{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:24:04Z","timestamp":1772119444342,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076006"],"award-info":[{"award-number":["62076006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Opening Foundation of the State Key Laboratory of Cognitive Intelligence","award":["COGOS-2023HE02"],"award-info":[{"award-number":["COGOS-2023HE02"]}]},{"name":"University Synergy Innovation Program of Anhui Province","award":["GXXT-2021-008"],"award-info":[{"award-number":["GXXT-2021-008"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s00500-025-10492-4","type":"journal-article","created":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T11:09:28Z","timestamp":1740740968000},"page":"2379-2390","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Gender opposition recognition method fusing emojis and multi-features in Chinese speech"],"prefix":"10.1007","volume":"29","author":[{"given":"Shunxiang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zichen","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Hanchen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yunduo","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kuan-Ching","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,28]]},"reference":[{"key":"10492_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2022.100217","volume":"15","author":"MA Al-Garadi","year":"2022","unstructured":"Al-Garadi MA, Kim S, Guo Y et al (2022) Natural language model for automatic identification of intimate partner violence reports from twitter. Array 15:100217","journal-title":"Array"},{"issue":"5","key":"10492_CR2","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1007\/s10796-021-10158-0","volume":"24","author":"VSP Attili","year":"2022","unstructured":"Attili VSP, Mathew SK, Sugumaran V (2022) Information privacy assimilation in IT organizations. Inf Syst Front 24(5):1497\u20131513","journal-title":"Inf Syst Front"},{"key":"10492_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100311","volume":"38","author":"FE Ayo","year":"2020","unstructured":"Ayo FE, Folorunso O, Ibharalu FT et al (2020) Machine learning techniques for hate speech classification of twitter data: state-of-the-art, future challenges and research directions. Comput Sci Rev 38:100311","journal-title":"Comput Sci Rev"},{"key":"10492_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101710","volume":"90","author":"V Balakrishnan","year":"2020","unstructured":"Balakrishnan V, Khan S, Arabnia HR (2020) Improving cyberbullying detection using Twitter users\u2019 psychological features and machine learning. Comput Secur 90:101710","journal-title":"Comput Secur"},{"key":"10492_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjds\/s13688-016-0072-6","volume":"5","author":"P Burnap","year":"2016","unstructured":"Burnap P, Williams ML (2016) Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Sci 5:1\u201315","journal-title":"EPJ Data Sci"},{"key":"10492_CR6","doi-asserted-by":"crossref","unstructured":"Cho K, Van M B, Bahdanau D et al (2014) On the properties of neural machine translation: encoder\u2013decoder approaches. In: 8th workshop on syntax, semantics and structure in statistical translation, SSST 2014. Association for Computational Linguistics (ACL), pp 103\u2013111","DOI":"10.3115\/v1\/W14-4012"},{"key":"10492_CR7","unstructured":"Devlin J, Chang M, Lee K et al (2019) BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of NAACL-HLT, pp 4171\u20134186"},{"key":"10492_CR8","doi-asserted-by":"crossref","unstructured":"Diesenreiter C, Krauss O, Sandler S et al (2022) ProperBERT-proactive recognition of offensive phrasing for effective regulation. In: 2022 international conference on electrical, computer, communications and mechatronics engineering (ICECCME). IEEE, pp 1\u20136","DOI":"10.1109\/ICECCME55909.2022.9987933"},{"issue":"5","key":"10492_CR9","doi-asserted-by":"publisher","first-page":"4743","DOI":"10.3233\/JIFS-179023","volume":"36","author":"S Frenda","year":"2019","unstructured":"Frenda S, Ghanem B, Montes-y-G\u00f3mez M et al (2019) Online hate speech against women: automatic identification of misogyny and sexism on twitter. J Intell Fuzzy Syst 36(5):4743\u20134752","journal-title":"J Intell Fuzzy Syst"},{"key":"10492_CR10","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1016\/j.future.2020.08.032","volume":"114","author":"JA Garcia-diaz","year":"2021","unstructured":"Garcia-diaz JA, Canovas-Garcia M, Colomo-Palacios R et al (2021) Detecting misogyny in Spanish tweets. An approach based on linguistics features and word embeddings. Future Gener Comput Syst 114:506\u2013518","journal-title":"Future Gener Comput Syst"},{"issue":"8","key":"10492_CR11","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"key":"10492_CR12","doi-asserted-by":"crossref","unstructured":"Jha A, Mamidi R (2017) When does a compliment become sexist? analysis and classification of ambivalent sexism using twitter data. In: Proceedings of the second workshop on NLP and computational social science, pp 7\u201316","DOI":"10.18653\/v1\/W17-2902"},{"key":"10492_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2021.100182","volume":"27","author":"A Jiang","year":"2022","unstructured":"Jiang A, Yang X, Liu Y et al (2022) SWSR: a Chinese dataset and lexicon for online sexism detection. Online Soc Netw Media 27:100182","journal-title":"Online Soc Netw Media"},{"key":"10492_CR14","doi-asserted-by":"crossref","unstructured":"Karlekar S, Bansal M (2018) Safecity: understanding diverse forms of sexual harassment personal stories. arXiv preprint http:\/\/arxiv.org\/abs\/1809.04739","DOI":"10.18653\/v1\/D18-1303"},{"issue":"2","key":"10492_CR15","volume":"2","author":"AMUD Khanday","year":"2022","unstructured":"Khanday AMUD, Rabani ST, Khan QR et al (2022) Detecting twitter hate speech in COVID-19 era using machine learning and ensemble learning techniques. Int J Inf Manag Data Insights 2(2):100120","journal-title":"Int J Inf Manag Data Insights"},{"issue":"1","key":"10492_CR16","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s10579-022-09611-6","volume":"57","author":"L Li","year":"2023","unstructured":"Li L, Wang XT (2023) Nonverbal communication with emojis in social media: dissociating hedonic intensity from frequency. Lang Resour Eval 57(1):323\u2013342","journal-title":"Lang Resour Eval"},{"key":"10492_CR17","unstructured":"Mikolov T, Chen K, Corrado G et al (2013) Efficient estimation of word representations in vector space. arXiv preprint http:\/\/arxiv.org\/abs\/1301.3781"},{"issue":"8","key":"10492_CR18","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0237861","volume":"15","author":"M Mozafari","year":"2020","unstructured":"Mozafari M, Farahbakhsh R, Crespi N (2020) Hate speech detection and racial bias mitigation in social media based on BERT model. PLoS ONE 15(8):e0237861","journal-title":"PLoS ONE"},{"issue":"6","key":"10492_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102360","volume":"57","author":"EW Pamungkas","year":"2020","unstructured":"Pamungkas EW, Basile V, Patti V (2020) Misogyny detection in twitter: a multilingual and cross-domain study. Inf Process Manag 57(6):102360","journal-title":"Inf Process Manag"},{"issue":"4","key":"10492_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3457189","volume":"15","author":"P Parikh","year":"2021","unstructured":"Parikh P, Abburi H, Chhaya N et al (2021) Categorizing sexism and misogyny through neural approaches. ACM Trans Web (TWEB) 15(4):1\u201331","journal-title":"ACM Trans Web (TWEB)"},{"issue":"12","key":"10492_CR21","doi-asserted-by":"publisher","first-page":"4730","DOI":"10.1007\/s10489-018-1242-y","volume":"48","author":"GK Pitsilis","year":"2018","unstructured":"Pitsilis GK, Ramampiaro H, Langseth H (2018) Effective hate-speech detection in Twitter data using recurrent neural networks. Appl Intell 48(12):4730\u20134742","journal-title":"Appl Intell"},{"key":"10492_CR22","doi-asserted-by":"crossref","unstructured":"Plaza L, Carrillo-de-Albornoz J, Morante R et al (2023) Overview of EXIST 2023: sEXism Identification in Social NeTworks. In: Advances in information retrieval: 45th European conference on information retrieval, ECIR 2023, Dublin, Ireland, April 2\u20136, 2023, Proceedings, Part III. Springer Nature Switzerland, Cham, pp 593\u2013599","DOI":"10.1007\/978-3-031-28241-6_68"},{"key":"10492_CR23","doi-asserted-by":"publisher","first-page":"219563","DOI":"10.1109\/ACCESS.2020.3042604","volume":"8","author":"F Rodriguez-Sanchez","year":"2020","unstructured":"Rodriguez-Sanchez F, Carrillo-De-Albornoz J, Plaza L (2020) Automatic classification of sexism in social networks: an empirical study on twitter data. IEEE Access 8:219563\u2013219576","journal-title":"IEEE Access"},{"key":"10492_CR24","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.neucom.2021.12.022","volume":"490","author":"O Sharif","year":"2022","unstructured":"Sharif O, Hoque MM (2022) Tackling cyber-aggression: identification and fine-grained categorization of aggressive texts on social media using weighted ensemble of transformers. Neurocomputing 490:462\u2013481","journal-title":"Neurocomputing"},{"key":"10492_CR25","unstructured":"Sharifirad S, Matwin S (2019) When a tweet is actually sexist. A more comprehensive classification of different online harassment categories and the challenges in NLP. arXiv preprint http:\/\/arxiv.org\/abs\/1902.10584"},{"issue":"2","key":"10492_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.102888","volume":"59","author":"AG Sreedevi","year":"2022","unstructured":"Sreedevi AG, Harshitha TN, Sugumaran V et al (2022) Application of cognitive computing in healthcare, cybersecurity, big data and IoT: a literature review. Inf Process Manag 59(2):102888","journal-title":"Inf Process Manag"},{"key":"10492_CR27","first-page":"133","volume":"3","author":"V Sugumaran","year":"2022","unstructured":"Sugumaran V, Ibrahim SJA (2022) Rough set based on least dissimilarity normalized index for handling uncertainty during E-learners learning pattern recognition. Int J Intell Netw 3:133\u2013137","journal-title":"Int J Intell Netw"},{"issue":"1","key":"10492_CR28","doi-asserted-by":"publisher","first-page":"125","DOI":"10.3233\/JIFS-221252","volume":"44","author":"S Sundaramurthy","year":"2023","unstructured":"Sundaramurthy S, Sugumaran V, Thangavelu A et al (2023) Predicting rheumatoid arthritis from the biomarkers of clinical trials using improved harmony search optimization with adaptive neuro-fuzzy inference system. J Intell Fuzzy Syst 44(1):125\u2013137","journal-title":"J Intell Fuzzy Syst"},{"key":"10492_CR29","doi-asserted-by":"crossref","unstructured":"Tai W, Kung HT, Dong XL et al (2020) exBERT: extending pre-trained models with domain-specific vocabulary under constrained training resources. In: Findings of the association for computational linguistics: EMNLP 2020, pp 1433\u20131439","DOI":"10.18653\/v1\/2020.findings-emnlp.129"},{"key":"10492_CR30","first-page":"15","volume":"12","author":"YT Wang","year":"2021","unstructured":"Wang YT (2021) Analysis on marriage practice of the new generation youth and its influencing factors. China Youth Study 12:15","journal-title":"China Youth Study"},{"issue":"9","key":"10492_CR31","doi-asserted-by":"publisher","first-page":"4400","DOI":"10.1109\/TCYB.2020.2987064","volume":"51","author":"X Wang","year":"2020","unstructured":"Wang X, Kou L, Sugumaran V et al (2020) Emotion correlation mining through deep learning models on natural language text. IEEE Trans Cybern 51(9):4400\u20134413","journal-title":"IEEE Trans Cybern"},{"key":"10492_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121669","volume":"238","author":"S Xie","year":"2024","unstructured":"Xie S, Pan Q, Wang X et al (2024) Combining prompt learning with contextual semantics for inductive relation prediction. Expert Syst Appl 238:121669","journal-title":"Expert Syst Appl"},{"key":"10492_CR33","doi-asserted-by":"crossref","unstructured":"Yan P, Li L, Chen W et al (2019) Quantum-inspired density matrix encoder for sexual harassment personal stories classification. In: 2019 IEEE international conference on intelligence and security informatics (ISI). IEEE, pp 218\u2013220","DOI":"10.1109\/ISI.2019.8823281"},{"issue":"09","key":"10492_CR35","first-page":"63","volume":"31","author":"XX Zheng","year":"2018","unstructured":"Zheng XX, Liu L, Hu D et al (2018) Influence of micro-blog\u2019s cyberbullying on mental health of college students in Hefei City. Med Soc 31(09):63\u201365+84","journal-title":"Med Soc"},{"issue":"1","key":"10492_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41109-018-0104-1","volume":"3","author":"Z Zhu","year":"2018","unstructured":"Zhu Z, Ke Z, Cui J et al (2018) The construction of Chinese microblog gender-specific thesauruses and user gender classification. Appl Netw Sci 3(1):1\u201317","journal-title":"Appl Netw Sci"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10492-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-025-10492-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10492-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T02:36:52Z","timestamp":1742179012000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-025-10492-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["10492"],"URL":"https:\/\/doi.org\/10.1007\/s00500-025-10492-4","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3722370\/v1","asserted-by":"object"}]},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2]]},"assertion":[{"value":"8 November 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}