{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T18:21:06Z","timestamp":1773253266897,"version":"3.50.1"},"reference-count":51,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Processing &amp; Management"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.ipm.2026.104643","type":"journal-article","created":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T17:36:00Z","timestamp":1769103360000},"page":"104643","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["TaNSP: An efficient target pattern mining algorithm based on negative sequential pattern"],"prefix":"10.1016","volume":"63","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-2936-1797","authenticated-orcid":false,"given":"Xiaowen","family":"Cui","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5455-3618","authenticated-orcid":false,"given":"Xue","family":"Dong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7905-4519","authenticated-orcid":false,"given":"Ping","family":"Qiu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0160-1783","authenticated-orcid":false,"given":"Chuanhou","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6798-9293","authenticated-orcid":false,"given":"Yuhai","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1840-3540","authenticated-orcid":false,"given":"Wenpeng","family":"Lu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5364-5844","authenticated-orcid":false,"given":"Xiangjun","family":"Dong","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.ipm.2026.104643_bib0001","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1016\/j.jksuci.2019.01.012","article-title":"Cd-spm: Cross-domain book recommendation using sequential pattern mining and rule mining","volume":"34","author":"Anwar","year":"2022","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"10.1016\/j.ipm.2026.104643_bib0002","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.artint.2016.03.001","article-title":"e-NSP: Efficient negative sequential pattern mining","volume":"235","author":"Cao","year":"2016","journal-title":"Artificial Intelligence"},{"issue":"1","key":"10.1016\/j.ipm.2026.104643_bib0003","first-page":"1","article-title":"High utility periodic frequent pattern mining in multiple sequences","volume":"137","author":"Chen","year":"2023","journal-title":"CMES-Computer Modeling in Engineering & Sciences"},{"issue":"5","key":"10.1016\/j.ipm.2026.104643_bib0004","doi-asserted-by":"crossref","first-page":"2084","DOI":"10.1109\/TCYB.2018.2869907","article-title":"e-RNSP: An efficient method for mining repetition negative sequential patterns","volume":"50","author":"Dong","year":"2018","journal-title":"IEEE Transactions on Cybernetics"},{"key":"10.1016\/j.ipm.2026.104643_bib0005","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.patcog.2018.06.016","article-title":"F-NSP+: A fast negative sequential patterns mining method with self-adaptive data storage","volume":"84","author":"Dong","year":"2018","journal-title":"Pattern Recognition"},{"issue":"9","key":"10.1016\/j.ipm.2026.104643_bib0006","doi-asserted-by":"crossref","first-page":"2764","DOI":"10.1109\/TNNLS.2018.2886199","article-title":"Mining top-k useful negative sequential patterns via learning","volume":"30","author":"Dong","year":"2019","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"6","key":"10.1016\/j.ipm.2026.104643_bib0007","doi-asserted-by":"crossref","first-page":"3766","DOI":"10.1109\/TKDE.2025.3547394","article-title":"Towards target sequential rules","volume":"37","author":"Gan","year":"2025","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"2","key":"10.1016\/j.ipm.2026.104643_bib0008","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1109\/TCYB.2020.2970176","article-title":"Fast utility mining on sequence data","volume":"51","author":"Gan","year":"2020","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"2","key":"10.1016\/j.ipm.2026.104643_bib0009","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1109\/TNNLS.2020.3041732","article-title":"Toward better structure and constraint to mine negative sequential patterns","volume":"34","author":"Gao","year":"2020","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"10.1016\/j.ipm.2026.104643_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.115419","article-title":"A cellular-based evolutionary approach for the extraction of emerging patterns in massive data streams","volume":"183","author":"Garc\u00eda-Vico","year":"2021","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"10.1016\/j.ipm.2026.104643_bib0011","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3457949","article-title":"Hierarchical hyperedge embedding-based representation learning for group recommendation","volume":"40","author":"Guo","year":"2021","journal-title":"ACM Transactions on Information Systems (TOIS)"},{"key":"10.1016\/j.ipm.2026.104643_bib0012","series-title":"Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining","first-page":"1569","article-title":"Streaming session-based recommendation","author":"Guo","year":"2019"},{"issue":"7","key":"10.1016\/j.ipm.2026.104643_bib0013","first-page":"7397","article-title":"Reinforcement learning-enhanced shared-account cross-domain sequential recommendation","volume":"35","author":"Guo","year":"2022","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"10.1016\/j.ipm.2026.104643_bib0014","doi-asserted-by":"crossref","first-page":"4002","DOI":"10.1109\/TNNLS.2022.3201533","article-title":"Time interval-enhanced graph neural network for shared-account cross-domain sequential recommendation","volume":"35","author":"Guo","year":"2022","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"2","key":"10.1016\/j.ipm.2026.104643_bib0015","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1007\/s10618-019-00672-w","article-title":"NegPSpan: Efficient extraction of negative sequential patterns with embedding constraints","volume":"34","author":"Guyet","year":"2020","journal-title":"Data Mining and Knowledge Discovery"},{"key":"10.1016\/j.ipm.2026.104643_bib0016","series-title":"2008\u202fIEEE Asia-pacific services computing conference","first-page":"1213","article-title":"Mining negative sequential patterns for e-commerce recommendations","author":"Hsueh","year":"2008"},{"key":"10.1016\/j.ipm.2026.104643_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119791","article-title":"Targeted mining of contiguous sequential patterns","volume":"653","author":"Hu","year":"2024","journal-title":"Information Sciences"},{"issue":"5","key":"10.1016\/j.ipm.2026.104643_bib0018","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3639827","article-title":"TaSPM: Targeted sequential pattern mining","volume":"18","author":"Huang","year":"2024","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"issue":"1","key":"10.1016\/j.ipm.2026.104643_bib0019","first-page":"1","article-title":"On mining progressive positive and negative sequential patterns simultaneously","volume":"36","author":"Huang","year":"2020","journal-title":"Journal of Information Science & Engineering"},{"key":"10.1016\/j.ipm.2026.104643_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.107047","article-title":"Targeted mining of top-k high utility itemsets","volume":"126","author":"Huang","year":"2023","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"6","key":"10.1016\/j.ipm.2026.104643_bib0021","doi-asserted-by":"crossref","first-page":"1522","DOI":"10.1109\/TKDE.2003.1245290","article-title":"Itemset trees for targeted association querying","volume":"15","author":"Kubat","year":"2003","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"5","key":"10.1016\/j.ipm.2026.104643_bib0022","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1016\/j.jksuci.2019.09.006","article-title":"A review on big data based parallel and distributed approaches of pattern mining","volume":"34","author":"Kumar","year":"2022","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"3","key":"10.1016\/j.ipm.2026.104643_bib0023","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2025.104077","article-title":"Tk-rnsp: Efficient top-k repetitive negative sequential pattern mining","volume":"62","author":"Lan","year":"2025","journal-title":"Information Processing & Management"},{"key":"10.1016\/j.ipm.2026.104643_bib0024","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2025.122582","article-title":"Mining frequent sequential patterns in fully dynamic database: A support approximation method","volume":"721","author":"Li","year":"2025","journal-title":"Information Sciences"},{"issue":"6","key":"10.1016\/j.ipm.2026.104643_bib0025","doi-asserted-by":"crossref","first-page":"2509","DOI":"10.1007\/s10115-023-01831-8","article-title":"Fchm-stream: Fast closed high utility itemsets mining over data streams","volume":"65","author":"Li","year":"2023","journal-title":"Knowledge and Information Systems"},{"key":"10.1016\/j.ipm.2026.104643_bib0026","series-title":"2021\u202fIEEE International conference on data mining (ICDM)","first-page":"419","article-title":"Fgc-stream: A novel joint miner for frequent generators and closed itemsets in data streams","author":"Martin","year":"2021"},{"issue":"4","key":"10.1016\/j.ipm.2026.104643_bib0027","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1109\/TAI.2022.3171530","article-title":"Targeted high-utility itemset querying","volume":"4","author":"Miao","year":"2022","journal-title":"IEEE Transactions on Artificial Intelligence"},{"issue":"4","key":"10.1016\/j.ipm.2026.104643_bib0028","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2023.103376","article-title":"Multi-channel hypergraph topic neural network for clinical treatment pattern mining","volume":"60","author":"Min","year":"2023","journal-title":"Information Processing & Management"},{"key":"10.1016\/j.ipm.2026.104643_bib0029","series-title":"IECON 2017-43rd Annual conference of the ieee industrial electronics society","first-page":"3419","article-title":"Negi-NSP: Negative sequential pattern mining based on loose constraints","author":"Qiu","year":"2017"},{"key":"10.1016\/j.ipm.2026.104643_bib0030","series-title":"International conference on business process management","first-page":"415","article-title":"Best: Bilaterally expanding subtrace tree for event sequence prediction","author":"Rauch","year":"2025"},{"key":"10.1016\/j.ipm.2026.104643_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.122754","article-title":"A new tree-based approach to mine sequential patterns","volume":"242","author":"Rizvee","year":"2024","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"10.1016\/j.ipm.2026.104643_bib0032","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2024.104008","article-title":"Robust community detection based on improved user interaction, enhanced local path index and pattern mining in social networks","volume":"62","author":"Sayari","year":"2025","journal-title":"Information Processing & Management"},{"key":"10.1016\/j.ipm.2026.104643_bib0033","series-title":"International conference on extending database technology","first-page":"1","article-title":"Mining sequential patterns: Generalizations and performance improvements","author":"Srikant","year":"1996"},{"key":"10.1016\/j.ipm.2026.104643_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.111449","article-title":"Sn-rnsp: Mining self-adaptive nonoverlapping repetitive negative sequential patterns in transaction sequences","volume":"287","author":"Sun","year":"2024","journal-title":"Knowledge-Based Systems"},{"key":"10.1016\/j.ipm.2026.104643_bib0035","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.112398","article-title":"Mining actionable repetitive positive and negative sequential patterns","volume":"302","author":"Sun","year":"2024","journal-title":"Knowledge-Based Systems"},{"key":"10.1016\/j.ipm.2026.104643_bib0036","article-title":"Detecting frequent sequential patterns between weather and cattle behavior using data mining","volume":"6","author":"Trieu","year":"2024","journal-title":"Frontiers in Animal Science"},{"issue":"3","key":"10.1016\/j.ipm.2026.104643_bib0037","first-page":"1","article-title":"Interactive sequential basket recommendation by learning basket couplings and positive\/negative feedback","volume":"39","author":"Wang","year":"2021","journal-title":"ACM Transactions on Information Systems"},{"issue":"2","key":"10.1016\/j.ipm.2026.104643_bib0038","first-page":"1","article-title":"Vm-nsp: Vertical negative sequential pattern mining with loose negative element constraints","volume":"39","author":"Wang","year":"2021","journal-title":"ACM Transactions on Information Systems"},{"issue":"3","key":"10.1016\/j.ipm.2026.104643_bib0039","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2022.102938","article-title":"Hgnn: Hyperedge-based graph neural network for mooc course recommendation","volume":"59","author":"Wang","year":"2022","journal-title":"Information Processing & Management"},{"issue":"3","key":"10.1016\/j.ipm.2026.104643_bib0040","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3549940","article-title":"Onp-miner: One-off negative sequential pattern mining","volume":"17","author":"Wu","year":"2023","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"issue":"3","key":"10.1016\/j.ipm.2026.104643_bib0041","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3480245","article-title":"Ntp-miner: Nonoverlapping three-way sequential pattern mining","volume":"16","author":"Wu","year":"2021","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"10.1016\/j.ipm.2026.104643_bib0042","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.ins.2021.12.064","article-title":"Nwp-miner: Nonoverlapping weak-gap sequential pattern mining","volume":"588","author":"Wu","year":"2022","journal-title":"Information Sciences"},{"key":"10.1016\/j.ipm.2026.104643_bib0043","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2020.105812","article-title":"NetNCSP: Nonoverlapping closed sequential pattern mining","volume":"196","author":"Wu","year":"2020","journal-title":"Knowledge-Based Systems"},{"issue":"2","key":"10.1016\/j.ipm.2026.104643_bib0044","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2025.104402","article-title":"HU-RNSP: Efficiently mining high-utility repeated negative sequential patterns","volume":"63","author":"Xiao","year":"2026","journal-title":"Information Processing & Management"},{"key":"10.1016\/j.ipm.2026.104643_bib0045","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2025.114185","article-title":"Skyline quantity-utility sequential pattern mining: an efficient and effective approach","volume":"328","author":"Xu","year":"2025","journal-title":"Knowledge-Based Systems"},{"issue":"2","key":"10.1016\/j.ipm.2026.104643_bib0046","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1109\/TBDATA.2022.3175428","article-title":"Tusq: Targeted high-utility sequence querying","volume":"9","author":"Zhang","year":"2022","journal-title":"IEEE Transactions on Big Data"},{"issue":"1","key":"10.1016\/j.ipm.2026.104643_bib0047","first-page":"1","article-title":"Husp-sp: Faster utility mining on sequence data","volume":"18","author":"Zhang","year":"2023","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"10.1016\/j.ipm.2026.104643_bib0048","doi-asserted-by":"crossref","first-page":"31842","DOI":"10.1109\/ACCESS.2023.3262823","article-title":"An effective method for mining negative sequential patterns from data streams","volume":"11","author":"Zhang","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.ipm.2026.104643_bib0049","series-title":"2022\u202fIEEE International conference on big data (big data)","first-page":"6271","article-title":"Targeted mining of rare high-utility patterns","author":"Zhang","year":"2022"},{"issue":"6","key":"10.1016\/j.ipm.2026.104643_bib0050","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2025.104272","article-title":"A study on sensing opportunities for ev technology recombination based on consumer preference mining and multi-layer network construction","volume":"62","author":"Zhao","year":"2025","journal-title":"Information Processing & Management"},{"issue":"1","key":"10.1016\/j.ipm.2026.104643_bib0051","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3530012","article-title":"perCLTV: A general system for personalized customer lifetime value prediction in online games","volume":"41","author":"Zhao","year":"2023","journal-title":"ACM Transactions on Information Systems"}],"container-title":["Information Processing &amp; Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S030645732600035X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S030645732600035X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T23:56:22Z","timestamp":1773186982000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S030645732600035X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":51,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["S030645732600035X"],"URL":"https:\/\/doi.org\/10.1016\/j.ipm.2026.104643","relation":{},"ISSN":["0306-4573"],"issn-type":[{"value":"0306-4573","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"TaNSP: An efficient target pattern mining algorithm based on negative sequential pattern","name":"articletitle","label":"Article Title"},{"value":"Information Processing & Management","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ipm.2026.104643","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104643"}}