{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T04:04:50Z","timestamp":1727323490424},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:00:00Z","timestamp":1725408000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:00:00Z","timestamp":1725408000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,4]]},"DOI":"10.1109\/inista62901.2024.10683849","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:22:01Z","timestamp":1727198521000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Emotion Detection on Fraudulent Accounts Using BERT and Kleinberg\u2019s Burst Algorithms in Indonesian Text"],"prefix":"10.1109","author":[{"given":"Muhammad Asri","family":"Safi\u2019Ie","sequence":"first","affiliation":[{"name":"Yamaguchi University,Graduate School of Sciences and Technology for Innovation,Yamaguchi,Japan"}]},{"given":"Kunhao","family":"Yang","sequence":"additional","affiliation":[{"name":"Yamaguchi University,Graduate School of Sciences and Technology for Innovation,Yamaguchi,Japan"}]},{"given":"Shingo","family":"Mabu","sequence":"additional","affiliation":[{"name":"Yamaguchi University,Graduate School of Sciences and Technology for Innovation,Yamaguchi,Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.03.041"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijlcj.2021.100482"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106979"},{"key":"ref4","first-page":"1","article-title":"Chapter 4: Improving the Cyber Crime Database","author":"Mc Guire","year":"2013","journal-title":"Cyber crime: a review of the evidence., Home Office"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcorpfin.2020.101694"},{"key":"ref6","article-title":"Why Businesses And Brands Need To Be Taking Advantage Of Social Media","author":"Pec","year":"2022","journal-title":"Forbes"},{"key":"ref7","article-title":"The Cambridge Analytica scandal changed the world but it didn\u2019t change Facebook","author":"Wong","year":"2019","journal-title":"Guardian News & Media Limited"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/2056305120913884"},{"key":"ref9","article-title":"Jumlahnya Terus Naik, SWI: Kerugian Masyarakat Akibat Investasi Ilegal Capai Rp. 123 T","author":"Mardiyansah","year":"2022","journal-title":"Kompas Gramedia"},{"article-title":"Provided proper attribution is provided, Google hereby grants permission to reproduce the tables and figures in this paper solely for use in journalistic or scholarly works","volume-title":"Conference on Neural Information Processing Systems (NIPS 2017)","author":"Vaswani","key":"ref10"},{"key":"ref11","article-title":"BERT: Pretraining of Deep Bidirectional Transformers for Language Understanding","author":"Devlin","year":"2019","journal-title":"NAACL 2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DATABIA53375.2021.9650096"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICoDT255437.2022.9787395"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.111112"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00782-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP52413.2021.00077"},{"article-title":"Detecting \u2018bursts\u2019 in time series data with Kleinberg\u2019s burst detection algorithm","year":"2017","author":"Marinsek","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775061"},{"key":"ref19","article-title":"Location-Based Burst Detection Algorithm in Spatiotemporal Document Stream","author":"Tamura","year":"2012","journal-title":"WorldComp. 2012 Proceedings"},{"article-title":"Identifying Event-related Bursts via Social Media Activities","volume-title":"Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning","author":"Zhao","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835862"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03717-4"}],"event":{"name":"2024 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","start":{"date-parts":[[2024,9,4]]},"location":"Craiova, Romania","end":{"date-parts":[[2024,9,6]]}},"container-title":["2024 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10683750\/10683751\/10683849.pdf?arnumber=10683849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:16:31Z","timestamp":1727241391000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10683849\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/inista62901.2024.10683849","relation":{},"subject":[],"published":{"date-parts":[[2024,9,4]]}}}