{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:01:30Z","timestamp":1776096090647,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T00:00:00Z","timestamp":1714435200000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1827700"],"award-info":[{"award-number":["1827700"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100001143","name":"William T. Grant Foundation","doi-asserted-by":"publisher","award":["187941"],"award-info":[{"award-number":["187941"]}],"id":[{"id":"10.13039\/100001143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543873.3587607","type":"proceedings-article","created":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T11:36:14Z","timestamp":1682681774000},"page":"1348-1357","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Towards Automated Detection of Risky Images Shared by Youth on Social Media"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0804-832X","authenticated-orcid":false,"given":"Jinkyung","family":"Park","sequence":"first","affiliation":[{"name":"Vanderbilt University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0658-7938","authenticated-orcid":false,"given":"Joshua","family":"Gracie","sequence":"additional","affiliation":[{"name":"University of Central Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1569-9662","authenticated-orcid":false,"given":"Ashwaq","family":"Alsoubai","sequence":"additional","affiliation":[{"name":"Vanderbilt University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6162-578X","authenticated-orcid":false,"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"Boston University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8194-2336","authenticated-orcid":false,"given":"Vivek","family":"Singh","sequence":"additional","affiliation":[{"name":"Rutgers University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6223-1029","authenticated-orcid":false,"given":"Pamela","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"Vanderbilt University, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Shiza Ali Afsaneh Razi Kim Seunghyun Ashwaq Alsoubai Joshua Gracie Munmun De\u00a0Choudhury Pamela\u00a0J Wisniewski and Gianluca Stringhini. 2022. Understanding the Digital Lives of Youth: Analyzing Media Shared within Safe Versus Unsafe Private Conversations on Instagram. (2022).","DOI":"10.1145\/3491102.3501969"},{"key":"e_1_3_2_1_2_1","volume-title":"Social Media and Technology","author":"Anderson Monica","year":"2018","unstructured":"Monica Anderson and Jingjing Jiang. 2018. Teens, Social Media and Technology 2018. https:\/\/www.pewresearch.org\/internet\/2018\/05\/31\/teens-social-media-technology-2018\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00676"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432930"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0169839"},{"key":"e_1_3_2_1_6_1","unstructured":"Gedas Bertasius Heng Wang and Lorenzo Torresani. 2021. Is space-time attention all you need for video understanding?. In ICML Vol.\u00a02. 4."},{"key":"e_1_3_2_1_7_1","volume-title":"Boosting child abuse victim identification in Forensic Tools with hashing techniques. V Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad 1","author":"Biswas Rubel","year":"2019","unstructured":"Rubel Biswas, Victor Gonz\u00e1lez-Castro, E Fidalgo, and Deisy Chaves. 2019. Boosting child abuse victim identification in Forensic Tools with hashing techniques. V Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad 1 (2019), 344\u2013345."},{"key":"e_1_3_2_1_8_1","volume-title":"Thematic analysis","author":"Braun Virginia","unstructured":"Virginia Braun and Victoria Clarke. 2012. Thematic analysis.American Psychological Association."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00951"},{"key":"e_1_3_2_1_11_1","volume-title":"International conference on machine learning. PMLR, 1597\u20131607","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In International conference on machine learning. PMLR, 1597\u20131607."},{"key":"e_1_3_2_1_12_1","volume-title":"Improved baselines with momentum contrastive learning. arXiv preprint arXiv:2003.04297","author":"Chen Xinlei","year":"2020","unstructured":"Xinlei Chen, Haoqi Fan, Ross Girshick, and Kaiming He. 2020. Improved baselines with momentum contrastive learning. arXiv preprint arXiv:2003.04297 (2020)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-3018"},{"key":"e_1_3_2_1_14_1","volume-title":"The context of sexual violence: Situational predictors of self-protective actions. Violence and victims 18, 5","author":"Clay-Warner Jody","year":"2003","unstructured":"Jody Clay-Warner. 2003. The context of sexual violence: Situational predictors of self-protective actions. Violence and victims 18, 5 (2003), 543\u2013556."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/00224499.2017.1386763"},{"key":"e_1_3_2_1_16_1","volume-title":"An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929","author":"Dosovitskiy Alexey","year":"2020","unstructured":"Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, 2020. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"James\u00a0W Drisko and Tina Maschi. 2016. Content analysis. Pocket Guide to Social Work Re.","DOI":"10.1093\/acprof:oso\/9780190215491.001.0001"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300364"},{"key":"e_1_3_2_1_19_1","unstructured":"facebookresearch\/dino. 2022. facebookresearch\/dino. https:\/\/github.com\/facebookresearch\/dino"},{"key":"e_1_3_2_1_20_1","volume-title":"Youth internet safety education: Aligning programs with the evidence base. Trauma, violence, & abuse 22, 5","author":"Finkelhor David","year":"2021","unstructured":"David Finkelhor, Kerryann Walsh, Lisa Jones, Kimberly Mitchell, and Anne Collier. 2021. Youth internet safety education: Aligning programs with the evidence base. Trauma, violence, & abuse 22, 5 (2021), 1233\u20131247."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Abhishek Gangwar Eduardo Fidalgo Enrique Alegre and V\u00edctor Gonz\u00e1lez-Castro. 2017. Pornography and child sexual abuse detection in image and video: A comparative evaluation. (2017).","DOI":"10.1049\/ic.2017.0046"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.02.056"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.2190\/EC.45.2.a"},{"key":"e_1_3_2_1_24_1","volume-title":"Alcohol in the media: content and effects on drinking beliefs and behaviors among youth. Adolescent medicine clinics 16, 2","author":"Grube W","year":"2005","unstructured":"Joel\u00a0W Grube and Elizabeth Waiters. 2005. Alcohol in the media: content and effects on drinking beliefs and behaviors among youth. Adolescent medicine clinics 16, 2 (2005), 327."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7296"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27433-1_4"},{"key":"e_1_3_2_1_28_1","unstructured":"ImageNet. 2021. ImageNet. https:\/\/www.image-net.org\/"},{"key":"e_1_3_2_1_29_1","unstructured":"Instagram. 2022. Abuse and Spam. https:\/\/help.instagram.com\/165828726894770"},{"key":"e_1_3_2_1_30_1","unstructured":"Instagram. 2022. How do I send a message to someone on Instagram?https:\/\/help.instagram.com\/155540431448273"},{"key":"e_1_3_2_1_31_1","volume-title":"International conference on machine learning. PMLR, 4651\u20134664","author":"Jaegle Andrew","year":"2021","unstructured":"Andrew Jaegle, Felix Gimeno, Andy Brock, Oriol Vinyals, Andrew Zisserman, and Joao Carreira. 2021. Perceiver: General perception with iterative attention. In International conference on machine learning. PMLR, 4651\u20134664."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2011.09.015"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508576"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476066"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2018.02.009"},{"key":"e_1_3_2_1_36_1","volume-title":"Workshop on challenges in representation learning, ICML, Vol.\u00a03. 896","author":"Lee Dong-Hyun","year":"2013","unstructured":"Dong-Hyun Lee 2013. Pseudo-label: The simple and efficient semi-supervised learning method for deep neural networks. In Workshop on challenges in representation learning, ICML, Vol.\u00a03. 896."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"e_1_3_2_1_38_1","volume-title":"Slutpage use among US college students: the secret and social platforms of image-based sexual abuse. Archives of sexual behavior 50, 5","author":"Maas K","year":"2021","unstructured":"Megan\u00a0K Maas, Kyla\u00a0M Cary, Elizabeth\u00a0M Clancy, Bianca Klettke, Heather\u00a0L McCauley, and Jeff\u00a0R Temple. 2021. Slutpage use among US college students: the secret and social platforms of image-based sexual abuse. Archives of sexual behavior 50, 5 (2021), 2203\u20132214."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2018.00065"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2018.03.012"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106488"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3104051"},{"key":"e_1_3_2_1_43_1","volume-title":"The measurement of cyberbullying: Dimensional structure and relative item severity and discrimination. Cyberpsychology, behavior, and social networking 14, 5","author":"Menesini Ersilia","year":"2011","unstructured":"Ersilia Menesini, Annalaura Nocentini, and Pamela Calussi. 2011. The measurement of cyberbullying: Dimensional structure and relative item severity and discrimination. Cyberpsychology, behavior, and social networking 14, 5 (2011), 267\u2013274."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amepre.2007.02.001"},{"key":"e_1_3_2_1_45_1","first-page":"21199","article-title":"Uncertainty-aware self-training for few-shot text classification","volume":"33","author":"Mukherjee Subhabrata","year":"2020","unstructured":"Subhabrata Mukherjee and Ahmed Awadallah. 2020. Uncertainty-aware self-training for few-shot text classification. Advances in Neural Information Processing Systems 33 (2020), 21199\u201321212.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.09.135"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2011-0054"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.07.002"},{"key":"e_1_3_2_1_49_1","volume-title":"Stand-alone self-attention in vision models. Advances in Neural Information Processing Systems 32","author":"Ramachandran Prajit","year":"2019","unstructured":"Prajit Ramachandran, Niki Parmar, Ashish Vaswani, Irwan Bello, Anselm Levskaya, and Jon Shlens. 2019. Stand-alone self-attention in vision models. Advances in Neural Information Processing Systems 32 (2019)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479609"},{"key":"e_1_3_2_1_51_1","first-page":"1","article-title":"Instagram photos reveal predictive markers of depression","volume":"6","author":"Reece G","year":"2017","unstructured":"Andrew\u00a0G Reece and Christopher\u00a0M Danforth. 2017. Instagram photos reveal predictive markers of depression. EPJ Data Science 6 (2017), 1\u201312.","journal-title":"EPJ Data Science"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2019.104696"},{"key":"e_1_3_2_1_53_1","unstructured":"Mamshad\u00a0Nayeem Rizve Kevin Duarte Yogesh\u00a0S Rawat and Mubarak Shah. 2021. In defense of pseudo-labeling: An uncertainty-aware pseudo-label selection framework for semi-supervised learning. arXiv preprint arXiv:2101.06329 (2021)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479517"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449076"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01228-1_19"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2013.59"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053169"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274433"},{"key":"e_1_3_2_1_60_1","volume-title":"the collective online self-Portrait of the social media generation. Journal of Youth Studies","author":"Stahl Catherine\u00a0Cheng","year":"2022","unstructured":"Catherine\u00a0Cheng Stahl and Ioana Literat. 2022. # GenZ on TikTok: the collective online self-Portrait of the social media generation. Journal of Youth Studies (2022), 1\u201322."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00028"},{"key":"e_1_3_2_1_62_1","volume-title":"International Conference on Machine Learning. PMLR, 10347\u201310357","author":"Touvron Hugo","year":"2021","unstructured":"Hugo Touvron, Matthieu Cord, Matthijs Douze, Francisco Massa, Alexandre Sablayrolles, and Herv\u00e9 J\u00e9gou. 2021. Training data-efficient image transformers & distillation through attention. In International Conference on Machine Learning. PMLR, 10347\u201310357."},{"key":"e_1_3_2_1_63_1","volume-title":"Attention is all you need. Advances in neural information processing systems 30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan\u00a0N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_64_1","volume-title":"2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA).","author":"Vishwamitra Nishant","year":"2021","unstructured":"Nishant Vishwamitra, Hongxin Hu, Feng Luo, and Long Cheng. 2021. Towards understanding and detecting cyberbullying in real-world images. In 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA)."},{"key":"e_1_3_2_1_65_1","volume-title":"Teens and cyberbullying","author":"Vogels A","year":"2022","unstructured":"Emily\u00a0A Vogels. 2022. Teens and cyberbullying 2022. https:\/\/www.pewresearch.org\/internet\/2022\/12\/15\/teens-and-cyberbullying-2022\/"},{"key":"e_1_3_2_1_66_1","volume-title":"social media and technology","author":"Vogels A","year":"2022","unstructured":"Emily\u00a0A Vogels, Risa Gelles-Watnick, and Navid Massarat. 2022. Teens, social media and technology 2022. https:\/\/www.pewresearch.org\/internet\/2022\/08\/10\/teens-social-media-and-technology-2022\/"},{"key":"e_1_3_2_1_67_1","volume-title":"A systematic review of the current knowledge regarding revenge pornography and non-consensual sharing of sexually explicit media. Aggression and violent behavior 36","author":"Walker Kate","year":"2017","unstructured":"Kate Walker and Emma Sleath. 2017. A systematic review of the current knowledge regarding revenge pornography and non-consensual sharing of sexually explicit media. Aggression and violent behavior 36 (2017), 9\u201324."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00061"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.142"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858317"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00393"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2017.7998260"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32245-8_67"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1177\/1470357216643220"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01395-y"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"crossref","unstructured":"Haoti Zhong Hao Li Anna\u00a0Cinzia Squicciarini Sarah\u00a0Michele Rajtmajer Christopher Griffin David\u00a0J Miller and Cornelia Caragea. 2016. Content-Driven Detection of Cyberbullying on the Instagram Social Network.. In IJCAI Vol.\u00a016. 3952\u20133958.","DOI":"10.24963\/ijcai.2017\/552"},{"key":"e_1_3_2_1_77_1","volume-title":"Deformable detr: Deformable transformers for end-to-end object detection. arXiv preprint arXiv:2010.04159","author":"Zhu Xizhou","year":"2020","unstructured":"Xizhou Zhu, Weijie Su, Lewei Lu, Bin Li, Xiaogang Wang, and Jifeng Dai. 2020. Deformable detr: Deformable transformers for end-to-end object detection. arXiv preprint arXiv:2010.04159 (2020)."}],"event":{"name":"WWW '23: The ACM Web Conference 2023","location":"Austin TX USA","acronym":"WWW '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Companion Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543873.3587607","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543873.3587607","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543873.3587607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T23:48:54Z","timestamp":1755820134000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543873.3587607"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":77,"alternative-id":["10.1145\/3543873.3587607","10.1145\/3543873"],"URL":"https:\/\/doi.org\/10.1145\/3543873.3587607","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}