Leveraging burst in twitter network communities for event detection

被引:10
|
作者
Ansah, Jeffery [1 ]
Liu, Lin [1 ]
Kang, Wei [1 ]
Liu, Jixue [1 ]
Li, Jiuyong [1 ]
机构
[1] Univ South Australia, Adelaide, SA, Australia
关键词
SensorTree; Burst; Network community; Social media; Propagation trees; Twitter; Event detection;
D O I
10.1007/s11280-020-00786-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting protest events using social media is an important task with many useful applications to emergency services, law enforcement agencies, and other stakeholders. A plethora of research on event detection using social media has presented myriad approaches relying on tweet contents (text) to solve the event detection problem, with notable improvements over time. Despite the myriad of existing research, the use of the structural relationships among users in online Twitter network communities for event detection is rarely observed. In this work, we present a novel protest event detection framework called SensorTree. SensorTree utilizes the network structural connections among users in a community for protest event detection. The SensorTree framework tracks information propagation in Twitter network communities to model the sudden change in growth of these communities as burst for event detection. Once burst is detected, SensorTree builds a tensorized topic model to extract events. To show the prowess of SensorTree for event detection, we conduct extensive experiments on geographically diverse Twitter datasets using qualitative and quantitative evaluations. We further show the superiority of SensorTree by comparing our results to several existing state-of-the-art methods. SensorTree outperforms the baselines as well as the comparison models. The results further suggest that utilizing network community structure yields concise and accurate event detection. We also present case studies on real-world protest event to further show that SensorTree is capable of detecting events with fine granularity description without any language restrictions.
引用
收藏
页码:2851 / 2876
页数:26
相关论文
共 50 条
  • [1] Leveraging burst in twitter network communities for event detection
    Jeffery Ansah
    Lin Liu
    Wei Kang
    Jixue Liu
    Jiuyong Li
    [J]. World Wide Web, 2020, 23 : 2851 - 2876
  • [2] Sub-event Detection on Twitter Network
    Chen, Chao
    Terejanu, Gabriel
    [J]. ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, AIAI 2018, 2018, 519 : 50 - 60
  • [3] Bot Conversations are Different: Leveraging Network Metrics for Bot Detection in Twitter
    Beskow, David M.
    Carley, Kathleen M.
    [J]. 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2018, : 825 - 832
  • [4] Malicious Event Detecting in Twitter Communities
    Amato, Flora
    Cozzolino, Giovanni
    Mazzeo, Antonino
    Romano, Sara
    [J]. INTELLIGENT INTERACTIVE MULTIMEDIA SYSTEMS AND SERVICES 2016, 2016, 55 : 63 - 72
  • [5] Leveraging Time for Spammers Detection on Twitter
    Washha, Mahdi
    Qaroush, Aziz
    Sedes, Florence
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS (MEDES 2016), 2016, : 109 - 116
  • [6] Leveraging Twitter to detect event names associated with a place
    Chan, C. K.
    Vasardani, M.
    Winter, S.
    [J]. JOURNAL OF SPATIAL SCIENCE, 2014, 59 (01) : 137 - 155
  • [7] Topical Event Detection on Twitter
    Cui, Lishan
    Zhang, Xiuzhen
    Zhou, Xiangmin
    Salim, Flora
    [J]. DATABASES THEORY AND APPLICATIONS, (ADC 2016), 2016, 9877 : 257 - 268
  • [8] Event Detection in Twitter Microblogging
    Doulamis, Nikolaos D.
    Doulamis, Anastasios D.
    Kokkinos, Panagiotis
    Varvarigos, Emmanouel
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (12) : 2810 - 2824
  • [9] Leveraging the Power of a Twitter Network for Library Promotion
    Shulman, Jason
    Yep, Jewelry
    Tome, Daniel
    [J]. JOURNAL OF ACADEMIC LIBRARIANSHIP, 2015, 41 (02): : 178 - 185
  • [10] A SURVEY OF TECHNIQUES FOR EVENT DETECTION IN TWITTER
    Atefeh, Farzindar
    Khreich, Wael
    [J]. COMPUTATIONAL INTELLIGENCE, 2015, 31 (01) : 132 - 164