{"id":"https://openalex.org/W2911157066","doi":"https://doi.org/10.1142/s021819401840017x","title":"Multiple Relational Topic Modeling for Noisy Short Texts","display_name":"Multiple Relational Topic Modeling for Noisy Short Texts","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2911157066","doi":"https://doi.org/10.1142/s021819401840017x","mag":"2911157066"},"language":"en","primary_location":{"id":"doi:10.1142/s021819401840017x","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s021819401840017x","pdf_url":null,"source":{"id":"https://openalex.org/S131442419","display_name":"International Journal of Software Engineering and Knowledge Engineering","issn_l":"0218-1940","issn":["0218-1940","1793-6403"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Software Engineering and Knowledge Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067065264","display_name":"Zheng Liu","orcid":"https://orcid.org/0000-0001-5391-1105"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zheng Liu","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security &amp; Intelligent Processing School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, P. R. China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security &amp; Intelligent Processing School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, P. R. China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111826999","display_name":"Chi-Yu Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chiyu Liu","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security &amp; Intelligent Processing School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, P. R. China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security &amp; Intelligent Processing School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, P. R. China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057056828","display_name":"Bin Xia","orcid":"https://orcid.org/0000-0001-9519-6517"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Xia","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security &amp; Intelligent Processing School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, P. R. China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security &amp; Intelligent Processing School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, P. R. China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100440801","display_name":"Tao Li","orcid":"https://orcid.org/0000-0001-9968-2993"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Li","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security &amp; Intelligent Processing School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, P. R. China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security &amp; Intelligent Processing School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, P. R. China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5067065264"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":0.4886,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.74337467,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"28","issue":"11n12","first_page":"1559","last_page":"1574"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13910","display_name":"Computational and Text Analysis Methods","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/3300","display_name":"General Social Sciences"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8145128488540649},{"id":"https://openalex.org/keywords/topic-model","display_name":"Topic model","score":0.6946051716804504},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5426701307296753},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5325801372528076},{"id":"https://openalex.org/keywords/social-network-analysis","display_name":"Social network analysis","score":0.4879855513572693},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47020038962364197},{"id":"https://openalex.org/keywords/word","display_name":"Word (group theory)","score":0.46634429693222046},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.465694785118103},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.44528359174728394},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.4231518805027008},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3698788285255432},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3467479944229126},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.25639718770980835},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1422017514705658},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.13123974204063416}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8145128488540649},{"id":"https://openalex.org/C171686336","wikidata":"https://www.wikidata.org/wiki/Q3532085","display_name":"Topic model","level":2,"score":0.6946051716804504},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5426701307296753},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5325801372528076},{"id":"https://openalex.org/C114713312","wikidata":"https://www.wikidata.org/wiki/Q7551269","display_name":"Social network analysis","level":3,"score":0.4879855513572693},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47020038962364197},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.46634429693222046},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.465694785118103},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.44528359174728394},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.4231518805027008},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3698788285255432},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3467479944229126},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.25639718770980835},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1422017514705658},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.13123974204063416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s021819401840017x","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s021819401840017x","pdf_url":null,"source":{"id":"https://openalex.org/S131442419","display_name":"International Journal of Software Engineering and Knowledge Engineering","issn_l":"0218-1940","issn":["0218-1940","1793-6403"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Software Engineering and Knowledge Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.800000011920929,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2131689821","https://openalex.org/W2151703435","https://openalex.org/W2178725228","https://openalex.org/W2309222574"],"related_works":["https://openalex.org/W2952662149","https://openalex.org/W2793616590","https://openalex.org/W2183090405","https://openalex.org/W2065835655","https://openalex.org/W2075666982","https://openalex.org/W3160699245","https://openalex.org/W2782955270","https://openalex.org/W2349928170","https://openalex.org/W1594712698","https://openalex.org/W2499535628"],"abstract_inverted_index":{"Understanding":[0],"contents":[1,26],"in":[2,17,86],"social":[3,18,24,69],"networks":[4,70],"by":[5,102,127],"inferring":[6],"high-quality":[7,57,158],"latent":[8,159],"topics":[9,160],"from":[10,68,161],"short":[11,66,81,109,163],"texts":[12,67,82,110],"is":[13,21],"a":[14,104,129,133],"significant":[15],"task":[16],"analysis,":[19],"which":[20],"challenging":[22],"because":[23],"network":[25],"are":[27],"usually":[28],"extremely":[29],"short,":[30],"noisy":[31,108,162],"and":[32,53,124,132,156],"full":[33],"of":[34,41],"informal":[35],"vocabularies.":[36],"Due":[37],"to":[38,64,88],"the":[39,76,142,152],"lack":[40],"sufficient":[42],"word":[43,153],"co-occurrence":[44,154],"instances,":[45],"well-known":[46],"topic":[47,58,91,105,144],"modeling":[48,92,145],"methods":[49,93],"such":[50,83],"as":[51,84],"LDA":[52],"LSA":[54],"cannot":[55],"uncover":[56,157],"structures.":[59],"Existing":[60],"research":[61],"works":[62],"seek":[63],"pool":[65],"into":[71],"pseudo":[72],"documents":[73],"or":[74],"utilize":[75],"explicit":[77,123],"relations":[78,113,126],"among":[79],"these":[80],"hashtags":[85],"tweets":[87],"make":[89],"classic":[90],"work.":[94],"In":[95],"this":[96,100],"paper,":[97],"we":[98],"explore":[99],"problem":[101],"proposing":[103],"model":[106],"for":[107],"with":[111,141],"multiple":[112],"called":[114],"MRTM":[115,120,149],"(Multiple":[116],"Relational":[117],"Topic":[118],"Modeling).":[119],"exploits":[121],"both":[122],"implicit":[125],"introducing":[128],"document-attribute":[130],"distribution":[131],"two-step":[134],"random":[135],"sampling":[136],"strategy.":[137],"Extensive":[138],"experiments,":[139],"compared":[140],"state-of-the-art":[143],"approaches,":[146],"demonstrate":[147],"that":[148],"can":[150],"alleviate":[151],"sparsity":[155],"texts.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
