{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:26:21Z","timestamp":1760059581951,"version":"build-2065373602"},"reference-count":46,"publisher":"MDPI AG","issue":"13","license":[{"start":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T00:00:00Z","timestamp":1750723200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Sciences"],"abstract":"<jats:p>The complexity for law enforcement and child protection agencies has been exacerbated by the proliferation of child sexual exploitation channels, facilitated by digital platforms and social media. Generative AI\u2019s ability to analyze large datasets, recognize patterns, and generate new content makes it one of the potential solutions for detecting suspicious behavior and indicators of child sexual exploitation. This paper discusses the potential of generative AI to aid in the fight against pedophilic crimes by reviewing current research, methodologies, and challenges, as well as future directions and ethical concerns. Although the potential benefits are significant, applying AI to such a sensitive area presents numerous challenges, including privacy concerns, algorithmic bias, and potential misuse, which must be addressed carefully.<\/jats:p>","DOI":"10.3390\/app15137105","type":"journal-article","created":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T09:24:18Z","timestamp":1750757058000},"page":"7105","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Survey of Generative AI for Detecting Pedophilia Crimes"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-0974-3458","authenticated-orcid":false,"given":"Filipe","family":"Silva","sequence":"first","affiliation":[{"name":"Coimbra Institute of Engineering (ISEC), Polytechnic University of Coimbra, Rua Pedro Nunes\u2014Quinta da Nora, 3030-199 Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5741-6897","authenticated-orcid":false,"given":"Rodrigo Rocha","family":"Silva","sequence":"additional","affiliation":[{"name":"Centre for Informatics and Systems of the University of Coimbra (CISUC), P\u00f3lo II, Pinhal de Marrocos, 3030-290 Coimbra, Portugal"},{"name":"FATEC\u2014Faculdade de Tecnologia de Mogi das Cruzes, S\u00e3o Paulo Technological College, Mogi das Cruzes 08773-600, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9660-2011","authenticated-orcid":false,"given":"Jorge","family":"Bernardino","sequence":"additional","affiliation":[{"name":"Coimbra Institute of Engineering (ISEC), Polytechnic University of Coimbra, Rua Pedro Nunes\u2014Quinta da Nora, 3030-199 Coimbra, Portugal"},{"name":"Centre for Informatics and Systems of the University of Coimbra (CISUC), P\u00f3lo II, Pinhal de Marrocos, 3030-290 Coimbra, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,24]]},"reference":[{"key":"ref_1","unstructured":"Marvasti, J.A. (2004). Psychiatric Treatment of Sexual Offenders: Treating the Past Traumas in Traumatizers. A Bio-Psycho-Social Perspective, Charles C Thomas Publisher."},{"key":"ref_2","unstructured":"Cook, D., Zilka, M., DeSandre, H., Giles, S., Weller, A., and Maskell, S. (2022). Can We Automate the Analysis of Online Child Sexual Exploitation Discourse?. arXiv."},{"key":"ref_3","first-page":"1","article-title":"Artificial intelligence and child sexual abuse: A rapid evidence assessment","volume":"711","author":"Wolbers","year":"2025","journal-title":"Trends Issues Crime Crim. Justice"},{"key":"ref_4","unstructured":"Levy, I., and Robinson, C. (2022). Thoughts on child safety on commodity platforms. arXiv."},{"key":"ref_5","unstructured":"UNICRI\u2014United Nations Interregional Crime and Justice Research Institute (2025, May 06). New! How AI Is Leading the Fight Against Online Child Abuse. Available online: https:\/\/unicri.org\/News\/AI-for-Safer-Children-%20article-Emerging-Europe."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Puentes, J., Castillo, A., Osejo, W., Calder\u00f3n, Y., Quintero, V., and Saldarriaga, L. (2023, January 2\u20136). Guarding the Guardians: Automated Analysis of Online Child Sexual Abuse. Proceedings of the 2023 IEEE\/CVF International Conference on Computer Vision Workshops (ICCVW), Paris, France.","DOI":"10.1109\/ICCVW60793.2023.00400"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"110039","DOI":"10.1016\/j.knosys.2022.110039","article-title":"Online grooming detection: A comprehensive survey of child exploitation in chat logs","volume":"259","author":"Borj","year":"2023","journal-title":"Knowl.-Based Syst."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1016\/j.future.2021.10.003","article-title":"An effective hybrid collaborative algorithm for energy-efficient distributed permutation flow-shop inverse scheduling","volume":"128","author":"Mou","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"105998","DOI":"10.1016\/j.chiabu.2022.105998","article-title":"Identification of red flag child sexual grooming behaviors","volume":"136","author":"Jeglic","year":"2023","journal-title":"Child Abus. Negl."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Rani, G., Singh, J., and Khanna, A. (2023, January 23\u201324). Comparative Analysis of Generative AI Models. Proceedings of the 2023 International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT), Faridabad, India.","DOI":"10.1109\/ICAICCIT60255.2023.10465941"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Prosser, E., and Edwards, M. (2024, January 5\u20136). Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention. Proceedings of the EICC 2024: European Interdisciplinary Cybersecurity Conference, Xanthi, Greece.","DOI":"10.1145\/3655693.3655694"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"69","DOI":"10.48185\/jaai.v5i1.1052","article-title":"Gemini versus ChatGPT: Applications, performance, architecture, capabilities, and implementation","volume":"5","author":"Rane","year":"2024","journal-title":"J. Appl. Artif. Intell."},{"key":"ref_13","unstructured":"Buscemi, A., and Proverbio, D. (2024). ChatGPT vs Gemini vs LLaMA on Multilingual Sentiment Analysis. arXiv."},{"key":"ref_14","first-page":"1","article-title":"Detecting online grooming at its earliest stages: Development and validation of the Online Grooming Risk Scale","volume":"10","author":"Pasca","year":"2022","journal-title":"Mediterr. J. Clin. Psychol."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"103","DOI":"10.2753\/JEC1086-4415150305","article-title":"Learning to Identify Internet Sexual Predation","volume":"15","author":"McGhee","year":"2011","journal-title":"Int. J. Electron. Commer."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Upadhyay, A., Chaudhari, A., Ghale, S., and Pawar, S.S. (2017, January 19\u201320). Detection and prevention measures for cyberbullying and online grooming. Proceedings of the 2017 International Conference on Inventive Systems and Control (ICISC), Coimbatore, India.","DOI":"10.1109\/ICISC.2017.8068605"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Keyvanpour, M., Nayebi, N.G., Ebrahimi, M., Ormandjieva, O., and Suen, C.Y. (2016). Automated identification of child abuse in chat rooms by using data mining. Data Mining Trends and Applications in Criminal Science and Investigations, IGI Global.","DOI":"10.4018\/978-1-5225-0463-4.ch009"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Ngejane, C.H., Mabuza-Hocquet, G., Eloff, J.H.P., and Lefophane, S. (2018, January 6\u20137). Mitigating Online Sexual Grooming Cyber-crime on Social Media Using Machine Learning: A Desktop Survey. Proceedings of the 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD), Durban, South Africa.","DOI":"10.1109\/ICABCD.2018.8465413"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Anderson, P., Zuo, Z., Yang, L., and Qu, Y. (2019, January 23\u201326). An Intelligent Online Grooming Detection System Using AI Technologies. Proceedings of the 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), New Orleans, LA, USA.","DOI":"10.1109\/FUZZ-IEEE.2019.8858973"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.procs.2015.07.536","article-title":"Logistic Models for Classifying Online Grooming Conversation","volume":"59","author":"Pranoto","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Fauzi, M.A., Wolthusen, S., Yang, B., Bours, P., and Yeng, P. (2023, January 16\u201318). Identifying Sexual Predators in Chats Using SVM and Feature Ensemble. Proceedings of the 2023 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), Windhoek, Namibia.","DOI":"10.1109\/ETNCC59188.2023.10284950"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.diin.2016.07.001","article-title":"Detecting predatory conversations in social media by deep Convolutional Neural Networks","volume":"18","author":"Ebrahimi","year":"2016","journal-title":"Digit. Investig."},{"key":"ref_23","first-page":"33","article-title":"Identifying Online Sexual Grooming Content in Social Media Using Classification Technique","volume":"4","author":"Nasir","year":"2022","journal-title":"J. Adv. Comput. Technol. Appl."},{"key":"ref_24","unstructured":"Mila, K.C., Montreal, H., Caporossi, G., Rabbany, R., De Cock, M., and Mila, G.F. (2025, May 06). Early Detection of Sexual Predators with Federated Learning. May 2023. Available online: https:\/\/openreview.net\/pdf?id=M84OnT0ZvDq."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Eilifsen, T.N., Shrestha, B., and Bours, P. (2023, January 26\u201327). Early Detection of Cyber Grooming in Online Conversations: A Dynamic Trust Model and Sliding Window Approach. Proceedings of the 2023 21st International Conference on Emerging eLearning Technologies and Applications (ICETA), Stary Smokovec, Slovakia.","DOI":"10.1109\/ICETA61311.2023.10343952"},{"key":"ref_26","unstructured":"Liu, D., Suen, C.Y., and Ormandjieva, O. (2017). A Novel Way of Identifying Cyber Predators. arXiv."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Vogt, M., Leser, U., and Akbik, A. (2021, January 1\u20136). Early detection of sexual predators in chats. Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Bangkok, Thailand.","DOI":"10.18653\/v1\/2021.acl-long.386"},{"key":"ref_28","unstructured":"Simen, M.A. (2023). Fine Tuning BERT for Detecting Cyber Grooming in Online Chats. [Master\u2019s Thesis, Norwegian University of Science and Technology]. Available online: https:\/\/ntnuopen.ntnu.no\/ntnu-xmlui\/handle\/11250\/3088473."},{"key":"ref_29","unstructured":"Borj, P.R., Raja, K., and Bours, P. (2023, January 26). Detecting Online Grooming by Simple Contrastive Chat Embeddings. Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, Charlotte, NC, USA."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Nguyen, T.T., Wilson, C., and Dalins, J. (2024, January 9\u201311). Fine-Tuning Llama 2 Large Language Models for Detecting Online Sexual Predatory Chats and Abusive Texts. Proceedings of the European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, Bruges, Belgium.","DOI":"10.14428\/esann\/2024.ES2024-222"},{"key":"ref_31","first-page":"2079","article-title":"Deep Learning-Based Natural Language Processing Model and Optical Character Recognition for Detection of Online Grooming on Social Networking Services","volume":"143","author":"Kim","year":"2025","journal-title":"Comput. Model. Eng. Sci."},{"key":"ref_32","unstructured":"Kim, D., Kim, T., and Yang, J. (April, January 31). Early Detection of Online Grooming with Language Models. Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing, Catania International Airport, Catania, Italy."},{"key":"ref_33","unstructured":"Hamm, L. (2025). Advancing Grooming Detection in Chat Logs: Comparing Traditional Machine Learning and Large Language Models with a Focus on Predator Tone. [Master\u2019s Thesis, Uppsala University]. Available online: https:\/\/urn.kb.se\/resolve?urn=urn:nbn:se:uu:diva-550352."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3153","DOI":"10.1109\/TDSC.2023.3324275","article-title":"Metadata-Based Detection of Child Sexual Abuse Material","volume":"21","author":"Pereira","year":"2023","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_35","unstructured":"Struckman, K. (2025, May 06). Wilson Center. Combatting AI-Generated CSAM. February 2023. Available online: https:\/\/www.wilsoncenter.org\/article\/combatting-ai-generated-csam."},{"key":"ref_36","unstructured":"European Parliament (2025, May 06). Children and Generative AI. February 2025. Available online: https:\/\/www.europarl.europa.eu\/thinktank\/en\/document\/EPRS_ATA(2025)769494."},{"key":"ref_37","unstructured":"Hua, Y., Namavari, A., Cheng, K., Naaman, M., and Ristenpart, T. (2022, January 10\u201312). Increasing Adversarial Uncertainty to Scale Private Similarity Testing. Proceedings of the 31st USENIX Security Symposium, Boston, MA, USA. Available online: https:\/\/www.usenix.org\/system\/files\/sec22summer_hua.pdf."},{"key":"ref_38","unstructured":"Liang, P.P., Wu, C., Morency, L.P., and Salakhutdinov, R. (2021, January 18\u201324). Towards Understanding and Mitigating Social Biases in Language Models. Proceedings of the 38th International Conference on Machine Learning, Virtual. Available online: https:\/\/arxiv.org\/pdf\/2106.13219."},{"key":"ref_39","unstructured":"(2025, May 06). Monash University. Digital Child Abuse: Deepfakes and the Rising Danger of AI-Generated Exploitation. February 2025. Available online: https:\/\/lens.monash.edu\/@politics-society\/2025\/02\/25\/1387341\/digital-child-abuse-deepfakes-and-the-rising-danger-of-ai-generated-exploitation."},{"key":"ref_40","unstructured":"(2025, May 06). GOV.UK. Innovating to Detect Deepfakes and Protect the Public. February 2023, Available online: https:\/\/www.gov.uk\/government\/case-studies\/innovating-to-detect-deepfakes-and-protect-the-public."},{"key":"ref_41","unstructured":"Bang, Y., Ji, Z., Schelten, A., Hartshorn, A., Fowler, T., Zhang, C., Cancedda, N., and Fung, P. (2025). HalluLens: LLM Hallucination Benchmark. arXiv, Available online: https:\/\/arxiv.org\/pdf\/2504.17550."},{"key":"ref_42","unstructured":"EUCPN\u2014European Crime Prevention Network (2025, May 06). Artificial Intelligence and Predictive Policing: Risks and Challenges. June 2022. Available online: https:\/\/www.eucpn.org\/document\/recommendation-paper-artificial-intelligence-and-predictive-policing-risks-and-challenges."},{"key":"ref_43","unstructured":"(2025, May 06). GlobeNewswire. Multimodal AI at a Crossroads: Report Reveals CSEM Risks. May 2025. Available online: https:\/\/www.globenewswire.com\/news-release\/2025\/05\/08\/3077301\/0\/en\/Multimodal-AI-at-a-Crossroads-Report-Reveals-CSEM-Risks.html."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Coelho, T., Ribeiro, L.S.F., Macedo, J., Santos, J.A.D., and Avila, S. (2025). Minimizing Risk Through Minimizing Model-Data Interaction: A Protocol For Relying on Proxy Tasks When Designing Child Sexual Abuse Imagery Detection Models. arXiv, Available online: https:\/\/arxiv.org\/pdf\/2505.06621v1.","DOI":"10.1145\/3715275.3732102"},{"key":"ref_45","unstructured":"Bilal, A., Ebert, D., and Lin, B. (2025). LLMs for Explainable AI: A Comprehensive Survey. arXiv."},{"key":"ref_46","unstructured":"European Parliament (2025, May 06). Artificial Intelligence Act: MEPs Adopt Landmark Law. Press Release, 13 March 2024. Available online: https:\/\/www.europarl.europa.eu\/news\/en\/press-room\/20240308IPR19015\/artificial-intelligence-act-meps-adopt-landmark-law."}],"container-title":["Applied Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2076-3417\/15\/13\/7105\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:57:44Z","timestamp":1760032664000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2076-3417\/15\/13\/7105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,24]]},"references-count":46,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["app15137105"],"URL":"https:\/\/doi.org\/10.3390\/app15137105","relation":{},"ISSN":["2076-3417"],"issn-type":[{"type":"electronic","value":"2076-3417"}],"subject":[],"published":{"date-parts":[[2025,6,24]]}}}