{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T03:26:28Z","timestamp":1776482788588,"version":"3.51.2"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T00:00:00Z","timestamp":1663027200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T00:00:00Z","timestamp":1663027200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,13]]},"DOI":"10.1109\/iicaiet55139.2022.9936788","type":"proceedings-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T20:44:15Z","timestamp":1668026655000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Detection of Social Media Hashtag Hijacking Using Dictionary-based and Machine Learning Methods"],"prefix":"10.1109","author":[{"given":"Wei Ling","family":"Cheah","sequence":"first","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]},{"given":"Hui Na","family":"Chua","sequence":"additional","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]}],"member":"263","reference":[{"key":"ref10","author":"campbell","year":"2021","journal-title":"What is Black Lives Matter and what are the aims?"},{"key":"ref11","author":"iorio","year":"2017","journal-title":"The True Impact of Black Lives Matter"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2487809"},{"key":"ref13","author":"hill","year":"2014","journal-title":"#McDStories When A Hashtag Becomes A Bashtag"},{"key":"ref14","author":"burke","year":"2019","journal-title":"McDonald backlash after Twitter campaign #McDstories"},{"key":"ref15","author":"fei","year":"0","journal-title":"A dictionary-based approach to identifying aspects implied by adjectives for opinion mining"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-818366-3.00005-8"},{"key":"ref17","author":"vandam","year":"2016","journal-title":"Detecting hashtag hijacking from Twitter | Proceedings of the 8th ACM Conference on Web Science"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.09.174"},{"key":"ref19","first-page":"46","article-title":"An Automated Topics Labelling Framework using Zero-Shot Text Classification","author":"khan","year":"2021","journal-title":"Journal of Engineering Science and Technology Special Issue on ACSAT"},{"key":"ref4","author":"field","year":"2021","journal-title":"Proceedings of the 1st Workshop on NLP for Positive Impact - ACL Anthology"},{"key":"ref3","author":"funches","year":"0","journal-title":"Hashtag Hijacking A Consumer Retaliation Behavior in the Digital World"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5120\/20085-2111"},{"key":"ref5","author":"goswami","year":"2018","journal-title":"Social Media and Hashtag Activism"},{"key":"ref8","author":"dadas","year":"0","journal-title":"HASHTAG ACTIVISM THE PROMISE AND RISK OF &#x2018;ATTENTION &#x2019;"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.nlp4posimpact-1.9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/mar.21191"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2478\/jec-2018-0006"},{"key":"ref9","author":"anderson","year":"2020","journal-title":"#BlackLivesMatter surges on Twitter after George Floyd's death"}],"event":{"name":"2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)","location":"Kota Kinabalu, Malaysia","start":{"date-parts":[[2022,9,13]]},"end":{"date-parts":[[2022,9,15]]}},"container-title":["2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9936688\/9936734\/09936788.pdf?arnumber=9936788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T20:22:02Z","timestamp":1669666922000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9936788\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,13]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iicaiet55139.2022.9936788","relation":{},"subject":[],"published":{"date-parts":[[2022,9,13]]}}}