{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T01:26:39Z","timestamp":1773883599265,"version":"3.50.1"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1741306"],"award-info":[{"award-number":["IIS-1741306"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-2235548"],"award-info":[{"award-number":["IIS-2235548"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000005","name":"U.S. Department of Defense","doi-asserted-by":"publisher","award":["W81XWH-22-1-0581"],"award-info":[{"award-number":["W81XWH-22-1-0581"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000005","name":"U.S. Department of Defense","doi-asserted-by":"publisher","award":["W81XWH-22-1-0582"],"award-info":[{"award-number":["W81XWH-22-1-0582"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1109\/tpami.2023.3324799","type":"journal-article","created":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T18:13:48Z","timestamp":1697480028000},"page":"305-321","source":"Crossref","is-referenced-by-count":17,"title":["Frequent Pattern Mining in Continuous-Time Temporal Networks"],"prefix":"10.1109","volume":"46","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6468-1971","authenticated-orcid":false,"given":"Ali","family":"Jazayeri","sequence":"first","affiliation":[{"name":"College of Computing and Informatics, Drexel University, Philadelphia, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5463-6926","authenticated-orcid":false,"given":"Christopher C.","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Computing and Informatics, Drexel University, Philadelphia, PA, USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"General System Theory: Foundations, Development, Applications","author":"Bertalanffy","year":"1972"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/00018732.2011.572452"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888912000331"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BF00872095"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2002.1183885"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1852658.1852661"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2008.11.021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2011\/11\/P11005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36461-7_2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672329"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.2002.1829"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/physreve.84.016105"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2012.03.001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2015-60657-4"},{"key":"ref16","first-page":"30","article-title":"Finding frequent substructures in chemical compounds","volume-title":"Proc. Int. Conf. Knowl. Discov. Data Mining","author":"Dehaspe"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45372-5_2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2001.989534"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM47256.2019.8983290"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2018.9020009"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3389\/fncom.2018.00031"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.compmedimag.2016.04.004"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11682-017-9753-4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2975167.2975170"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tvcg.2019.2934670"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098090"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1186\/s13040-018-0181-9"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/tcbb.2016.2645202"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-020-3474-1"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2015.1016116"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2629445"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.115"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.01.030"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2014.0189"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2011.12.002"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2013.11.003"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/innovations.2011.5893799"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/icassp.2014.6853857"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34980-6_30"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3299815.3314485"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.4067\/S0718-33052017000200226"},{"key":"ref42","article-title":"A framework for intrusion detection based on frequent subgraph mining","volume-title":"Proc. 2nd SDM Workshop Mining Netw. Graphs","author":"Herrera-Semenets"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2675881"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2021.3072001"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1093\/comnet\/cnaa031"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1126\/science.298.5594.824"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/icdm.2002.1184038"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/icdm.2002.1184038"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2007.368850"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.104"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2008.68"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.99"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1830252.1830272"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.106"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972801.41"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.184"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020501"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1613\/jair.43"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0003-9"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.92"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.124"},{"key":"ref62","first-page":"166","article-title":"Frequent subgraph discovery in large attributed streaming graphs","volume-title":"Proc. 3rd Int. Conf. Big Data Streams Heterogeneous Source Mining Algorithms Syst. Program. Models Appl.","author":"Ray"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719802"},{"key":"ref64","volume-title":"Algorithmic Graph Theory and Perfect Graphs","author":"Golumbic","year":"1980"},{"key":"ref65","doi-asserted-by":"crossref","DOI":"10.1201\/9781420035346","volume-title":"CRC Standard Mathematical Tables and Formulae","author":"Zwillinger","year":"2002"},{"key":"ref66","volume-title":"Interval Analysis","volume":"4","author":"Moore","year":"1966"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.2140\/pjm.1965.15.835"},{"key":"ref68","volume-title":"Computational Geometry: An Introduction","author":"Preparata","year":"2012"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1201\/9781420035179.ch18"},{"key":"ref70","volume-title":"Introduction to Algorithms","author":"Cormen","year":"2009"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2013.09.003"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972870.13"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1173"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2897518.2897542"},{"key":"ref75","article-title":"Fixing the UPCC case of split-or-Johnson","author":"Babai","year":"2017"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3313276.3316356"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0073970"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0107878"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3307339.3342160"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2023.102576"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.08.114"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/34\/10345401\/10286094-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/34\/10345401\/10286094.pdf?arnumber=10286094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T01:20:38Z","timestamp":1703035238000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10286094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":81,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tpami.2023.3324799","relation":{},"ISSN":["0162-8828","2160-9292","1939-3539"],"issn-type":[{"value":"0162-8828","type":"print"},{"value":"2160-9292","type":"electronic"},{"value":"1939-3539","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]}}}