{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T01:09:19Z","timestamp":1773277759734,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T00:00:00Z","timestamp":1642032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T00:00:00Z","timestamp":1642032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61873160"],"award-info":[{"award-number":["61873160"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["21ZR1426500"],"award-info":[{"award-number":["21ZR1426500"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11227-021-04251-z","type":"journal-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T08:03:31Z","timestamp":1642061011000},"page":"8751-8773","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["An reinforcement learning-based speech censorship chatbot system"],"prefix":"10.1007","volume":"78","author":[{"given":"Shaokang","family":"Cai","sequence":"first","affiliation":[]},{"given":"Dezhi","family":"Han","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1986-7144","authenticated-orcid":false,"given":"Dun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Noel","family":"Crespi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,13]]},"reference":[{"key":"4251_CR1","first-page":"270","volume":"1","author":"JN Kok","year":"2009","unstructured":"Kok JN, Boers EJ, Kosters WA, Van der Putten P, Poel M (2009) Artificial intelligence: definition, trends, techniques, and cases. Artif Intell 1:270\u2013299","journal-title":"Artif Intell"},{"key":"4251_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511794797","volume-title":"Artificial intelligence: foundations of computational agents","author":"DL Poole","year":"2010","unstructured":"Poole DL, Mackworth AK (2010) Artificial intelligence: foundations of computational agents. Cambridge University Press, Cambridge"},{"key":"4251_CR3","first-page":"1","volume":"2","author":"D Li","year":"2021","unstructured":"Li D, Han D, Weng T-H, Zheng Z, Li H, Liu H, Castiglione A, Li K-C (2021) Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey. Soft Comput 2:1\u201318","journal-title":"Soft Comput"},{"key":"4251_CR4","doi-asserted-by":"crossref","unstructured":"Li M, Han D, Li D, Liu H, Chang C-C (2021) Mfvt:an anomaly traffic detection method merging feature fusion network and vision transformer architecture","DOI":"10.21203\/rs.3.rs-877144\/v1"},{"key":"4251_CR5","doi-asserted-by":"crossref","unstructured":"Li D, Han D, Zhang X, Zhang L (2019) Panoramic image mosaic technology based on sift algorithm in power monitoring. In: 2019 6th International Conference on Systems and Informatics (ICSAI), pp 1329\u20131333","DOI":"10.1109\/ICSAI48974.2019.9010294"},{"key":"4251_CR6","doi-asserted-by":"crossref","unstructured":"Adamopoulou E, Moussiades L (2020) An overview of chatbot technology. In: IFIP International Conference on Artificial Intelligence Applications and Innovations, pp 373\u2013383. Springer","DOI":"10.1007\/978-3-030-49186-4_31"},{"key":"4251_CR7","doi-asserted-by":"crossref","unstructured":"Khan R, Das A (2018) Introduction to chatbots. In: Build Better Chatbots, pp 1\u201311. Springer","DOI":"10.1007\/978-1-4842-3111-1_1"},{"key":"4251_CR8","first-page":"1096","volume":"29","author":"D Li","year":"2021","unstructured":"Li D, Han D, Zheng Z, Weng T-H, Li H, Liu H, Castiglione A, Li K-C (2021) Moocschain: a blockchain-based secure storage and sharing scheme for moocs learning. Comput Stand Interfaces 29:1096","journal-title":"Comput Stand Interfaces"},{"key":"4251_CR9","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.chb.2015.02.026","volume":"49","author":"J Hill","year":"2015","unstructured":"Hill J, Ford WR, Farreras IG (2015) Real conversations with artificial intelligence: a comparison between human-human online conversations and human-chatbot conversations. Comput Hum Behav 49:245\u2013250","journal-title":"Comput Hum Behav"},{"key":"4251_CR10","doi-asserted-by":"publisher","first-page":"106795","DOI":"10.1016\/j.chb.2021.106795","volume":"121","author":"N Park","year":"2021","unstructured":"Park N, Jang K, Cho S, Choi J (2021) Use of offensive language in human-artificial intelligence chatbot interaction: the effects of ethical ideology, social competence, and perceived humanlikeness. Comput Hum Behav 121:106795","journal-title":"Comput Hum Behav"},{"key":"4251_CR11","first-page":"7045823","volume":"2021","author":"M Li","year":"2021","unstructured":"Li M, Han D, Yin X, Liu H, Li D (2021) Design and implementation of an anomaly network traffic detection model integrating temporal and spatial features. Secur Commun Netw 2021:7045823\u20131704582315","journal-title":"Secur Commun Netw"},{"key":"4251_CR12","doi-asserted-by":"crossref","unstructured":"Dadvar M, Trieschnigg D, Ordelman R, de Jong F (2013) Improving cyberbullying detection with user context. In: European Conference on Information Retrieval, pp 693\u2013696. Springer","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"4251_CR13","doi-asserted-by":"crossref","unstructured":"Xiang G, Fan B, Wang L, Hong J, Rose C (2012) Detecting offensive tweets via topical feature discovery over a large scale twitter corpus. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp 1980\u20131984","DOI":"10.1145\/2396761.2398556"},{"key":"4251_CR14","unstructured":"Li J, Miller AH, Chopra S, Ranzato M, Weston J (2016) Dialogue learning with human-in-the-loop. arXiv preprint arXiv:1611.09823"},{"key":"4251_CR15","unstructured":"Abel D, Salvatier J, Stuhlm\u00fcller A, Evans O (2017) Agent-agnostic human-in-the-loop reinforcement learning. arXiv preprint arXiv:1701.04079"},{"key":"4251_CR16","doi-asserted-by":"crossref","unstructured":"Asghar N, Poupart P, Jiang X, Li H (2016) Deep active learning for dialogue generation. arXiv preprint arXiv:1612.03929","DOI":"10.18653\/v1\/S17-1008"},{"key":"4251_CR17","doi-asserted-by":"crossref","unstructured":"Du J, Gui L, He Y, Xu R (2017) A convolutional attentional neural network for sentiment classification. In: 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), pp 445\u2013450. IEEE","DOI":"10.1109\/SPAC.2017.8304320"},{"key":"4251_CR18","doi-asserted-by":"crossref","unstructured":"Yang Z, Yang D, Dyer C, He X, Smola A, Hovy E (2016) Hierarchical attention networks for document classification. In: Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp 1480\u20131489","DOI":"10.18653\/v1\/N16-1174"},{"issue":"1","key":"4251_CR19","doi-asserted-by":"publisher","first-page":"011102","DOI":"10.1063\/1.4906785","volume":"3","author":"Y Li","year":"2015","unstructured":"Li Y, Zhang L, Ma Y, Singh DJ (2015) Tuning optical properties of transparent conducting barium stannate by dimensional reduction. APL Mater 3(1):011102","journal-title":"APL Mater"},{"key":"4251_CR20","unstructured":"Liu P, Qiu X, Huang X (2016) Recurrent neural network for text classification with multi-task learning. arXiv preprint arXiv:1605.05101"},{"key":"4251_CR21","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.knosys.2015.06.015","volume":"89","author":"K Ravi","year":"2015","unstructured":"Ravi K, Ravi V (2015) A survey on opinion mining and sentiment analysis: tasks, approaches and applications. Knowl-Based Syst 89:14\u201346","journal-title":"Knowl-Based Syst"},{"issue":"4","key":"4251_CR22","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1002\/widm.1253","volume":"8","author":"L Zhang","year":"2018","unstructured":"Zhang L, Wang S, Liu B (2018) Deep learning for sentiment analysis: a survey. Wiley Interdiscip Rev Data Min Knowled Discov 8(4):1253","journal-title":"Wiley Interdiscip Rev Data Min Knowled Discov"},{"key":"4251_CR23","doi-asserted-by":"crossref","unstructured":"Allouch M, Azaria A, Azoulay-Schwartz R (2019) Detecting sentences that may be harmful to children with special needs. In: 2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI), pp 1209\u20131213","DOI":"10.1109\/ICTAI.2019.00167"},{"key":"4251_CR24","doi-asserted-by":"crossref","unstructured":"Razavi AH, Inkpen D, Uritsky S, Matwin S (2010) Offensive language detection using multi-level classification. In: Canadian Conference on AI","DOI":"10.1007\/978-3-642-13059-5_5"},{"key":"4251_CR25","unstructured":"Spertus E (1997) Smokey: Automatic recognition of hostile messages. In: AAAI, pp 1058\u20131065"},{"key":"4251_CR26","unstructured":"Yin D, Xue Z, Hong L, Davison BD, Kontostathis A, Edwards L (2009) Detection of harassment on web 2.0. In: Proceedings of the Content Analysis in the WEB, vol 2, pp 1\u20137"},{"key":"4251_CR27","unstructured":"Dinakar K, Reichart R, Lieberman H (2011) Modeling the detection of textual cyberbullying. In: Fifth International AAAI Conference on Weblogs and Social Media, vol. WS-11-02, p 11"},{"key":"4251_CR28","unstructured":"Chkroun M, Azaria A (2018) Safebot: A safe collaborative chatbot. In: Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence, pp 695\u2013698"},{"key":"4251_CR29","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9:1735\u20131780","journal-title":"Neural Comput"},{"key":"4251_CR30","doi-asserted-by":"crossref","unstructured":"Peters ME, Neumann M, Iyyer M, Gardner M, Clark C, Lee K, Zettlemoyer L (2018) Deep contextualized word representations. arXiv preprint arXiv:1802.05365","DOI":"10.18653\/v1\/N18-1202"},{"key":"4251_CR31","doi-asserted-by":"publisher","first-page":"132306","DOI":"10.1016\/j.physd.2019.132306","volume":"404","author":"A Sherstinsky","year":"2020","unstructured":"Sherstinsky A (2020) Fundamentals of recurrent neural network (rnn) and long short-term memory (lstm) network. Physica D 404:132306","journal-title":"Physica D"},{"key":"4251_CR32","doi-asserted-by":"crossref","unstructured":"Wan S, Lan Y, Guo J, Xu J, Pang L, Cheng X (2016) A deep architecture for semantic matching with multiple positional sentence representations. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol 30","DOI":"10.1609\/aaai.v30i1.10342"},{"key":"4251_CR33","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.future.2020.07.050","volume":"114","author":"S Sadiq","year":"2021","unstructured":"Sadiq S, Mehmood A, Ullah S, Ahmad M, Choi GS, On B-W (2021) Aggression detection through deep neural model on twitter. Future Gener Comput Syst 114:120\u2013129","journal-title":"Future Gener Comput Syst"},{"key":"4251_CR34","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K (2019) Bert: pre-training of deep bidirectional transformers for language understanding. In: NAACL"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04251-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04251-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04251-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T20:01:45Z","timestamp":1700078505000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04251-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,13]]},"references-count":34,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["4251"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04251-z","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,13]]},"assertion":[{"value":"30 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}