2,664
Views
63
CrossRef citations to date
0
Altmetric
Research Article

Processing Social Media Images by Combining Human and Machine Computing during Crises

ORCID Icon, ORCID Icon & ORCID Icon

References

  • Alam, F., Imran, M., & Ofli, F. (2017, August). Image4act: Online social media image processing for disaster response. In International conference on advances in social networks analysis and mining (ASONAM) (pp. 1–4). Sydney, Australia: IEEE/ACM.
  • An, S., Huang, Z., Chen, Y., & Weng, D. (2017). Near duplicate product image detection based on binary hashing. In Proceedings of the 2017 international conference on deep learning technologies (pp. 75–80). Chengdu, China: ACM
  • Attari, N., Ofli, F., Awad, M., Lucas, J., & Chawla, S. (2017, October). Nazr-cnn: Fine-grained classification of uav imagery for damage assessment. In Ieee international conference on data science and advanced analytics (dsaa) (pp. 1–10). Tokyo, Japan: IEEE.
  • Babenko, A., Slesarev, A., Chigorin, A., & Lempitsky, V. (2014). Neural codes for image retrieval. In European conference on computer vision (pp. 584–599). Zurich, Switzerland: Springer
  • Chen, T., Lu, D., Kan, M.-Y., & Cui, P. (2013). Understanding and classifying image tweets. In Acm international conference on multimedia (pp. 781–784). Barcelona, Spain: ACM.
  • Chum, O., Philbin, J., & Zisserman, A. (2008). Near duplicate image detection: Min-hash and tf-idf weighting. In British machine vision conference (bmvc) (pp. 1–10). Leeds, UK: The University of Leeds.
  • Cresci, S., Tesconi, M., Cimino, A., & Dellórletta, F. (2015). A linguistically-driven approach to cross-event damage assessment of natural disasters from social media messages. In Acm international conference on world wide web (pp. 1195–1200). Florence, Italy: ACM.
  • Csurka, G., Dance, C. R., Fan, L., Willamowski, J., & Bray, C. (2004). Visual categorization with bags of key- points. In Workshop on statistical learning in computer vision, eccv(pp. 59–74). Prague, Czech Republic: Springer
  • Daly, S., & Thom, J. A. (2016, May). Mining and classifying image posts on social media to analyse fires. In International conference on information systems for crisis response and management (iscram) (pp. 1–14). Rio de Janeiro, Brazil: Scopus.
  • Donahue, J., Jia, Y., Vinyals, O., Hoffman, J., Zhang, N., Tzeng, E., & Darrell, T. (2014). Decaf: A deep convolutional activation feature for generic visual recognition. In International conference on machine learning (pp. 647–655). Beijing, China: International Machine Learning Society (IMLS). Retrieved from http://jmlr.org/proceedings/papers/v32/donahue14.html
  • Dong, W., Wang, Z., Charikar, M., & Li, K. (2012). High- confidence near-duplicate image detection. In Proceedings of the 2nd acm international conference on multimedia retrieval (p. 1). Hong Kong: ACM.
  • Everingham, M., Van Gool, L., Williams, C. K. I., Winn, J., & Zisserman, A. (2010, June). The pascal visual object classes (voc) challenge. International Journal of Computer Vision, 88(2), 303–338.
  • Feng, T., Hong, Z., Fu, Q., Ma, S., Jie, X., Wu, H., & Tong, X. (2014). Application and prospect of a high- resolution remote sensing and geo-information system in estimating earthquake casualties. Natural Hazards and Earth System Sciences, 14(8), 2165–2178.
  • Fernandez Galarreta, J., Kerle, N., & Gerke, M. (2015). UAV-based urban structural damage assessment using object-based image analysis and semantic reasoning. Natural Hazards and Earth System Science, 15(6), 1087–1101.
  • Girshick, R. B., Donahue, J., Darrell, T., & Malik, J. (2014). Rich feature hierarchies for accurate object detection and semantic segmentation. In Ieee conference on computer vision and pattern recognition (pp. 580–587). Columbus, Ohio: IEEE.
  • Gong, Y., Pawlowski, M., Yang, F., Brandy, L., Bourdev, L., & Fergus, R. (2015). Web scale photo hash clustering on a single machine. In Proceedings of the ieee conference on computer vision and pattern recognition (pp. 19–27). Hawaii, USA: IEEE.
  • Hamming, R. W. (1950, April). Error detecting and error correcting codes. The Bell System Technical Journal, 29(2), 147–160.
  • He, K., Zhang, X., Ren, S., & Sun, J. (2016, June). Deep residual learning for image recognition. In ieee conference on computer vision and pattern recognition (cvpr). Washington, DC: IEEE.
  • Hughes, A. L., & Palen, L. (2009). Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management, 6(3–4), 248–260.
  • Imran, M., Castillo, C., Diaz, F., & Vieweg, S. (2015). Processing social media messages in mass emergency: A survey. ACM Computing Surveys, 47(4), 67.
  • Imran, M., Castillo, C., Lucas, J., Meier, P., & Vieweg, S. (2014). AIDR: Artificial intelligence for disaster re- sponse. In Acm international conference on world wide web (pp. 159–162). Seoul, Republic of Korea: ACM.
  • Imran, M., Elbassuoni, S. M., Castillo, C., Diaz, F., & Meier, P. (2013). Extracting information nuggets from disaster-related messages in social media. In International conference on information systems for crisis response and management. Baden-Baden, Germany: Scopus.
  • Jégou, H., Douze, M., Schmid, C., & Pérez, P. (2010). Aggregating local descriptors into a compact image representation. IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 3304–3311). San Francisco, USA: IEEE.
  • Ke, Y., Sukthankar, R., & Huston, L. (2004). An efficient parts-based near-duplicate and sub-image retrieval system. In Acm international conference on multimedia (pp. 869–876). New York, NY: ACM.
  • Krizhevsky, A., Sutskever, I., & Hinton, G. E. (2012). Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems (pp. 1097–1105). Lake Tahoe, USA: ACM.
  • Lagerstrom, R., Arzhaeva, Y., Szul, P., Obst, O., Power, R., Robinson, B., & Bednarz, T. (2016). Image classification to support emergency situation awareness. Frontiers in Robotics and AI, 3, 54. doi:https://doi.org/10.3389/frobt.2016.00054
  • Lazebnik, S., Schmid, C., & Ponce, J. (2006). Beyond bags of features: Spatial pyramid matching for recognizing natural scene categories. In Ieee conference on computer vision and pattern recognition (Vol. 2, p. 2169–2178). New York, NY: IEEE. doi: https://doi.org/10.1109/CVPR.2006.68
  • Lee, D. C., Ke, Q., & Isard, M. (2010). Partition min-hash for partial duplicate image discovery. In European conference on computer vision (eccv) (pp. 648–662). Crete, Greece: Springer.
  • Lei, Y., Qiu, G., Zheng, L., & Huang, J. (2014, July). Fast near-duplicate image detection using uniform randomized trees. ACM Trans. Multimedia Comput. Commun. Appl, 10(4), 1–35. 35. 15.
  • Lei, Y., Wang, Y., & Huang, J. (2011). Robust image hash in radon transform domain for authentication. Signal Processing: Image Communication, 26(6), 280–288.
  • Nguyen, D. T., Alam, F., Ofli, F., & Imran, M. (2017, May). Automatic image filtering on social networks using deep learning and perceptual hashing during crises. In International conference on information systems for crisis response and management (ISCRAM). Albi, France: Scopus.
  • Nguyen, D. T., Ofli, F., Imran, M., & Mitra, P. (2017, August). Damage assessment from social media imagery data during disasters. In International conference on advances in social networks analysis and min- ing (ASONAM) (pp. 1–8). Sydney, Australia: IEEE/ACM.
  • Ofli, F., Meier, P., Imran, M., Castillo, C., Tuia, D., & Rey, N.,. O. (2016). Combining human computing and machine learning to make sense of big (aerial) data for disaster response. Big Data, 4(1), 47–59.
  • Oquab, M., Bottou, L., Laptev, I., & Sivic, J. (2014). Learning and transferring mid-level image representations using convolutional neural networks. In Ieee conference on computer vision and pattern recognition (pp. 1717–1724). Columbus, Ohio: IEEE.  Retrieved from doi: https://doi.org/10.1109/CVPR.2014.222
  • Ozbulak, G., Aytar, Y., & Ekenel, H. K. (2016, September). How transferable are cnn-based features for age and gender classification? In International conference of the biometrics special interest group (p. 1–6). Darmstadt, Germany: IEEE. doi: https://doi.org/10.1109/BIOSIG.2016.7736925
  • Pesaresi, M., Gerhardinger, A., & Haag, F. (2007). Rapid damage assessment of built-up structures using vhr satellite data in tsunami-affected areas. International Journal of Remote Sensing, 28(13–14), 3013–3036.
  • Peters, R., & Joao, P. D. A. (2015). Investigating images as indicators for relevant social media messages in disaster management. In International conference on information systems for crisis response and management. Kristiansand, Norway: Scopus.
  • Reuter, C., Ludwig, T., Kaufhold, M.-A., & Pipek, V. (2015). Xhelp: Design of a cross-platform social-media application to support volunteer moderators in disasters. In Acm conference on human factors in computing systems (pp. 4093–4102). Seoul, Republic of Korea: ACM.
  • Rivest, R. (1992, April). The md5 message-digest algorithm. RFC 1321, MIT Laboratory for Computer Science and RSA Data Security, Inc. (tools.ietf.org/html/rfc1321)
  • Rudra, K., Banerjee, S., Ganguly, N., Goyal, P., Imran, M., & Mitra, P. (2016). Summarizing situational tweets in crisis scenario. In Acm conference on hypertext and social media (pp. 137–147). Nova Scotia, Canada: ACM.
  • Rui, Y., Huang, T. S., & Mehrotra, S. (1997). Content- based image retrieval with relevance feedback in mars. International Conference on Image Processing (Vol.2, pp. 815–818). California, USA: IEEE.
  • Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., … Fei-Fei, L. (2015). ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision, 115(3), 211–252. doi:https://doi.org/10.1007/s11263-015-0816-y
  • Sermanet, P., Eigen, D., Zhang, X., Mathieu, M., Fergus, R., & LeCun, Y. (2013). Overfeat: Integrated recognition, localization and detection using convolutional networks. CoRR, abs/1312.6229. Retrieved from http://arxiv.org/abs/1312.6229
  • Shi, S., Wang, Q., Xu, P., & Chu, X. (2016). Benchmark- ing state-of-the-art deep learning software tools. arXiv preprint arXiv:1608.07249.
  • Siddiquie, B., Feris, R. S., & Davis, L. S. (2011). Image ranking and retrieval based on multi-attribute queries. IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 801–808). Colorado, USA: IEEE.
  • Simonyan, K., & Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556.
  • Starbird, K., Palen, L., Hughes, A. L., & Vieweg, S. (2010). Chatter on the red: What hazards threat reveals about the social life of microblogged information. In Acm conference on computer supported cooperative work (pp. 241–250). Savannah, USA: ACM.
  • Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., … Rabinovich, A. (2015). Going deeper with convolutions. In Proceedings of the ieee conference on computer vision and pattern recognition (pp. 1–9). Boston, USA: IEEE.
  • Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., & Wojna, Z. (2015). Rethinking the inception architecture for computer vision. CoRR, abs/1512.00567.
  • Turker, M., & San, B. T. (2004). Detection of col- lapsed buildings caused by the 1999 izmit, turkey earthquake through digital analysis of post-event aerial photographs. International Journal of Remote Sensing, 25(21), 4701–4714. doi:https://doi.org/10.1080/01431160410001709976
  • Wu, Z., Ke, Q., Isard, M., & Sun, J. (2009). Bundling features for large scale partial-duplicate web image search. In Computer vision and pattern recognition, 2009. cvpr 2009. ieee conference on (pp. 25–32). Miami, USA: IEEE.
  • Xu, K., Ba, J., Kiros, R., Cho, K., Courville, A., Salakhudi- Nov, R.,., … Bengio, Y. (2015). Show, attend and tell: Neuralimage caption generation with visual attention. In International conference on machine learning (pp. 2048–2057). Lille, France: International Machine Learning Society (IMLS).
  • Yosinski, J., Clune, J., Bengio, Y., & Lipson, H. (2014). How transferable are features in deep neural networks? In. Advances in Neural Information Processing Systems, 3320–3328. Montr'eal, Canada: NIPS.
  • Zagoruyko, S., & Komodakis, N. (2016). Wide residual networks. CoRR, abs/1605.07146. Retrieved from http://arxiv.org/abs/1605.07146
  • Zauner, C. (2010). Implementation and benchmarking of perceptual image hash functions. In Phd dissertation.
  • Zeiler, M. D., & Fergus, R. (2014). Visualizing and understanding convolutional networks. In F. David, P. Tomas, S. Bernt & T.Tinne (Eds.), European conference on computer vision (ECCV14) (pp. 818–833). Zurich, Switzerland: Springer. doi:https://doi.org/10.1007/978-3-319-10590-1\_53
  • Zheng, S., Song, Y., Leung, T., & Goodfellow, I. (2016). Improving the robustness of deep neural networks via stability training. In Proceedings of the ieee conference on computer vision and pattern recognition (pp. 4480–4488). Washington, DC: IEEE.