{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:23:15Z","timestamp":1761402195131,"version":"3.41.0"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T00:00:00Z","timestamp":1626825600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2022,4,30]]},"abstract":"<jats:p>\n            In smartphone data analysis, both energy consumption modeling and user behavior mining have been explored extensively, but the relationship between energy consumption and user behavior has been rarely studied. Such a relationship is explored over large-scale users in this article. Based on energy consumption data, where each users\u2019 feature vector is represented by energy breakdown on hardware components of different apps, User Behavior Models (UBM) are established to capture user behavior patterns (i.e., app preference, usage time). The challenge lies in the high diversity of user behaviors (i.e., massive apps and usage ways), which leads to high dimension and dispersion of data. To overcome the challenge, three mechanisms are designed. First, to reduce the dimension, apps are ranked with the top ones identified as typical apps to represent all. Second, the dispersion is reduced by scaling each users\u2019 feature vector with typical apps to unit  \u2113\n            <jats:sub>1<\/jats:sub>\n            norm. The scaled vector becomes Usage Pattern, while the \u2113\n            <jats:sub>1<\/jats:sub>\n            norm of vector before scaling is treated as Usage Intensity. Third, the usage pattern is analyzed with a two-layer clustering approach to further reduce data dispersion. In the upper layer, each typical app is studied across its users with respect to hardware components to identify Typical Hardware Usage Patterns (THUP). In the lower layer, users are studied with respect to these THUPs to identify Typical App Usage Patterns (TAUP). The analytical results of these two layers are consolidated into Usage Pattern Models (UPM), and UBMs are finally established by a union of UPMs and Usage Intensity Distributions (UID). By carrying out experiments on energy consumption data from 18,308 distinct users over 10 days, 33 UBMs are extracted from training data. With the test data, it is proven that these UBMs cover 94% user behaviors and achieve up to 20% improvement in accuracy of energy representation, as compared with the baseline method, PCA. Besides, potential applications and implications of these UBMs are illustrated for smartphone manufacturers, app developers, network providers, and so on.\n          <\/jats:p>","DOI":"10.1145\/3461459","type":"journal-article","created":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T21:25:55Z","timestamp":1626902755000},"page":"1-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Establishing Smartphone User Behavior Model Based on Energy Consumption Data"],"prefix":"10.1145","volume":"16","author":[{"given":"Ming","family":"Ding","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4928-2067","authenticated-orcid":false,"given":"Tianyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1353-1420","authenticated-orcid":false,"given":"Xudong","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2021,7,21]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2900728.2900850"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3234"},{"key":"e_1_2_1_3_1","unstructured":"App Annie. 2017. Spotlight on Consumer App Usage Part 1. Retrieved from https:\/\/www.insidemarketing.it\/wp-content\/uploads\/2017\/06\/1705_Report_Consumer_App_Usage_EN.pdf.  App Annie. 2017. Spotlight on Consumer App Usage Part 1. Retrieved from https:\/\/www.insidemarketing.it\/wp-content\/uploads\/2017\/06\/1705_Report_Consumer_App_Usage_EN.pdf."},{"key":"e_1_2_1_4_1","unstructured":"Charles Arthur. 2014. Your smartphone\u2019s best app? Battery life say 89% of Britons. The Guardian. Retrieved from https:\/\/www.theguardian.com\/technology\/2014\/may\/21\/your-smartphones-best-app-battery-life-say-89-of-britons.  Charles Arthur. 2014. Your smartphone\u2019s best app? Battery life say 89% of Britons. The Guardian. Retrieved from https:\/\/www.theguardian.com\/technology\/2014\/may\/21\/your-smartphones-best-app-battery-life-say-89-of-britons."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644927"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871702"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855840.1855861"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2796314.2745875"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154504"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785891"},{"key":"e_1_2_1_11_1","volume-title":"Number of available apps at Google Play from 2nd quarter 2015 to 2nd quarter","author":"Clement J.","year":"2019","unstructured":"J. Clement . 2019. Number of available apps at Google Play from 2nd quarter 2015 to 2nd quarter 2019 . Statista. Retrieved from https:\/\/www.statista.com\/statistics\/289418\/number-of-available-apps-in-the-google-play-store-quarter\/. J. Clement. 2019. Number of available apps at Google Play from 2nd quarter 2015 to 2nd quarter 2019. Statista. Retrieved from https:\/\/www.statista.com\/statistics\/289418\/number-of-available-apps-in-the-google-play-store-quarter\/."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1899475.1899502"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814453"},{"key":"e_1_2_1_14_1","unstructured":"Mansoor Iqbal. 2019. TikTok Revenue and Usage Statistics. Retrieved from https:\/\/www.businessofapps.com\/data\/tik-tok-statistics\/.  Mansoor Iqbal. 2019. TikTok Revenue and Usage Statistics. Retrieved from https:\/\/www.businessofapps.com\/data\/tik-tok-statistics\/."},{"volume-title":"Mobile Computing, Applications, and Services","author":"Jiang Yifei","key":"e_1_2_1_15_1","unstructured":"Yifei Jiang , Abhishek Jaiantilal , Xin Pan , Mohammad A. A. H. Al-Mutawa , Shivakant Mishra , and Larry Shi . 2013. Personalized energy consumption modeling on smartphones . In Mobile Computing, Applications, and Services . Springer , Berlin , 343\u2013354. Yifei Jiang, Abhishek Jaiantilal, Xin Pan, Mohammad A. A. H. Al-Mutawa, Shivakant Mishra, and Larry Shi. 2013. Personalized energy consumption modeling on smartphones. In Mobile Computing, Applications, and Services. Springer, Berlin, 343\u2013354."},{"volume-title":"Principal Component Analysis","author":"Jolliffe Ian","key":"e_1_2_1_16_1","unstructured":"Ian Jolliffe . 2011. Principal Component Analysis . Springer , 1094\u20131096. Ian Jolliffe. 2011. Principal Component Analysis. Springer, 1094\u20131096."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2807542"},{"key":"e_1_2_1_18_1","unstructured":"Philipp Krieter. 2020. Looking inside-mobile screen recordings as a privacy friendly long-term data source to analyze user behavior. Universit\u00e4t Bremen  Philipp Krieter. 2020. Looking inside-mobile screen recordings as a privacy friendly long-term data source to analyze user behavior. Universit\u00e4t Bremen"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2014.6851993"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483780"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815686"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505529"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aca.2003.12.020"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348583"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168841"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.88.6.2297"},{"key":"e_1_2_1_28_1","volume-title":"Amad Rashid, Sajid Anwar, Fernando Joaquim, and Zahid Halim.","author":"Rashid Ahmar","year":"2020","unstructured":"Ahmar Rashid , Muhammad Amir Zeb , Amad Rashid, Sajid Anwar, Fernando Joaquim, and Zahid Halim. 2020 . Conceptualization of smartphone usage and feature preferences among various demographics. Cluster Computing ( 2020), 1855\u20131873. Ahmar Rashid, Muhammad Amir Zeb, Amad Rashid, Sajid Anwar, Fernando Joaquim, and Zahid Halim. 2020. Conceptualization of smartphone usage and feature preferences among various demographics. Cluster Computing (2020), 1855\u20131873."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2832173"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1088958"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209669"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500.2319"},{"key":"e_1_2_1_33_1","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton . 2008 . Visualizing data using t-SNE . Journal of Machine Learning Research 9 , 86 (2008), 2579 \u2013 2605 . Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of Machine Learning Research 9, 86 (2008), 2579\u20132605.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858107"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878961.1878982"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971696"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461459","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3461459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:35Z","timestamp":1750195715000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,21]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4,30]]}},"alternative-id":["10.1145\/3461459"],"URL":"https:\/\/doi.org\/10.1145\/3461459","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"type":"print","value":"1556-4681"},{"type":"electronic","value":"1556-472X"}],"subject":[],"published":{"date-parts":[[2021,7,21]]},"assertion":[{"value":"2020-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}