{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T18:41:46Z","timestamp":1777574506178,"version":"3.51.4"},"reference-count":140,"publisher":"Tsinghua University Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Big Data Min. Anal."],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.26599\/bdma.2023.9020021","type":"journal-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T20:35:44Z","timestamp":1703536544000},"page":"217-243","source":"Crossref","is-referenced-by-count":13,"title":["A Survey on Event Tracking in Social Media Data Streams"],"prefix":"10.26599","volume":"7","author":[{"given":"Zixuan","family":"Han","sequence":"first","affiliation":[{"name":"School of Computer Science and Communication Engineering and Jiangsu University,Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace,Zhenjiang,China,212013"}]},{"given":"Leilei","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering and Jiangsu University,Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace,Zhenjiang,China,212013"}]},{"given":"Lu","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computing and Mathematical Sciences, University of Leicester,Leicester,UK,LE1 7RH"}]},{"given":"Liang","family":"Jiang","sequence":"additional","affiliation":[{"name":"Ocean College, Jiangsu University of Science and Technology,Zhenjiang,China,212100"}]},{"given":"Jiawei","family":"Fang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering and Jiangsu University,Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace,Zhenjiang,China,212013"}]},{"given":"Fanyuan","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering and Jiangsu University,Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace,Zhenjiang,China,212013"}]},{"given":"Jinjuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering and Jiangsu University,Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace,Zhenjiang,China,212013"}]},{"given":"John","family":"Panneerselvam","sequence":"additional","affiliation":[{"name":"School of Computing and Mathematical Sciences, University of Leicester,Leicester,UK,LE1 7RH"}]},{"given":"Nick","family":"Antonopoulos","sequence":"additional","affiliation":[{"name":"University Executive Office, Edinburgh Napier University,Edinburgh,UK,EH11 4BN"}]}],"member":"11138","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.11.101"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2023.3235411"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.2021.1956917"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2022.3186172"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.11.011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.11.047"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3178230"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72240-1_62"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v29.i1.pp421-430"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119347"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2893625"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2938954"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2018.06.017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.05.004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21127-0_10"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1364\/AO.477642"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v13i1.pp957-971"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3480246"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2018.8424607"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-021-00514-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103098"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2933554"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.08.003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.10.013"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.035"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2675839"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-016-0416-y"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3015355"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2021.9020024"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2913783"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10900-018-0518-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-020-00217-3"},{"key":"ref33","first-page":"35","article-title":"# TwitterSearch: A comparison of microblog search and web search","volume-title":"Proc. 4th ACM Int. Conf. on Web Search and Data Mining","author":"Teevan"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2018.04.077"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2018.11.075"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1163\/9789004400795_012"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11782-3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.02.107"},{"key":"ref39","first-page":"837","article-title":"The automatic content extraction (ACE) program-tasks, data, and evaluation","volume-title":"Proc. 4th Int. Conf. on Language Resources and Evaluation","author":"Doddington"},{"issue":"4","key":"ref40","first-page":"1015","article-title":"Joint Chinese event extraction based multi-task learning, (in Chinese)","volume":"30","author":"He","year":"2019","journal-title":"J. Softw."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2020.916.935"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/app10175841"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1732\/1\/012024"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.075"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9359-x"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2973736"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11919"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3217871.3217872"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8405623"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICCASIT53235.2021.9633720"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.52"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/23249935.2020.1813214"},{"issue":"10","key":"ref53","first-page":"102","article-title":"Chinese event detection based on data augmentation and weakly supervised adversarial training, (in Chinese)","volume":"42","author":"Luo","year":"2022","journal-title":"J. Comput. Appl."},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/p17-1164"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/d19-1582"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05360-1"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.274"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1501-5_13"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2018.03.001"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/FTC.2016.7821630"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772777"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23535-1_55"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v5i1.14102"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CogInfoCom.2013.6719289"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0933-2_1"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-018-9828-9"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12017"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/235968.233324"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892648"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807306"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0340-z"},{"key":"ref72","first-page":"1130","article-title":"Beyond TFIDF weighting for text categorization in the vector space model","volume-title":"Proc. 19th Int. Joint Conf. on Artificial Intelligence","author":"Soucy"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2014.11.004"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752310"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3417-1"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258430"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.258"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007617005950"},{"key":"ref79","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"Blei","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488514"},{"key":"ref81","article-title":"A biterm-based dirichlet process topic model for short texts","volume-title":"Proc. 3rd Int. Conf. on Computer Science and Service System","author":"Pan"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2014.141"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.2991\/tlicsc-18.2018.26"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2885987"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2417506"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/COMNETSAT.2018.8684085"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-018-0206-0"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.008"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3485314.3485322"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/782\/5\/052043"},{"key":"ref91","first-page":"878","article-title":"Open-domain event detection using distant supervision","volume-title":"Proc. 27th Int. Conf. on Computational Linguistics","author":"Araki"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.53"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1048"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1105"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijdrr.2018.03.002"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.iheduc.2018.04.002"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.10.017"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.09.127"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-016-0258-x"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/2996183"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2017.06.003"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2018.9020004"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1177\/0093650216682900"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2018.11.020"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775057"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.22"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25661-5_57"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2012.05.021"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2959791"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8201-6_22"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.08.046"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.170"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187907"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-018-0548-4"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0744-0"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.12.003"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.038"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-018-07761-2"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753486"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958830"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.209"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09333-8_16"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1038\/srep05547"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2935905"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2018.03.005"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.01.095"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935925"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2015885"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.33"},{"key":"ref132","first-page":"602","article-title":"Predicting responses to microblog posts","volume-title":"Proc. 2012 Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","author":"Artzi"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1177\/0165551517698564"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1498-8_77"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.07.051"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/1031171.1031258"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396787"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3291598"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.02.003"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2889074"}],"container-title":["Big Data Mining and Analytics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8254253\/10372994\/10372955.pdf?arnumber=10372955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T20:10:46Z","timestamp":1743711046000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10372955\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":140,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.26599\/bdma.2023.9020021","relation":{},"ISSN":["2096-0654","2097-406X"],"issn-type":[{"value":"2096-0654","type":"print"},{"value":"2097-406X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}