{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T22:08:34Z","timestamp":1772489314206,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3667099","type":"journal-article","created":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T20:48:59Z","timestamp":1771879739000},"page":"29493-29522","source":"Crossref","is-referenced-by-count":0,"title":["SHIELD: System for Harmful Explicit-Content Identification and Evaluation Through LLM-Driven Approach"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0422-0561","authenticated-orcid":false,"given":"Dishant","family":"Kapoor","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Bharati Vidyapeeth&#x2019;s College of Engineering, New Delhi, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3469-2108","authenticated-orcid":false,"given":"Karan","family":"Ahuja","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Bharati Vidyapeeth&#x2019;s College of Engineering, New Delhi, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6690-8500","authenticated-orcid":false,"given":"Deepika","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Bharati Vidyapeeth&#x2019;s College of Engineering, New Delhi, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3979-7252","authenticated-orcid":false,"given":"Paanav","family":"Puri","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Bharati Vidyapeeth&#x2019;s College of Engineering, New Delhi, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6884-7959","authenticated-orcid":false,"given":"Srinivas","family":"Jangirala","sequence":"additional","affiliation":[{"name":"Jindal Global Business School, O. P. Jindal Global University, Haryana, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vedika","family":"Gupta","sequence":"additional","affiliation":[{"name":"Jindal Global Business School, O. P. Jindal Global University, Haryana, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1018-8719","authenticated-orcid":false,"given":"Anandadeep","family":"Mandal","sequence":"additional","affiliation":[{"name":"Birmingham Business School, University of Birmingham, Birmingham, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/car.1092"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/10720162.2012.660431"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2021.634909"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.08.015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3599696.3612895"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17762\/ijritcc.v11i6.6770"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14428\/esann\/2024.es2024-222"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v18i1.31358"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1463546"},{"key":"ref10","first-page":"6193","article-title":"I feel offended, don\u2019t be abusive! Implicit\/explicit messages in offensive and abusive language","volume-title":"Proc. 12th Lang. Resour. Eval. Conf. (LREC)","author":"Caselli"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0221152"},{"issue":"2","key":"ref12","first-page":"298","article-title":"Detection of pornographic digital images","volume":"5","author":"Marcial-Basilio","year":"2011","journal-title":"Int. J. Comput."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/icassp40776.2020.9054278"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.psychres.2023.115446"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/iccmc48092.2020.iccmc-000137"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2020.0110861"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3089515"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/bigcomp.2018.00085"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD61410.2024.10579996"},{"key":"ref20","article-title":"Harmful suicide content detection","author":"Park","year":"2024","journal-title":"arXiv:2407.13942"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.chipro.2024.100043"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1162\/coli_a_00561"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3726302.3730305"},{"issue":"4","key":"ref24","first-page":"35","article-title":"Modern information retrieval: A brief overview","volume":"24","author":"Singhal","year":"2001","journal-title":"IEEE Data Eng. Bull."},{"key":"ref25","article-title":"Efficient estimation of word representations in vector space","author":"Mikolov","year":"2013","journal-title":"arXiv:1301.3781"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-56706-x"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2021.3114781"},{"key":"ref29","first-page":"17283","article-title":"Grounding language models to images for multimodal inputs and outputs","volume-title":"Proc. ICML","author":"Koh"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3726302.3731945"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3746027.3754558"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.2801"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.acl-long.439"},{"key":"ref34","article-title":"Towards safer social media platforms: Scalable and performant few-shot harmful content moderation using large language models","author":"Bonagiri","year":"2025","journal-title":"arXiv:2501.13976"},{"key":"ref35","first-page":"897","article-title":"Learning to rank using classification and gradient boosting","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Li"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00834"},{"key":"ref37","article-title":"TANDEM: Temporal-aware neural detection for multimodal hate speech","author":"Koushik","year":"2026","journal-title":"arXiv:2601.11178"},{"key":"ref38","article-title":"Towards trustworthy multimodal moderation via policy-aligned reasoning and hierarchical labeling","author":"Li","year":"2025","journal-title":"arXiv:2508.03296"},{"key":"ref39","article-title":"ShieldVLM: Safeguarding the multimodal implicit toxicity via deliberative reasoning with LVLMs","author":"Cui","year":"2025","journal-title":"arXiv:2505.14035"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.663"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-72992-8_22"},{"key":"ref42","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"Proc. ICML","author":"Radford"},{"key":"ref43","article-title":"BLIP: Bootstrapping language-image pre-training for unified vision-language understanding and generation","author":"Li","year":"2022","journal-title":"arXiv:2201.12086"},{"key":"ref44","article-title":"VisualBERT: A simple and performant baseline for vision and language","author":"Harold Li","year":"2019","journal-title":"arXiv:1908.03557"},{"key":"ref45","article-title":"MiniGPT-4: Enhancing vision-language understanding with advanced large language models","author":"Zhu","year":"2023","journal-title":"arXiv:2304.10592"},{"key":"ref46","article-title":"MemeBLIP2: A novel lightweight multimodal system to detect harmful memes","author":"Liu","year":"2025","journal-title":"arXiv:2504.21226"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.24818\/ida-ql\/2019.5"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1907.11692"},{"key":"ref49","article-title":"LLaMA: Open and efficient foundation language models","author":"Touvron","year":"2023","journal-title":"arXiv:2302.13971"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW69036.2025.00627"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11406083.pdf?arnumber=11406083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T20:57:13Z","timestamp":1772485033000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11406083\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3667099","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}