{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:43:11Z","timestamp":1730274191317,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/isi.2018.8587340","type":"proceedings-article","created":{"date-parts":[[2018,12,27]],"date-time":"2018-12-27T18:00:33Z","timestamp":1545933633000},"page":"214-219","source":"Crossref","is-referenced-by-count":4,"title":["Joint Learning with Keyword Extraction for Event Detection in Social Media"],"prefix":"10.1109","author":[{"given":"Guandan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Wenji","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Qingchao","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Han","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1008992.1009044"},{"key":"ref11","first-page":"1519","article-title":"On-line Trend Analysis with Topic Models: twitter Trends Detection Topic Model Online","author":"lau","year":"2012","journal-title":"COLING"},{"key":"ref12","first-page":"2666","article-title":"Hashtag-Based Sub-Event Discovery Using Mutually Generative LDA in Twitter","author":"xing","year":"2016","journal-title":"AAAI"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref14","article-title":"Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling","author":"chung","year":"2014","journal-title":"Arxiv preprint arXiv"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1174"},{"key":"ref16","article-title":"Learning to Remember Rare Events","author":"kaiser","year":"2017","journal-title":"Arxiv preprint arXiv"},{"key":"ref17","first-page":"583","article-title":"Cluster ensembles&#x2014;a knowledge reuse framework for combining multiple partitions","volume":"3","author":"strehl","year":"2002","journal-title":"Journal of Machine Learning Research"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-008-9066-8"},{"key":"ref19","article-title":"Proximal policy optimization algorithms","author":"schulman","year":"2017","journal-title":"arXiv preprint arXiv 1707 07816"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488006"},{"key":"ref3","first-page":"401","article-title":"Event detection in twitter","volume":"11","author":"weng","year":"2011","journal-title":"ICWSM"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.54"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2014.6921613"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004905"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188180"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1504\/IJWBC.2013.051298"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958878"},{"key":"ref9","article-title":"Detections, Bounds, and Timelines: UMass and TDT3","author":"umass","year":"2000","journal-title":"Proc Topic Detection and Tracking Workshop"},{"key":"ref20","first-page":"409","article-title":"Building a large-scale corpus for evaluating event detection on twitter","author":"mcminn","year":"2013","journal-title":"International Conference on Information and Knowledge Management"},{"key":"ref22","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"ref21","first-page":"181","article-title":"Streaming first story detection with application to Twitter","author":"osborne","year":"2010","journal-title":"Human Language Technologies the 2010 Conference of the North American Chapter of for Computational Linguistics"}],"event":{"name":"2018 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2018,11,9]]},"location":"Miami, FL","end":{"date-parts":[[2018,11,11]]}},"container-title":["2018 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8575039\/8587309\/08587340.pdf?arnumber=8587340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T21:40:46Z","timestamp":1643233246000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8587340\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isi.2018.8587340","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}