{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:13:15Z","timestamp":1766733195602,"version":"3.37.3"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61300202","61332018","61471232"],"award-info":[{"award-number":["61300202","61332018","61471232"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2019,12,1]]},"DOI":"10.1109\/tbdata.2017.2656918","type":"journal-article","created":{"date-parts":[[2017,1,24]],"date-time":"2017-01-24T19:28:19Z","timestamp":1485286099000},"page":"529-539","source":"Crossref","is-referenced-by-count":13,"title":["Multi-Modal Description of Public Safety Events Using Surveillance and Social Media"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8362-5991","authenticated-orcid":false,"given":"Zheng","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7885-7678","authenticated-orcid":false,"given":"Lin","family":"Mei","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2525-3074","authenticated-orcid":false,"given":"Zhihan","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Chuanping","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xiangfeng","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yunhuai","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1282280.1282352"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2009.2036235"},{"key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0581-x"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3112-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-014-0408-7"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135957"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0553-0"},{"key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2517638"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.693"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IMVIP.2007.13"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-015-3482-x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2470645"},{"journal-title":"Introduction to Emergency Management","year":"2010","author":"haddow","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2008.01.001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.819583"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1117\/1.1406944"},{"key":"ref24","first-page":"1876","article-title":"EDF: A framework for semantic annotation of video","author":"nevatia","year":"0","journal-title":"Proc 10th IEEE Int Conf Comput Vis Workshops"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2050411"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383272"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MMUL.2005.87","article-title":"VERL: An ontology framework for representing and annotating video events","volume":"12","author":"nevatia","year":"2005","journal-title":"IEEE Multimedia"},{"key":"ref50","article-title":"CCTV forensic readiness: A case study on digital CCTV systems","author":"ariffin","year":"2016","journal-title":"Contemporary Digital Forensic Investigations of Cloud and Mobile Applications"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2015.1058118"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2632724"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.001"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4013"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1111\/1556-4029.13267"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.032"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.018"},{"key":"ref53","article-title":"What influences employees to use enterprise social networks? A socio-technical perspective","author":"chin","year":"0","journal-title":"Proc Pacific Asia Conf Inf Syst"},{"key":"ref52","first-page":"1","article-title":"Enterprise social networks: A successful implementation within a telecommunication company","author":"chin","year":"0","journal-title":"Proc 21st Amer Conf Inf Syst"},{"key":"ref10","article-title":"Network structure and community evolution on Twitter: human behavior change in response to the 2011 Japanese Earthquake and Tsunami","author":"lu","year":"2014","journal-title":"Scientific Reports"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1629890.1629907"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081895"},{"key":"ref12","article-title":"The role of social media during a natural disaster: A case study of the 2011 Thai Flood","volume":"11","author":"kongthon","year":"2014","journal-title":"Journal of technology management &amp; innovation"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1203882109"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pmed.1001083"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/17538941003759255"},{"key":"ref16","first-page":"1079","article-title":"Microblogging during two natural hazards events: What Twitter may contribute to situational awareness","author":"hughes","year":"0","journal-title":"Proc ACM Conf Comput Human Interaction"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.167"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.42"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-005-2715-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505572"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.07.024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1785\/gssrl.81.2.246"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2014.2307452"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772777"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9671.2012.01359.x"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2647986"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.29"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2430892"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2441051"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3780"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-014-1231-9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2010.2094608"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.09.027"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2015.22"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2015.19"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/8915964\/07831493.pdf?arnumber=7831493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:55:28Z","timestamp":1657745728000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7831493\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,1]]},"references-count":60,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2017.2656918","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"type":"electronic","value":"2332-7790"},{"type":"electronic","value":"2372-2096"}],"subject":[],"published":{"date-parts":[[2019,12,1]]}}}