Proceedings of ICT4SD 2020","first-page":"731","article-title":"Effectiveness of cyberbullying prevention strategies in the UAE","author":"AL Nuaimi","year":"2021"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TAFFC.2017.2761757","article-title":"Approaches to automated detection of cyberbullying: a survey","volume":"11","author":"Salawu","year":"2020","journal-title":"IEEE Trans Affective Comput"},{"key":"ref4","unstructured":"Raisi E, Huang B. Cyberbullying identification using participant-vocabulary consistency. arXiv:1606.08084, 2016."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MIC.2020.3032930","article-title":"Session-based cyberbullying detection: problems and challenges","volume":"25","author":"Cheng","year":"2021","journal-title":"IEEE Internet Comput"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"275","DOI":"10.25046\/aj020634","article-title":"A multilingual system for cyberbullying detection: Arabic content detection using machine learning","volume":"2","author":"Haidar","year":"2017","journal-title":"Adv Sci Technol Eng Syst J"},{"key":"ref7","first-page":"1","article-title":"Introduction to Arabic natural language processing","volume":"3","author":"Habash","year":"2010","journal-title":"Synth Lect Hum Lang Technol"},{"key":"ref8","series-title":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","first-page":"1","article-title":"Detecting Arabic YouTube Spam using data mining techniques","author":"Tashtoush","year":"2022 Jun 6\u20137"},{"key":"ref9","article-title":"Deep learning algorithm for cyberbullying detection","volume":"9","author":"Al-Ajlan","year":"2018","journal-title":"Int J Adv Comp Sci Appl"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1007\/978-3-319-92639-1_47","author":"Bu","year":"2018","journal-title":"Hybrid artificial intelligent systems"},{"key":"ref11","series-title":"2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA)","first-page":"740","article-title":"Cyberbullying detection with a pronunciation based convolutional neural network","volume":"2016","author":"Zhang","year":"2016 Dec 18\u201320"},{"key":"ref12","series-title":"2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)","first-page":"1","article-title":"Deployment of machine learning and deep learning algorithms in detecting cyberbullying in bangla and romanized bangla text: a comparative study","author":"Ahmed","year":"2021 Feb 19\u201320"},{"key":"ref13","series-title":"2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS)","first-page":"466","article-title":"Detecting offensive language on Arabic social media using deep learning","author":"Mohaouchane","year":"2019 Oct 22\u201325"},{"key":"ref14","doi-asserted-by":"crossref","unstructured":"Agrawal S, Awekar A. Deep learning for detecting cyberbullying across multiple social media platforms; 2018. p. 141\u201353.","DOI":"10.1007\/978-3-319-76941-7_11"},{"key":"ref15","unstructured":"Lanasri D, Olano J, Klioui S, Lee SL, Sekkai L. Hate speech detection in Algerian dialect using deep learning. arXiv:2309.11611. 2023."},{"key":"ref16","series-title":"International Conference on Global Security, Safety, and Sustainability 2023","first-page":"147","article-title":"Cyberbullying detection in twitter using deep learning model techniques","author":"Seetharaman","year":"2023"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1007\/s10772-024-10118-4","article-title":"Arabic cyberbullying detection system using convolutional neural network and multi-head attention","volume":"27","author":"Azzeh","year":"2024","journal-title":"Int J Speech Technol"},{"key":"ref18","series-title":"Machine learning and intelligent communications. MLICOM 2019. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering","article-title":"Cyberbullying detection with birn and attention mechanism","author":"Zhang","year":"2019"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.1007\/s00530-020-00710-4","article-title":"CyberBERT: bert for cyberbullying identification","volume":"28","author":"Paul","year":"2022","journal-title":"Multimed Syst"},{"key":"ref20","series-title":"2021 International Conference on Computer Communication and Informatics (ICCCI)","first-page":"1","article-title":"Cyberbullying detection using LSTM-CNN architecture and its applications","author":"Gada","year":"2021 Jan 27\u201329"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1839","DOI":"10.1007\/s00530-020-00701-5","article-title":"Cyberbullying detection solutions based on deep learning architectures","volume":"29","author":"Iwendi","year":"2023","journal-title":"Multimed Syst"},{"key":"ref22","series-title":"Proceedings of the 18th International Conference on Advances in Mobile Computing & Multimedia","first-page":"3","article-title":"Linking textual and contextual features for intelligent cyberbullying detection in social media","author":"Rezvani","year":"2020"},{"key":"ref23","series-title":"2020 International Joint Conference on Neural Networks (IJCNN)","first-page":"1","article-title":"LSHWE: improving similarity-based word embedding with locality sensitive hashing for cyberbullying detection","author":"Zhao","year":"2020 July 19\u201324"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"115001","DOI":"10.1016\/j.eswa.2021.115001","article-title":"Cyberbullying detection: utilizing social media features","volume":"179","author":"Bozyi\u011fit","year":"2021","journal-title":"Expert Syst Appl"},{"key":"ref25","first-page":"1","article-title":"Comparison of machine learning techniques for cyberbullying detection on youtube Arabic comments","volume":"21","author":"Alsubait","year":"2021","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref26","first-page":"112","article-title":"Cyberbullying detection by sentiment analysis of tweets\u2019 contents written in Arabic in Saudi Arabia society","volume":"21","author":"Almutairi","year":"2021","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"39","DOI":"10.21608\/ejle.2021.50240.1017","article-title":"Arabic cyberbullying detection using Arabic sentiment analysis","volume":"8","author":"Almutiry","year":"2021","journal-title":"Egypt J Lang Eng"},{"key":"ref28","first-page":"2330","article-title":"Automatic cyber bullying detection in Arabic social media","volume":"12","author":"AlHarbi","year":"2019","journal-title":"Int J Eng Res Technol"},{"key":"ref29","series-title":"2019 International Conference of Advanced Informatics: Concepts, Theory and Applications (ICAICTA)","first-page":"1","article-title":"Optimizing deep learning for detection cyberbullying text in Indonesian language","author":"Anindyati","year":"2019 Sep 20\u201321"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"1567","DOI":"10.1007\/s12083-019-00832-1","article-title":"Toward efficient and effective bullying detection in online social network","volume":"13","author":"Wu","year":"2020","journal-title":"Peer Peer Netw Appl"},{"key":"ref31","first-page":"25","article-title":"Cyberbully image and text detection using convolutional neural networks","volume":"11","author":"Drishya","year":"2019","journal-title":"CiiT Int J Fuzzy Syst"},{"key":"ref32","unstructured":"Dadvar M, Eckert K. Cyberbullying detection in social networks using deep learning based models; a reproducibility study. arXiv:1812.08046. 2018."},{"key":"ref33","first-page":"1409","article-title":"Cyber-bullying and cyber-harassment detection using supervised machine learning techniques in Arabic social media contents","volume":"21","author":"Kanan","year":"2020","journal-title":"J Internet Technol"},{"key":"ref34","series-title":"Proceedings of the Web Conference 2021 (WWW '21)","first-page":"496","article-title":"Improving cyberbullying detection with user interaction","author":"Ge","year":"2021"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.procs.2013.05.005","article-title":"The role of text pre-processing in sentiment analysis","volume":"17","author":"Haddi","year":"2013","journal-title":"Procedia Comput Sci"},{"key":"ref36","first-page":"2327","article-title":"Atar: attention-based LSTM for Arabizi transliteration","volume":"11","author":"Talafha","year":"2021","journal-title":"Int J Electr Comput Eng"},{"key":"ref37","author":"Hardeniya","year":"2016","journal-title":"Natural language processing: python and NLTK"},{"key":"ref38","series-title":"2020 16th International Computer Engineering Conference (ICENCO)","first-page":"92","article-title":"Word embeddings and neural network architectures for Arabic sentiment analysis","author":"Fawzy","year":"2020 Dec 29\u201330"},{"key":"ref39","series-title":"2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","first-page":"1675","article-title":"LSTM-CNN hybrid model for text classification","author":"Zhang","year":"2018 Oct 12\u201314"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1124","DOI":"10.1007\/s42452-019-1165-1","article-title":"Hierarchical LSTM network for text classification","volume":"1","author":"Borna","year":"2019","journal-title":"SN Appl Sci"},{"key":"ref41","first-page":"333","article-title":"Attention-based LSTM, GRU and CNN for short text classification","volume":"39","author":"Yu","year":"2020","journal-title":"J Intell Fuzzy Syst"},{"key":"ref42","first-page":"1033","article-title":"A machine learning approach to cyberbullying detection in Arabic tweets","volume":"80","author":"Musleh","year":"2024","journal-title":"Comput Mater Contin"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_62724\/TSP_CMC_62724.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:07:12Z","timestamp":1763341632000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60588"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":42,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062724","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}