{"id":"https://openalex.org/W7139951197","doi":"https://doi.org/10.1016/j.procs.2026.01.096","title":"Cyberbullying and Harassment Pattern Recognition from Social Media Data Using BiLSTM-CNN Hybrid Model","display_name":"Cyberbullying and Harassment Pattern Recognition from Social Media Data Using BiLSTM-CNN Hybrid Model","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7139951197","doi":"https://doi.org/10.1016/j.procs.2026.01.096"},"language":"en","primary_location":{"id":"doi:10.1016/j.procs.2026.01.096","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.096","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1016/j.procs.2026.01.096","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130234980","display_name":"Mustafa Hamid Abd Alsadh","orcid":null},"institutions":[{"id":"https://openalex.org/I3040621137","display_name":"Alsalam University College","ror":"https://ror.org/0047hkh43","country_code":"IQ","type":"education","lineage":["https://openalex.org/I3040621137"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Mustafa Hamid Abd Alsadh","raw_affiliation_strings":["Department of Computer Technical Engineering, Imam Al-Kadhim University College(IKC), Al-Diwaniyah, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Technical Engineering, Imam Al-Kadhim University College(IKC), Al-Diwaniyah, Iraq","institution_ids":["https://openalex.org/I3040621137"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010221850","display_name":"Hayder Makki Shakir","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126504","display_name":"University of Al-Qadisiyah","ror":"https://ror.org/02ewzwr87","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210126504"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Hayder Makki Shakir","raw_affiliation_strings":["Department Computer Science and Information Technology, University of Al-Qadisiyah, Al-Qadisiyah, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department Computer Science and Information Technology, University of Al-Qadisiyah, Al-Qadisiyah, Iraq","institution_ids":["https://openalex.org/I4210126504"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130228660","display_name":"Doaa.I. Hasan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126504","display_name":"University of Al-Qadisiyah","ror":"https://ror.org/02ewzwr87","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210126504"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Doaa.I. Hasan","raw_affiliation_strings":["Department Intelligent medical systems, College of Computer Science and Information Technology, University of Al-Qadisiyah, Al-Qadisiyah, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department Intelligent medical systems, College of Computer Science and Information Technology, University of Al-Qadisiyah, Al-Qadisiyah, Iraq","institution_ids":["https://openalex.org/I4210126504"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130253921","display_name":"Hamsa Emad Mahmood","orcid":null},"institutions":[{"id":"https://openalex.org/I135120706","display_name":"University of Baghdad","ror":"https://ror.org/007f1da21","country_code":"IQ","type":"education","lineage":["https://openalex.org/I135120706"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Hamsa Emad Mahmood","raw_affiliation_strings":["Head of Information Technology Unit, College of Political Science, University of Baghdad, Baghdad, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Head of Information Technology Unit, College of Political Science, University of Baghdad, Baghdad, Iraq","institution_ids":["https://openalex.org/I135120706"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002040454","display_name":"Amjed Abbas Ahmed","orcid":"https://orcid.org/0000-0001-6069-2967"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Amjed Abbas Ahmed","raw_affiliation_strings":["Center for Artificial Intelligent Technology, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia, Imam Al Kadhum College (IKC), Department of Computer Science, University of Technology, Baghdad, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Center for Artificial Intelligent Technology, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia, Imam Al Kadhum College (IKC), Department of Computer Science, University of Technology, Baghdad, Iraq","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043646770","display_name":"Aladdin Al Zahran","orcid":"https://orcid.org/0000-0001-5382-6007"},"institutions":[{"id":"https://openalex.org/I45998257","display_name":"Sohar University","ror":"https://ror.org/02ftvf862","country_code":"OM","type":"education","lineage":["https://openalex.org/I45998257"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"Aladdin Al Zahran","raw_affiliation_strings":["Associate Professor, Sohar University, Oman"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Associate Professor, Sohar University, Oman","institution_ids":["https://openalex.org/I45998257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037528486","display_name":"Taher M. Ghazal","orcid":"https://orcid.org/0000-0003-0672-7924"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Taher M. Ghazal","raw_affiliation_strings":["Faculty of Computing and IT, Sohar University, Oman, Department of Networks and Cybersecurity, Hourani Center for Applied Scientific Research, Al-Ahliyya Amman University, Amman, Jordan. Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM), 43600 Bangi, Selangor"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Computing and IT, Sohar University, Oman, Department of Networks and Cybersecurity, Hourani Center for Applied Scientific Research, Al-Ahliyya Amman University, Amman, Jordan. Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM), 43600 Bangi, Selangor","institution_ids":["https://openalex.org/I885383172"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5002040454"],"corresponding_institution_ids":["https://openalex.org/I885383172"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.54659853,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"275","issue":null,"first_page":"833","last_page":"842"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.7843999862670898,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.7843999862670898,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10485","display_name":"Bullying, Victimization, and Aggression","score":0.026900000870227814,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10664","display_name":"Sentiment Analysis and Opinion Mining","score":0.01810000091791153,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.7487000226974487},{"id":"https://openalex.org/keywords/harassment","display_name":"Harassment","score":0.6930000185966492},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.39489999413490295},{"id":"https://openalex.org/keywords/pattern-analysis","display_name":"Pattern analysis","score":0.2687999904155731}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.821399986743927},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.7487000226974487},{"id":"https://openalex.org/C2778976716","wikidata":"https://www.wikidata.org/wiki/Q3240539","display_name":"Harassment","level":2,"score":0.6930000185966492},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4307999908924103},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.39489999413490295},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.35269999504089355},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2930000126361847},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.27399998903274536},{"id":"https://openalex.org/C2985264313","wikidata":"https://www.wikidata.org/wiki/Q378859","display_name":"Pattern analysis","level":2,"score":0.2687999904155731},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2680000066757202},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.25920000672340393},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2581000030040741},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.257099986076355}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.procs.2026.01.096","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.096","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.procs.2026.01.096","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.096","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Gender equality","score":0.651232123374939,"id":"https://metadata.un.org/sdg/5"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W3207929337","https://openalex.org/W3211909136","https://openalex.org/W4318484724","https://openalex.org/W4387366667","https://openalex.org/W4390941662","https://openalex.org/W4391317575","https://openalex.org/W4394787107","https://openalex.org/W4398199981","https://openalex.org/W4399199148","https://openalex.org/W4399429354","https://openalex.org/W4403571731","https://openalex.org/W4404201390","https://openalex.org/W4407275474","https://openalex.org/W4407601811","https://openalex.org/W4407980151","https://openalex.org/W4408469137","https://openalex.org/W4409839155","https://openalex.org/W4410964376","https://openalex.org/W4413931618"],"related_works":[],"abstract_inverted_index":{"People":[0],"often":[1],"get":[2],"harassed":[3],"and":[4,7,27,65,140,177,189,199],"bullied":[5],"online,":[6],"both":[8,128],"of":[9,30,34,57,125,148,158],"these":[10],"things":[11],"can":[12,109],"hurt":[13],"their":[14],"mental":[15],"health.":[16],"To":[17],"keep":[18],"online":[19,208],"spaces":[20],"safe,":[21],"it":[22,61],"is":[23,86,100],"important":[24,103],"to":[25,63,88,101,121,137,204],"find":[26,102],"recognize":[28],"patterns":[29,174],"abusive":[31],"behavior.":[32],"Most":[33],"the":[35,38,55,76,90,113,116,123,131,149,159,165,201],"time,":[36],"though,":[37],"present":[39],"detection":[40],"approaches":[41,52],"are":[42],"either":[43],"rule-based":[44],"algorithms":[45],"or":[46],"simple":[47],"machine":[48],"learning":[49,73],"models.":[50],"These":[51,192],"cannot":[53],"handle":[54],"complexity":[56],"user-generated":[58],"content":[59,144,206],"when":[60],"comes":[62],"context":[64],"sequence":[66],"features.":[67],"We":[68],"propose":[69],"a":[70,182],"hybrid":[71,193],"deep":[72],"framework":[74,85],"dubbed":[75],"Bidirectional":[77],"Long":[78],"Short-Term":[79],"Memory-Convolutional":[80],"Neural":[81],"Network":[82],"(BiLSTM-CNN).":[83],"This":[84],"meant":[87],"fix":[89],"problems":[91],"that":[92,107,151,164],"have":[93],"been":[94],"found.":[95],"The":[96,179],"CNN":[97],"layer\u2019s":[98],"job":[99],"local":[104],"features":[105],"so":[106],"classification":[108],"be":[110],"better.":[111],"On":[112],"other":[114],"hand,":[115],"BiLSTM":[117],"component":[118],"performs":[119],"well":[120],"diagnose":[122],"flow":[124],"words":[126],"in":[127],"directions.":[129],"Using":[130],"BiLSTM-CNN":[132,166],"model,":[133],"we":[134],"were":[135],"able":[136],"more":[138,175],"accurately":[139],"sensitively":[141],"detect":[142],"risky":[143],"through":[145],"our":[146],"analysis":[147],"texts":[150],"originated":[152],"from":[153],"social":[154],"media":[155],"posts.":[156],"Analysis":[157],"experimental":[160],"evaluation":[161],"data":[162],"indicates":[163],"model":[167,180],"outperformed":[168],"traditional":[169],"models":[170],"by":[171],"detecting":[172],"cyberbullying":[173],"quickly":[176],"accurately.":[178],"used":[181],"97.4%":[183],"recall,":[184],"97.8":[185],"accuracy,":[186],"98.5%":[187],"F1-score,":[188],"96.2%":[190],"precision.":[191],"requirements":[194],"helped":[195],"improve":[196],"recognition":[197],"accuracy":[198],"strengthened":[200],"model\u2019s":[202],"ability":[203],"moderate":[205],"on":[207],"platforms.":[209]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-03-21T00:00:00"}
