Citation: | Po Hu, Min-Lie Huang, Xiao-Yan Zhu. Exploring the Interactions of Storylines from Informative News Events[J]. Journal of Computer Science and Technology, 2014, 29(3): 502-518. DOI: 10.1007/s11390-014-1445-6 |
[1] |
Kovach B, Rosenstiel T. Blur: How to Know What's True in the Age of Information Overload. New York: Bloomsbury, 2011.
|
[2] |
Hunziker H. In the Eye of the Reader: Foveal and Peripheral Perception. Germany: Staubli, 2007.
|
[3] |
Allan J, Carbonell J, Doddington G et al. Topic detection and tracking pilot study: Final report. In Proc. DARPA Broadcast News Transcription and Understanding Workshop, Feb. 1998, pp.194-218.
|
[4] |
Yan R, Wan X, Otterbacher J et al. Evolutionary timeline summarization: A balanced optimization framework via iterative substitution. In Proc. the 34th SIGIR, Jul. 2011, pp.745-754.
|
[5] |
Yan R, Kong L, Huang C, Wan X, Li X, Zhang Y. Timeline generation through evolutionary trans-temporal summarization. In Proc. EMNLP, Jul. 2011, pp.433-443.
|
[6] |
Hu P, Huang M, Xu P, Li W, Usadi A K, Zhu X. Generating breakpoint-based timeline overview for news topic retrospection. In Proc. ICDM, Dec. 2011, pp.260-269.
|
[7] |
Wang D, Li T, Ogihara M. Generating pictorial storylines via minimum-weight connected dominating set approximation in multi-view graphs. In Proc. AAAI, Jul. 2012, pp.683{689.
|
[8] |
Pustejovsky J, Castano J, Ingria R et al. TimeML: Robust specification of event and temporal expressions in text. In New Directions in Question Answering 2003, Maybury M T (ed.), 2003, pp.28-34.
|
[9] |
Seker S E, Diri B. TimeML and Turkish temporal logic. In Proc. ICAI, Jul. 2010, pp.881-887.
|
[10] |
Reichenbach H. Elements of Symbolic Logic. London: Macmillan Co., 1947.
|
[11] |
Rosu G, Bensalem S. Allen linear (interval) temporal logic——Translation to LTL and monitor synthesis. In Proc. the 18th CAV, Aug. 2006, pp.263-277.
|
[12] |
Ahmed A, Xing E P. Timeline: A dynamic hierarchical Dirichlet process model for recovering birth/death and evolution of topics in text stream. In Proc. UAI, Jul. 2010, pp.20-29.
|
[13] |
Jo Y, Hopcroft J E, Lagoze C. The web of topics: Discovering the topology of topic evolution in a corpus. In Proc. the 20th WWW, Apr. 2011, pp.257-266.
|
[14] |
Cui W, Liu S, Tan L et al. TextFlow: Towards better understanding of evolving topics in text. IEEE Trans. Visualization and Computer Graphics, 2011, 17(12): 2412-2421.
|
[15] |
Gao Z J, Song Y, Liu S et al. Tracking and connecting topics via incremental hierarchical Dirichlet processes. In Proc. the 11th ICDM, Dec. 2011, pp.1056-1061.
|
[16] |
Lin C X, Mei Q, Han J, Jiang Y, Danilevsky M. The joint inference of topic diffusion and evolution in social communities. In Proc. the 11th ICDM, Dec. 2011, pp.378-387.
|
[17] |
Wang Y, Agichtein E, Benzi M. TM-LDA: Effcient online modeling of latent topic transitions in social media. In Proc. the 18th SIGKDD, Aug. 2012, pp.123-131.
|
[18] |
Teh H W, Jordan M I, Beal M J, Blei D M. Sharing clusters among related groups: Hierarchical Dirichlet processes. In Proc. Neural Information Processing Systems, Dec. 2005, pp.1385-1392.
|
[19] |
Nallapati R, Feng A, Peng F, Allan J. Event threading within news topics. In Proc. the 13th CIKM, Nov. 2004, pp.446-453.
|
[20] |
Mei Q, Zhai C. Discovering evolutionary theme patterns from text: An exploration of temporal text mining. In Proc. SIGKDD, Aug. 2005, pp.198-207.
|
[21] |
Choudhary R, Mehta S, Bagchi A, Balakrishnan R. Towards characterization of actor evolution and interactions in news corpora. In Proc. the 30th ECIR, Mar. 2008, pp.422-429.
|
[22] |
Shahaf D, Guestrin C, Horvitz E. Trains of thought: Generating information maps. In Proc. the 21st WWW, Apr. 2012, pp.899-908.
|
[23] |
Ansell G. Introduction to Journalism (2nd edition). Johannesburg: Jacana Media (Pty) Ltd., 2011.
|
[24] |
Bowles H. Storytelling and Drama: Exploring Narrative Episodes in Plays (8th edition). Amsterdam: John Benjamins Publishing Company, 2010.
|
[25] |
Finkel J R, Grenager T, Manning C. Incorporating non-local information into information extraction systems by Gibbs sampling. In Proc. ACL, Jun. 2005, pp.363-370.
|
[26] |
Hofmann T. Probabilistic latent semantic indexing. In Proc. the 22nd SIGIR, Aug. 1999, pp.50-57.
|
[27] |
Dempster A P, Laird N M, Rubin D B. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, 1977, 39(1): 1-38.
|
[28] |
Endres D M, Schindelin J E. A new metric for probability distributions. IEEE Trans. Information Theory, 2003, 49(7): 1858-1860.
|
[29] |
Thagard P, Verbeurgt K. Coherence as constraint satisfaction. Cognitive Science, 1998, 22(1): 1-24.
|
[30] |
Haveliwala T H. Topic-sensitive PageRank. In Proc. the 11th WWW, May 2002, pp.517-526.
|
[31] |
Lih A. Wikipedia as participatory journalism: Reliable sources? Metrics for evaluating collaborative media as a news resource. In Proc. the 5th International Symposium on Online Journalism, Apr. 2004, pp.1-31.
|
[32] |
Lin C Y. ROUGE: A package for automatic evaluation of summaries. In Proc. ACL Workshop on Text Summarization Branches Out, Jul. 2004, pp.74-81.
|
[33] |
Lin C Y, Hovy E H. Automatic evaluation of summaries using n-gram co-occurrence statistics. In Proc. NAACL, May 2003, pp.71-78.
|
[34] |
Porter M F. An algorithm for suffx stripping. Program, 1980, 14(3): 130-137.
|
[1] | Franklin Yang. CFP: A Coherence-Free Processor Design[J]. Journal of Computer Science and Technology, 2024, 39(1): 99-102. DOI: 10.1007/s11390-023-3964-5 |
[2] | Qing-Mei Tan, Xu-Na Wang. Multi-Attribute Preferences Mining Method for Group Users with the Process of Noise Reduction[J]. Journal of Computer Science and Technology, 2021, 36(4): 944-960. DOI: 10.1007/s11390-021-0102-0 |
[3] | Wei Chen, Weiqing Wang, Hongzhi Yin, Jun-Hua Fang, Lei Zhao. User Account Linkage Across Multiple Platforms with Location Data[J]. Journal of Computer Science and Technology, 2020, 35(4): 751-768. DOI: 10.1007/s11390-020-0250-7 |
[4] | Xian Wu, Wei Fan, Jing Gao, Zi-Ming Feng, Yong Yu. Detecting Marionette Microblog Users for Improved Information Credibility[J]. Journal of Computer Science and Technology, 2015, 30(5): 1082-1096. DOI: 10.1007/s11390-015-1584-4 |
[5] | Wei-Wei Ni, Jin-Wang Zheng, Zhi-Hong Chong. HilAnchor: Location Privacy Protection in the Presence of Users' Preferences[J]. Journal of Computer Science and Technology, 2012, (2): 413-427. DOI: 10.1007/s11390-012-1231-2 |
[6] | Hua Qingyi. An Approach to User Interface Specification with Attribute Grammars[J]. Journal of Computer Science and Technology, 1997, 12(1): 65-75. |
[7] | Fang Zhiyi, Ju Jiubin. NONH:A New Cache-Based Coherence Protocol for Linked List Structure DSM System and Its Performance Evaluation[J]. Journal of Computer Science and Technology, 1996, 11(4): 405-415. |
[8] | Xu Jianguo, Wei Wenxin. GUIDS: A Graphical User Interface Development System in UniECAD[J]. Journal of Computer Science and Technology, 1994, 9(4): 342-348. |
[9] | Wang Haiying, Liu Shenquan. A Domain Knowledge Driven Approach for User Interface Software Development[J]. Journal of Computer Science and Technology, 1991, 6(2): 145-152. |
[10] | Wang Haiying. A Framework for Command Recovery in User Interface[J]. Journal of Computer Science and Technology, 1990, 5(3): 296-301. |
1. | G. Vijitha, B. Sargunam. AN APPROACH FOR IMAGE STEGANOGRAPHY AND STEGANALYSIS USING REGRESSIVE STUDENT PSYCHOLOGY OPTIMIZATION-ENABLED DEEP MAX-OUT NETWORK. Biomedical Engineering: Applications, Basis and Communications, 2025, 37(02) DOI:10.4015/S1016237224500479 |
2. | Jian He, Shaowei Weng, Lifang Yu, et al. Steganalysis Network With Two-Branch Preprocessing for Spatial and JPEG Domains. IEEE Transactions on Circuits and Systems for Video Technology, 2025, 35(2): 1451. DOI:10.1109/TCSVT.2024.3470809 |
3. | Tong Fu, Liquan Chen, Yinghua Jiang, et al. Image Steganalysis Based on Dual-Path Enhancement and Fractal Downsampling. IEEE Transactions on Information Forensics and Security, 2025, 20: 1. DOI:10.1109/TIFS.2024.3493615 |
4. | Kang-Kang Wei, Wei-Qi Luo, Shun-Quan Tan, et al. CTNet: A Convolutional Transformer Network for Color Image Steganalysis. Journal of Computer Science and Technology, 2025, 40(2): 413. DOI:10.1007/s11390-023-3006-3 |
5. | Ntivuguruzwa Jean de la Croix, Tohari Ahmad, Fengling Han, et al. HSDetect-Net: A Fuzzy-Based Deep Learning Steganalysis Framework to Detect Possible Hidden Data in Digital Images. IEEE Access, 2025, 13: 43013. DOI:10.1109/ACCESS.2025.3546510 |
6. | Tong Fu, Liquan Chen, Yuan Gao, et al. DCANet: CNN model with dual-path network and improved coordinate attention for JPEG steganalysis. Multimedia Systems, 2024, 30(4) DOI:10.1007/s00530-024-01433-6 |
7. | Zhiqiang Wu, Shuhui Wan. An Image Steganalysis Algorithm Based on Multi-Resolution Feature Fusion. International Journal of Information Security and Privacy, 2024, 18(1): 1. DOI:10.4018/IJISP.359893 |
8. | Numrena Farooq, Roohie Naaz Mir. Image Steganalysis using Deep Convolution Neural Networks: A Literature Survey. International Journal of Sensors, Wireless Communications and Control, 2024, 14(4): 247. DOI:10.2174/0122103279296370240529075507 |
9. | Hamza Kheddar, Mustapha Hemis, Yassine Himeur, et al. Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions. Neurocomputing, 2024, 581: 127528. DOI:10.1016/j.neucom.2024.127528 |
10. | Ntivuguruzwa Jean de La Croix, Tohari Ahmad. Toward Hidden Data Detection via Local Features Optimization in Spatial Domain Images. 2023 Conference on Information Communications Technology and Society (ICTAS), DOI:10.1109/ICTAS56421.2023.10082736 |
11. | Akram Kadhim Mshet, Huda Kadhim Tayyeh. Deep learning-based image Steganalysis. CYBER DEFENSE IRAQ: CDI2024, DOI:10.1063/5.0235246 |
12. | Mehrab Hosain, Rajiv Kapoor. Advances in Artificial-Business Analytics and Quantum Machine Learning. Lecture Notes in Electrical Engineering, DOI:10.1007/978-981-97-2508-3_49 |
13. | Yuanlin Yang. Large Capacity Data Hiding in Binary Image black and white mixed regions. 2023 3rd International Conference on Electronic Information Engineering and Computer (EIECT), DOI:10.1109/EIECT60552.2023.10441974 |