
Inakollu, A., Kranthi, S., and A, J. (2024). A novel approach
to data security in cloud storage using erasure coding
and re-encryption. In 2024 8th International Confer-
ence on I-SMAC (IoT in Social, Mobile, Analytics and
Cloud) (I-SMAC), pages 972–976.
Krisnanik, E., Isnainiyah, I. N., and Resdiansyah, A. Z. A.
(2020). The development of mobile-based applica-
tion for mental health counseling during the covid-19
pandemic. In 2020 International Conference on In-
formatics, Multimedia, Cyber and Information System
(ICIMCIS), pages 324–328.
Latif, S., Hao, Y., Zhang, H., Bassily, R., and Rountev, A.
(2020). Introducing differential privacy mechanisms
for mobile app analytics of dynamic content. In 2020
IEEE International Conference on Software Mainte-
nance and Evolution (ICSME), pages 267–277.
Lim, S., Kim, Y., Choi, C.-H., Sohn, J.-y., and Kim, B.-H.
(2024). ERD: A framework for improving LLM rea-
soning for cognitive distortion classification. In Pro-
ceedings of the 6th Clinical Natural Language Pro-
cessing Workshop, pages 292–300, Mexico City, Mex-
ico. Association for Computational Linguistics.
Liu, Y., Ott, M., Goyal, N., Du, J., Joshi, M., Chen, D.,
Levy, O., Lewis, M., Zettlemoyer, L., and Stoyanov,
V. (2019). Roberta: A robustly optimized bert pre-
training approach. arXiv preprint arXiv:1907.11692.
Mostafa, M., El Bolock, A., and Abdennadher, S. (2021).
Automatic detection and classification of cognitive
distortions in journaling text. In WEBIST, pages 444–
452.
Na, H. (2024). CBT-LLM: A Chinese large language
model for cognitive behavioral therapy-based mental
health question answering. In Proceedings of the 2024
Joint International Conference on Computational Lin-
guistics, Language Resources and Evaluation (LREC-
COLING 2024), pages 2930–2940, Torino, Italia.
ELRA and ICCL.
O’Loughlin, K., Neary, M., Adkins, E. C., and Schueller,
S. M. (2019). Reviewing the data security and pri-
vacy policies of mobile apps for depression. Internet
Interventions, 15:110–115.
Parker, L., Halter, V., Karliychuk, T., and Grundy, Q.
(2019). How private is your mental health app data?
an empirical study of mental health app privacy poli-
cies and practices. International Journal of Law and
Psychiatry, 64:198–204.
Pico, A., Taverner, J., Vivancos, E., and Garcia-Fornes, A.
(2025). Comparative analysis of the efficacy in the
classification of cognitive distortions using llms. In
Proceedings of the 17th International Conference on
Agents and Artificial Intelligence - Volume 1: EAA,
pages 957–965. INSTICC, SciTePress.
Qi, H., Zhao, Q., Li, J., Song, C., Zhai, W., Luo, D., Liu,
S., Yu, Y. J., Wang, F., Zou, H., et al. (2023). Super-
vised learning and large language model benchmarks
on mental health datasets: Cognitive distortions and
suicidal risks in chinese social media. arXiv preprint
arXiv:2309.03564.
Rasmy, M., Sabty, C., Sakr, N., and El Bolock, A. (2024).
Enhanced cognitive distortions detection and classifi-
cation through data augmentation techniques. In Pa-
cific Rim International Conference on Artificial Intel-
ligence, pages 134–145. Springer.
Samuel, M. and Shirley, C. (2023). Mindset, an android-
based mental wellbeing support mobile application. In
2023 3rd International Conference on Pervasive Com-
puting and Social Networking (ICPCSN), pages 989–
996.
Shickel, B., Siegel, S., Heesacker, M., Benton, S., and
Rashidi, P. (2020a). Automatic detection and clas-
sification of cognitive distortions in mental health
text. In 2020 IEEE 20th International Conference
on Bioinformatics and Bioengineering (BIBE), pages
275–280.
Shickel, B., Siegel, S., Heesacker, M., Benton, S., and
Rashidi, P. (2020b). Automatic detection and clas-
sification of cognitive distortions in mental health
text. In 2020 IEEE 20th International Conference
on Bioinformatics and Bioengineering (BIBE), pages
275–280. IEEE.
Shreevastava, S. and Foltz, P. (2021). Detecting cognitive
distortions from patient-therapist interactions. In Pro-
ceedings of the Seventh Workshop on Computational
Linguistics and Clinical Psychology: Improving Ac-
cess, pages 151–158.
Suguna, M. and Shalinie, S. M. (2017). Privacy preserv-
ing data auditing protocol for secure storage in mobile
cloud computing. In 2017 International Conference
on Wireless Communications, Signal Processing and
Networking (WiSPNET), pages 2725–2729.
Tasnim, R. A. and Eishita, F. Z. (2022). Arcod: A serious
gaming approach to measure cognitive distortions. In
2022 IEEE 10th International Conference on Serious
Games and Applications for Health(SeGAH), pages
1–8.
Vichare, A., Jose, T., Tiwari, J., and Yadav, U. (2017). Data
security using authenticated encryption and decryp-
tion algorithm for android phones. In 2017 Interna-
tional Conference on Computing, Communication and
Automation (ICCCA), pages 789–794.
Vijay Sai, R., Geetha B, G., Yogeshwaran, S., Vignesh,
A., and Santhosh, D. (2024). Implementation mod-
ular encryption to safeguard health data in mobile
cloud environments. In 2024 3rd International Con-
ference on Applied Artificial Intelligence and Comput-
ing (ICAAIC), pages 1352–1357.
Wang, B., Deng, P., Zhao, Y., and Qin, B. (2023). C2d2
dataset: A resource for the cognitive distortion analy-
sis and its impact on mental health. In Findings of the
Association for Computational Linguistics: EMNLP
2023, pages 10149–10160.
Whaiduzzaman, M., Hossain, M. R., Shovon, A. R., Roy,
S., Laszka, A., Buyya, R., and Barros, A. (2020). A
privacy-preserving mobile and fog computing frame-
work to trace and prevent covid-19 community trans-
mission. IEEE Journal of Biomedical and Health In-
formatics, 24(12):3564–3575.
Zhou, T., Cai, Z., Xiao, B., Wang, L., Xu, M., and Chen, Y.
(2018). Location privacy-preserving data recovery for
mobile crowdsensing. volume 2, pages 1–23.
ICSOFT 2025 - 20th International Conference on Software Technologies
368