Retraction
Constraint-based high utility mobile trajectory pattern mining for security systems
Paper Information
Record ID:
62941
Author(s):
Publication Date:
February 14, 2024
Retraction Date:
August 23, 2024
(1.2 year years ago)
Subjects:
Institution:
College of Computer Science and Technology, Xi’an University of Science and Technology, Xi’an, ChinaCountry:
🇨🇳 ChinaArticle Type:
Publisher:
IOS Press (bought by Sage November 2023)
Open Access:
Yes
DOI:
PubMed ID:
Not indexed in PubMed
Retraction PubMed ID:
Not indexed in PubMed
Retraction Details
Retraction Reasons:
Nature of Retraction:
Retraction
Retraction Notice:
10.3233/JIFS-219433Additional Notes:
An earlier publication date of the original article is suggested by: https://www.semanticscholar.org/paper/Constraint-based-high-utility-mobile-trajectory-for-Li-Feng/0071156b714ba98d72cf3fcfbe1dde9c74af5583 The ACM information about the original article: https://dl.acm.org/doi/abs/10.3233/JIFS-233967
Citations (1)
1
Total Citations1
Post-Retraction(100.0%)
0
Pre-Retraction0
Same DayPost-Retraction Citation Analysis
0
Within 30 days
1
Within 1 year
0
After 2+ years
229
Days since retraction (latest)
A review of meta-heuristic high utility patterns mining methods
Meng Han, Wenyan Yang, Zhenlong Dai et al. (5 authors)
Knowledge and Information Systems
Published: Apr 2025
229 days after retraction
Quick Stats
Total Citations:
1
Years Since Retraction:
1.2 year
Open Access:
Yes
Last Checked:
Jul 24, 2025