{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T05:55:17Z","timestamp":1771912517594,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"European Union\u2019s Horizon 2020 Research and Innovation Program through Next Generation Internet (NGI) Trust","award":["825618"],"award-info":[{"award-number":["825618"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3114389","type":"journal-article","created":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T20:26:14Z","timestamp":1632169574000},"page":"132723-132732","source":"Crossref","is-referenced-by-count":20,"title":["Keeping Children Safe Online With Limited Resources: Analyzing What is Seen and Heard"],"prefix":"10.1109","volume":"9","author":[{"given":"Aleksandar","family":"Jevremovic","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6136-1895","authenticated-orcid":false,"given":"Mladen","family":"Veinovic","sequence":"additional","affiliation":[]},{"given":"Milan","family":"Cabarkapa","sequence":"additional","affiliation":[]},{"given":"Marko","family":"Krstic","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9648-4438","authenticated-orcid":false,"given":"Ivan","family":"Chorbev","sequence":"additional","affiliation":[]},{"given":"Ivica","family":"Dimitrovski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3195-3168","authenticated-orcid":false,"given":"Nuno","family":"Garcia","sequence":"additional","affiliation":[]},{"given":"Nuno","family":"Pombo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6279-2988","authenticated-orcid":false,"given":"Milos","family":"Stojmenovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TENSYMP50017.2020.9230778"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.014"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683713"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2007.32"},{"key":"ref30","year":"2021","journal-title":"Client Side Indecent Content Checking"},{"key":"ref37","author":"subin","year":"2019","journal-title":"Awesome&#x2013;Deepfake\/Porn Detection Using Deep Learning"},{"key":"ref36","year":"2020","journal-title":"STOIK Video Converter"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9450.2007.00611.x"},{"key":"ref34","article-title":"Hate speech in pixels: Detection of offensive memes towards automatic moderation","author":"oriol sabat","year":"2019","journal-title":"arXiv 1910 02334"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.07.001"},{"key":"ref40","article-title":"Sphinx-4: A flexible open source framework for speech recognition","author":"walker","year":"0","journal-title":"Sun Micro"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2016.17.DRR-063"},{"key":"ref12","article-title":"Sexual predator detection in chats with chained classifiers","author":"escalante","year":"2013","journal-title":"Proc 4th Workshop Comput Approaches Subjectivity Sentiment Social Media Anal"},{"key":"ref13","year":"2010","journal-title":"EEU COST Action IS0801 on Cyberbullying"},{"key":"ref14","year":"2014","journal-title":"EU Kids Online Researching European Children&#x2019;s Online Opportunities Risks and Safety"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10772-020-09717-8"},{"key":"ref16","author":"hassan","year":"2016","journal-title":"Web Speech API Angular"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0203794"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICII.2001.983086"},{"key":"ref19","article-title":"Pornographic image recognition via weighted multiple instance learning","author":"xin","year":"2019","journal-title":"arXiv 1902 03771"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.06.017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2013.04.007"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2018.03.012"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2012.09.007"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S19-2005"},{"key":"ref29","year":"2018","journal-title":"Nucleo de Processamento Digital de Imagens (NDPI)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13734-6_30"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59065-9_20"},{"key":"ref2","author":"bochkovskiy","year":"2019","journal-title":"Darknet"},{"key":"ref9","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2018","journal-title":"arXiv 1810 04805"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/sym13010026"},{"key":"ref20","article-title":"Combining CNNs for detecting pornography in the absence of labeled training data","author":"jung","year":"2020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2195481"},{"key":"ref21","author":"kim","year":"2020","journal-title":"NSFW Data Scraper"},{"key":"ref42","article-title":"RASR&#x2013;the RWTH Aachen university open source speech recognition toolkit","author":"wiesler","year":"2011","journal-title":"Proc IEEE Workshop Autom Speech Recognition Understanding (ASRU)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1655925.1656071"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.07.012"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1691","DOI":"10.21437\/Eurospeech.2001-396","article-title":"Julius&#x2014;An open source real-time large vocabulary recognition engine","author":"lee","year":"2001","journal-title":"Proc EUROSPEECH Scandinavia 7th Eur Conf Speech Commun Technol 2nd INTERSPEECH Event"},{"key":"ref26","article-title":"Artificial intelligence: COMBATING online sexual abuse of children","author":"macdonald","year":"0","journal-title":"Bracket Found"},{"key":"ref43","author":"young","year":"2006","journal-title":"The HTK Book (for HTK Version 3 4)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.08.012"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09541357.pdf?arnumber=9541357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T19:33:20Z","timestamp":1673292800000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9541357\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3114389","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}