{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T16:22:28Z","timestamp":1773850948445,"version":"3.50.1"},"reference-count":161,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Science and Technology Development Fund, Macau, SAR","award":["0093\/2022\/A2"],"award-info":[{"award-number":["0093\/2022\/A2"]}]},{"name":"Science and Technology Development Fund, Macau, SAR","award":["0076\/2022\/A2"],"award-info":[{"award-number":["0076\/2022\/A2"]}]},{"name":"Science and Technology Development Fund, Macau, SAR","award":["0008\/2022\/AGJ"],"award-info":[{"award-number":["0008\/2022\/AGJ"]}]},{"name":"Science and Technology Development Fund, Macau, SAR","award":["0047\/2021\/A1"],"award-info":[{"award-number":["0047\/2021\/A1"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/comst.2023.3246993","type":"journal-article","created":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T18:38:29Z","timestamp":1677091109000},"page":"1227-1260","source":"Crossref","is-referenced-by-count":48,"title":["A Tutorial on Internet of Behaviors: Concept, Architecture, Technology, Applications, and Challenges"],"prefix":"10.1109","volume":"25","author":[{"given":"Qinglin","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Macau University of Science and Technology, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0186-7653","authenticated-orcid":false,"given":"Guangcheng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Macau University of Science and Technology, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2694-2130","authenticated-orcid":false,"given":"Jincheng","family":"Cai","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Macau University of Science and Technology, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5408-8752","authenticated-orcid":false,"given":"MengChu","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6172-8650","authenticated-orcid":false,"given":"Li","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Macau University of Science and Technology, Macau, China"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1088\/0967-3334\/35\/7\/1245"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.06.005"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70994-7_36"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.appet.2014.11.003"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.5772\/16646"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.04.037"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.09.004"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2015.7299406"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-017-0725-0"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2833745"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.029"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/s100201154"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63558-3_40"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26561-2_6"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IoTGC.2017.8008967"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.2316\/P.2011.716-067"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2208"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2499621"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/s17061229"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.04.004"},{"key":"ref7","author":"panetta","year":"2020","journal-title":"Gartner Top Strategic Tech Trends for 2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2018.07.006"},{"key":"ref4","author":"nyman","year":"2012","journal-title":"Internet of behaviors (IoB)"},{"key":"ref3","author":"kidd","year":"2019","journal-title":"What is the Internet of behaviors? IoB explained"},{"key":"ref6","author":"panetta","year":"2019","journal-title":"Gartner Top Strategic Predictions for 2020 and Beyond"},{"key":"ref5","author":"gilbert","year":"2021","journal-title":"The Internet of behaviour promises more personalised and context-sensitive assistive technology"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2018.8615854"},{"key":"ref101","first-page":"3995","article-title":"Deep convolutional neural networks on multichannel time series for human activity recognition","author":"yang","year":"2015","journal-title":"Proc 24th Int Joint Conf Artif Intell"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/s18020676"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v27i2.18997"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2010.23"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.33969\/AIS.2019.11007"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-018-0603-z"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.medengphy.2014.02.012"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024287"},{"key":"ref30","first-page":"1541","article-title":"Activity recognition from accelerometer data","volume":"5","author":"ravi","year":"2005","journal-title":"Proc AAAI Conf"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1004275"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.028"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.04.057"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsams.2016.06.003"},{"key":"ref147","author":"nyman","year":"2021","journal-title":"Internet of Behaviors (IoB) in good company&#x2014; Future behavior markets | G&#x00F6;te Nyman&#x2019;s (gotepoem) Blog"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1689239.1689243"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2903299"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2021.3063699"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2882064"},{"key":"ref153","year":"2021","journal-title":"Trusted Execution Environment"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2022.105548"},{"key":"ref151","year":"2021","journal-title":"HomeKit&#x2014;All accessories"},{"key":"ref152","year":"2021","journal-title":"Microsoft Azure Cloud Computing Services"},{"key":"ref150","year":"2021","journal-title":"Amazon Alexa voice AI | Alexa developer official site"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2020.105444"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/s19102298"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1249\/MSS.0b013e3181a24536"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2014.6876762"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSC.2017.086821"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2022.3225660"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IOT-TUSCANY.2018.8373045"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2020.1003114"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT.2019.00028"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2022.3215258"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-012-0896-3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.04.003"},{"key":"ref29","first-page":"370","article-title":"A wearable RFID system for real-time activity recognition using radio patterns","author":"wang","year":"2013","journal-title":"Proc Int Conf Mobile Ubiquitous Syst Comput Netw Services"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.06.004"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2022.3206999"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"ref12","author":"nyman","year":"2021","journal-title":"Gote Nyman&#x2019;s (gotepoem) Blog"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3099953"},{"key":"ref128","first-page":"1","article-title":"Privacy-preserving aggregation of time-series data","author":"shi","year":"2011","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2845683"},{"key":"ref129","year":"2018","journal-title":"Data transfer project overview and fundamentals"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2015.7225754"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219745"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2014.6856532"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP53844.2022.00016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2021.126057"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294491"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1004395"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2020.102615"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2987777"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2018.2862380"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2949703"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.08.006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.08.025"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1003925"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00636"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335757"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3088935"},{"key":"ref134","year":"2021","journal-title":"Anonymous P2P"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8461228"},{"key":"ref131","year":"2021","journal-title":"Solid Your data your choice Advancing Web standards to empower people"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2020.2976305"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.2990103"},{"key":"ref130","year":"2020","journal-title":"MyData An introduction to human-centric use of personal data"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.04.035"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1518\/001872006777724417"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/S1369-8478(02)00011-6"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2016.7580804"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2019.1633569"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600682CM"},{"key":"ref85","first-page":"16","article-title":"A comprehensive review on intents, intention mining and intention classification","volume":"9","author":"date","year":"2020","journal-title":"Int J Sci Res"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2800161"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940538"},{"key":"ref135","first-page":"1","article-title":"Attention is all you need","volume":"30","author":"vaswani","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2007.902640"},{"key":"ref136","year":"2021","journal-title":"Home automation"},{"key":"ref82","volume":"10","author":"bratman","year":"1987","journal-title":"Intention Plans and Practical Reason"},{"key":"ref144","article-title":"Probabilistic sensor fusion for ambient assisted living","author":"diethe","year":"2017","journal-title":"arXiv 1702 01209"},{"key":"ref81","author":"cover","year":"1999","journal-title":"Elements of Information Theory"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2017.447"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-020-00604-x"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871630"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-021-00342-9"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2865034"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/s40520-019-01238-y"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5051915"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3523-0"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.68"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8460924"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132926"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.15607\/RSS.2012.VIII.055"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018689"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7311"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2018.12.096"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2037317"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-73622-y"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00035"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v28i1.8917"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/MECBME.2016.7745398"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2004.10.017"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457085"},{"key":"ref2","year":"2021","journal-title":"DIKW pyramid"},{"key":"ref1","year":"2020","journal-title":"IoT Growth Demands Rethink of Long-Term Storage Strategies Says IDC"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2318835"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1080\/01691864.2014.1003096"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600699CM"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1177\/1729881416662780"},{"key":"ref73","first-page":"236","article-title":"Automatic detection of cyber security related accounts on online social networks: Twitter as an example","author":"sa?glam","year":"2018","journal-title":"Proc 9th Int Conf Social Media Soc"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.090911.111340"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2430335"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39863-9_17"},{"key":"ref119","first-page":"2","article-title":"Algorithms for inverse reinforcement learning","volume":"1","author":"ng","year":"2000","journal-title":"Proc ICML"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2008.2006190"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2019.1911825"},{"key":"ref69","first-page":"103","article-title":"Advanced patient or elder fall detection based on movement and sound data","author":"doukas","year":"2008","journal-title":"Proc 2nd Int Conf Pervasive Comput Technol Healthcare"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1186\/s12984-015-0013-9"},{"key":"ref115","first-page":"282","article-title":"Conditional random fields: Probabilistic models for segmenting and labeling sequence data","author":"lafferty","year":"2001","journal-title":"Proc ICML"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.087"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24646-6_1"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/IRC.2018.00043"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2010.2051955"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.399"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.4108\/icst.pervasivehealth.2011.246161"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/1833349.1778859"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2022.105797"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900125"},{"key":"ref120","first-page":"653","article-title":"The effects of feedback on human behavior in social media: An inverse reinforcement learning model","author":"das","year":"2014","journal-title":"Proc Int Conf Auton Agents Multi-Agent Syst"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2012.6485186"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-020-05939-8"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/10130694\/10049481.pdf?arnumber=10049481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T18:34:32Z","timestamp":1686594872000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10049481\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":161,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/comst.2023.3246993","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}