{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T13:07:10Z","timestamp":1763644030470,"version":"3.41.0"},"reference-count":42,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T00:00:00Z","timestamp":1695772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61972189"],"award-info":[{"award-number":["No. 61972189"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["No. 2022YFB3105000"],"award-info":[{"award-number":["No. 2022YFB3105000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Key Project of PCL","award":["No. PCL2023AS5-1"],"award-info":[{"award-number":["No. PCL2023AS5-1"]}]},{"name":"Shenzhen Science and Technology Innovation Commission: Research Center for Computer Network (Shenzhen) Ministry of Education, and the Shenzhen Key Lab of Software Defined Networking","award":["No. ZDSYS20140509172959989"],"award-info":[{"award-number":["No. ZDSYS20140509172959989"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2023,9,27]]},"abstract":"<jats:p>With the booming of smart home market, intelligent Internet of Things (IoT) devices have been increasingly involved in home life. To improve the user experience of smart homes, some prior works have explored how to use machine learning for predicting interactions between users and devices. However, the existing solutions have inferior User Device Interaction (UDI) prediction accuracy, as they ignore three key factors: routine, intent and multi-level periodicity of human behaviors. In this paper, we present SmartUDI, a novel accurate UDI prediction approach for smart homes. First, we propose a Message-Passing-based Routine Extraction (MPRE) algorithm to mine routine behaviors, then the contrastive loss is applied to narrow representations among behaviors from the same routines and alienate representations among behaviors from different routines. Second, we propose an Intent-aware Capsule Graph Attention Network (ICGAT) to encode multiple intents of users while considering complex transitions between different behaviors. Third, we design a Cluster-based Historical Attention Mechanism (CHAM) to capture the multi-level periodicity by aggregating the current sequence and the semantically nearest historical sequence representations through the attention mechanism. SmartUDI can be seamlessly deployed on cloud infrastructures of IoT device vendors and edge nodes, enabling the delivery of personalized device service recommendations to users. Comprehensive experiments on four real-world datasets show that SmartUDI consistently outperforms the state-of-the-art baselines with more accurate and highly interpretable results.<\/jats:p>","DOI":"10.1145\/3610906","type":"journal-article","created":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T19:45:03Z","timestamp":1695843903000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["I Know Your Intent"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2394-2995","authenticated-orcid":false,"given":"Jingyu","family":"Xiao","sequence":"first","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School, Shenzhen, China and Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7892-0021","authenticated-orcid":false,"given":"Qingsong","family":"Zou","sequence":"additional","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School, Shenzhen, China and Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7892-0021","authenticated-orcid":false,"given":"Qing","family":"Li","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9016-5594","authenticated-orcid":false,"given":"Dan","family":"Zhao","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1353-2028","authenticated-orcid":false,"given":"Kang","family":"Li","sequence":"additional","affiliation":[{"name":"Jilin University, Changchun, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6820-4286","authenticated-orcid":false,"given":"Zixuan","family":"Weng","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0754-2817","authenticated-orcid":false,"given":"Ruoyu","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School, Shenzhen, China and Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4260-1395","authenticated-orcid":false,"given":"Yong","family":"Jiang","sequence":"additional","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School, Shenzhen, China and Peng Cheng Laboratory, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2023,9,27]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3157726"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355155"},{"key":"e_1_2_2_3_1","volume-title":"Relational graph attention networks. arXiv preprint arXiv:1904.05811","author":"Busbridge Dan","year":"2019","unstructured":"Dan Busbridge, Dane Sherburn, Pietro Cavallo, and Nils Y Hammerla. 2019. Relational graph attention networks. arXiv preprint arXiv:1904.05811 (2019)."},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5747"},{"key":"e_1_2_2_5_1","volume-title":"International conference on machine learning. PMLR, 1597--1607","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In International conference on machine learning. PMLR, 1597--1607."},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19204474"},{"key":"e_1_2_2_7_1","volume-title":"Hidden markov models. Current opinion in structural biology 6, 3","author":"Eddy Sean R","year":"1996","unstructured":"Sean R Eddy. 1996. Hidden markov models. Current opinion in structural biology 6, 3 (1996), 361--365."},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2888923"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186058"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24797-2"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557226"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00035"},{"key":"e_1_2_2_15_1","volume-title":"Time2vec: Learning a vector representation of time. arXiv preprint arXiv:1907.05321","author":"Kazemi Seyed Mehran","year":"2019","unstructured":"Seyed Mehran Kazemi, Rishab Goel, Sepehr Eghbali, Janahan Ramanan, Jaspreet Sahota, Sanjay Thakur, Stella Wu, Cathal Smyth, Pascal Poupart, and Marcus Brubaker. 2019. Time2vec: Learning a vector representation of time. arXiv preprint arXiv:1907.05321 (2019)."},{"key":"e_1_2_2_16_1","volume-title":"Network community detection: A review and visual survey. arXiv preprint arXiv:1708.00977","author":"Khan Bisma S","year":"2017","unstructured":"Bisma S Khan and Muaz A Niazi. 2017. Network community detection: A review and visual survey. arXiv preprint arXiv:1708.00977 (2017)."},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2845-6"},{"key":"e_1_2_2_18_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_2_2_19_1","volume-title":"IoTEnsemble: Detection of Botnet Attacks on Internet of Things. In European Symposium on Research in Computer Security (ESORICS). Springer, 569--588","author":"Li Ruoyu","year":"2022","unstructured":"Ruoyu Li, Qing Li, Yucheng Huang, Wenbin Zhang, Peican Zhu, and Yong Jiang. 2022. IoTEnsemble: Detection of Botnet Attacks on Internet of Things. In European Symposium on Research in Computer Security (ESORICS). Springer, 569--588."},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3122148"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517239"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91431-8_41"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0135"},{"key":"e_1_2_2_24_1","unstructured":"Knud Lasse Lueth. 2018. State of the IoT 2018: Number of IoT devices now at 7B -- Market accelerating. https:\/\/iot-analytics.com\/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b\/."},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0001.2000169"},{"key":"e_1_2_2_26_1","volume-title":"Pytorch: An imperative style, high-performance deep learning library. Advances in Neural Information Processing Systems (NIPS) 32","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, et al. 2019. Pytorch: An imperative style, high-performance deep learning library. Advances in Neural Information Processing Systems (NIPS) 32 (2019)."},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313567"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772773"},{"key":"e_1_2_2_29_1","volume-title":"Dynamic routing between capsules. Advances in Neural Information Processing Systems (NIPS) 30","author":"Sabour Sara","year":"2017","unstructured":"Sara Sabour, Nicholas Frosst, and Geoffrey E Hinton. 2017. Dynamic routing between capsules. Advances in Neural Information Processing Systems (NIPS) 30 (2017)."},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-002-0082-8"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359840"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3191767"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159656"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/IE.2018.00014"},{"key":"e_1_2_2_35_1","volume-title":"Attention is all you need. Advances in Neural Information Processing Systems (NIPS) 30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in Neural Information Processing Systems (NIPS) 30 (2017)."},{"key":"e_1_2_2_36_1","volume-title":"Proceedings of the 6th International Conference on Learning Representations (ICLR)","author":"Veli\u010dkovi\u0107 Petar","year":"2018","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2018. Graph attention networks. Proceedings of the 6th International Conference on Learning Representations (ICLR) (2018)."},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2014.09.064"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301346"},{"key":"e_1_2_2_39_1","volume-title":"Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 1634--1642","author":"Xiao Jingyu","year":"2023","unstructured":"Jingyu Xiao, Qingsong Zou, Qing Li, Dan Zhao, Kang Li, Wenxin Tang, Runjie Zhou, and Yong Jiang. 2023. User Device Interaction Prediction via Relational Gated Graph Attention Network and Intent-aware Encoder. In Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 1634--1642."},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/547"},{"key":"e_1_2_2_41_1","volume-title":"Smart-home anomaly detection using combination of in-home situation and user behavior. CoRR abs\/2109.14348","author":"Yamauchi Masaaki","year":"2021","unstructured":"Masaaki Yamauchi, Masahiro Tanaka, Yuichi Ohsita, Masayuki Murata, Kensuke Ueda, and Yoshiaki Kato. 2021. Smart-home anomaly detection using combination of in-home situation and user behavior. CoRR abs\/2109.14348 (2021). https:\/\/arxiv.org\/abs\/2109.14348"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580890"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3610906","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3610906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:59Z","timestamp":1750178219000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3610906"}},"subtitle":["Graph-enhanced Intent-aware User Device Interaction Prediction via Contrastive Learning"],"short-title":[],"issued":{"date-parts":[[2023,9,27]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9,27]]}},"alternative-id":["10.1145\/3610906"],"URL":"https:\/\/doi.org\/10.1145\/3610906","relation":{},"ISSN":["2474-9567"],"issn-type":[{"type":"electronic","value":"2474-9567"}],"subject":[],"published":{"date-parts":[[2023,9,27]]},"assertion":[{"value":"2023-09-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}