iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3522759
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:43:06Z","timestamp":1725615786044},"reference-count":64,"publisher":"Association for Computing Machinery (ACM)","issue":"3","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Manage. Inf. Syst."],"published-print":{"date-parts":[[2022,9,30]]},"abstract":"\n Online social networks (OSNs) are a rich source of information, and the data (including user-generated content) can be mined to facilitate real-world event prediction. However, the dynamic nature of OSNs and the fast-pace nature of social events or hot topics compound the challenge of event prediction. This is a key limitation in many existing approaches. For example, our evaluations of six baseline approaches (i.e., logistic regression latent Dirichlet allocation (LDA)-based logistic regression (LR), multi-task learning (MTL), long short-term memory (LSTM) and convolutional neural networks, and transformer-based model) on three datasets collected as part of this research (two from Twitter and one from a news collection site\n \n 1<\/jats:sup>\n <\/jats:xref>\n ), reveal that the accuracy of these approaches is between 50% and 60%, and they are not capable of utilizing new events in event predictions. Hence, in this article, we develop a novel DNN-based framework (hereafter referred to as event prediction with feedback mechanism\u2014\n EPFM<\/jats:monospace>\n . Specifically, EPFM makes use of a feedback mechanism based on emerging events detection to improve the performance of event prediction. The feedback mechanism ensembles three outlier detection processes and returns a list of new events. Some of the events will then be chosen by analysts to feed into the fine-tuning process to update the predictive model. To evaluate EPFM, we conduct a series of experiments on the same three datasets, whose findings show that EPFM achieves 80% accuracy in event detection and outperforms the six baseline approaches.We also validate EPFM\u2019s capability of detecting new events by empirically analyzing the feedback mechanism under different thresholds.\n <\/jats:p>","DOI":"10.1145\/3522759","type":"journal-article","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T11:33:15Z","timestamp":1648639995000},"page":"1-24","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Social Media Event Prediction using DNN with Feedback Mechanism"],"prefix":"10.1145","volume":"13","author":[{"given":"Wanlun","family":"Ma","sequence":"first","affiliation":[{"name":"Swinburne University of Technology, Hawthorn, VIC, Australia"}]},{"given":"Xiangyu","family":"Hu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Ultimo, NSW, Australia"}]},{"given":"Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"James Cook University, Douglas, QLD, Australia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0655-666X","authenticated-orcid":false,"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Hawthorn, VIC, Australia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kkwang Raymond","family":"Choo","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX"}]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Hawthorn, VIC, Australia"}]}],"member":"320","published-online":{"date-parts":[[2022,5,14]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3416703"},{"key":"e_1_3_3_3_2","first-page":"1763","article-title":"Health-protective behaviour, social media usage and conspiracy belief during the COVID-19 public health emergency","author":"Allington Daniel","year":"2020","unstructured":"Daniel Allington, Bobby Duffy, Simon Wessely, Nayana Dhavan, and James Rubin. 2020. Health-protective behaviour, social media usage and conspiracy belief during the COVID-19 public health emergency. Psychological Medicine 51, 10 (2020), 1763\u20131769.","journal-title":"Psychological Medicine"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3342101"},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18111-0_29"},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/2996183"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2542182.2542190"},{"issue":"2011","key":"e_1_3_3_8_2","first-page":"438","article-title":"Beyond trending topics: Real-world event identification on Twitter.","volume":"11","author":"Becker Hila","year":"2011","unstructured":"Hila Becker, Mor Naaman, and Luis Gravano. 2011. Beyond trending topics: Real-world event identification on Twitter.Icwsm 11, 2011 (2011), 438\u2013441.","journal-title":"Icwsm"},{"key":"e_1_3_3_9_2","volume-title":"Pattern Recognition and Machine Learning","author":"Bishop Christopher M.","year":"2006","unstructured":"Christopher M. Bishop. 2006. Pattern Recognition and Machine Learning. Springer."},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2010.12.007"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0206-4"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004905"},{"key":"e_1_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.96"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-4932.2012.00809.x"},{"key":"e_1_3_3_17_2","unstructured":"Junyoung Chung Caglar Gulcehre KyungHyun Cho and Yoshua Bengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. In Advances in neural information processing systems Workshop on Deep Learning . 8\u201313."},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13388-014-0004-6"},{"key":"e_1_3_3_19_2","unstructured":"Jacob Devlin Ming-Wei Chang Kenton Lee and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies Volume 1 (Long and Short Papers) . 4171\u20134186."},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-15405-7"},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2523813"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.02.003"},{"key":"e_1_3_3_23_2","doi-asserted-by":"crossref","unstructured":"Amira Ghenai and Yelena Mejova. 2017. Catching Zika fever: Application of crowdsourcing and machine learning for tracking health misinformation on Twitter. In 2017 IEEE International Conference on Healthcare Informatics (ICHI) . 518\u2013518.","DOI":"10.1109\/ICHI.2017.58"},{"issue":"4","key":"e_1_3_3_24_2","first-page":"68:1\u201368:36","article-title":"The future of false information detection on social media: New perspectives and trends","volume":"53","author":"Guo Bin","year":"2020","unstructured":"Bin Guo, Yasan Ding, Lina Yao, Yunji Liang, and Zhiwen Yu. 2020. The future of false information detection on social media: New perspectives and trends. ACM Computing Surveys 53, 4 (2020), 68:1\u201368:36.","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_3_27_2","article-title":"Decision-making with heterogeneous sensors-a copula based approach","author":"Iyengar Satish Giridhar","year":"2011","unstructured":"Satish Giridhar Iyengar. 2011. Decision-making with heterogeneous sensors-a copula based approach. PhD Dissertation (2011).","journal-title":"PhD Dissertation"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783319"},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.148"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eneco.2016.11.016"},{"key":"e_1_3_3_31_2","doi-asserted-by":"crossref","unstructured":"Yoon Kim. 2014. Convolutional neural networks for sentence classification. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP) . Association for Computational Linguistics Doha Qatar 1746\u20131751.","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2020\/16371"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2597892"},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2577024"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1038\/44565"},{"key":"e_1_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3657"},{"key":"e_1_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3309704"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2014.01.001"},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0758-8_14"},{"key":"e_1_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978975"},{"key":"e_1_3_3_41_2","first-page":"3111","volume-title":"Proceedings of the Advances in Neural Information Processing Systems","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Proceedings of the Advances in Neural Information Processing Systems. 3111\u20133119."},{"key":"e_1_3_3_42_2","article-title":"Professional social media usage: Work engagement perspective","author":"Oksa Reetta","year":"2020","unstructured":"Reetta Oksa, Markus Kaakinen, Nina Savela, Noora Ellonen, and Atte Oksanen. 2020. Professional social media usage: Work engagement perspective. New Media & Society 23, 8 (2020), 2303\u20132326.","journal-title":"New Media & Society"},{"key":"e_1_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/2407740.2407743"},{"issue":"8","key":"e_1_3_3_45_2","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford Alec","year":"2019","unstructured":"Alec Radford, Jeffrey Wu, Rewon Child, David Luan, Dario Amodei, Ilya Sutskever, et\u00a0al. 2019. Language models are unsupervised multitask learners. OpenAI Blog 1, 8 (2019), 9. https:\/\/cdn.openai.com\/better-language-models\/language_models_are_unsupervised_multitask_learners.pdf.","journal-title":"OpenAI Blog"},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772777"},{"key":"e_1_3_3_47_2","unstructured":"Victor Sanh Lysandre Debut Julien Chaumond and Thomas Wolf. 2019. DistilBERT a distilled version of BERT: Smaller faster cheaper and lighter. In Proceedings of the 19th International Conference on World Wide Web . 851\u2013860."},{"key":"e_1_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2809933"},{"key":"e_1_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.53"},{"key":"e_1_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3422824"},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835643"},{"issue":"1","key":"e_1_3_3_52_2","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1609\/icwsm.v4i1.14009","article-title":"Predicting elections with Twitter: What 140 characters reveal about political sentiment.","volume":"10","author":"Tumasjan Andranik","year":"2010","unstructured":"Andranik Tumasjan, Timm Oliver Sprenger, Philipp G. Sandner, and Isabell M. Welpe. 2010. Predicting elections with Twitter: What 140 characters reveal about political sentiment.Icwsm 10, 1 (2010), 178\u2013185.","journal-title":"Icwsm"},{"key":"e_1_3_3_53_2","article-title":"Well-read students learn better: On the importance of pre-training compact models","author":"Turc Iulia","year":"2019","unstructured":"Iulia Turc, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. Well-read students learn better: On the importance of pre-training compact models. arXiv:1908.08962. Retrieved from https:\/\/arxiv.org\/abs\/1908.08962.","journal-title":"arXiv:1908.08962"},{"key":"e_1_3_3_54_2","first-page":"5998","volume-title":"Proceedings of the Advances in Neural Information Processing Systems","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. In Proceedings of the Advances in Neural Information Processing Systems. 5998\u20136008."},{"key":"e_1_3_3_55_2","first-page":"49","volume-title":"Proceedings of the 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing , and IEEE International Conference on Intelligent Data and Security","author":"Veeramachaneni Kalyan","year":"2016","unstructured":"Kalyan Veeramachaneni, Ignacio Arnaldo, Vamsi Korrapati, Constantinos Bassias, and Ke Li. 2016. 2: Training a big data machine to defend. In Proceedings of the 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing , and IEEE International Conference on Intelligent Data and Security. IEEE, 49\u201354."},{"key":"e_1_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2020\/14119"},{"key":"e_1_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29047-3_28"},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(02)00030-1"},{"key":"e_1_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10326"},{"key":"e_1_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.5555\/2969239.2969312"},{"key":"e_1_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0080"},{"key":"e_1_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.39"},{"key":"e_1_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783377"},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2657624"}],"container-title":["ACM Transactions on Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3522759","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T01:54:34Z","timestamp":1672624474000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3522759"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,14]]},"references-count":64,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9,30]]}},"alternative-id":["10.1145\/3522759"],"URL":"http:\/\/dx.doi.org\/10.1145\/3522759","relation":{},"ISSN":["2158-656X","2158-6578"],"issn-type":[{"value":"2158-656X","type":"print"},{"value":"2158-6578","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,14]]},"assertion":[{"value":"2021-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}