{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T04:24:05Z","timestamp":1770611045126,"version":"3.49.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/asonam.2018.8508280","type":"proceedings-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T23:19:29Z","timestamp":1540509569000},"page":"77-82","source":"Crossref","is-referenced-by-count":2,"title":["When do Crowds Turn Violent? Uncovering Triggers from Media"],"prefix":"10.1109","author":[{"given":"Yue","family":"Ning","sequence":"first","affiliation":[]},{"given":"Sathappan","family":"Muthiah","sequence":"additional","affiliation":[]},{"given":"Naren","family":"Ramakrishnan","sequence":"additional","affiliation":[]},{"given":"Huzefa","family":"Rangwala","sequence":"additional","affiliation":[]},{"given":"David","family":"Mares","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273643"},{"key":"ref11","first-page":"1012","article-title":"Towards discovering what patterns trigger what labels","author":"li","year":"2012","journal-title":"Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783380"},{"key":"ref13","first-page":"1188","article-title":"Distributed representations of sentences and documents","author":"le","year":"2014","journal-title":"Proceedings of the 31st International Conference on International Conference on Machine Learning"},{"key":"ref14","first-page":"561","article-title":"Support vector machines for multiple-instance learning","volume":"15","author":"andrews","year":"2002","journal-title":"Proceedings of Advances in Neural Information Processing Systems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.145"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2579233"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623373"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783377"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/978-3-642-29047-3_28","article-title":"Automatic crime prediction using events extracted from twitter posts","author":"wang","year":"2012","journal-title":"International Conference on Social Computing Behavioral-Cultural Modeling and Prediction"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19318-7_35"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939709"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2012.6239348"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939802"},{"key":"ref9","first-page":"930","author":"lin","year":"2009","journal-title":"Weakly-Supervised Violence Detection in Movies with Audio and Video Based Co-training"}],"event":{"name":"2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","location":"Barcelona","start":{"date-parts":[[2018,8,28]]},"end":{"date-parts":[[2018,8,31]]}},"container-title":["2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488381\/8508239\/08508280.pdf?arnumber=8508280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T20:59:40Z","timestamp":1643230780000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8508280\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/asonam.2018.8508280","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}