{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:48:16Z","timestamp":1765039696110,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-15209-z","type":"journal-article","created":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T11:01:50Z","timestamp":1688986910000},"page":"13873-13886","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Identifying personality traits of WhatsApp users based on frequently used emojis using deep learning"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6990-0950","authenticated-orcid":false,"given":"Shahram","family":"Saeidi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"issue":"17","key":"15209_CR1","doi-asserted-by":"publisher","first-page":"e6989","DOI":"10.1002\/cpe.6989","volume":"34","author":"O Abayomi-Alli","year":"2022","unstructured":"Abayomi-Alli O, Misra S, Abayomi-Alli A (2022) A deep learning method for automatic SMS spam classification: Performance of learning algorithms on indigenous dataset. Concurrency Comput Pract Exper 34(17):e6989. https:\/\/doi.org\/10.1002\/cpe.6989","journal-title":"Concurrency Comput Pract Exper"},{"issue":"8","key":"15209_CR2","doi-asserted-by":"publisher","first-page":"1835","DOI":"10.1002\/acs.3425","volume":"36","author":"G Agarwal","year":"2022","unstructured":"Agarwal G, Om H, Gupta S (2022) A learning framework of modified deep recurrent neural network for classification and recognition of voice mood. Int J Adapt Control Signal Process 36(8):1835\u20131859","journal-title":"Int J Adapt Control Signal Process"},{"issue":"6","key":"15209_CR3","first-page":"3084","volume":"5","author":"MR Ahan","year":"2018","unstructured":"Ahan MR, Rohmetra H, Mungad A (2018) Social Network Analysis using Data Segmentation and Neural Networks. Int Res J Eng Technol 5(6):3084\u20133096","journal-title":"Int Res J Eng Technol"},{"key":"15209_CR4","doi-asserted-by":"publisher","unstructured":"Bai Q, Dan Q, Mu Z, Yang M (2019) A systematic review of emoji: current research and future perspectives. Front Psychol. 10. https:\/\/doi.org\/10.3389\/fpsyg.2019.02221","DOI":"10.3389\/fpsyg.2019.02221"},{"issue":"7","key":"15209_CR5","first-page":"1811","volume":"13","author":"R Bala","year":"2017","unstructured":"Bala R, Kumar D (2017) Classification Using ANN: A Review. Int J Comput Intell Res 13(7):1811\u20131820","journal-title":"Int J Comput Intell Res"},{"key":"15209_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2020.101517","author":"S BazzazAbkenar","year":"2020","unstructured":"BazzazAbkenar S, Mahdipour E, Jameii SM, Haghi Kashani M (2020) Big data analytics meets social media: A systematic review of techniques, open issues, and future directions. Telematics Inform. https:\/\/doi.org\/10.1016\/j.tele.2020.101517","journal-title":"Telematics Inform"},{"key":"15209_CR7","doi-asserted-by":"publisher","unstructured":"Bazzaz Abkenar S, Mahdipour E, Jameii SM, Haghi Kashani M (2021) A hybrid classification method for Twitter spam detection based on differential evolution and random forest. Concurrency Comput Pract Exper. e6381. https:\/\/doi.org\/10.1002\/cpe.6381","DOI":"10.1002\/cpe.6381"},{"issue":"1","key":"15209_CR8","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random Forests. Mach Learn 45(1):532","journal-title":"Mach Learn"},{"key":"15209_CR9","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-020-00545-z","author":"H Cui","year":"2021","unstructured":"Cui H, Shuai S, Niu S, Shi C, Zhou L (2021) A classification method for social information of sellers on social network. EURASIP J Image Video Process. https:\/\/doi.org\/10.1186\/s13640-020-00545-z","journal-title":"EURASIP J Image Video Process"},{"issue":"36","key":"15209_CR10","doi-asserted-by":"publisher","first-page":"15274","DOI":"10.1073\/pnas.0900282106","volume":"106","author":"N Eagle","year":"2009","unstructured":"Eagle N, Pentland A, Lazer D (2009) Inferring friendship network structure by using mobile phone data. Proc Natl Acad Sci 106(36):15274\u201315278","journal-title":"Proc Natl Acad Sci"},{"key":"15209_CR11","unstructured":"Evans V (2017) The Emoji Code: The Linguistics Behind Smiley Faces and Scaredy Cats, Picador USA"},{"key":"15209_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0277-0_15","author":"A Hussain","year":"2018","unstructured":"Hussain A, Keshavamurthy BN, Wazarkar S (2018) An Efficient Approach for Classifying Social Network Events Using Convolution Neural Networks. Adv Data Inf Sci. https:\/\/doi.org\/10.1007\/978-981-13-0277-0_15","journal-title":"Adv Data Inf Sci"},{"issue":"9","key":"15209_CR13","first-page":"2038","volume":"12","author":"SJ Hussain","year":"2021","unstructured":"Hussain SJ, Khan G, Farooq U, Jhanjhi NZ, Talib MN, Suseendran G (2021) Age classification using convolution neural networks using a local dataset. Turkish J Comput Math Educ 12(9):2038\u20132045","journal-title":"Turkish J Comput Math Educ"},{"key":"15209_CR14","unstructured":"James R (2015) UK's fastest-growing language is emoji. Taylorhearing. https:\/\/www.taylorherring.com\/tag\/mobile-pr"},{"key":"15209_CR15","doi-asserted-by":"crossref","unstructured":"Khemphila A, Boonjing V (2011) Heart disease Classification using Neural Network and Feature Selection, 21st International Conference on Systems Engineering. 406\u2013409","DOI":"10.1109\/ICSEng.2011.80"},{"key":"15209_CR16","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1134\/S1054661815030128","volume":"25","author":"AI Kukharenko","year":"2015","unstructured":"Kukharenko AI, Konushin AS (2015) Simultaneous classification of several features of a person\u2019s appearance using a deep convolutional neural network. Pattern Recognit Image Anal 25:461\u2013465","journal-title":"Pattern Recognit Image Anal"},{"issue":"3","key":"15209_CR17","doi-asserted-by":"publisher","first-page":"696","DOI":"10.35940\/ijitee.C8378.019320","volume":"9","author":"N Kumar","year":"2020","unstructured":"Kumar N, Kumar D (2020) Classification using Artificial Neural Network Optimized with Bat Algorithm. Int J Innov Technol Explor Eng 9(3):696\u2013700","journal-title":"Int J Innov Technol Explor Eng"},{"key":"15209_CR18","doi-asserted-by":"crossref","unstructured":"Li W, Chen Y, Hu T, Luo J (2018) Mining the Relationship between Emoji Usage Patterns and Personality, Proceedings of the Twelfth International AAAI Conference on Web and Social Media (ICWSM 2018)","DOI":"10.1609\/icwsm.v12i1.15054"},{"key":"15209_CR19","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.paid.2017.02.037","volume":"112","author":"D Marengo","year":"2017","unstructured":"Marengo D, Giannotta F, Settanni M (2017) Assessing personality using emoji: An exploratory study. Personality Individ Differ 112:74\u201378","journal-title":"Personality Individ Differ"},{"key":"15209_CR20","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1111\/j.1540-5915.1992.tb00425.x","volume":"23","author":"LM Salchenberger","year":"2009","unstructured":"Salchenberger LM, Cinar EM, Lash NA (2009) Neural networks: a new tool for predicting thrift failures. Decis Sci 23:899\u2013916","journal-title":"Decis Sci"},{"issue":"8","key":"15209_CR21","doi-asserted-by":"publisher","first-page":"e13038","DOI":"10.1111\/exsy.13038","volume":"39","author":"H Singh","year":"2022","unstructured":"Singh H, Singh B, Kaur M (2022) An efficient feature selection method based on improved elephant herding optimization to classify high-dimensional biomedical data. Expert Syst 39(8):e13038. https:\/\/doi.org\/10.1111\/exsy.13038","journal-title":"Expert Syst"},{"issue":"6","key":"15209_CR22","doi-asserted-by":"publisher","first-page":"2414","DOI":"10.1016\/j.chb.2012.07.012","volume":"28","author":"JL Skues","year":"2012","unstructured":"Skues JL, Willians B, Lisa W (2012) The effects of personality traits, self-esteem, loneliness, and narcissism on Facebook use among university students. Comput Hum Behav 28(6):2414\u20132419","journal-title":"Comput Hum Behav"},{"key":"15209_CR23","unstructured":"Sperl G (2016) Person Classification with Convolutional Neural Networks, M.Sc. Thesis, Faculty of Informatics, Vienna University of Technology"},{"key":"15209_CR24","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2019.00002","author":"Q Tan","year":"2019","unstructured":"Tan Q, Liu N, Hu X (2019) Deep Representation Learning for Social Network Analysis. Front Big Data. https:\/\/doi.org\/10.3389\/fdata.2019.00002","journal-title":"Front Big Data"},{"key":"15209_CR25","volume-title":"LSTM Recurrent Neural Networks for Signature Verification: A Novel Approach","author":"C Tiflin","year":"2012","unstructured":"Tiflin C (2012) LSTM Recurrent Neural Networks for Signature Verification: A Novel Approach. LAP LAMBERT Academic Publishing, London, UK"},{"issue":"5","key":"15209_CR26","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1016\/j.chb.2011.02.004","volume":"27","author":"R Tracli","year":"2011","unstructured":"Tracli R, Sophia X (2011) Who uses Facebook? An investigation into the relationship between the Big Five. Comput Hum Behav 27(5):1658\u20131664","journal-title":"Comput Hum Behav"},{"key":"15209_CR27","doi-asserted-by":"publisher","first-page":"e4209","DOI":"10.1002\/cpe.4209","volume":"29","author":"T Wu","year":"2017","unstructured":"Wu T, Wen S, Liu S, Zhang J et al (2017) Detecting spamming activities in Twitter based on deep-learning technique. Concurrency Computat Pract Exper 29:e4209. https:\/\/doi.org\/10.1002\/cpe.4209","journal-title":"Concurrency Computat Pract Exper"},{"key":"15209_CR28","doi-asserted-by":"publisher","unstructured":"Zhang C, Wang S, Zhan D, Yin M, Lou F (2021) Inferring users' social roles with a multi-level graph neural network model. Entropy 23(11). https:\/\/doi.org\/10.3390\/e23111453","DOI":"10.3390\/e23111453"},{"issue":"0","key":"15209_CR29","first-page":"1","volume":"0","author":"Y Zhu","year":"2020","unstructured":"Zhu Y (2020) The prediction model of personality in social networks by using data mining deep learning algorithm and random walk model. Int J Electr Eng Educ 0(0):1\u201314","journal-title":"Int J Electr Eng Educ"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15209-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15209-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15209-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T10:38:19Z","timestamp":1706265499000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15209-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":29,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["15209"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15209-z","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"6 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}