{"id":"https://openalex.org/W7151431356","doi":"https://doi.org/10.1109/icmla66185.2025.00125","title":"Toward Unified Moderation of Cyberbullying Across Social Media and Video Games","display_name":"Toward Unified Moderation of Cyberbullying Across Social Media and Video Games","publication_year":2025,"publication_date":"2025-12-03","ids":{"openalex":"https://openalex.org/W7151431356","doi":"https://doi.org/10.1109/icmla66185.2025.00125"},"language":null,"primary_location":{"id":"doi:10.1109/icmla66185.2025.00125","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmla66185.2025.00125","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Machine Learning and Applications (ICMLA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5133114363","display_name":"David Cong","orcid":null},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]},{"id":"https://openalex.org/I36194607","display_name":"Duke Energy (United States)","ror":"https://ror.org/030r69d22","country_code":"US","type":"company","lineage":["https://openalex.org/I36194607"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"David Cong","raw_affiliation_strings":["Duke University,Computer Science"],"affiliations":[{"raw_affiliation_string":"Duke University,Computer Science","institution_ids":["https://openalex.org/I36194607","https://openalex.org/I170897317"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133115620","display_name":"Keyan Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Keyan Guo","raw_affiliation_strings":["University at Buffalo,Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"University at Buffalo,Computer Science and Engineering","institution_ids":["https://openalex.org/I63190737"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5133095397","display_name":"Hongxin Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hongxin Hu","raw_affiliation_strings":["University at Buffalo,Computer Science and Engineering"],"affiliations":[{"raw_affiliation_string":"University at Buffalo,Computer Science and Engineering","institution_ids":["https://openalex.org/I63190737"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5133114363"],"corresponding_institution_ids":["https://openalex.org/I170897317","https://openalex.org/I36194607"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.87284359,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"848","last_page":"852"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.7555999755859375,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.7555999755859375,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10485","display_name":"Bullying, Victimization, and Aggression","score":0.1881999969482422,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.0038999998942017555,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/moderation","display_name":"Moderation","score":0.5550000071525574},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.5339000225067139},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.37459999322891235},{"id":"https://openalex.org/keywords/social-relation","display_name":"Social relation","score":0.32260000705718994},{"id":"https://openalex.org/keywords/video-game","display_name":"Video game","score":0.2759000062942505}],"concepts":[{"id":"https://openalex.org/C93225998","wikidata":"https://www.wikidata.org/wiki/Q1941972","display_name":"Moderation","level":2,"score":0.5550000071525574},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.5547000169754028},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.5339000225067139},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.49079999327659607},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.37540000677108765},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.37459999322891235},{"id":"https://openalex.org/C130064352","wikidata":"https://www.wikidata.org/wiki/Q853725","display_name":"Social relation","level":2,"score":0.32260000705718994},{"id":"https://openalex.org/C112698675","wikidata":"https://www.wikidata.org/wiki/Q37038","display_name":"Advertising","level":1,"score":0.31619998812675476},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3043999969959259},{"id":"https://openalex.org/C3018412434","wikidata":"https://www.wikidata.org/wiki/Q7889","display_name":"Video game","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.26510000228881836},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.26170000433921814},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.2540999948978424}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icmla66185.2025.00125","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmla66185.2025.00125","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Machine Learning and Applications (ICMLA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Gender equality","score":0.5223899483680725,"id":"https://metadata.un.org/sdg/5"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2008056655","https://openalex.org/W2473555522","https://openalex.org/W2911964244","https://openalex.org/W3137762660","https://openalex.org/W3162390523","https://openalex.org/W3174880282","https://openalex.org/W3183506578","https://openalex.org/W4210645638","https://openalex.org/W4390266861","https://openalex.org/W7133224126"],"related_works":[],"abstract_inverted_index":{"The":[0],"growing":[1],"integration":[2],"of":[3,17,63],"social":[4,74,135],"media":[5,75,136],"and":[6,28,37,61,83,131,137,145],"video":[7,80,138],"games":[8],"in":[9],"adolescents\u2019":[10],"daily":[11],"lives":[12],"has":[13],"heightened":[14],"the":[15,118],"risk":[16],"cyberbullying,":[18],"contributing":[19],"to":[20,42,54,87],"severe":[21],"mental":[22],"health":[23],"challenges":[24],"such":[25],"as":[26],"depression":[27],"suicidal":[29],"ideation.":[30],"Traditional":[31],"moderation":[32],"techniques,":[33],"including":[34],"manual":[35],"review":[36],"rule-based":[38],"filters,":[39],"often":[40],"fail":[41],"capture":[43],"contextual":[44],"nuances.":[45],"Existing":[46],"machine":[47],"learning":[48],"models":[49,71],"also":[50],"face":[51],"limitations":[52],"due":[53],"their":[55],"reliance":[56],"on":[57,73,79,134],"large":[58],"labeled":[59],"datasets":[60],"lack":[62],"cross-platform":[64],"adaptability.":[65],"Our":[66],"experiments":[67],"further":[68],"reveal":[69],"that":[70,99],"trained":[72],"content":[76],"perform":[77],"poorly":[78],"game":[81,139],"data":[82,123],"vice":[84],"versa,":[85],"leading":[86],"inefficient":[88],"moderation.":[89,150],"To":[90],"address":[91],"these":[92],"challenges,":[93],"we":[94],"propose":[95],"a":[96,143],"novel":[97],"approach":[98],"leverages":[100],"Large":[101],"Language":[102],"Models":[103],"(LLMs)":[104],"with":[105],"Chain-of-Thought":[106],"(CoT)":[107],"reasoning":[108],"for":[109,120,148],"cyberbullying":[110,149],"detection":[111],"across":[112],"both":[113],"domains.":[114],"This":[115],"method":[116],"eliminates":[117],"need":[119],"extensive":[121],"training":[122],"while":[124],"significantly":[125],"improving":[126],"accuracy.":[127],"It":[128],"achieves":[129],"90.3%":[130],"91.1%":[132],"accuracy":[133],"datasets,":[140],"respectively,":[141],"offering":[142],"scalable":[144],"resource-efficient":[146],"solution":[147]},"counts_by_year":[],"updated_date":"2026-04-09T06:08:40.794217","created_date":"2026-04-08T00:00:00"}
