{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T06:29:46Z","timestamp":1774074586478,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002136"],"award-info":[{"award-number":["62002136"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Guangdong Province of China","award":["2020A1515010970"],"award-info":[{"award-number":["2020A1515010970"]}]},{"name":"Natural Science Foundation of Guangdong Province of China","award":["2022A1515011861"],"award-info":[{"award-number":["2022A1515011861"]}]},{"name":"Guangzhou Basic and Applied Basic Research Foundation","award":["202102020277"],"award-info":[{"award-number":["202102020277"]}]},{"name":"Shenzhen Research Council","award":["JCYJ20200109113427092"],"award-info":[{"award-number":["JCYJ20200109113427092"]}]},{"name":"Shenzhen Research Council","award":["GJHZ20180928155209705"],"award-info":[{"award-number":["GJHZ20180928155209705"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2023,4,1]]},"DOI":"10.1109\/tbdata.2022.3175428","type":"journal-article","created":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T20:22:38Z","timestamp":1652732558000},"page":"512-527","source":"Crossref","is-referenced-by-count":25,"title":["TUSQ: Targeted High-Utility Sequence Querying"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2207-0953","authenticated-orcid":false,"given":"Chunkai","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, Guangdong, China"}]},{"given":"Quanjian","family":"Dai","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, Guangdong, China"}]},{"given":"Zilin","family":"Du","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5781-8116","authenticated-orcid":false,"given":"Wensheng","family":"Gan","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-8230","authenticated-orcid":false,"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3491-5968","authenticated-orcid":false,"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Illinois at Chicago, Chicago, IL, USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"487","article-title":"Fast algorithms for mining association rules","volume-title":"Proc. 20th Int. Conf. Very Large Data Bases","author":"Agrawal"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/360402.360421"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1023\/A:1007652502315","article-title":"SPADE: An efficient algorithm for mining frequent sequences","volume":"42","author":"Zaki","year":"2001","journal-title":"Mach. Learn."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1207"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775109"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11430919_79"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08326-1_9"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.10.1510.0066"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20149-3_18"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2942594"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/66926.66946"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/125223.125262"},{"key":"ref14","article-title":"A guided fp-growth algorithm for multitude-targeted mining of Big Data","author":"Shabtay","year":"2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1245290"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-53917-6_9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM.2017.8217834"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(03)00073-3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2010.2410"},{"issue":"10","key":"ref20","first-page":"12","article-title":"Target oriented sequential pattern mining using recency and monetary constraints","volume":"45","author":"Chand","year":"2012","journal-title":"Int. J. Comput. Appl."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-018-0633-7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0914-8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.10.033"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.77"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.107"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1186\/s12918-017-0475-4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33718-5_16"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644897"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000005258.31418.83"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/69.846291"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-006-0032-8"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956807"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2004.03.009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0014140"},{"issue":"1","key":"ref35","first-page":"54","article-title":"A survey of sequential pattern mining","volume":"1","author":"Fournier-Viger","year":"2017","journal-title":"Data Sci. Pattern Recognit."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250893"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04921-8_5"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.59"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2970176"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3446938"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006152"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3178114"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622405"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335372"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.14806\/ej.19.B.729"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-020-00830-x"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080758"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.06.006"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339636"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/10068313\/09775580.pdf?arnumber=9775580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T22:49:01Z","timestamp":1705963741000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9775580\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":49,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2022.3175428","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,1]]}}}