{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T16:28:16Z","timestamp":1774888096373,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/bibm.2016.7822752","type":"proceedings-article","created":{"date-parts":[[2017,1,20]],"date-time":"2017-01-20T03:36:10Z","timestamp":1484883370000},"page":"1555-1560","source":"Crossref","is-referenced-by-count":8,"title":["Analyzing and retrieving illicit drug-related posts from social media"],"prefix":"10.1109","author":[{"family":"Tao Ding","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Arpita Roy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Zhiyuan Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Qian Zhu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Shimei Pan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","first-page":"3","article-title":"Recurrent neural network based language model","volume":"2","author":"mikolov","year":"2010","journal-title":"InterSpeech"},{"key":"ref38","first-page":"1137","article-title":"A neural probabilistic language model","volume":"3","author":"bengio","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"ref33","first-page":"4","article-title":"Nttmunsw system for adverse drug reactions extraction in twitter data","author":"wang","year":"2016","journal-title":"Proceedings of the Social Media Mining Shared Task Workshop at the Pacific Symposium on Biocomputing"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocu041"},{"key":"ref31","first-page":"856","article-title":"Online learning for latent dirichlet allocation","author":"hoffman","year":"2010","journal-title":"Advances in neural information processing systems"},{"key":"ref30","first-page":"424","article-title":"A latent dirichlet allocation method for selectional preferences","author":"ritter","year":"2010","journal-title":"Proceedings annual meeting of the Association for Computational Linguistics"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1064"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W15-1524"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2014.59"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1146"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1979742.1979614"},{"key":"ref40","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013","journal-title":"arXiv preprint arXiv 1301 3781"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v3i1.13970","article-title":"Event detection and tracking in social streams","author":"sayyadi","year":"2009","journal-title":"ICWSM"},{"key":"ref12","first-page":"1568","article-title":"Twitter catches the flu: detecting influenza epidemics using twitter","author":"aramaki","year":"2011","journal-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.125"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s40264-015-0379-4"},{"key":"ref15","article-title":"Understanding illicit drug use behaviors by mining social media","author":"zhou","year":"2016","journal-title":"arXiv preprint arXiv 1604 07096"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341558"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390425"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1291233.1291384"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646021"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639726"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugalcdep.2008.11.011"},{"key":"ref27","first-page":"29","article-title":"Latent dirichlet allocation in web spam filtering","author":"b\u00edr\u00f3","year":"2008","journal-title":"Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.clinpsy.3.022806.091408"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1001\/archpsyc.1986.01800120017004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1342211.1342234"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0376-8716(96)01298-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4603(00)00119-2"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1111\/j.1943-278X.1995.tb00490.x","article-title":"Risk factors for adolescent suicide and suicidal behavior: mental and substance abuse disorders, family environmental factors, and life stress","volume":"25","author":"brent","year":"1995","journal-title":"Suicide and Life-Threatening Behavior"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00213-008-1173-0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1177\/002204268701700202"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0376-8716(98)00101-X"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341557"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453934"},{"key":"ref21","first-page":"438","article-title":"Beyond trending topics: Realworld event identification on twitter","volume":"11","author":"becker","year":"2011","journal-title":"ICWSM"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959927"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367633"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972764.5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1390749.1390764"}],"event":{"name":"2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","location":"Shenzhen, China","start":{"date-parts":[[2016,12,15]]},"end":{"date-parts":[[2016,12,18]]}},"container-title":["2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7811899\/7822470\/07822752.pdf?arnumber=7822752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T17:36:59Z","timestamp":1749922619000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7822752\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/bibm.2016.7822752","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}