{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:02:18Z","timestamp":1743026538687,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811507571"},{"type":"electronic","value":"9789811507588"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-0758-8_14","type":"book-chapter","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T17:47:53Z","timestamp":1571852873000},"page":"181-190","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Online Event Detection in Social Media with Bursty Event Recognition"],"prefix":"10.1007","author":[{"given":"Wanlun","family":"Ma","sequence":"first","affiliation":[]},{"given":"Zhuo","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiangyu","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,24]]},"reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-319-18111-0_29","volume-title":"Computational Linguistics and Intelligent Text Processing","author":"N Alsaedi","year":"2015","unstructured":"Alsaedi, N., Burnap, P.: Arabic event detection in social media. In: Gelbukh, A. (ed.) CICLing 2015. LNCS, vol. 9041, pp. 384\u2013401. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18111-0_29"},{"issue":"2","key":"14_CR2","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/2996183","volume":"17","author":"N Alsaedi","year":"2017","unstructured":"Alsaedi, N., Burnap, P., Rana, O.: Can we predict a riot? Disruptive event detection using twitter. ACM Trans. Internet Technol. (TOIT) 17(2), 18 (2017)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Becker, H., Naaman, M., Gravano, L.: Beyond trending topics: real-world event identification on twitter. In: ICWSM, vol. 11, pp. 438\u2013441 (2011)","DOI":"10.1609\/icwsm.v5i1.14146"},{"issue":"Jan","key":"14_CR4","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3(Jan), 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"14_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"issue":"1","key":"14_CR6","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/s13278-014-0206-4","volume":"4","author":"P Burnap","year":"2014","unstructured":"Burnap, P., Williams, M.L., Sloan, L., Rana, O., Housley, W., Edwards, A., Knight, V., Procter, R., Voss, A.: Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Soc. Netw. Anal. Min. 4(1), 206 (2014)","journal-title":"Soc. Netw. Anal. Min."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Chen, G., Kong, Q., Mao, W.: Online event detection and tracking in social media based on neural similarity metric learning. In: IEEE International Conference on Intelligence and Security Informatics, pp. 182\u2013184 (2017)","DOI":"10.1109\/ISI.2017.8004905"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zhang, H., Wu, J., Wang, X., Liu, R., Lin, M.: Modeling emerging, evolving and fading topics using dynamic soft orthogonal NMF with sparse representation. In: 2015 IEEE International Conference on Data Mining (ICDM), pp. 61\u201370. IEEE (2015)","DOI":"10.1109\/ICDM.2015.96"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Ghenai, A., Mejova, Y.: Catching Zika fever: application of crowdsourcing and machine learning for tracking health misinformation on twitter. arXiv preprint arXiv:1707.03778 (2017)","DOI":"10.1109\/ICHI.2017.58"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Guille, A., Favre, C.: Mention-anomaly-based event detection and tracking in twitter. In: 2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), pp. 375\u2013382. IEEE (2014)","DOI":"10.1109\/ASONAM.2014.6921613"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Kalyanam, J.: Leveraging social context for modeling topic evolution. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 517\u2013526 (2015)","DOI":"10.1145\/2783258.2783319"},{"issue":"4","key":"14_CR12","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1023\/A:1024940629314","volume":"7","author":"J Kleinberg","year":"2003","unstructured":"Kleinberg, J.: Bursty and hierarchical structure in streams. Data Min. Knowl. Disc. 7(4), 373\u2013397 (2003)","journal-title":"Data Min. Knowl. Disc."},{"issue":"6755","key":"14_CR13","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1038\/44565","volume":"401","author":"DD Lee","year":"1999","unstructured":"Lee, D.D., Seung, H.S.: Learning the parts of objects by non-negative matrix factorization. Nature 401(6755), 788\u2013791 (1999)","journal-title":"Nature"},{"key":"14_CR14","first-page":"1250","volume":"1000","author":"J Liu","year":"2018","unstructured":"Liu, J., Chen, Y., Liu, K., Zhao, J.: Event detection via gated multilingual attention mechanism. Statistics 1000, 1250 (2018)","journal-title":"Statistics"},{"issue":"3","key":"14_CR15","first-page":"76","volume":"31","author":"L Palen","year":"2008","unstructured":"Palen, L.: Online social media in crisis events. Educ. Q. 31(3), 76\u201378 (2008)","journal-title":"Educ. Q."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Schinas, M., Papadopoulos, S., Petkos, G., Kompatsiaris, Y., Mitkas, P.A.: Multimodal graph-based event detection and summarization in social media streams. In: ACM International Conference on Multimedia, pp. 189\u2013192 (2015)","DOI":"10.1145\/2733373.2809933"},{"key":"14_CR17","unstructured":"Shearer, E., Gottfriend, J.: News use across social media platforms 2017. Pew Research Center (2017)"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Shin, D.S., et al.: STExNMF: spatio-temporally exclusive topic discovery for anomalous event detection. In: 2017 IEEE International Conference on Data Mining (ICDM), pp. 435\u2013444. IEEE (2017)","DOI":"10.1109\/ICDM.2017.53"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Sriram, B., Fuhry, D., Demir, E., Ferhatosmanoglu, H., Demirbas, M.: Short text classification in twitter to improve information filtering. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 841\u2013842. ACM (2010)","DOI":"10.1145\/1835449.1835643"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Xing, C., Wang, Y., Liu, J., Huang, Y., Ma, W.Y.: Hashtag-based sub-event discovery using mutually generative LDA in twitter. In: AAAI, pp. 2666\u20132672 (2016)","DOI":"10.1609\/aaai.v30i1.10326"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Zhao, L., Sun, Q., Ye, J., Chen, F., Lu, C.T., Ramakrishnan, N.: Multi-task learning for spatio-temporal event forecasting. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1503\u20131512. ACM (2015)","DOI":"10.1145\/2783258.2783377"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Social Networks and Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0758-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T01:01:40Z","timestamp":1695344500000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0758-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811507571","9789811507588"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0758-8_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SocialSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security and Privacy in Social Networks and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socialsec0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/socialsec2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"http:\/\/nsclab.org\/socialsec2019\/","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}