{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:33:05Z","timestamp":1762522385000,"version":"3.37.3"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2954884","type":"journal-article","created":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T21:01:17Z","timestamp":1574370077000},"page":"172178-172189","source":"Crossref","is-referenced-by-count":10,"title":["Implicit Life Event Discovery From Call Transcripts Using Temporal Input Transformation Network"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3479-2774","authenticated-orcid":false,"given":"Nima","family":"Ebadi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7126-0120","authenticated-orcid":false,"given":"Brandon","family":"Lwowski","sequence":"additional","affiliation":[]},{"given":"Mehrad","family":"Jaloli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9671-577X","authenticated-orcid":false,"given":"Paul","family":"Rad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.2307\/2982063"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1146\/annurev-statistics-022513-115657"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1016\/S0306-4573(02)00021-3"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/1361684.1361686"},{"year":"2010","author":"perkins","journal-title":"Python Text Processing With NLTK 2 0 Cookbook Over 80 Practical Recipes for Using Python&#x2019;s NLTK Suite of Libraries to Maximize Your Natural Language Processing Capabilities","key":"ref31"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.18653\/v1\/D18-1549"},{"key":"ref37","first-page":"5809","article-title":"First-order adversarial vulnerability of neural networks and input dimension","author":"simon-gabriel","year":"2019","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref36","first-page":"5719","article-title":"Mixture models for diverse machine translation: Tricks of the trade","author":"shen","year":"2019","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref35","first-page":"6428","article-title":"Probabilistic neural-symbolic models for interpretable visual question answering","author":"vedantam","year":"2019","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref34","article-title":"Countering adversarial images using input transformations","author":"guo","year":"2017","journal-title":"arXiv 1711 00117"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1145\/3137597.3137600"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1016\/j.ipm.2004.11.005"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1137\/1.9781611972740.45"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.23919\/WAC.2018.8430483"},{"year":"2016","author":"goodfellow","journal-title":"Deep Learning","key":"ref27"},{"year":"2008","author":"kummamuru","article-title":"Method of analyzing conversational transcripts","key":"ref29"},{"year":"2019","author":"herrin","article-title":"Managing, monitoring and transcribing concurrent meetings and\/or conference calls","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ASRU.1997.659129"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.3115\/v1\/D14-1214"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.18653\/v1\/D18-1122"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.18653\/v1\/D18-1127"},{"key":"ref24","first-page":"107","article-title":"Applying a culture dependent emotion triggers database for text valence and emotion classification","author":"balahur","year":"2008","journal-title":"Procesamiento del lenguaje natural"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/3319921.3319937"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/978-3-662-44851-9_28","article-title":"Large-scale multi-label text classification&#x2014;Revisiting neural networks","author":"nam","year":"2014","journal-title":"Proc Eur Conf Mach Learn Knowl Discovery Databases"},{"key":"ref25","first-page":"1","article-title":"Rethinking sentiment analysis in the news: From theory to practice and back","volume":"9","author":"balahur","year":"2009","journal-title":"Proc WOMSA"},{"key":"ref50","first-page":"2440","article-title":"End-to-end memory networks","author":"sukhbaatar","year":"2015","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref51","article-title":"A simple but tough-to-beat baseline for the fake news challenge stance detection task","author":"riedel","year":"2017","journal-title":"arXiv 1707 03264"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1145\/2939672.2939785"},{"year":"2017","author":"mrowca","article-title":"Stance detection for fake news identification","key":"ref58"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1109\/TKDE.2016.2522427"},{"key":"ref56","article-title":"FastText.zip: Compressing text classification models","author":"joulin","year":"2016","journal-title":"arXiv 1612 03651"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.18653\/v1\/W18-5306"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1007\/s00365-006-0663-2"},{"key":"ref53","article-title":"Tensorflow: Large-scale machine learning on heterogeneous distributed systems","author":"abadi","year":"2016","journal-title":"arXiv 1603 04467"},{"key":"ref52","article-title":"TensorFlow eager: A multi-stage, python-embedded DSL for machine learning","author":"agrawal","year":"2019","journal-title":"arXiv 1903 01855"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.3233\/IDT-140195"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1002\/dir.20057"},{"key":"ref40","first-page":"856","article-title":"Online learning for latent Dirichlet allocation","author":"hoffman","year":"2010","journal-title":"Proc Adv Neural Inf Process Syst"},{"year":"2015","author":"ripa","article-title":"Real-time call center call monitoring and analysis","key":"ref12"},{"year":"2002","author":"hoyle","journal-title":"Event Marketing","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/1062745.1062924"},{"key":"ref15","first-page":"1","article-title":"Automatic summarization of call-center conversations","author":"stepanov","year":"2015","journal-title":"Proc IEEE Workshop Autom Speech Recognition Understanding (ASRU)"},{"key":"ref16","article-title":"Geospatial event detection by grouping emotion contagion in social media","author":"lwowski","year":"0","journal-title":"IEEE Trans Big Data"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1609\/icwsm.v8i1.14572","article-title":"Facebook, Twitter and Google plus for breaking news: Is there a winner?","author":"osborne","year":"2014","journal-title":"Proc Int'l AAAI Conf Weblogs and Social Media"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2339530.2339704"},{"key":"ref19","first-page":"207","article-title":"Real-time news event extraction for global crisis monitoring","author":"tanev","year":"2008","journal-title":"Proc Int Conf Natural Lang and Inf Syst"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/s10579-013-9224-5"},{"year":"2011","author":"gawronski","journal-title":"Handbook of Implicit Social Cognition Measurement Theory and Applications","key":"ref3"},{"year":"2015","author":"deshmukh","article-title":"Intent discovery in audio or text-based conversation","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1645953.1646128"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICME.2008.4607730"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1186\/s13388-014-0008-2"},{"key":"ref49","article-title":"Memory networks","author":"weston","year":"2014","journal-title":"arXiv 1410 3916"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/INFCOM.2013.6566966"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref45","first-page":"100","article-title":"Automatic evaluation of topic coherence","author":"newman","year":"2010","journal-title":"Proc Hum Lang Technol Annu Conf North Amer Chapter Assoc Comput Linguistics"},{"key":"ref48","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-70338-1","author":"bianchi","year":"2017","journal-title":"Recurrent Neural Networks for Short-Term Load Forecasting An Overview and Comparative Analysis"},{"key":"ref47","article-title":"The unreasonable effectiveness of recurrent neural networks","volume":"21","author":"karpathy","year":"2015","journal-title":"Andrej Karpathy blog"},{"key":"ref42","first-page":"283","article-title":"Generalized nonnegative matrix approximations with Bregman divergences","author":"sra","year":"2006","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref41","first-page":"993","article-title":"Latent Dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"J Mach Learn Res"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1145\/2684822.2685324"},{"key":"ref43","first-page":"556","article-title":"Algorithms for non-negative matrix factorization","author":"lee","year":"2001","journal-title":"Proc Adv Neural Inf Process Syst"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08908668.pdf?arnumber=8908668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T06:34:11Z","timestamp":1695450851000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8908668\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2954884","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}