{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T14:26:27Z","timestamp":1774880787402,"version":"3.50.1"},"reference-count":182,"publisher":"World Scientific Pub Co Pte Ltd","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Info. Tech. Dec. Mak."],"published-print":{"date-parts":[[2019,7]]},"abstract":"<jats:p>High utility itemset mining considers unit profits and quantities of items in a transaction database to extract more applicable and more useful association rules. Downward closure property, which causes significant pruning in frequent itemset mining, is not established in the utility of itemsets and so the mining problem will require alternative solutions to reduce its search space and to enhance its efficiency. Using an anti-monotonic upper bound of the utility function and exploiting efficient data structures for storing and compacting the dataset to perform efficient pruning strategies are the main solutions to address high utility itemset mining problem. Different mining methods and techniques have attempted to improve performance of extracting high utility itemsets and their several variants, including high-average utility itemsets, top-k high utility itemsets, and high utility itemsets with negative values, using more efficient data structures, more appropriate anti-monotonic upper bounds, and stronger pruning strategies. This paper aims to represent a comprehensive systematic review for high utility itemset mining techniques and to classify them based on their problem-solving approaches.<\/jats:p>","DOI":"10.1142\/s0219622019300027","type":"journal-article","created":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T03:53:42Z","timestamp":1555300422000},"page":"1113-1185","source":"Crossref","is-referenced-by-count":17,"title":["A Systematic Survey on High Utility Itemset Mining"],"prefix":"10.1142","volume":"18","author":[{"given":"Bahareh","family":"Rahmati","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Semnan Branch, Islamic Azad University, Semnan, Iran"}]},{"given":"Mohammad Karim","family":"Sohrabi","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Semnan Branch, Islamic Azad University, Semnan, Iran"}]}],"member":"219","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"S0219622019300027BIB001","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622016300020"},{"key":"S0219622019300027BIB002","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiolchem.2017.06.002"},{"key":"S0219622019300027BIB003","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2435155"},{"key":"S0219622019300027BIB004","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622014500473"},{"key":"S0219622019300027BIB005","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1612-279"},{"key":"S0219622019300027BIB006","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2855-x"},{"key":"S0219622019300027BIB007","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2010.11.005"},{"key":"S0219622019300027BIB008","author":"Kapusta J.","year":"2018","journal-title":"International Journal of Information Technology and Decision-Making"},{"key":"S0219622019300027BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2016.07.001"},{"key":"S0219622019300027BIB010","author":"Hemmatian F.","year":"2018","journal-title":"Artificial Intelligence Review"},{"key":"S0219622019300027BIB011","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622014500266"},{"key":"S0219622019300027BIB012","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2017.04.006"},{"key":"S0219622019300027BIB013","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-1963-4"},{"key":"S0219622019300027BIB014","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622013500077"},{"key":"S0219622019300027BIB015","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2016.05.003"},{"key":"S0219622019300027BIB016","doi-asserted-by":"publisher","DOI":"10.17706\/jcp.11.2.140-148"},{"key":"S0219622019300027BIB017","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1608-112"},{"key":"S0219622019300027BIB018","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.09.012"},{"key":"S0219622019300027BIB019","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.02.018"},{"key":"S0219622019300027BIB020","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2627050"},{"key":"S0219622019300027BIB021","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.137"},{"key":"S0219622019300027BIB022","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622012500095"},{"key":"S0219622019300027BIB023","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2011.01.009"},{"key":"S0219622019300027BIB024","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.092"},{"key":"S0219622019300027BIB025","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622008003204"},{"key":"S0219622019300027BIB026","doi-asserted-by":"crossref","first-page":"23","DOI":"10.19101\/IJACR.2016.627001","volume":"7","author":"Sohrabi M. K.","year":"2016","journal-title":"Journal of Advances in Computer Research"},{"key":"S0219622019300027BIB027","first-page":"94431V","volume-title":"Proc. 6th Int. Conf. Graphic and Image Processing (ICGIP 2014)","author":"Sohrabi M. K.","year":"2014"},{"key":"S0219622019300027BIB028","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.036"},{"key":"S0219622019300027BIB029","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2739749"},{"key":"S0219622019300027BIB030","first-page":"186","volume-title":"Proc. 4th Int. Symp. Computational and Business Intelligence (ISCBI)","author":"Sohrabi M. K.","year":"2016"},{"key":"S0219622019300027BIB031","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2793862"},{"key":"S0219622019300027BIB032","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2345408"},{"key":"S0219622019300027BIB033","first-page":"207","volume-title":"Proc. ACM SIGMOD Int. Conf. Management of Data","author":"Agrawal R.","year":"1993"},{"key":"S0219622019300027BIB035","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1145\/956750.956788","volume-title":"Proc. 9th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining","author":"Zaki M. J.","year":"2003"},{"key":"S0219622019300027BIB036","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.03.004"},{"key":"S0219622019300027BIB037","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.01.025"},{"key":"S0219622019300027BIB038","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.01.010"},{"key":"S0219622019300027BIB039","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.03.003"},{"key":"S0219622019300027BIB040","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.09.005"},{"key":"S0219622019300027BIB041","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2017.1405286"},{"key":"S0219622019300027BIB042","doi-asserted-by":"publisher","DOI":"10.1080\/02533839.2018.1454853"},{"key":"S0219622019300027BIB043","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2014.07.004"},{"key":"S0219622019300027BIB044","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-014-0732-4"},{"key":"S0219622019300027BIB045","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.04.048"},{"key":"S0219622019300027BIB046","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.09.023"},{"key":"S0219622019300027BIB047","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.12.018"},{"key":"S0219622019300027BIB048","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.01.049"},{"key":"S0219622019300027BIB049","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.12.023"},{"key":"S0219622019300027BIB050","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.017"},{"key":"S0219622019300027BIB051","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.11.064"},{"key":"S0219622019300027BIB052","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.04.001"},{"key":"S0219622019300027BIB053","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.01.034"},{"key":"S0219622019300027BIB054","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.07.025"},{"key":"S0219622019300027BIB055","author":"Vanahalli M. K.","year":"2018","journal-title":"Information Sciences"},{"key":"S0219622019300027BIB056","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/ICDM.2003.1250893","volume-title":"Proc. 3rd IEEE Int. Conf. Data Mining","author":"Chan R.","year":"2003"},{"key":"S0219622019300027BIB058","series-title":"LNCS","first-page":"417","volume-title":"Proc. 11th Int. Fuzzy Systems Association World Congress (2005)","volume":"3399","author":"Li Y.-C.","year":"2005"},{"key":"S0219622019300027BIB060","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2005.10.004"},{"key":"S0219622019300027BIB061","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.06.009"},{"key":"S0219622019300027BIB062","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.46"},{"key":"S0219622019300027BIB063","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1145\/1835804.1835839","volume-title":"Proc. 16th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining","author":"Tseng V. S.","year":"2010"},{"key":"S0219622019300027BIB064","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.59"},{"key":"S0219622019300027BIB065","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.12.082"},{"key":"S0219622019300027BIB066","first-page":"71","volume-title":"Proc. IEEE Int. Conf. Computer and Information Technology","author":"Erwin A.","year":"2007"},{"key":"S0219622019300027BIB067","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-013-0443-7"},{"key":"S0219622019300027BIB068","first-page":"55","volume-title":"Proc. 21st ACM Int. Conf. Information and Knowledge Management","author":"Liu M.","year":"2012"},{"key":"S0219622019300027BIB069","first-page":"984","volume-title":"Proc. 12th IEEE Int. Conf. Data Mining","author":"Liu J.","year":"2012"},{"key":"S0219622019300027BIB071","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.11.001"},{"key":"S0219622019300027BIB072","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-017-1057-2"},{"key":"S0219622019300027BIB073","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.08.028"},{"key":"S0219622019300027BIB074","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.11.038"},{"key":"S0219622019300027BIB075","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-016-0986-0"},{"key":"S0219622019300027BIB076","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-017-0932-1"},{"key":"S0219622019300027BIB077","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-016-0989-x"},{"key":"S0219622019300027BIB078","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2009.05.066"},{"key":"S0219622019300027BIB079","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.08.022"},{"key":"S0219622019300027BIB080","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.12.035"},{"key":"S0219622019300027BIB081","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.12.010"},{"key":"S0219622019300027BIB082","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.04.016"},{"key":"S0219622019300027BIB083","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2458860"},{"key":"S0219622019300027BIB084","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.035"},{"key":"S0219622019300027BIB085","first-page":"2526","volume-title":"Proc. Int. Conf. Systems, Man and Cybernetics","author":"Hong T.-P.","year":"2009"},{"key":"S0219622019300027BIB086","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2016.04.002"},{"key":"S0219622019300027BIB087","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-016-0890-z"},{"key":"S0219622019300027BIB088","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-017-0896-1"},{"key":"S0219622019300027BIB089","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.027"},{"key":"S0219622019300027BIB090","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2717438"},{"key":"S0219622019300027BIB091","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2820740"},{"key":"S0219622019300027BIB092","author":"Truong T.","year":"2018","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"S0219622019300027BIB093","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.12.038"},{"key":"S0219622019300027BIB094","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.07.003"},{"key":"S0219622019300027BIB095","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2014.891839"},{"key":"S0219622019300027BIB096","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.07.006"},{"key":"S0219622019300027BIB097","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2106-1"},{"key":"S0219622019300027BIB098","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.10.027"},{"key":"S0219622019300027BIB099","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.09.033"},{"key":"S0219622019300027BIB100","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.11.040"},{"key":"S0219622019300027BIB101","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.10.049"},{"key":"S0219622019300027BIB102","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1145\/2695664.2695823","volume-title":"Proc. 30th ACM Symposium on Applied Computing","author":"Fournier-Viger P.","year":"2015"},{"key":"S0219622019300027BIB103","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.09.013"},{"key":"S0219622019300027BIB104","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2017.12.012"},{"key":"S0219622019300027BIB105","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.02.051"},{"key":"S0219622019300027BIB106","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-015-0740-4"},{"key":"S0219622019300027BIB107","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-016-1020-2"},{"key":"S0219622019300027BIB108","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1155-9"},{"key":"S0219622019300027BIB109","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2801261"},{"key":"S0219622019300027BIB110","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-010-0330-z"},{"key":"S0219622019300027BIB111","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.01.045"},{"key":"S0219622019300027BIB112","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.03.001"},{"key":"S0219622019300027BIB113","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-017-0939-7"},{"key":"S0219622019300027BIB114","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2017.2682782"},{"key":"S0219622019300027BIB115","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.12.029"},{"key":"S0219622019300027BIB116","first-page":"235","volume-title":"Proc. IEEE Int. Conf. Cyber-Enabled Distributed Computing and Knowledge Discovery","author":"Lan Y.","year":"2015"},{"key":"S0219622019300027BIB117","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.12.019"},{"key":"S0219622019300027BIB118","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2159-1"},{"key":"S0219622019300027BIB119","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022419032620"},{"key":"S0219622019300027BIB120","first-page":"482","volume-title":"Proc 3rd SIAM Int. Conf. Data Mining","author":"Yao H.","year":"2004"},{"key":"S0219622019300027BIB121","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2706947"},{"key":"S0219622019300027BIB122","first-page":"3","volume-title":"Proc. 2nd Int. Workshop Integrating Artificial Intelligence and Data Mining","volume":"84","author":"Erwin A.","year":"2007"},{"key":"S0219622019300027BIB124","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-012-0492-y"},{"key":"S0219622019300027BIB125","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2788083"},{"key":"S0219622019300027BIB126","first-page":"193","volume":"28","author":"Lan G.-C.","year":"2012","journal-title":"Journal of Information Science and Engineering"},{"key":"S0219622019300027BIB127","volume":"8","author":"Gan W.","year":"2018","journal-title":"WIREs Data Mining and Knowledge Discovery"},{"key":"S0219622019300027BIB128","first-page":"212","volume-title":"Proc. 2nd ACM Int. Conf. Ubiquitous Information Management and Communication","author":"Yeh J.-S.","year":"2008"},{"key":"S0219622019300027BIB129","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.01.072"},{"key":"S0219622019300027BIB130","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-013-0467-z"},{"key":"S0219622019300027BIB131","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-014-0601-6"},{"key":"S0219622019300027BIB132","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.03.020"},{"key":"S0219622019300027BIB133","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.03.016"},{"key":"S0219622019300027BIB134","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.03.021"},{"key":"S0219622019300027BIB135","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2420557"},{"key":"S0219622019300027BIB136","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0914-8"},{"key":"S0219622019300027BIB137","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.03.019"},{"key":"S0219622019300027BIB138","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2018.01.005"},{"key":"S0219622019300027BIB139","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2827167"},{"key":"S0219622019300027BIB140","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-016-5617-1"},{"key":"S0219622019300027BIB141","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1227-x"},{"key":"S0219622019300027BIB142","author":"Gan W.","year":"2018","journal-title":"arXive"},{"key":"S0219622019300027BIB143","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-012-0379-3"},{"key":"S0219622019300027BIB144","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-012-0483-z"},{"key":"S0219622019300027BIB145","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.74506"},{"key":"S0219622019300027BIB146","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2014.1000396"},{"key":"S0219622019300027BIB147","author":"Tamilselvi T.","year":"2018","journal-title":"Cluster Computing"},{"key":"S0219622019300027BIB148","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.12.003"},{"key":"S0219622019300027BIB149","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.07.051"},{"key":"S0219622019300027BIB150","doi-asserted-by":"publisher","DOI":"10.1016\/j.pisc.2015.11.013"},{"key":"S0219622019300027BIB151","first-page":"191","volume-title":"Proc. 9th IEEE Int. Conf. Granular Computing","author":"Lin J. C.-W.","year":"2013"},{"key":"S0219622019300027BIB154","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.051"},{"key":"S0219622019300027BIB155","first-page":"78","volume-title":"Proc. 18th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining","author":"Wu C.-W.","year":"2012"},{"key":"S0219622019300027BIB156","author":"Singh K.","year":"2018","journal-title":"Expert Systems"},{"key":"S0219622019300027BIB157","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.01.006"},{"key":"S0219622019300027BIB158","first-page":"33","volume-title":"CISIM 2014. LNCS","volume":"8838","author":"Lu T.","year":"2014"},{"key":"S0219622019300027BIB159","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1180-8"},{"key":"S0219622019300027BIB160","author":"Sohrabi M. K.","year":"2018","journal-title":"Archives of Computational Methods Engineering"},{"key":"S0219622019300027BIB161","author":"Dam T.-L.","year":"2018","journal-title":"Frontiers of Computer Science in China"},{"key":"S0219622019300027BIB162","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-3-319-41920-6_15","volume-title":"Machine Learning and Data Mining in Pattern Recognition, MLDM, 2016","volume":"9729","author":"Fournier-Viger P.","year":"2016"},{"key":"S0219622019300027BIB163","first-page":"187","volume-title":"Proc. IEEE Int. Conf. Technologies and Applications of Artificial Intelligence (TAAI)","author":"Wu C.-W.","year":"2015"},{"key":"S0219622019300027BIB164","author":"Singh K.","year":"2018","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"S0219622019300027BIB165","author":"Dam T.-L.","year":"2018","journal-title":"Knowledge-Based Systems"},{"key":"S0219622019300027BIB166","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.02.008"},{"key":"S0219622019300027BIB167","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.12.036"},{"key":"S0219622019300027BIB168","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-04921-8","volume-title":"High-Utility Pattern Mining, Theory, Algorithms, and Applications","author":"Fournier-Viger P.","year":"2019"},{"key":"S0219622019300027BIB169","volume":"8","author":"Fournier-Viger P.","year":"2017","journal-title":"WIREs Data Mining and Knowledge Discovery"},{"key":"S0219622019300027BIB170","volume-title":"Soft Computing in Data Analytics. Advances in Intelligent Systems and Computing","volume":"758","author":"Suvarna U.","year":"2019"},{"key":"S0219622019300027BIB171","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-017-1130-x"},{"key":"S0219622019300027BIB172","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2819162"},{"key":"S0219622019300027BIB173","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-009-0188-5"},{"key":"S0219622019300027BIB174","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2016.02.003"},{"key":"S0219622019300027BIB175","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2015.05.003"},{"key":"S0219622019300027BIB176","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-160837"},{"key":"S0219622019300027BIB177","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2015.06.002"},{"key":"S0219622019300027BIB178","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.02.058"},{"key":"S0219622019300027BIB179","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.09.009"},{"key":"S0219622019300027BIB180","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.11.020"},{"key":"S0219622019300027BIB181","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.03.007"},{"key":"S0219622019300027BIB182","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.09.007"},{"key":"S0219622019300027BIB183","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.80"},{"key":"S0219622019300027BIB184","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.124"},{"key":"S0219622019300027BIB185","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2015.07.012"},{"key":"S0219622019300027BIB186","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.165"},{"key":"S0219622019300027BIB187","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.10.026"},{"key":"S0219622019300027BIB188","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.06.042"},{"key":"S0219622019300027BIB189","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.08.018"}],"container-title":["International Journal of Information Technology &amp; Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219622019300027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T23:15:33Z","timestamp":1663283733000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219622019300027"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":182,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2019,8,26]]},"published-print":{"date-parts":[[2019,7]]}},"alternative-id":["10.1142\/S0219622019300027"],"URL":"https:\/\/doi.org\/10.1142\/s0219622019300027","relation":{},"ISSN":["0219-6220","1793-6845"],"issn-type":[{"value":"0219-6220","type":"print"},{"value":"1793-6845","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}