<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462024000301091</article-id>
<article-id pub-id-type="doi">10.13053/cys-28-3-4989</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Cyberbullying Detection in a Multi-classification Codemixed Dataset]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rahman-Laskar]]></surname>
<given-names><![CDATA[Sahinur]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[Gauri]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Badhani]]></surname>
<given-names><![CDATA[Ritika]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Pinto-Avendaño]]></surname>
<given-names><![CDATA[David Eduardo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,UPES School of Computer Science ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>India</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Benemérita Universidad Autónoma de Puebla Facultad de Ciencias de la Computación ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2024</year>
</pub-date>
<volume>28</volume>
<numero>3</numero>
<fpage>1091</fpage>
<lpage>1113</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462024000301091&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462024000301091&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462024000301091&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: In an era characterized by digital communication and social media, the concept of cyberbullying has arisen as a social concern, impacting individuals of all ages. It refers to the act of using digital communication tools like, social media, and messaging apps, to harass intimidate or harm someone. Codemixed cyberbullying refers to the use of multiple languages or a mix of languages in online communications and the use of multiple languages or a mix of languages can sometimes make it challenging for content moderators or automated systems to detect and address cyberbullying effectively. The challenges include the availability of standard codemixed datasets, especially for Indian languages. This paper investigates cyberbullying detection in Hinglish, a code-mixed language of Hindi and English. We have created a novel multi-class Hinglish dataset, annotated across seven cyberbullying categories: age, gender, religion, mockery, abusive, offensive, and not cyberbullying, and explored different machine learning-based models. We have performed a comparative analysis based on the standard evaluation metrics and achieved a state-of-the-art result on a multi-class codemixed Hinglish dataset.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Cyberbullying]]></kwd>
<kwd lng="en"><![CDATA[codemixed]]></kwd>
<kwd lng="en"><![CDATA[Hinglish]]></kwd>
<kwd lng="en"><![CDATA[machine learning]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ahammed]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Niloy]]></surname>
<given-names><![CDATA[M. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Chowdhury]]></surname>
<given-names><![CDATA[S. M. M. H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Implementation of machine learning to detect hate speech in bangla language]]></source>
<year>2019</year>
<conf-name><![CDATA[ 8th International Conference System Modeling and Advancement in Research Trends]]></conf-name>
<conf-loc> </conf-loc>
<page-range>317-20</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ahmed]]></surname>
<given-names><![CDATA[M. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Nur]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Islam]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Das]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deployment of machine learning and deep learning algorithms in detecting cyberbullying in bangla and romanized bangla text: A comparative study]]></source>
<year>2021</year>
<conf-name><![CDATA[ International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Akhter]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Uzzal]]></surname>
<given-names><![CDATA[K. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Polash]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber bullying detection and classification using multinomial Naïve Bayes and fuzzy logic]]></article-title>
<source><![CDATA[International Journal of Mathematical Sciences and Computing]]></source>
<year>2019</year>
<volume>5</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alam]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhowmik]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Prosun]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberbullying detection: An ensemble based machine learning approach]]></source>
<year>2021</year>
<conf-name><![CDATA[ third international conference on intelligent communication technologies and virtual mobile networks]]></conf-name>
<conf-loc> </conf-loc>
<page-range>710-5</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ali]]></surname>
<given-names><![CDATA[M. U.]]></given-names>
</name>
<name>
<surname><![CDATA[Lefticaru]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Detection of cyberbullying on social media platforms using machine learning]]></source>
<year>2024</year>
<conf-name><![CDATA[ UK Workshop on Computational Intelligence]]></conf-name>
<conf-loc>Switzerland </conf-loc>
<page-range>220-33</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alqahtani]]></surname>
<given-names><![CDATA[A. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Ilyas]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An ensemble-based multi-classification machine learning classifiers approach to detect multiple classes of cyberbullying]]></article-title>
<source><![CDATA[Machine Learning and Knowledge Extraction]]></source>
<year>2024</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>156-70</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alqahtani]]></surname>
<given-names><![CDATA[A. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Ilyas]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[A machine learning ensemble model for the detection of cyberbullying]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Atoum]]></surname>
<given-names><![CDATA[J. O.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberbullying detection through sentiment analysis]]></source>
<year>2020</year>
<conf-name><![CDATA[ International Conference on Computational Science and Computational Intelligence]]></conf-name>
<conf-loc> </conf-loc>
<page-range>292-7</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Balakrishnan]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Arabnia]]></surname>
<given-names><![CDATA[H. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Improving cyberbullying detection using twitter users&#8217; psychological features and machine learning]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2020</year>
<volume>90</volume>
<page-range>101710</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bhalla]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Chadha]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[An efficient model to detect the presence of hinglish text in youtube data]]></source>
<year>2023</year>
<conf-name><![CDATA[ International Conference on Advances in Computation, Communication and Information Technology]]></conf-name>
<conf-loc> </conf-loc>
<page-range>385-91</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chakraborty]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Seddiqui]]></surname>
<given-names><![CDATA[M. H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Threat and abusive language detection on social media in bengali language]]></source>
<year>2019</year>
<conf-name><![CDATA[ 1st International Conference on Advances in Science, Engineering and Robotics Technology]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dubey]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Kaushal]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards detection of cyberbullying in hinglish code mixed data]]></source>
<year>2023</year>
<conf-name><![CDATA[ 10th International Conference on Computing for Sustainable Global Development]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1096-100</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ghosh]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Nowal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Manju]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social media cyberbullying detection using machine learning in bengali language]]></article-title>
<source><![CDATA[International Journal of Engineering Research &amp; Technology]]></source>
<year>2021</year>
<volume>10</volume>
<numero>5</numero>
<issue>5</issue>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ji]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Zou]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Lyu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<source><![CDATA[XG-SF: an XGBoost classifier based on shapelet features for time series classification]]></source>
<year>2018</year>
<volume>147</volume>
<conf-name><![CDATA[ International Conference on Identification, Information and Knowledge in the Internet of Things]]></conf-name>
<conf-date>2018</conf-date>
<conf-loc> </conf-loc>
<page-range>24-8</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mondal]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Dutta]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[T. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying detection in hinglish comments from social media using machine learning techniques]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2024</year>
<page-range>1-22</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maity]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Jain]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Jha]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Saha]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhattacharyya]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Genex: A commonsense-aware unified generative framework for explainable cyberbullying detection]]></source>
<year>2023</year>
<conf-name><![CDATA[ Conference on Empirical Methods in Natural Language Processing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>16632-45</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maity]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Jha]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Jain]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Saha]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhattacharyya]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Explain thyself bully&#8221;: Sentiment aided cyberbullying detection with explanation]]></source>
<year>2024</year>
<conf-name><![CDATA[ IEEE International Conference on Document Analysis and Recognition]]></conf-name>
<conf-loc> </conf-loc>
<page-range>132-48</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maity]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Saha]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A multitask multimodal framework for sentiment and emotion-aided cyberbullying detection]]></article-title>
<source><![CDATA[IEEE Internet Computing]]></source>
<year>2022</year>
<volume>26</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>68-78</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maity]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Saha]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhattacharyya]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Emoji, sentiment and emotion aided cyberbullying detection in hinglish]]></article-title>
<source><![CDATA[IEEE Transactions on Computational Social Systems]]></source>
<year>2023</year>
<volume>10</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>2411-20</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mladenovic]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Osmjanski]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Vujicic-Stankovic]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-aggression, cyberbullying, and cyber-grooming: A survey and research challenges]]></article-title>
<source><![CDATA[ACM Computing Surveys]]></source>
<year>2022</year>
<volume>54</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-42</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muneer]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Fati]]></surname>
<given-names><![CDATA[S. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A comparative analysis of machine learning techniques for cyberbullying detection on twitter]]></article-title>
<source><![CDATA[Future Internet]]></source>
<year>2020</year>
<volume>12</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>187</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nath]]></surname>
<given-names><![CDATA[S. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Karim]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Miraz]]></surname>
<given-names><![CDATA[M. H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deep learning based cyberbullying detection in bangla language]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nuthalapati]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Abbaraju]]></surname>
<given-names><![CDATA[S. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Varma]]></surname>
<given-names><![CDATA[G. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Biswas]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying detection: A comparative study of classification algorithms]]></article-title>
<source><![CDATA[International Journal of Computer Science and Mobile Computing]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pawar]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Raje]]></surname>
<given-names><![CDATA[R. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Multilingual cyberbullying detection system]]></source>
<year>2019</year>
<conf-name><![CDATA[ IEEE International Conference on Electro Information Technology (EIT)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>040-4</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salawu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Lumsden]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Approaches to automated detection of cyberbullying: A survey]]></article-title>
<source><![CDATA[IEEE Transactions on Affective Computing]]></source>
<year>2020</year>
<volume>11</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>3-24</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[N. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sharma]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An efficient automated multi-modal cyberbullying detection using decision fusion classifier on social media platforms]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2023</year>
<volume>83</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>20507-35</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tripto]]></surname>
<given-names><![CDATA[N. I.]]></given-names>
</name>
<name>
<surname><![CDATA[Eunus-Ali]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Detecting multilabel sentiment and emotions from bangla youtube comments]]></source>
<year>2018</year>
<conf-name><![CDATA[ International Conference on Bangla Speech and Language Processing (ICBSLP)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Van-Hee]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Jacobs]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Emmery]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Desmet]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Lefever]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Verhoeven]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[De-Pauw]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Daelemans]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Hoste]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Automatic detection of cyberbullying in social media text]]></article-title>
<source><![CDATA[PloS ONE]]></source>
<year>2018</year>
<volume>13</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>1-22</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Verma]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Milosevic]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Cortis]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Davis]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Benchmarking language models for cyberbullying identification and classification from social-media texts]]></source>
<year>2022</year>
<conf-name><![CDATA[ First Workshop on Language Technology and Resources for a Fair, Inclusive, and Safe Society within the 13th Language Resources and Evaluation Conference]]></conf-name>
<conf-loc>Marseille, France </conf-loc>
<page-range>26-31</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
