{"id":"https://openalex.org/W4403486801","doi":"https://doi.org/10.3233/faia240969","title":"Enhancing Stance Detection on Social Media via Core Views Discovery","display_name":"Enhancing Stance Detection on Social Media via Core Views Discovery","publication_year":2024,"publication_date":"2024-10-16","ids":{"openalex":"https://openalex.org/W4403486801","doi":"https://doi.org/10.3233/faia240969"},"language":"en","primary_location":{"id":"doi:10.3233/faia240969","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia240969","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240969","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240969","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015264469","display_name":"Yu Yan","orcid":"https://orcid.org/0000-0003-1627-5335"},"institutions":[{"id":"https://openalex.org/I37448385","display_name":"China People's Public Security University","ror":"https://ror.org/05twya590","country_code":"CN","type":"education","lineage":["https://openalex.org/I37448385"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Yan","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences","School of Information and Network Security, People Public Security University of China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Information and Network Security, People Public Security University of China","institution_ids":["https://openalex.org/I37448385"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086972170","display_name":"Yinghan Shen","orcid":"https://orcid.org/0009-0004-1727-665X"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinghan Shen","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences","Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042998955","display_name":"Teli Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I37448385","display_name":"China People's Public Security University","ror":"https://ror.org/05twya590","country_code":"CN","type":"education","lineage":["https://openalex.org/I37448385"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Teli Liu","raw_affiliation_strings":["School of Information and Network Security, People Public Security University of China"],"affiliations":[{"raw_affiliation_string":"School of Information and Network Security, People Public Security University of China","institution_ids":["https://openalex.org/I37448385"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091865553","display_name":"Xuhui Jiang","orcid":"https://orcid.org/0000-0002-1741-0781"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuhui Jiang","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences","Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082075054","display_name":"Dechun Yin","orcid":null},"institutions":[{"id":"https://openalex.org/I37448385","display_name":"China People's Public Security University","ror":"https://ror.org/05twya590","country_code":"CN","type":"education","lineage":["https://openalex.org/I37448385"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dechun Yin","raw_affiliation_strings":["School of Information and Network Security, People Public Security University of China"],"affiliations":[{"raw_affiliation_string":"School of Information and Network Security, People Public Security University of China","institution_ids":["https://openalex.org/I37448385"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5015264469"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I37448385","https://openalex.org/I4210090176"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.38392745,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.9684000015258789,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.9684000015258789,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10664","display_name":"Sentiment Analysis and Opinion Mining","score":0.9614999890327454,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9581999778747559,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.7285934686660767},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.5103122591972351},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.40022480487823486},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3791671395301819},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3735133409500122},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18394649028778076},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09630060195922852}],"concepts":[{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.7285934686660767},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.5103122591972351},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.40022480487823486},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3791671395301819},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3735133409500122},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18394649028778076},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09630060195922852}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia240969","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia240969","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240969","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia240969","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia240969","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240969","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.7900000214576721,"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4403486801.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Stance":[0,99],"detection":[1],"aims":[2],"to":[3,54,143],"identify":[4],"the":[5,12,37,42,65,74,98,107,123,134,138,164,169,187],"expressed":[6],"attitude":[7],"towards":[8],"a":[9,88,119],"target":[10],"from":[11,21,81,133,149],"text,":[13],"which":[14,84],"is":[15,52],"significant":[16],"for":[17,90,112,159,179],"learning":[18],"public":[19],"cognition":[20],"social":[22,30],"media.":[23],"The":[24,61],"short":[25],"and":[26,58,67,79,128,151,171],"implicit":[27],"nature":[28],"of":[29,41,126,190],"media":[31],"users\u2019":[32],"expressions":[33],"potentially":[34],"results":[35],"in":[36],"stance":[38,72,91,176],"understanding":[39,125],"bias":[40],"model.":[43],"To":[44,161],"address":[45],"this":[46,94],"problem,":[47],"introducing":[48],"external":[49],"background":[50,113,157],"information":[51,114],"helpful":[53],"mitigate":[55],"these":[56,153],"biases":[57],"enhance":[59],"explainability.":[60],"core":[62,108,131,145,154],"view,":[63],"reflecting":[64],"motivations":[66],"reasons":[68],"behind":[69],"an":[70],"individual\u2019s":[71],"toward":[73],"target,":[75],"can":[76,85],"be":[77],"summarized":[78],"extracted":[80],"collective":[82],"tweets,":[83],"serve":[86],"as":[87,156],"reference":[89],"detection.":[92],"In":[93],"study,":[95],"we":[96,117,167],"propose":[97],"Detection":[100],"via":[101],"Core":[102],"View":[103],"Discovery":[104],"(SD-CVM),":[105],"where":[106],"views":[109,132,146,155],"are":[110],"used":[111],"modeling.":[115],"Specifically,":[116],"construct":[118],"joint":[120],"classifier":[121],"combining":[122],"semantic":[124],"tweets":[127,150],"their":[129],"relevant":[130],"public.":[135],"We":[136],"utilize":[137],"Large":[139],"Language":[140],"Model":[141],"(LLM)":[142],"extract":[144],"with":[147],"stances":[148],"use":[152],"references":[158],"tweets.":[160],"further":[162],"optimize":[163],"tweet":[165],"understanding,":[166],"develop":[168],"contrastive":[170],"rebalancing":[172],"mechanism":[173],"by":[174],"incorporating":[175],"supervision":[177],"signals":[178],"training.":[180],"Experiments":[181],"on":[182],"two":[183],"representative":[184],"datasets":[185],"demonstrate":[186],"excellent":[188],"performance":[189],"our":[191],"method.":[192]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
