{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:31:17Z","timestamp":1760596277208,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/isi.2017.8004905","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T20:42:42Z","timestamp":1502397762000},"page":"182-184","source":"Crossref","is-referenced-by-count":18,"title":["Online event detection and tracking in social media based on neural similarity metric learning"],"prefix":"10.1109","author":[{"given":"Guandan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Qingchao","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Wenji","family":"Mao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1504\/IJWBC.2013.051298"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/1958824.1958878"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/2487788.2488006"},{"key":"ref5","first-page":"401","article-title":"Event detection in twitter","volume":"11","author":"weng","year":"2011","journal-title":"ICWSM"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.18653\/v1\/N16-1174"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ASONAM.2014.6921613"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TMM.2013.2265080"},{"year":"2017","author":"kaiser","journal-title":"Learning to remember rare events","key":"ref9"},{"key":"ref1","first-page":"1519","article-title":"On-line Trend Analysis with Topic Models:\\# twitter Trends Detection Topic Model Online","author":"lau","year":"2012","journal-title":"COLING"}],"event":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2017,7,22]]},"location":"Beijing, China","end":{"date-parts":[[2017,7,24]]}},"container-title":["2017 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7999198\/8004858\/08004905.pdf?arnumber=8004905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T23:53:45Z","timestamp":1503532425000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8004905\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/isi.2017.8004905","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}