{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T20:54:22Z","timestamp":1773694462959,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:00:00Z","timestamp":1760572800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:00:00Z","timestamp":1760572800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,16]]},"DOI":"10.1109\/iccp68926.2025.11427180","type":"proceedings-article","created":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T19:51:37Z","timestamp":1773431497000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["HarmLLaMA: Harmful Language Detection with Large Language Models"],"prefix":"10.1109","author":[{"given":"Ciprian-Octavian","family":"Truic\u0103","sequence":"first","affiliation":[{"name":"National University of Science and Technology POLITEHNICA Bucharest Academy of Romanian Scientists,Bucharest,Romania"}]},{"given":"Elena-Simona","family":"Apostol","sequence":"additional","affiliation":[{"name":"National University of Science and Technology POLITEHNICA Bucharest Academy of Romanian Scientists,Bucharest,Romania"}]},{"given":"Alexandru-Gabriel","family":"Ilie","sequence":"additional","affiliation":[{"name":"National University of Science and Technology POLITEHNICA Bucharest,Bucharest,Romania"}]},{"given":"Adrian","family":"Paschke","sequence":"additional","affiliation":[{"name":"Freie Universit&#x00E4;t Berlin Fraunhofer FOKUS,Berlin,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3532397"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3793801"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2024.101728"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3417232"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3603399"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3054223"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/s19-2007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/0894439317734157"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-018-07761-2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/RoEduNet68395.2025.11208267"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3583332"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v9i1.14583"},{"key":"ref13","first-page":"1897","article-title":"NetGuardAI at EXIST2025: Sexism Detection using mDeBERTa","volume-title":"Working Notes of the Conference and Labs of the Evaluation Forum","author":"Cotelin"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00035"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.woah-1.10"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.26615\/978-954-452-092-2_048"},{"key":"ref18","first-page":"113","article-title":"LoRA: Low-rank adaptation of large language models","volume-title":"International Conference on Learning Representations","author":"Hu"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3132502"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.semeval-1.93"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.semeval-1.305"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.01.014"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3389\/frai.2024.1474034"},{"key":"ref24","article-title":"Gemma: Open Models Based on Gemini Research and Technology","author":"Mesnard","year":"2024","journal-title":"ArXiv 2403.08295"},{"key":"ref25","first-page":"199","article-title":"Filtering Aggression from the Multilingual Social Media Feed","volume-title":"Workshop on Trolling, Aggression and Cyberbullying","author":"Modha"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36687-2_77"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.semeval-1.73"},{"key":"ref29","first-page":"2112","article-title":"Awakened at EXIST2025: Adaptive Mixture of Transformers","volume-title":"Working Notes of the Conference and Labs of the Evaluation Forum","author":"Petrescu"},{"key":"ref30","first-page":"1157","article-title":"Language-based Mixture of Transformers for EXIST2024","volume-title":"Working Notes of the Conference and Labs of the Evaluation Forum","volume":"3740","author":"Petrescu"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-032-04354-2_10"},{"key":"ref32","first-page":"1426","article-title":"SparseShield: Social network immunization vs. harmful speech","volume-title":"ACM Conference on Information and Knowledge Management","author":"Petrescu"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2024.3434355"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.semeval-1.59"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.semeval-1.190"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/vaccines9020109"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.07.050"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326032"},{"key":"ref39","article-title":"LLaMA: Open and Efficient Foundation Language Models","author":"Touvron","year":"2023","journal-title":"ArXiv 2302.13971"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/math10040569"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/math11030508"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111715"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.126984"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3331220"},{"key":"ref45","first-page":"749","article-title":"Awakened at CheckThat! 2022: Fake News Detection using BiLSTM and sentence transformer","volume-title":"Working Notes of the Conference and Labs of the Evaluation Forum","author":"Truic\u0103"},{"key":"ref46","first-page":"588","article-title":"A Deep Learning Architecture for Audience Interest Prediction of News Topic on Social Media","volume-title":"International Conference on Extending Database Technology","author":"Truic\u0103"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP63557.2024.10793051"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2818052.2874320"},{"issue":"4","key":"ref49","first-page":"69","article-title":"Classification of an imbalanced data set using decision tree algorithms","volume":"79","author":"Truic\u0103","year":"2017","journal-title":"Univiversity Politechnica of Bucharest Scientific Bulletin - Series C Electrical Engineering and Computer Science"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49586-6_33"}],"event":{"name":"2025 IEEE 21st International Conference on Intelligent Computer Communication and Processing (ICCP)","location":"Cluj-Napoca, Romania","start":{"date-parts":[[2025,10,16]]},"end":{"date-parts":[[2025,10,18]]}},"container-title":["2025 IEEE 21st International Conference on Intelligent Computer Communication and Processing (ICCP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11427093\/11427059\/11427180.pdf?arnumber=11427180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T20:10:28Z","timestamp":1773691828000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11427180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/iccp68926.2025.11427180","relation":{},"subject":[],"published":{"date-parts":[[2025,10,16]]}}}