{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T22:04:32Z","timestamp":1769033072122,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,14]]},"DOI":"10.1109\/cloudcom67567.2025.11331545","type":"proceedings-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T20:37:16Z","timestamp":1768941436000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Performance Evaluation and Analysis of LLMs for Detecting Dangerous Speech in Emotional Disorder Data"],"prefix":"10.1109","author":[{"given":"Shuojiayin","family":"Yang","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Lanzhou University,Lanzhou,China"}]},{"given":"Jiaxin","family":"Chen","sequence":"additional","affiliation":[{"name":"Shenzhen MSU-BIT University,Shenzhen,China"}]},{"given":"Yongfeng","family":"Tao","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Lanzhou University,Lanzhou,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/s2215-0366(21)00395-3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1037\/ccp0000854"},{"key":"ref3","first-page":"20","article-title":"Detection rate of mental health issues among chinese students and its educational implications","volume":"43","author":"Yu","year":"2022","journal-title":"Tsinghua J Educ"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.psychres.2008.05.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACII.2009.5349358"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2025.3604064"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2024.3405949"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/T-AFFC.2010.1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cobeha.2017.07.005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3539850"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i16.29728"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s40501-025-00363-y"},{"key":"ref13","article-title":"Smarter: A data-efficient framework to improve toxicity detection with explanation via self-augmenting large language models","author":"Nghiem","year":"2025","journal-title":"arXiv preprint"},{"key":"ref14","article-title":"Empathy-r1: A chain-of-empathy and reinforcement learning framework for long-form mental health support","author":"Yao","year":"2025","journal-title":"arXiv preprint"},{"key":"ref15","article-title":"The psychogenic machine: Simulating ai psychosis, delusion reinforce-ment and harm enablement in large language models","author":"Yeung","year":"2025","journal-title":"arXiv preprint"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/pan.2025.10017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.301"},{"key":"ref18","article-title":"Analysing safety risks in llms fine-tuned with pseudo-malicious cyber security data","author":"Eizemity","year":"2025","journal-title":"arXiv preprint"},{"key":"ref19","article-title":"Ethical and social risks of harm from language models","author":"Weidinger","year":"2021","journal-title":"arXiv preprint"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/1178222618792860"},{"issue":"1","key":"ref21","first-page":"1","article-title":"Mental-11m: Leveraging large language models for mental health prediction via online text data","volume-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies","volume":"8","author":"Xu"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1177\/2167702617747074"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM62325.2024.10821773"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2319837121"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3678884.3681858"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM58861.2023.10385305"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2024.3397403"},{"key":"ref28","first-page":"28492","article-title":"Robust speech recognition via large-scale weak supervision","volume-title":"International conference on machine learning","author":"Radford"}],"event":{"name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","location":"Shenzhen, China","start":{"date-parts":[[2025,11,14]]},"end":{"date-parts":[[2025,11,16]]}},"container-title":["2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11330195\/11331311\/11331545.pdf?arnumber=11331545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T07:08:25Z","timestamp":1768979305000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11331545\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/cloudcom67567.2025.11331545","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]}}}