{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T12:56:46Z","timestamp":1774702606595,"version":"3.50.1"},"reference-count":47,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.asoc.2026.114790","type":"journal-article","created":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:02:37Z","timestamp":1770278557000},"page":"114790","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Evolving explainable neural architectures: Dynamic behavioral-novelty weighting in multi-objective neuroevolution for multimodal spam detection"],"prefix":"10.1016","volume":"192","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9324-1813","authenticated-orcid":false,"given":"Adnane","family":"Filali","sequence":"first","affiliation":[]},{"given":"El Arbi","family":"Abdellaoui Alaoui","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-726X","authenticated-orcid":false,"given":"Mostafa","family":"Merras","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2026.114790_bib0005","doi-asserted-by":"crossref","first-page":"A357","DOI":"10.1121\/10.0008583","article-title":"Audio-based spam call detection","volume":"150","author":"Emmanouilidou","year":"2021","journal-title":"J. Acoust. Soc. Am."},{"key":"10.1016\/j.asoc.2026.114790_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.compbiomed.2021.104994","article-title":"A novel deep neuroevolution-based image classification method to diagnose coronavirus disease (COVID-19)","volume":"139","author":"Ahmadian","year":"2021","journal-title":"Comput. Biol. Med."},{"key":"10.1016\/j.asoc.2026.114790_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2023.101805","article-title":"Explainable artificial intelligence (XAI): what we know and what is left to attain trustworthy artificial intelligence","volume":"99","author":"Ali","year":"2023","journal-title":"Inf. Fusion."},{"key":"10.1016\/j.asoc.2026.114790_bib0020","doi-asserted-by":"crossref","DOI":"10.3390\/app142411804","article-title":"SMS spam detection system based on deep learning architectures for Turkish and English messages","volume":"14","author":"Altunay","year":"2024","journal-title":"Appl. Sci."},{"key":"10.1016\/j.asoc.2026.114790_bib0025","article-title":"Assessment of automl frameworks for predicting compressive and flexural strength of recycled aggregate concrete","volume":"31","author":"Campos","year":"2025","journal-title":"Mater. Today Sustain."},{"key":"10.1016\/j.asoc.2026.114790_bib0030","first-page":"1","article-title":"DDNAS: discretized differentiable neural architecture search for text classification","volume":"14","author":"Chen","year":"2023","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"10.1016\/j.asoc.2026.114790_bib0035","doi-asserted-by":"crossref","first-page":"5531","DOI":"10.32604\/cmc.2025.070101","article-title":"HERL-ViT: a hybrid enhanced vision transformer based on regional-local attention for malware detection","volume":"85","author":"Cui","year":"2025","journal-title":"Comput. Mater. Continua"},{"key":"10.1016\/j.asoc.2026.114790_bib0040","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1007\/s10462-025-11162-5","article-title":"BERT applications in natural language processing: a review","volume":"58","author":"Gardazi","year":"2025","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.asoc.2026.114790_bib0045","doi-asserted-by":"crossref","DOI":"10.3390\/fi12090156","article-title":"A hybrid CNN-LSTM model for SMS spam detection in arabic and English messages","volume":"12","author":"Ghourabi","year":"2020","journal-title":"Future Internet"},{"key":"10.1016\/j.asoc.2026.114790_bib0050","series-title":"2023 8th International Conference on Electrical, Electronics and Information Engineering (ICEEIE)","first-page":"1","article-title":"Performance evaluation of EfficientNetB0, EfficientNetV2, and MobileNetV3 for American sign language classification","author":"Hartanto","year":"2023"},{"key":"10.1016\/j.asoc.2026.114790_bib0055","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/j.neucom.2022.02.003","article-title":"EvoDCNN: an evolutionary deep convolutional neural network for image classification","volume":"488","author":"Hassanzadeh","year":"2022","journal-title":"Neurocomputing"},{"key":"10.1016\/j.asoc.2026.114790_bib0060","doi-asserted-by":"crossref","DOI":"10.3390\/math13071114","article-title":"Enhancing neural network training through neuroevolutionary models: a hybrid approach to classification optimization","volume":"13","author":"Hurtado-Mora","year":"2025","journal-title":"Mathematics"},{"key":"10.1016\/j.asoc.2026.114790_bib0065","article-title":"OCR post-correction for detecting adversarial text images","volume":"66","author":"Imam","year":"2022","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.asoc.2026.114790_bib0070","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.112939","article-title":"Spam email classification based on cybersecurity potential risk using natural language processing","author":"J\u00e1\u00f1ez-Martino","year":"2025","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.asoc.2026.114790_bib0075","doi-asserted-by":"crossref","first-page":"1379","DOI":"10.1016\/j.procs.2023.10.126","article-title":"An insight into neuroevolution and genetic algorithms for text classification","volume":"225","author":"Kadamala","year":"2023","journal-title":"Proc. Comput. Sci."},{"key":"10.1016\/j.asoc.2026.114790_bib0080","doi-asserted-by":"crossref","first-page":"40819","DOI":"10.1007\/s11042-023-15170-x","article-title":"Robust multimedia spam filtering based on visual, textual, and audio deep features and random forest","volume":"82","author":"Kihal","year":"2023","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.asoc.2026.114790_bib0085","doi-asserted-by":"crossref","first-page":"975","DOI":"10.1007\/BF01009452","article-title":"Optimization by simulated annealing: quantitative studies","volume":"34","author":"Kirkpatrick","year":"1984","journal-title":"J. Stat. Phys."},{"key":"10.1016\/j.asoc.2026.114790_bib0090","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.114666","article-title":"Neuroevolution of augmenting topologies for solving a two-stage hybrid flow shop scheduling problem: a comparison of different solution strategies","volume":"172","author":"Lang","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2026.114790_bib0095","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2025.104364","article-title":"The silence of the phishers: early-stage voice phishing detection with runtime permission requests","volume":"152","author":"Lee","year":"2025","journal-title":"Comput. Secur."},{"key":"10.1016\/j.asoc.2026.114790_bib0100","article-title":"Cross-feature fusion speech emotion recognition based on attention mask residual network and wav2vec 2.0","author":"Li","year":"2024","journal-title":"Digit. Commun. Netw."},{"key":"10.1016\/j.asoc.2026.114790_bib0105","doi-asserted-by":"crossref","first-page":"80253","DOI":"10.1109\/ACCESS.2021.3081479","article-title":"A spam transformer model for SMS spam detection","volume":"9","author":"Liu","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.asoc.2026.114790_bib0110","doi-asserted-by":"crossref","first-page":"80253","DOI":"10.1109\/ACCESS.2021.3081479","article-title":"A spam transformer model for SMS spam detection","volume":"9","author":"Liu","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.asoc.2026.114790_bib0115","article-title":"A unified approach to interpreting model predictions","volume":"30","author":"Lundberg","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.asoc.2026.114790_bib0120","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.future.2021.06.026","article-title":"Protector: an optimized deep learning-based framework for image spam detection and prevention","volume":"125","author":"Makkar","year":"2021","journal-title":"Futur. Gener. Comput. Syst."},{"key":"10.1016\/j.asoc.2026.114790_bib0125","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.ins.2020.05.113","article-title":"SPAMI: a cognitive spam protector for advertisement malicious images","volume":"540","author":"Makkar","year":"2020","journal-title":"Inf. Sci."},{"key":"10.1016\/j.asoc.2026.114790_bib0130","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2023.110478","article-title":"Efficient e-mail spam filtering approach combining logistic regression model and orthogonal atomic orbital search algorithm","volume":"144","author":"Manita","year":"2023","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2026.114790_bib0135","first-page":"269","article-title":"14 - evolving deep neural networks","author":"Miikkulainen","year":"2024"},{"key":"10.1016\/j.asoc.2026.114790_bib0140","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.3390\/electronics11132053","article-title":"Hybrid features by combining visual and text information to improve spam filtering performance","volume":"11","author":"Nam","year":"2022","journal-title":"Electronics"},{"key":"10.1016\/j.asoc.2026.114790_bib0145","article-title":"An enhanced mechanism for detection of spam emails by deep learning technique with bio-inspired algorithm","volume":"8","author":"Nicholas","year":"2024","journal-title":"e-Prime - Adv. Electr. Eng, Electron. Energy"},{"key":"10.1016\/j.asoc.2026.114790_bib0150","article-title":"BAOS-CNN: a novel deep neuroevolution algorithm for multispecies seagrass detection","volume":"19","author":"Noman Phd","year":"2024","journal-title":"PLOS ONE"},{"key":"10.1016\/j.asoc.2026.114790_bib0155","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1162\/evco_a_00282","article-title":"A systematic literature review of the successors of \u201cneuroevolution of augmenting topologies\u201d","volume":"29","author":"Papavasileiou","year":"2021","journal-title":"Evol. Comput."},{"key":"10.1016\/j.asoc.2026.114790_bib0160","first-page":"147","article-title":"A comparative study of hash algorithms in cryptography","volume":"8","author":"Pittalia","year":"2019","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"key":"10.1016\/j.asoc.2026.114790_bib0165","author":"Rho"},{"key":"10.1016\/j.asoc.2026.114790_bib0170","first-page":"9","article-title":"Multi-objective genetic algorithm and CNN-based deep learning architectural scheme for effective spam detection","volume":"3","author":"Rosita P","year":"2022","journal-title":"Int. J. Intell. Netw."},{"key":"10.1016\/j.asoc.2026.114790_bib0175","doi-asserted-by":"crossref","DOI":"10.3390\/electronics13112034","article-title":"Next-generation spam filtering: comparative fine-tuning of LLMs, NLPs, and CNN models for email spam classification","volume":"13","author":"Roumeliotis","year":"2024","journal-title":"Electronics"},{"key":"10.1016\/j.asoc.2026.114790_bib0180","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2025.130753","article-title":"Recommendation systems with LLM-based semantic embeddings and faiss similarity search","volume":"649","author":"Safar","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.asoc.2026.114790_bib0185","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1016\/j.aej.2023.01.048","article-title":"Deep learning-based spam image filtering","volume":"68","author":"Salama","year":"2023","journal-title":"Alex. Eng. J."},{"key":"10.1016\/j.asoc.2026.114790_bib0190","series-title":"Robocall audio from the FTC\u2019s project point of no entry","year":"2023"},{"key":"10.1016\/j.asoc.2026.114790_bib0195","doi-asserted-by":"crossref","first-page":"4897","DOI":"10.1007\/s40747-022-00741-6","article-title":"Deep convolutional forest: a dynamic deep ensemble approach for spam detection in text","volume":"8","author":"Shaaban","year":"2022","journal-title":"Complex Intell. Syst."},{"key":"10.1016\/j.asoc.2026.114790_bib0200","first-page":"103","article-title":"Convolutional neural networks for image spam detection","volume":"29","author":"Sharmin","year":"2020","journal-title":"Inf. Secur. J.: A Glob. Perspect."},{"key":"10.1016\/j.asoc.2026.114790_bib0205","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1162\/106365602320169811","article-title":"Evolving neural networks through augmenting topologies","volume":"10","author":"Stanley","year":"2002","journal-title":"Evol. Comput."},{"key":"10.1016\/j.asoc.2026.114790_bib0210","doi-asserted-by":"crossref","DOI":"10.1016\/j.csl.2025.101802","article-title":"Vishing: detecting social engineering in spoken communication \u2014 a first survey & urgent roadmap to address an emerging societal challenge","volume":"94","author":"Triantafyllopoulos","year":"2025","journal-title":"Comput. Speech Lang."},{"key":"10.1016\/j.asoc.2026.114790_bib0215","doi-asserted-by":"crossref","DOI":"10.3390\/appliedmath5010027","article-title":"Neural de: an evolutionary method based on differential evolution suitable for neural network training","volume":"5","author":"Tsoulos","year":"2025","journal-title":"AppliedMath"},{"key":"10.1016\/j.asoc.2026.114790_bib0220","doi-asserted-by":"crossref","DOI":"10.3389\/frai.2024.1509179","article-title":"A graph neural architecture search approach for identifying bots in social media","volume":"7","author":"Tzoumanekas","year":"2024","journal-title":"Front. Artif. Intell."},{"key":"10.1016\/j.asoc.2026.114790_bib0225","doi-asserted-by":"crossref","DOI":"10.1016\/j.dcan.2025.07.008","article-title":"ExplainableDetector: exploring transformer-based language modeling approach for SMS spam detection with explainability analysis","author":"Uddin","year":"2025","journal-title":"Digit. Commun. Netw."},{"key":"10.1016\/j.asoc.2026.114790_bib0230","doi-asserted-by":"crossref","DOI":"10.3390\/app10145011","article-title":"A discrete hidden markov model for SMS spam detection","volume":"10","author":"Xia","year":"2020","journal-title":"Appl. Sci."},{"key":"10.1016\/j.asoc.2026.114790_bib0235","doi-asserted-by":"crossref","DOI":"10.3390\/electronics12234779","article-title":"Genetic algorithm for high-dimensional emotion recognition from speech signals","volume":"12","author":"Yue","year":"2023","journal-title":"Electronics"}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626002383?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626002383?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T12:41:33Z","timestamp":1774701693000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494626002383"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":47,"alternative-id":["S1568494626002383"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.114790","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Evolving explainable neural architectures: Dynamic behavioral-novelty weighting in multi-objective neuroevolution for multimodal spam detection","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.114790","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"114790"}}