<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Detection of cyberbullying in Arabic social media using dynamic graph neural network ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Ahmed</forename><surname>Bouliche</surname></persName>
							<email>bouliche.ahmed.2@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Department of computer science</orgName>
								<orgName type="department" key="dep2">Faculty of sciences</orgName>
								<orgName type="institution">University of Boumerdes</orgName>
								<address>
									<settlement>Boumerdes</settlement>
									<country key="DZ">Algeria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Abdellah</forename><surname>Rezoug</surname></persName>
							<email>a.rezoug@univ-boumerdes.dz</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Department of computer science</orgName>
								<orgName type="department" key="dep2">Faculty of sciences</orgName>
								<orgName type="institution">University of Boumerdes</orgName>
								<address>
									<settlement>Boumerdes</settlement>
									<country key="DZ">Algeria</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Detection of cyberbullying in Arabic social media using dynamic graph neural network ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">F5CAECAED92243ECE9A3DA8A72C36DEA</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T07:11+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>natural language processing</term>
					<term>Arabic language</term>
					<term>dynamic graph neural network</term>
					<term>graph neural network</term>
					<term>cybercrime delection</term>
					<term>cyberbullying</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Despite all the advantages social networks have brought to the world, they are also a very favourable environment for the growth of so-called electronic crimes. Textual exchanges between users may include clues to crimes committed or being prepared. Usually, methods of Natural Language Processing (NLP) and neural networks are effective ways to detect cybercrimes particularly cyberbullying. In this paper, we proposed techniques that allow to use structures of dynamic temporal graphs as direct inputs to a model without turning them into static graphs as well as a message passing algorithm that fits well with the approach. The effectiveness of these techniques was tested on a prototype model. Fortunately, the proposed techniques have been proven to work, but with poor model performance. The applicability of a crime detector can be established with a session classifier if the data is more general, i.e., represents all the language used by bullies.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The widespread use of social media in recent years has helped to spread many types of dangerous cybercrimes. Fraud, swearing, harassment, terrorism, bullying, and drug dealing are examples of many cybercrimes that people have been suffering from in recent years. Cyberbullying is common among adolescents and has negative effects on the psychological and even physical state of the victim. Therefore, focus has recently turned to developing solutions capable of automatically detecting and predicting cybercrimes based mainly on artificial intelligence and natural language processing (NLP).</p><p>It is obvious that the domain of NLP is developing very well for some languages, such as English. Yet, for the Arabic language, there are only some experimental attempts that are issued here and there, which remain insufficient. In addition, the Arabic language poses another kind of difficulty related to the way it is written. Also, there is no unified language among the Arab countries, as each country uses its own dialect.</p><p>In recent years, researchers have proposed very effective machine learning-based solutions to detect cyberbullying by processing published texts, images, and videos. In this study, we are only interested in methods based on NLP. Arabic cyberbullying detection using sentiment analysis was proposed by Almutiry and Abdel Fattah <ref type="bibr" target="#b0">[1]</ref>. Abusive language detection on Arabic tweets based on matching texts with a list of obscene words was presented by Mubarak et al. <ref type="bibr" target="#b1">[2]</ref>. Aldjanabi et al. <ref type="bibr" target="#b2">[3]</ref> developed a classification system for determining offensive and hate speech using a multi-task learning (MTL) model built on top of a pre-trained Arabic language model. Fatemah Husain <ref type="bibr" target="#b3">[4]</ref> applied a single learner machine learning approach and an ensemble machine learning approach for offensive language detection in the Arabic language.</p><p>This article presents an approach to solving the problem of detecting cyberbullying through text analysis using a dynamic graph neural network (DGNN). The proposed method is a graphlevel classification to classify an entire comment session, whether it contains cyberbullying or not. These sessions are a set of comments where each relationship between two comments is a response relationship between the two. Each node in the graph is a comment, and an edge between them is a reply link. The temporal aspect of the data must be taken into consideration because texts are time-series data. The size of comments varies and is not fixed, so the type of time graph that will be used is dynamic time graphs. According to our modest research, the majority of methods on time graphs assume that graphs are static and often treat them as static <ref type="bibr">[28]</ref>. We propose a method that takes into account the dynamism of time graphs with a shift method for processing temporal and spatial aspects.</p><p>The remainder of this article is organised as follows. Section 2 summarises the state of the art of the proposed solutions to detect cyberbullying using artificial intelligence methods. Section 3 explains in detail the approach proposed in this article. Section 4 summarises the conducted experiments and the obtained results. This article is finished with conclusions on the most relevant observations and results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related works</head><p>Several researchers have tried to handle cyberbullying detection using machine learning algorithms. To detect aggressive behaviours, the work by <ref type="bibr" target="#b4">[5]</ref> employs three deep learning models: Closed Bi-directional Recurrent Unit (BiGRU), Transformers, and Convolutional Neural Networks (CNN). Experimental studies were conducted to examine how effective the models are at classifying well-known hate speech Twitter data-sets into aggressive and non-aggressive. An accuracy of about 88% was reached.</p><p>The authors proposed by <ref type="bibr" target="#b5">[6]</ref> another method based on supervised machine learning approaches. Several classifiers have been used to train and detect acts of bullying. The data set shows that neural networks perform better and achieve an accuracy of 92.8%, whereas simple vector machines (SVM) achieve 90.3%. Reynolds et al. <ref type="bibr" target="#b6">[7]</ref> used textual features and constructed several metrics to assess swear words through a swear word dictionary. What makes cyberbullying detection particularly challenging compared to offline bullying is that language can pose difficulties like ambiguity and sarcasm. Role prediction can also be a difficult task if we look at a conversation thread between the individuals involved in the conversation (victim, bully, bully type, advocate, etc.). The predictions made by the previous automatic methods for the detection of cyberbullying do not reflect the complexity of the task described above. Recent efforts include combined word normalisation, named entity recognition to detect person-specific references <ref type="bibr" target="#b7">[8]</ref>. In their work, <ref type="bibr" target="#b8">[9]</ref> collected a large data set from ask.fm and used BOW (Bag Of Words) features as a first test, then extended it with term lists, subjectivity lexicons, and subject model features.</p><p>Recently, neural word embedding and neural network techniques have been applied. Convolutional neural networks (CNN) on phonetic features have been applied by <ref type="bibr" target="#b9">[10]</ref> and <ref type="bibr" target="#b10">[11]</ref> to study, among others, the same architecture on textual features in combination with long-short-term memory (LSTM) networks.</p><p>People tend to describe their experience of bullying in messages called bullying traces. The researchers by <ref type="bibr" target="#b11">[12]</ref> presented a method to examine bullying traces. They identify several key issues in using social media to study bullying: text categorisation, role labelling, and topic modelling.</p><p>Using graphs to visualise potential cyberbullies and their connections is a recent method. The researchers by <ref type="bibr" target="#b12">[13]</ref> concretely implemented techniques from graph theory: Network functionalities (degree of centrality: number of incident links from a node; close centrality: average distance the shorter from each vertex to the other vertex.), Content-based features (length, sentiment, offensive words, pronouns).</p><p>The focus of most existing work done on cyberbullying is the independent content analysis of comments within social media sessions. Suyu et al. <ref type="bibr" target="#b13">[14]</ref> cited three different key limitations for detection of cyberbullying, 1) only consider the content within a single comment rather than the topic coherence across comments 2) remain generic and exploit limited interactions between social media users, 3) overlook the temporal correlations among different comments. They showed that interaction within the same session may evolve. Modelling topic coherence between comments and temporal interactions is critical to capturing repetitive bullying characteristics. leading to better predictive performance. To achieve this goal they constructed a unified temporal graph for each social media session and then proposed a principled graph-based approach for modelling the temporal dynamics and topic coherence throughout user interactions.</p><p>Research in psychology and social science has shown that cyberbullying is carried out repeatedly against victims <ref type="bibr" target="#b14">[15]</ref>. Studies of user interactions allow us to characterise their repetition by both content and temporal analysis. However, modelling interaction in social media sessions presents some challenges: sparsity, repetition, and user characteristics.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">The proposed approach</head><p>Our approach is based on dynamic graph neural networks. This part explains every step of the procedure. It is composed of: data collection, graph construction and how constraints are handled, coordination matrix creation, tokenisation and training the model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Graphs generation</head><p>Data generation was the hardest task and the process that took us the most time. Understanding the data structure is also an important factor for data generation. In our case, data generation is a process based mainly on dynamic temporal graph creation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.1.">Data collect</head><p>With some research and exploitation, we were able to collect 11268 comments, of which 8417 are negative instances that do not contain cyberbullying behaviour and 2851 positive instances that do contain cyberbullying behaviour. The links to the databases used were shared by <ref type="bibr" target="#b15">[16]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.2.">Construction of graphs</head><p>The construction of temporal graphs consists of understanding our data structure as well as the two types of temporal graphs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Structure of a session</head><p>The sessions will be represented by temporal graphs where each node represents a comment and the edges between them a response relationship. At the beginning (step 𝑡 = 0), the graph has nodes representing tokens corresponding to the 𝑖 𝑡ℎ comment. Each session is a dynamic temporal graph, dynamic temporal graphs are records over time. The records are graphs at each time step, with the 𝑖 𝑡ℎ node representing the token of the 𝑖𝑡ℎ comment at time step 𝑡. Except the size of comments is not fixed, so some nodes and edges will be removed over time.</p><p>There are two constraints that describe the structure we want to use for the sessions we are going to process:</p><p>• edge loop. Each node in our graph is a comment and not a user. If a comment 𝑗 is a reply to a comment 𝑖, and we add a cycle edge (i.e) comment 𝑖 is also a reply to 𝑗, this just doesn't make sense. • session owner. The session owner or the owner of a post is often the person bombarded with comments and insults.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Constraint of dynamic temporal graphs creation</head><p>• Node Deletion. nodes must be deleted only if the comment that corresponds to the node is less than the current time step, if the comment contains 10 tokens then the node will be deleted from the graph in the 11 𝑡ℎ time step.</p><p>• Edge removal. Edges should be removed only if one of the nodes linked to the edge is removed.</p><p>Removing and adding nodes is important for processing the temporal aspect of the graph. The deletion of the edges is done if a node linked to it is deleted, because no spatial data is propagated in the network. • Number of nodes equal to the number of nodes in the COO matrix. The COO matrix (CO-Ordination matrix) is a an optimised representation of the edges in the graph that consumes less space and reduces the number of units of calculation.</p><p>The matrix contains two rows. In each column the first row contains the sender nodes and the second row the receiver nodes. The union of the two lines gives us all the nodes of the matrix. If the set of nodes in the COO matrix is greater than the set of nodes in the node embedding matrix, it means that the embedding matrix is missing information about some nodes. This will make message passing impossible. • Isolated node. Isolated nodes cause problems because they do not belong to the set of nodes in the COO matrix. The absence of a node in the COO matrix puts us in a case where we do not know if the node has been deleted or is isolated. Deleting a node causes an edge to be deleted and deleting an edge causes a node to be isolated. • Shifted node embedding. A node is added to the graph at time 𝑡 if and only if the length of the comment which corresponds to the node is greater than 𝑡. If between [0 − 𝑡 − 1], some nodes have been deleted. Deleting these nodes will cause a shift in the order of the nodes in the node embedding matrix. This means that the embedding of node 14 can actually be the embedding of node 18.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Graph creation</head><p>• tokenisation: The Transformers library <ref type="bibr" target="#b16">[17]</ref> offers an entire hub where multiple developers can put their algorithm to use. For the segmentation of Arabic words, we use the segmenter <ref type="bibr" target="#b17">[18]</ref> and for the tokenisation algorithm we use a WordPiece algorithm developed by <ref type="bibr" target="#b18">[19]</ref> for the Arabic language. WordPiece was originally designed by Google when designing the famous BERT model. The tokenisation is performed on the entire data-set. When creating temporal graphs, for each node (𝑖 for example) that we add to a graph in a time 𝑡, we add the identifier of the 𝑤 𝑖 token of the comment 𝑖 in the embedding matrix. These identifiers will then be passed to an embedding layer which as output gives us an embedding vector (the dimension of the vector is a hyper-parameter). • Coordination matrix (COO-matrix). We start by picking a random number to determine the length of the session (number of comments or node in the session).</p><p>In the first time step 𝑡 = 0 we build the first graph where each node 𝑖 will pick a random number 𝑒 ∈ [1, 𝑠𝑖𝑧𝑒 𝑠 𝑒𝑠𝑠𝑖𝑜𝑛], 𝑒 is the node that will be connected to node𝑖. This will build the COO matrix which represents the edges and structure of the graph. We are still in the first step in time. To solve the isolated node problem, we add a self loop connection to the isolated node in the CO-Ordination matrix. Both the sender and the receiver are the isolated node and the weight of the edge is null.</p><p>To solve all the rest of the constraints for the creation of the dynamic temporal graph mentioned above, we proposed shifting the indices of nodes. For each step in time, we save a COO matrix with the new structure (the nodes not deleted) and another COO matrix where the indexes of the nodes are shifted backwards.</p><p>In the case of spatial data processing, we can use the nodes shifted edge indices, because the indices will be reset and this will prevent us from falling in the case where a node index is greater than the number of nodes in the embedding matrix.</p><p>In the case of time series data processing, we use the original indices to check if the node is not deleted and the shifted edge indices matrix to select the embedding vector of nodes for processing their temporal information. Finally, we were able to generate 753 dynamic temporal graphs from which 191 contain cyberbullying behaviour and 562 do not.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Model training</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.1.">Spacial data processing</head><p>Generally, message passing is done through a dot product between the adjacency matrix and the node embedding. We have a CO-Ordination matrix which consists of two rows and in each column the two connected nodes. How can the COO matrix be used for message passing?</p><p>The embedding matrix is created using an embedding layer that takes the token identifiers of the nodes at time step 𝑡 as input. The embedding dimension we chose is 𝑑𝑖𝑚 = 128. We create a copy of the embedding matrix and we update the vectors of the nodes which receive information from their neighbours in the embedding matrix. This can be achieved as follows:</p><p>For each column in the shifted edge indices CO-Ordination matrix, we update the embedding vector of the receiver node in the new embedding matrix. Example the first column is: 𝑠ℎ𝑖𝑓 𝑡𝑒𝑑 𝑒 𝑑𝑔𝑒 𝑖 𝑛𝑑𝑖𝑐𝑒𝑠 ..,1 = [1, 3], in the new node embedding we will use the vectors in the position 1 and 3 to update the vector in the position 3. And if the vector 3 has already been updated, we use the vectors in position 1 and the new vector in position 3.  This procedure must be done for all the columns in the shifted edge indices COO matrix. The result are weighted by parameterised readable weight matrix to learn the interactions (the number of layers we have chosen is three.). After applying these transformations to the graph in the first time step, we will do the same for all the graphs in the future time steps individually. This way, all spatial information about neighbouring nodes having been propagated through the graph in all time steps, the resulting node embedding can be used as input data for processing the temporal aspect.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.2.">Handling temporal aspect of graphs</head><p>After applying message passing for each node in each graph over time, our node embedding all contain information about their neighbouring nodes. It was previously mentioned that deletion leads to an embedding lag which can cause problems for handling the dynamic graph temporal aspect. If the nodes will be shifted then the time series data processing will learn corrupted and incorrect sequences. To solve this problem, we shifted the indices of the CO-Ordination matrix so that Deep Learning architectures used for processing time-series data learn the correct sequences. This is achieved as follows:</p><p>We start by concatenating all the records of a node through time. This will prepare the input data for the chosen Deep Learning architecture and will make processing temporal data very easy. To concatenate the vectors of the node through time, we have to loop over the time steps and check if the node has not been deleted from the COO matrix (this will indicate that the number of comment tokens is greater than 𝑡) and we have the shifted index of the node so we can extract the node embedding vector from the embedding matrix at time 𝑡, concatenate it with the node embedding vector at time 𝑡 − 1. We will have a representation of all the records over time in a matrix that will be used as input data for an LSTM layer. This concatenation operation will be done for all the nodes of the session.</p><p>An LSTM architecture will be used to process the temporal aspect of the data, the result of each node that passes through the LSTM will also be concatenated. Then we calculate the transpose the resulting matrix and get the average on the last dimension for shape reduction. A finale output layer is added to predict if the session contains cyberbullying or not.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Experimental results</head><p>In order to verify the effectiveness of the proposed approach, we conducted experimentation using the dataset. The input data contains 11268 Arabic comments (tweets), where 8417 do not contain cyberbullying and 2851 do contain cyberbullying. From these comments, 753 dynamic temporal graphs were generated, of which 191 contained cyberbullying and 562 did not.</p><p>The training results of the first epoch were 49% but we saw improvements in the second epoch with an accuracy of 74% which means that the learning took place and the proposed techniques applied to the CO-Ordination matrix worked. We were not able to continue the training for more than 2 epochs due to OOM (Out Of Memory) reasons. The temporal graphs are very memory-consuming data structures. We believed that the imbalance and the size of the database reduced the performance. The model that we have chosen is a prototype model to test the efficiency and profitability of the shifted edge indices COO matrix that we proposed.</p><p>We could have used regularisation technique for generalisation or scheduling the learning rate for better optimisation, but performance of the model was not our goal.</p><p>We tested on the same set that we used for training and we noticed that there was an extreme bias in the model predictions. This is not only because of the imbalance in the dataset, where almost 75% of the examples are negative examples, but also because of the small size of the dataset. From this confusion matrix, we calculated the following micro metrics (positive predictive rate, recall, specificity, negative predictive rate, precision) and the f1 score as a macro metric. The results are summarised in Table <ref type="table" target="#tab_1">2</ref>. Knowing that comments are text in nature and responses between one comment and another can be structured with a temporal graph gives us the ability to harness the power of dynamic temporal graphs. With different message-passing algorithms available, GNNs capture the relationships between nodes and learn to properly represent a graph in node embedding that represents each node and the information acquired from their neighbours. And with different deep learning architectures that process time-series data, we can learn how these node interactions change over time. We leverage the dynamism of the dynamic temporal graphs with a bunch of techniques that prove the learning has taken place despite the complex structure of the dynamic temporal graph being kept.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>Cyberbullying is a dangerous cybercrime that is lightly taken by governments despite the psychological damage it causes to its victims. It has spread very rapidly due to the spread of social media, which has caused an increase in the number of bullies that has led to a permanent cycle of violence.</p><p>Session classification seems more applicable for cyberbullying detection. Graph neural networks (GNN) make it possible to capture the relationships between entities, and by adding an architecture that deals with the temporal aspect of graphs, we have the ability to model relationships between entities over time. We decided to leverage dynamic temporal graphs because there is little research on this data structure, and hence the majority of research considers these graphs to be static temporal graphs. When turning a dynamic temporal graph into a static temporal graph, we think that the algorithm will waste a lot of training steps learning insignificant alternatives that we added to make the structure static. Therefore, we have proposed a technique that uses the dynamism of this structure. The method proved that learning took place. Unfortunately, we did not have the necessary means to properly test the performance of the method.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Example of coordination matrix</figDesc><graphic coords="5,231.04,244.09,133.20,153.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: The message passing algorithm</figDesc><graphic coords="7,148.36,123.20,298.56,221.28" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Analysis of temporal aspect in graphs</figDesc><graphic coords="7,164.20,390.26,266.88,204.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc></figDesc><table><row><cell>confusion matrix</cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="2">Negative positive</cell></row><row><cell>Negative</cell><cell>562</cell><cell>191</cell></row><row><cell>Positive</cell><cell>0</cell><cell>0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc></figDesc><table><row><cell>performance indicator metrics</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="6">PPR Recall NPR Specificity acc f1 score</cell></row><row><cell>0</cell><cell>0</cell><cell>100%</cell><cell>74%</cell><cell>74%</cell><cell>85%</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Arabic cyberbullying detection using arabic sentiment analysis</title>
		<author>
			<persName><forename type="first">S</forename><surname>Almutiry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Abdel</surname></persName>
		</author>
		<author>
			<persName><surname>Fattah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Egyptian Journal of Language Engineering</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="39" to="50" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Abusive language detection on arabic social media</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mubarak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Darwish</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Magdy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the first workshop on abusive language online</title>
				<meeting>the first workshop on abusive language online</meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="52" to="56" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Arabic offensive and hate speech detection using a cross-corpora multi-task learning model</title>
		<author>
			<persName><forename type="first">W</forename><surname>Aldjanabi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dahou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Al-Qaness</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Elaziz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Helmi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Damaševičius</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Informatics</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page">69</biblScope>
			<date type="published" when="2021">2021</date>
			<publisher>MDPI</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><forename type="first">F</forename><surname>Husain</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2005.08946</idno>
		<title level="m">Arabic offensive language detection using machine learning and ensemble machine learning approaches</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A multichannel deep learning framework for cyberbullying detection on social media</title>
		<author>
			<persName><forename type="first">M</forename><surname>Alotaibi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Alotaibi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Razaque</surname></persName>
		</author>
		<idno type="DOI">10.3390/electronics10212664</idno>
		<ptr target="https://www.mdpi.com/2079-9292/10/21/2664.doi:10.3390/electronics10212664" />
	</analytic>
	<monogr>
		<title level="j">Electronics</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Social media cyberbullying detection using machine learning</title>
		<author>
			<persName><forename type="first">J</forename><surname>Mounir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nashaat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ahmed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Emad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Amer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mohammed</surname></persName>
		</author>
		<idno type="DOI">10.14569/IJACSA.2019.0100587</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Advanced Computer Science and Applications</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="703" to="707" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Using machine learning to detect cyberbullying</title>
		<author>
			<persName><forename type="first">K</forename><surname>Reynolds</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kontostathis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Edwards</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICMLA.2011.152</idno>
	</analytic>
	<monogr>
		<title level="m">10th International Conference on Machine Learning and Applications and Workshops</title>
				<imprint>
			<date type="published" when="2011">2011. 2011</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="241" to="244" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Detecting online harassment in social networks</title>
		<author>
			<persName><forename type="first">U</forename><surname>Bretschneider</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Wöhner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Peters</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Thirty Fifth International Conference on Information Systems</title>
				<meeting><address><addrLine>Auckland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014. 2014</date>
			<biblScope unit="page" from="1" to="14" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><surname>Emmery</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Verhoeven</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">D</forename><surname>Pauw</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Jacobs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">V</forename><surname>Hee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Lefever</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Desmet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Hoste</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Daelemans</surname></persName>
		</author>
		<idno>CoRR abs/1910.11922</idno>
		<ptr target="http://arxiv.org/abs/1910.11922.arXiv:1910.11922" />
		<title level="m">Current limitations in cyberbullying detection: on evaluation criteria, reproducibility, and data scarcity</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Cyberbullying detection with a pronunciation based convolutional neural network</title>
		<author>
			<persName><forename type="first">X</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Tong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Vishwamitra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Whittaker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Mazer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kowalski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Luo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Macbeth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Dillon</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICMLA.2016.0132</idno>
	</analytic>
	<monogr>
		<title level="m">15th IEEE International Conference on Machine Learning and Applications (ICMLA)</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="740" to="745" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A &quot;deeper&quot; look at detecting cyberbullying in social networks</title>
		<author>
			<persName><forename type="first">H</forename><surname>Rosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Matos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ribeiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Coheur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Carvalho</surname></persName>
		</author>
		<idno type="DOI">10.1109/IJCNN.2018.8489211</idno>
	</analytic>
	<monogr>
		<title level="m">2018 International Joint Conference on Neural Networks (IJCNN)</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="1" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Learning from bullying traces in social media</title>
		<author>
			<persName><forename type="first">J.-M</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K.-S</forename><surname>Jun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bellmore</surname></persName>
		</author>
		<ptr target="https://aclanthology.org/N12-1084" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Association for Computational Linguistics</title>
				<meeting>the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Association for Computational Linguistics<address><addrLine>Montréal, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="656" to="666" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Identification and characterization of cyberbullying dynamics in an online social network</title>
		<author>
			<persName><forename type="first">A</forename><surname>Squicciarini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rajtmajer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Griffin</surname></persName>
		</author>
		<idno type="DOI">10.1145/2808797.2809398</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)</title>
				<imprint>
			<date type="published" when="2015">2015. 2015</date>
			<biblScope unit="page" from="280" to="285" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">Improving cyberbully detection with user interaction</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Cheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Liu</surname></persName>
		</author>
		<idno>CoRR abs/2011.00449</idno>
		<ptr target="https://arxiv.org/abs/2011.00449.arXiv:2011.00449" />
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Cyberbullying versus face-to-face bullying a theoretical and conceptual review</title>
		<author>
			<persName><forename type="first">J</forename><surname>Dooley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pyżalski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Cross</surname></persName>
		</author>
		<idno type="DOI">10.1027/0044-3409.217.4.182</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Psychology</title>
		<imprint>
			<biblScope unit="volume">217</biblScope>
			<biblScope unit="page" from="182" to="188" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Abusive language detection on Arabic social media</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mubarak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Darwish</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Magdy</surname></persName>
		</author>
		<idno type="DOI">10.18653/v1/W17-3008</idno>
		<ptr target="https://aclanthology.org/W17-3008.doi:10.18653/v1/W17-3008" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the First Workshop on Abusive Language Online, Association for Computational Linguistics</title>
				<meeting>the First Workshop on Abusive Language Online, Association for Computational Linguistics<address><addrLine>Vancouver, BC, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="52" to="56" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Transformers: State-of-the-art natural language processing</title>
		<author>
			<persName><forename type="first">T</forename><surname>Wolf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Debut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sanh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chaumond</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Delangue</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Moi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Cistac</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Rault</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Louf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Funtowicz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Davison</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Shleifer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Von Platen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Jernite</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Plu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">L</forename><surname>Scao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gugger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drame</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Lhoest</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Rush</surname></persName>
		</author>
		<ptr target="https://www.aclweb.org/anthology/2020.emnlp-demos.6" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, Association for Computational Linguistics</title>
				<meeting>the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, Association for Computational Linguistics</meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="38" to="45" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Farasa: A fast and furious segmenter for Arabic</title>
		<author>
			<persName><forename type="first">A</forename><surname>Abdelali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Darwish</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Durrani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Mubarak</surname></persName>
		</author>
		<idno type="DOI">10.18653/v1/N16-3003</idno>
		<ptr target="https://aclanthology.org/N16-3003.doi:10.18653/v1/N16-3003" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Demonstrations, Association for Computational Linguistics</title>
				<meeting>the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Demonstrations, Association for Computational Linguistics<address><addrLine>San Diego, California</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="11" to="16" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Arabert: Transformer-based model for arabic language understanding</title>
		<author>
			<persName><forename type="first">W</forename><surname>Antoun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Baly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Hajj</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">LREC 2020 Workshop Language Resources and Evaluation Conference</title>
				<imprint>
			<date type="published" when="2020-05-16">11-16 May 2020, 2020</date>
			<biblScope unit="page">9</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
