{"id":"https://openalex.org/W4394676691","doi":"https://doi.org/10.1109/access.2024.3386637","title":"RoBERTaNET: Enhanced RoBERTa Transformer Based Model for Cyberbullying Detection With GloVe Features","display_name":"RoBERTaNET: Enhanced RoBERTa Transformer Based Model for Cyberbullying Detection With GloVe Features","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4394676691","doi":"https://doi.org/10.1109/access.2024.3386637"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3386637","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3386637","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10495045.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10495045.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021016639","display_name":"Arwa A. Jamjoom","orcid":"https://orcid.org/0000-0002-5062-8942"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Arwa A. Jamjoom","raw_affiliation_strings":["Department of Information System, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information System, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057488732","display_name":"Hanen Karamti","orcid":"https://orcid.org/0000-0001-5162-2692"},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hanen Karamti","raw_affiliation_strings":["Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009400840","display_name":"Muhammad Umer","orcid":"https://orcid.org/0000-0002-6015-9326"},"institutions":[{"id":"https://openalex.org/I174731842","display_name":"Islamia University of Bahawalpur","ror":"https://ror.org/002rc4w13","country_code":"PK","type":"education","lineage":["https://openalex.org/I174731842"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Umer","raw_affiliation_strings":["Department of Computer Science and Information Technology, The Islamia University of Bahawalpur, Bahawalpur, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Technology, The Islamia University of Bahawalpur, Bahawalpur, Pakistan","institution_ids":["https://openalex.org/I174731842"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000028489","display_name":"Shtwai Alsubai","orcid":"https://orcid.org/0000-0002-6584-7400"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Shtwai Alsubai","raw_affiliation_strings":["Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Al-Kharj, Saudi Arabia","Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, P.O. Box 151, Al-Kharj, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-6584-7400","affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Al-Kharj, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]},{"raw_affiliation_string":"Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, P.O. Box 151, Al-Kharj, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007596905","display_name":"Tai-hoon Kim","orcid":"https://orcid.org/0000-0003-0117-8102"},"institutions":[{"id":"https://openalex.org/I111277659","display_name":"Chonnam National University","ror":"https://ror.org/05kzjxq56","country_code":"KR","type":"education","lineage":["https://openalex.org/I111277659"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Tai-Hoon Kim","raw_affiliation_strings":["School of Electrical and Computer Engineering, Yeosu Campus, Chonnam National University, Yeosu-si, Jeollanam-do, Republic of Korea","School of Electrical and Computer Engineering, Yeosu Campus, Chonnam National University, 50, Daehak-ro, Yeosu-si, Jeollanam-do, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0003-0117-8102","affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, Yeosu Campus, Chonnam National University, Yeosu-si, Jeollanam-do, Republic of Korea","institution_ids":["https://openalex.org/I111277659"]},{"raw_affiliation_string":"School of Electrical and Computer Engineering, Yeosu Campus, Chonnam National University, 50, Daehak-ro, Yeosu-si, Jeollanam-do, Republic of Korea","institution_ids":["https://openalex.org/I111277659"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109000224","display_name":"Imran Ashraf","orcid":"https://orcid.org/0009-0002-4598-1482"},"institutions":[{"id":"https://openalex.org/I55240360","display_name":"Yeungnam University","ror":"https://ror.org/05yc6p159","country_code":"KR","type":"education","lineage":["https://openalex.org/I55240360"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Imran Ashraf","raw_affiliation_strings":["Department of Information and Communication Engineering, Yeungnam University, Gyeongsan, Republic of Korea"],"raw_orcid":"https://orcid.org/0009-0002-4598-1482","affiliations":[{"raw_affiliation_string":"Department of Information and Communication Engineering, Yeungnam University, Gyeongsan, Republic of Korea","institution_ids":["https://openalex.org/I55240360"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5021016639"],"corresponding_institution_ids":["https://openalex.org/I185163786"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":8.135,"has_fulltext":true,"cited_by_count":25,"citation_normalized_percentile":{"value":0.97854915,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"12","issue":null,"first_page":"58950","last_page":"58959"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10485","display_name":"Bullying, Victimization, and Aggression","score":0.9645000100135803,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9358000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7633568048477173},{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.7096194624900818},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.6351231932640076},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.6350754499435425},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.5991551280021667},{"id":"https://openalex.org/keywords/intimidation","display_name":"Intimidation","score":0.5961103439331055},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.5882722735404968},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5686352252960205},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5287850499153137},{"id":"https://openalex.org/keywords/language-model","display_name":"Language model","score":0.500420093536377},{"id":"https://openalex.org/keywords/word-embedding","display_name":"Word embedding","score":0.4927528202533722},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4439201056957245},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.41235682368278503},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.40717294812202454},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39656853675842285},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13746106624603271},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.1312079131603241},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09180891513824463}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7633568048477173},{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.7096194624900818},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.6351231932640076},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.6350754499435425},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.5991551280021667},{"id":"https://openalex.org/C2781164112","wikidata":"https://www.wikidata.org/wiki/Q3858303","display_name":"Intimidation","level":2,"score":0.5961103439331055},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.5882722735404968},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5686352252960205},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5287850499153137},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.500420093536377},{"id":"https://openalex.org/C2777462759","wikidata":"https://www.wikidata.org/wiki/Q18395344","display_name":"Word embedding","level":3,"score":0.4927528202533722},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4439201056957245},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.41235682368278503},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.40717294812202454},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39656853675842285},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13746106624603271},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.1312079131603241},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09180891513824463},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3386637","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3386637","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10495045.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ecc0a4bc13184eadabece7ce528b4777","is_oa":true,"landing_page_url":"https://doaj.org/article/ecc0a4bc13184eadabece7ce528b4777","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 58950-58959 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3386637","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3386637","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10495045.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Gender equality","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/5"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4394676691.pdf","grobid_xml":"https://content.openalex.org/works/W4394676691.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W2117314500","https://openalex.org/W2522159200","https://openalex.org/W2594902547","https://openalex.org/W2802043748","https://openalex.org/W2895493709","https://openalex.org/W2941081759","https://openalex.org/W2945434935","https://openalex.org/W2962797668","https://openalex.org/W3011458709","https://openalex.org/W3036842656","https://openalex.org/W3120045749","https://openalex.org/W3137762660","https://openalex.org/W4214608374","https://openalex.org/W4220949780","https://openalex.org/W4221085936","https://openalex.org/W4283589994","https://openalex.org/W4293169088","https://openalex.org/W4301621576","https://openalex.org/W4309101631","https://openalex.org/W4310117749","https://openalex.org/W4316658410","https://openalex.org/W4318002980","https://openalex.org/W4318243851","https://openalex.org/W4384345401","https://openalex.org/W4385948419","https://openalex.org/W4385985558","https://openalex.org/W4386260374","https://openalex.org/W4386292370","https://openalex.org/W4386374142","https://openalex.org/W6607259140","https://openalex.org/W6608482188","https://openalex.org/W6620699631"],"related_works":["https://openalex.org/W1568520348","https://openalex.org/W3214407891","https://openalex.org/W3194113117","https://openalex.org/W4287020359","https://openalex.org/W3213194066","https://openalex.org/W4390508764","https://openalex.org/W268355439","https://openalex.org/W2967125893","https://openalex.org/W4385323698","https://openalex.org/W2385362579"],"abstract_inverted_index":{"Online":[0],"platforms":[1],"are":[2,83],"fostering":[3],"social":[4,60],"interaction,":[5],"but":[6],"unfortunately,":[7],"this":[8],"has":[9,32],"given":[10],"rise":[11],"to":[12,56,85],"antisocial":[13],"behaviors":[14],"such":[15],"as":[16],"cyberbullying,":[17],"trolling,":[18],"and":[19,30,40,46,53,68,142],"hate":[20,29],"speech":[21],"on":[22,59],"a":[23,34,102,162],"global":[24,122],"scale.":[25],"The":[26,131],"detection":[27,81],"of":[28,37,76,95,177],"aggression":[31],"become":[33],"vital":[35],"aspect":[36],"combating":[38],"cyberbullying":[39,98,105,167],"cyberharassment.":[41],"Cyberbullying":[42],"involves":[43],"using":[44],"aggressive":[45],"offensive":[47],"language":[48],"including":[49],"rude,":[50],"insulting,":[51],"hateful,":[52],"teasing":[54],"comments":[55],"harm":[57],"individuals":[58],"media":[61],"platforms.":[62],"Human":[63],"moderation":[64],"is":[65,134],"both":[66],"slow":[67],"expensive,":[69],"making":[70],"it":[71],"impractical":[72],"in":[73,99],"the":[74,93,117,138,147,156,175,178],"face":[75],"rapidly":[77],"growing":[78],"data.":[79],"Automatic":[80],"systems":[82],"essential":[84],"curb":[86],"trolling":[87],"effectively.":[88],"This":[89,107],"research":[90,108],"deals":[91],"with":[92,137,146],"challenge":[94],"automatically":[96],"identifying":[97],"tweets":[100],"from":[101,116,170],"publicly":[103],"available":[104],"dataset.":[106],"work":[109],"employs":[110],"robustly":[111],"optimized":[112],"bidirectional":[113],"encoder":[114],"representations":[115],"transformers":[118],"approach":[119,133],"(RoBERTa),":[120],"utilizing":[121],"vectors":[123],"for":[124,165],"word":[125,128,149],"representation":[126],"(GloVe)":[127],"embedding":[129,150],"features.":[130],"proposed":[132,157,179],"further":[135,173],"compared":[136],"state-of-the-art":[139],"machine,":[140],"deep,":[141],"transformer-based":[143],"learning":[144],"approaches":[145],"FastText":[148],"approach.":[151],"Statistical":[152],"results":[153],"demonstrate":[154],"that":[155],"model":[158],"outperforms":[159],"others,":[160],"achieving":[161],"95%":[163],"accuracy":[164],"detecting":[166],"tweets.":[168],"Results":[169],"k-fold":[171],"cross-validation":[172],"affirm":[174],"supremacy":[176],"model.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":18},{"year":2024,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
