{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T12:11:34Z","timestamp":1774527094488,"version":"3.50.1"},"reference-count":27,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T00:00:00Z","timestamp":1774483200000},"content-version":"vor","delay-in-days":84,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Communications"],"published-print":{"date-parts":[[2026,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>As users increasingly interact with AIoT systems through multiple Internet\u2010connected devices, conventional single\u2010device tracking fails to capture distributed user behaviours, limiting the effectiveness of personalization and targeted advertising. Cross\u2010device tracking therefore plays a crucial role in constructing unified user profiles from heterogeneous device traces. This paper proposes a novel cross\u2010device tracking approach that links users' mobile phones and tablet computers. To the best of our knowledge, this is the first study focusing specifically on these two device types. Our key insight is that users exhibit consistent operational characteristics across devices, despite differences in size and weight. We collect data from five motion sensors during four common device operations and design a multi\u2010scale spatio\u2010temporal twin network to capture behavioural similarities. Experimental results demonstrate that the proposed approach achieves an accuracy of 77.8% in a 18 participants scenario. We further analyse the impact of user operation types, model components and sensor data types on tracking performance. This work provides an effective solution for phone\u2013tablet cross\u2010device tracking and offers practical support for future advertising\u00a0technologies.<\/jats:p>","DOI":"10.1049\/cmu2.70155","type":"journal-article","created":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:09:37Z","timestamp":1774523377000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MTLinks: Mobile Phones and Tablet Computers Linking Based on a Multi\u2010Scale Spatio\u2010Temporal Twin Network in AIoT Systems"],"prefix":"10.1049","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6375-3419","authenticated-orcid":false,"given":"Naixuan","family":"Guo","sequence":"first","affiliation":[{"name":"School of Information Engineering Yancheng Institute of Technology Yancheng China"},{"name":"Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing China"}]},{"given":"Fu","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Engineering Yancheng Institute of Technology Yancheng China"}]},{"given":"Qin","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Information Engineering Yancheng Institute of Technology Yancheng China"}]},{"given":"Xiufang","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Information Engineering Yancheng Institute of Technology Yancheng China"}]},{"given":"Sen","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Information Engineering Yancheng Institute of Technology Yancheng China"},{"name":"School of Information and Communication Engineering Harbin Engineering University Harbin China"}]}],"member":"265","published-online":{"date-parts":[[2026,3,26]]},"reference":[{"key":"e_1_2_11_2_1","unstructured":"S.Zimmeck J. S.Li H.Kim S. M.Bellovin andT.Jebara \u201cA Privacy Analysis of Cross\u2010Device Tracking \u201d inThe 26th USENIX Security Symposium(ACM 2017) 1391\u20131408."},{"key":"e_1_2_11_3_1","doi-asserted-by":"crossref","unstructured":"S. K.Kane A. K.Karlson B.Meyers P.Johns A.Jacobs andG.Smith \u201cExploring Cross\u2010Device Web Use on PCs and Mobile Devices \u201d inProceedings of the IFIP Conference on Human\u2010Computer Interaction(Springer 2009) 722\u2013735.","DOI":"10.1007\/978-3-642-03655-2_79"},{"key":"e_1_2_11_4_1","unstructured":"ICDM \u201cDrawbridge Cross\u2010Device Connections\u201d (2015) accessed March 6 2026 https:\/\/www.kaggle.com\/c\/icdm\u20102015\u2010drawbridge\u2010cross\u2010device\u2010connections\/overview."},{"key":"e_1_2_11_5_1","unstructured":"CIKM Cup \u201cTrack 1: Cross\u2010Device Entity Linking Challenge\u201d (2016) accessed March 6 2026 https:\/\/competitions.codalab.org\/competitions\/11171."},{"issue":"5","key":"e_1_2_11_6_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3705893","article-title":"Wi\u2010Fi Sensing Techniques for Human Activity Recognition: Brief Survey, Potential Challenges, and Research Directions","volume":"57","author":"Miao F.","year":"2025","journal-title":"ACM Computing Surveys"},{"key":"e_1_2_11_7_1","unstructured":"A.Das N.Borisov andM.Caesar \u201cFingerprinting Smart Devices Through Embedded Acoustic Components \u201darXiv:1403.3366(2014)."},{"key":"e_1_2_11_8_1","doi-asserted-by":"crossref","unstructured":"R.Arandjelovic P.Gronat A.Torii T.Pajdla andJ.Sivic \u201cNetVLAD: CNN architecture for weakly supervised place recognition \u201d inProceedings of the IEEE Conference on Computer Vision and Pattern Recognition(IEEE 2016) 5297\u20135307.","DOI":"10.1109\/CVPR.2016.572"},{"issue":"2","key":"e_1_2_11_9_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3636462","article-title":"RF\u2010TESI: Radio Frequency Fingerprint\u2010Based Smartphone Identification Under Temperature Variation","volume":"20","author":"Gu X.","year":"2024","journal-title":"ACM Transactions on Sensor Networks"},{"key":"e_1_2_11_10_1","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.110115","article-title":"TEA\u2010RFFI: Temperature Adjusted Radio Frequency Fingerprint\u2010Based Smartphone Identification","volume":"238","author":"Gu X.","year":"2024","journal-title":"Computer Networks"},{"key":"e_1_2_11_11_1","doi-asserted-by":"crossref","unstructured":"F.Lanze A.Panchenko B.Braatz andA.Zinnen \u201cClock Skew Based Remote Device Fingerprinting Demystified \u201d in2012 IEEE Global Communications Conference (GLOBECOM)(IEEE 2012) 813\u2013819.","DOI":"10.1109\/GLOCOM.2012.6503213"},{"issue":"16","key":"e_1_2_11_12_1","doi-asserted-by":"crossref","first-page":"14646","DOI":"10.1109\/JIOT.2023.3277883","article-title":"A Survey on Fingerprinting Technologies for Smartphones Based on Embedded Transducers","volume":"10","author":"Berdich A.","year":"2023","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"e_1_2_11_13_1","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MWC.001.2300420","article-title":"Domain\u2010Agnostic Hardware Fingerprinting\u2010Based Device Identifier for Zero\u2010Trust IoT Security","volume":"31","author":"Elmaghbub A.","year":"2024","journal-title":"IEEE Wireless Communications"},{"key":"e_1_2_11_14_1","doi-asserted-by":"crossref","unstructured":"R.MutegekiandD. S.Han \u201cA CNN\u2010LSTM Approach to Human Activity Recognition \u201d in2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)(IEEE 2020) 362\u2013366.","DOI":"10.1109\/ICAIIC48513.2020.9065078"},{"issue":"3","key":"e_1_2_11_15_1","doi-asserted-by":"crossref","first-page":"308","DOI":"10.3390\/electronics10030308","article-title":"Biometric User Identification Based on Human Activity Recognition Using Wearable Sensors: An Experiment Using Deep Learning Models","volume":"10","author":"Mekruksavanich S.","year":"2021","journal-title":"Electronics"},{"key":"e_1_2_11_16_1","doi-asserted-by":"crossref","first-page":"1810","DOI":"10.1109\/ACCESS.2016.2557846","article-title":"Learning Human Identity From Motion Patterns","volume":"4","author":"Neverova N.","year":"2016","journal-title":"IEEE Access"},{"issue":"6","key":"e_1_2_11_17_1","doi-asserted-by":"crossref","first-page":"2307","DOI":"10.1007\/s00530-022-00954-2","article-title":"Smartphone\u2010Based Gait Recognition Using Convolutional Neural Networks and Dual\u2010Tree Complex Wavelet Transform","volume":"28","author":"Sezavar A.","year":"2022","journal-title":"Multimedia Systems"},{"key":"e_1_2_11_18_1","doi-asserted-by":"crossref","unstructured":"F.Brudy C.Holz R.R\u00e4dle et\u00a0al. \u201cCross\u2010Device Taxonomy: Survey Opportunities and Challenges of Interactions Spanning Across Multiple Devices \u201d inProceedings of the 2019 CHI Conference on Human Factors in Computing Systems(ACM 2019) 1\u201328.","DOI":"10.1145\/3290605.3300792"},{"key":"e_1_2_11_19_1","doi-asserted-by":"crossref","unstructured":"P.IoannouandE.Athanasopoulos \u201cBeen Here Already? Detecting Synchronized Browsers in the Wild \u201d in2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)(IEEE 2023) 913\u2013927.","DOI":"10.1109\/EuroSP57164.2023.00058"},{"key":"e_1_2_11_20_1","unstructured":"Y. S.Choo Cross\u2010Device Tracking of Employees With Social Networks(PhD Thesis Imperial College London 2017)."},{"key":"e_1_2_11_21_1","unstructured":"K.Waddell \u201cYour Phone is Listening Literally Listening to Your TV\u201d (2015) accessed March 6 2026 https:\/\/www.theatlantic.com\/technology\/archive\/2015\/11\/yourphone\u2010is\u2010literally\u2010listening\u2010to\u2010your\u2010tv\/416712\/."},{"key":"e_1_2_11_22_1","doi-asserted-by":"crossref","unstructured":"N.Matyunin J.Szefer andS.Katzenbeisser \u201cZero\u2010Permission Acoustic Cross\u2010Device Tracking \u201d inProceedings of IEEE International Symposium on Hardware Oriented Security and Trust (HOST)(IEEE 2018) 25\u201332.","DOI":"10.1109\/HST.2018.8383887"},{"issue":"2","key":"e_1_2_11_23_1","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1515\/popets-2017-0020","article-title":"Cross\u2010Device Tracking: Measurement and Disclosures","volume":"2017","author":"Brookman J.","year":"2017","journal-title":"PoPETs"},{"key":"e_1_2_11_24_1","doi-asserted-by":"crossref","unstructured":"K.Solomos P.Ilia S.Ioannidis andN.Kourtellis \u201cTalon: An Automated Framework for Cross\u2010Device Tracking Detection \u201darXiv:1812.11393(2019).","DOI":"10.1007\/978-3-030-12085-6_7"},{"issue":"1","key":"e_1_2_11_25_1","article-title":"A Novel IM Sync Message\u2010Based Cross\u2010Device Tracking","volume":"2020","author":"Guo N.","year":"2020","journal-title":"Security and Communication Networks"},{"issue":"16","key":"e_1_2_11_26_1","doi-asserted-by":"crossref","first-page":"3268","DOI":"10.3390\/electronics13163268","article-title":"WMLinks: Wearable Smart Devices and Mobile Phones Linking Through Bluetooth Low Energy (BLE) and WiFi Signals","volume":"13","author":"Guo N.","year":"2024","journal-title":"Electronics"},{"issue":"20","key":"e_1_2_11_27_1","doi-asserted-by":"crossref","first-page":"18028","DOI":"10.1109\/JIOT.2023.3278286","article-title":"CrossTrack: Device\u2010Free Cross\u2010Link Tracking With Commodity Wi\u2010Fi","volume":"10","author":"Ge W.","year":"2023","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_2_11_28_1","doi-asserted-by":"crossref","unstructured":"L. T.Nguyen Y. S.Kim P.Tague andJ.Zhang \u201cIdentityLink: User\u2010Device Linking Through Visual and RF\u2010Signal Cues \u201d inProceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing(ACM 2014) 529\u2013539.","DOI":"10.1145\/2632048.2636072"}],"container-title":["IET Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/cmu2.70155","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/cmu2.70155","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/cmu2.70155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:09:46Z","timestamp":1774523386000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/cmu2.70155"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["10.1049\/cmu2.70155"],"URL":"https:\/\/doi.org\/10.1049\/cmu2.70155","archive":["Portico"],"relation":{},"ISSN":["1751-8628","1751-8636"],"issn-type":[{"value":"1751-8628","type":"print"},{"value":"1751-8636","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"2025-12-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-03-18","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-03-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70155"}}