{"id":"https://openalex.org/W7131836571","doi":"https://doi.org/10.48550/arxiv.2602.22449","title":"A Fusion of context-aware based BanglaBERT and Two-Layer Stacked LSTM Framework for Multi-Label Cyberbullying Detection","display_name":"A Fusion of context-aware based BanglaBERT and Two-Layer Stacked LSTM Framework for Multi-Label Cyberbullying Detection","publication_year":2026,"publication_date":"2026-02-25","ids":{"openalex":"https://openalex.org/W7131836571","doi":"https://doi.org/10.48550/arxiv.2602.22449"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.22449","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5098975405","display_name":"Mirza Raquib","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Raquib, Mirza","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5098975404","display_name":"Asif Pervez Polok","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Polok, Asif Pervez","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127300249","display_name":"Kedar Nath Biswas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Biswas, Kedar Nath","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083985976","display_name":"Rahat Uddin Azad","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Azad, Rahat Uddin","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027326196","display_name":"Saydul Akbar Murad","orcid":"https://orcid.org/0000-0002-9015-1448"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Murad, Saydul Akbar","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5127312521","display_name":"Nick Rahimi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rahimi, Nick","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5098975405"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10485","display_name":"Bullying, Victimization, and Aggression","score":0.005900000222027302,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.004100000020116568,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5404999852180481},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.46959999203681946},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4309999942779541},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.40470001101493835},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.35929998755455017},{"id":"https://openalex.org/keywords/bengali","display_name":"Bengali","score":0.3248000144958496},{"id":"https://openalex.org/keywords/contextual-design","display_name":"Contextual design","score":0.3084000051021576}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7907000184059143},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6121000051498413},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5404999852180481},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5249999761581421},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.46959999203681946},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4309999942779541},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.40470001101493835},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.37940001487731934},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.35929998755455017},{"id":"https://openalex.org/C19235068","wikidata":"https://www.wikidata.org/wiki/Q9610","display_name":"Bengali","level":2,"score":0.3248000144958496},{"id":"https://openalex.org/C71611378","wikidata":"https://www.wikidata.org/wiki/Q5165191","display_name":"Contextual design","level":3,"score":0.3084000051021576},{"id":"https://openalex.org/C183322885","wikidata":"https://www.wikidata.org/wiki/Q17007702","display_name":"Context model","level":3,"score":0.303600013256073},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.301800012588501},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.2824000120162964},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27900001406669617},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.27390000224113464},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.2718999981880188},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.2567000091075897},{"id":"https://openalex.org/C2982912361","wikidata":"https://www.wikidata.org/wiki/Q1851867","display_name":"Mental model","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C2780505938","wikidata":"https://www.wikidata.org/wiki/Q17093282","display_name":"Unavailability","level":2,"score":0.25380000472068787}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.22449","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.22449","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.22449","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.22449","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.45588624477386475,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Cyberbullying":[0],"has":[1,76],"become":[2],"a":[3,50,93,127,134,155],"serious":[4],"and":[5,22,62,70,146,152,167,191],"growing":[6],"concern":[7],"in":[8,81],"todays":[9],"virtual":[10],"world.":[11],"When":[12],"left":[13],"unnoticed,":[14],"it":[15],"can":[16],"have":[17,26],"adverse":[18],"consequences":[19],"for":[20],"social":[21],"mental":[23],"health.":[24],"Researchers":[25],"explored":[27],"various":[28],"types":[29],"of":[30,46,201],"cyberbullying,":[31],"but":[32,106,117],"most":[33],"approaches":[34],"use":[35],"single-label":[36],"classification,":[37],"assuming":[38],"that":[39,130],"each":[40],"comment":[41,52],"contains":[42],"only":[43],"one":[44],"type":[45],"abuse.":[47],"In":[48],"reality,":[49],"single":[51],"may":[53,107],"include":[54],"overlapping":[55],"forms":[56],"such":[57],"as":[58],"threats,":[59],"hate":[60],"speech,":[61],"harassment.":[63],"Therefore,":[64],"multilabel":[65,73,158],"detection":[66,75],"is":[67,150],"both":[68],"realistic":[69],"essential.":[71],"However,":[72],"cyberbullying":[74,160],"received":[77],"limited":[78],"attention,":[79],"especially":[80],"low-resource":[82],"languages":[83],"like":[84],"Bangla,":[85],"where":[86],"robust":[87],"pre-trained":[88],"models":[89,113],"are":[90],"scarce.":[91],"Developing":[92],"generalized":[94],"model":[95,144,149],"with":[96,133],"moderate":[97],"accuracy":[98],"remains":[99],"challenging.":[100],"Transformers":[101],"offer":[102],"strong":[103],"contextual":[104],"understanding":[105],"miss":[108],"sequential":[109],"dependencies,":[110],"while":[111],"LSTM":[112],"capture":[114],"temporal":[115],"flow":[116],"lack":[118],"semantic":[119],"depth.":[120],"To":[121],"address":[122,175],"these":[123],"limitations,":[124],"we":[125],"propose":[126],"fusion":[128],"architecture":[129],"combines":[131],"BanglaBERT-Large":[132],"two-layer":[135],"stacked":[136],"LSTM.":[137],"We":[138,169,193],"analyze":[139],"their":[140],"behavior":[141],"to":[142,174,197],"jointly":[143],"context":[145],"sequence.":[147],"The":[148],"fine-tuned":[151],"evaluated":[153],"on":[154],"publicly":[156],"available":[157],"Bangla":[159],"dataset":[161],"covering":[162],"cyberbully,":[163],"sexual":[164],"harassment,":[165],"threat,":[166],"spam.":[168],"apply":[170],"different":[171],"sampling":[172],"strategies":[173],"class":[176],"imbalance.":[177],"Evaluation":[178],"uses":[179],"multiple":[180],"metrics,":[181],"including":[182],"accuracy,":[183],"precision,":[184],"recall,":[185],"F1-score,":[186],"Hamming":[187],"loss,":[188],"Cohens":[189],"kappa,":[190],"AUC-ROC.":[192],"employ":[194],"5-fold":[195],"cross-validation":[196],"assess":[198],"the":[199,202],"generalization":[200],"architecture.":[203]},"counts_by_year":[],"updated_date":"2026-05-01T08:36:08.643496","created_date":"2026-02-28T00:00:00"}
