Professional Documents
Culture Documents
Identificación de Big Five Mediante ML Random Forest Por Datos Recogidos de Uso de Celular
Identificación de Big Five Mediante ML Random Forest Por Datos Recogidos de Uso de Celular
3, JUNE 2019
Abstract—User profile can be used to characterize a person and can utilize the profile database to understand their customers.
help us better understand him/her, which further can be utilized According to certain customer’s previous purchase records, it
to provide enhanced personalized services. When using mobile can provide best services for him/her [1]. Early researches
phone, some of one’s information are unavoidably and unobtru-
sively passed or stored, which makes it possible to draw the user often acquired user profiles by personal files [2], question-
profile. In this paper, we propose to infer user profile, including naires, and population surveys. These approaches may be lim-
age, gender, and personality traits based on mobile phone sen- ited by the scale of the volunteers or participants. Nowadays
sory data. Specifically, we capture data when unlocking screen, smartphones are prevalent, and this can be the new mean to
playing games as well as some basic mobile phone information, record users’ behavior. In this paper, we aim to infer user
app usage, and screen status by using common available sensors
in commodity mobile phones. By analyzing the differences in profile using mobile phone sensory data.
users’ phone usage, we extracted features for user profile infer- Based on users’ ages and genders, 360 corporation created
ence. Random Forest regression and random forest classification personalized application recommendation modes for different
models are separately used to estimate age and gender of the user users.1 Corresponding to their real life, people of different
while support vector regression algorithm is applied to identify age may have different preferences for mobile applications.
personality traits. In addition, we evaluate the model through
real-life experiments conducted with a total of 84 phone users. For example, children are more likely to use mobile phone to
Experimental results show that our approach effective, achieving watch videos or play games [3]; adults usually spends time
an RSME of 4.3696 in age estimation and precision of 91.70% in on social softwares [4] and elderly people listen more radio
gender detection. As for personality traits identification, the root musics [5]. Besides, EMarketer2 in 2014 predicted that by
mean square errors of openness, conscientiousness, extraversion, 2018, almost everyone aged 18 to 34 has one mobile phone
agreeableness, and neuroticism are 0.29, 0.3506, 0.465, 0.3022,
and 0.452, respectively. and they have different cell-phone addictions across the gen-
ders [6]. Ali [7] concluded that gender differences among
Index Terms—Age estimation, gender detection, personality college students existed in the patterns of mobile phone usage.
traits identification.
Therefore, knowing people’s age and gender is helpful to
provide proper services for different users.
I. I NTRODUCTION The Big Five, proposed by McCrae and John [8], is an
SER profile characterizes a person in different aspects, identifiable framework for personality research which use five
U including explicit features, such as demographic
information, and implicit features, such as hobbies and per-
factors to describe the personality traits of people, such as
openness, conscientiousness, extraversion, agreeableness, and
sonality traits. Based on user profiles, we can label a category neuroticism. Li and Chen [9] introduced that older individ-
of users and get their information structured. Moreover, user uals had lower extraversion, while the middle-aged adults
profile can help to know the person more accurately, and had lower neuroticism and openness. Chittaranjan et al. [10]
achieve precisely personalized services. For example, a store proved that the Big Five was related to the mobile phone usage,
for example, introverts prefer using the Internet and extro-
Manuscript received November 19, 2018; revised January 20, 2019; verts have more calls; highly open users like to use video,
accepted January 26, 2019. Date of publication February 4, 2019; date of cur-
rent version June 19, 2019. This work was supported in part by the National audio, music, and e-mail instead of SMS. In this paper, we
Science Fund for Distinguished Young Scholars under Grant 61725205, in part take personality traits of the users who have the most obvi-
by the National Key Research and Development Program of China under Grant ous differences in emphatic consideration and help to provide
2016YFB1001400, and in part by the National Natural Science Foundation of
China under Grant 61332005 and Grant 61772428. (Corresponding author: more appropriate services.
Zhiwen Yu.) In real life cases, the traces left in phones can be used to
Z. Yu, E. Xu, H. Du, and B. Guo are with the School of Computer Science, understand the users. For example, Doddington [11] utilized
Northwestern Polytechnical University, Xi’an 710072, China (e-mail:
zhiweny@gmail.com; 861706249@qq.com; duhe@mail.nwpu.edu.cn; audios to determine user’s age; Jain et al. [12] classified gen-
guobin.keio@gmail.com). ders from user’s facial image features; some studies consider
L. Yao is with the School of Computer Science and Engineering,
University of New South Wales, Sydney, NSW 2052, Australia (e-mail:
1 [Online]. Available: http://sj.360.cn/index.html
lina.yao@unsw.edu.au).
Digital Object Identifier 10.1109/JIOT.2019.2897334 2 [Online]. Available: www.eMarketer.com
2327-4662 c 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Universidad de Lima. Downloaded on May 03,2024 at 09:37:52 UTC from IEEE Xplore. Restrictions apply.
YU et al.: INFERRING USER PROFILE ATTRIBUTES FROM MULTIDIMENSIONAL MOBILE PHONE SENSORY DATA 5153
phone calls and SMS details to analyze people’s personal- ten scientific problems in human behavior understanding.
ity traits [13]. However, the works on age estimation usually Wang et al. [21] put forward to classify and analyze CSI-based
group people into several rough categories. Furthermore, they behavior recognition studies and applications at three granular-
often have privacy issues because of accessing the data from ities: 1) signals; 2) actions; and 3) activities. Vrigkas et al. [22]
cameras and microphones. In the meanwhile, the researches provided a detailed review of recent and state-of-the-art
on user personality traits utilize metadata include the lengths research advances in the field of human activity classification.
of SMS, the numbers of the outgoing and incoming calls, and Bisio et al. [23] applied activity recognition to the application
the calling durations. Yet they also leave privacy issues to be of health remote monitoring. Riboni and Bettini [24] proposed
addressed where the private information collected. a method based on ontology and ontology reasoning com-
According to previous studies [14], the embedded sensors bined with statistical inference to solve the scalable problem
in smartphones run in the background with low power con- of activity recognition. Sztyler et al. [25] developed a robust
sumption. Experiments show that the power consumption of wearable-based activity recognition system to deal with the
the software is less than 6% across various mobilephone plat- situations where device positioning is ad-hoc or it is hard for
forms when users use mobile phones normally for 12 h. the users to collect initial training data.
Also, the collected data revealing users’ actual behavioral sta- However, studies using the mobile phone built-in sensors to
tus can be processed locally while preserving user privacy. mine users’ demographic information are rare. In this paper,
Therefore, by using built-in sensors, we are able to alleviate we aim to take advantages of acceleration sensors, magnetic
aforementioned problems and achieve user profile inference, fields, and light and gyroscope sensors in mobile phone to
including age estimation, gender detection, and personality detect users’ ages and genders, and we also combine machine
traits identification. learning algorithms to characterize user personalities.
In this paper, we propose a user profile inference model
based on multidimensional sensory data. The model mainly
portrays users from the aspects of age, gender, and personal-
ity traits according to their mobile phone usage preferences. B. User Attribute Identification
It collects data from accelerometer, magnetic field, gyroscope, There exist some researches on user attribute identification.
and light sensor, as well as the information about app usage, It is explored to connect perceptual data with the users them-
battery, headset, mobile mode, network, and screen status. selves, to mine the users’ attributes for identification purpose.
Compared with image [12] and audio [11] processing method, For example, based on biometric metrics, Lu and Liu [26]
the proposed approach is lightweight and privacy preserving. utilized certain on-screen sliding movements to figure out
Specifically, by analyzing the scenes of unlocking screen, “who you are.” Chao et al. [27] calculated users’intention
game playing, basic phone information, app usage, and screen to take taxis through multisourced urban data. Some exist-
status, we extract usage features, preference features, and ing approaches [28], [29] are to identify the user’s gender and
activity features, respectively. Then Random Forest regression mood through the user’s voice. Staiano et al. [30] investigated
algorithm is used to estimate users’ age; Random Forest clas- the relationships between social network structure and per-
sification is applied to detect their gender; and support vector sonality. de Montjoye et al. [31] provided the first evidence
regression (SVR) algorithm is utilized to identify personal- that personality can be reliably predicted from standard cell
ity traits. Real-life experiments are conducted with 84 users, phone logs. Differently, this paper not only focuses on the
and our approach is validated to be effective. In particular, the external characteristics of users but also analyzes their intrin-
estimated age strongly correlates with the unlocking screen sic features, where we use only mobile phone to infer user
and answering the phone call actions with r = 0.9852 and profiles. We have gained the insights of the relations between
p < 0.001. Gender detection achieves a precision of 91.70%. personality types and user preferences. This can be used to
For the personality traits, the root mean square errors (RMSEs) achieve better understanding of individuals and recommend
value of the Big Five (openness, conscientiousness, extraver- more personalized services.
sion, agreeableness, and neuroticism) are 0.29, 0.3506, 0.465, In addition, user portrait is also related to user attribute
0.3022, and 0.452, respectively. identification, where a wide range of data are required.
Chittaranjan et al. [32] mined the user demographic attributes
based on mobile data, such as data from acceleration sensors
II. R ELATED W ORK
and app usages. Some researchers studied the use sequence of
A. User Activity Recognition Based on Mobile Sensor apps [33], [34] to find out user interests and further investi-
Activity recognition aims to mine users’ current states gate the related attributes of the user [35]. Youyou et al. [36]
from their behaviors and the environments. Many existing analyzed personality traits based on users’ Facebook likes.
researches are focused on user activity recognition using sen- Lane and Manner [13] studied the relationship between per-
sors in mobile devices [15]. For example, Yu et al. [16] sonality traits and the smartphones. User portraits can also be
analyzed the users’ tapped button through smartphone micro- used to provide personalized services, and an example can be
phones. Yang et al. [17] used accelerometers to identify travel recommendations [37]. However, most of these stud-
users’ activities, such as walking, running, standing, and clean- ies produce only unilateral information, such as demographic
ing. Du et al. [18], [19] identified group activities based on attributes or personality traits, while many aspects of the data
accelerometers and magnetic fields. Yu et al. [20] proposed are required, of which some may violate users’ privacy (such
Authorized licensed use limited to: Universidad de Lima. Downloaded on May 03,2024 at 09:37:52 UTC from IEEE Xplore. Restrictions apply.
5154 IEEE INTERNET OF THINGS JOURNAL, VOL. 6, NO. 3, JUNE 2019
Fig. 2. Percentage of participants in all age groups about the use of various
phone functionalities.
Authorized licensed use limited to: Universidad de Lima. Downloaded on May 03,2024 at 09:37:52 UTC from IEEE Xplore. Restrictions apply.
YU et al.: INFERRING USER PROFILE ATTRIBUTES FROM MULTIDIMENSIONAL MOBILE PHONE SENSORY DATA 5155
Fig. 3. Changes of elevation angle when the users pick up the phone. (a) Children. (b) Elderly. (c) Adults.
(a)
(b)
(a)
(c)
Authorized licensed use limited to: Universidad de Lima. Downloaded on May 03,2024 at 09:37:52 UTC from IEEE Xplore. Restrictions apply.
5156 IEEE INTERNET OF THINGS JOURNAL, VOL. 6, NO. 3, JUNE 2019
V. G ENDER D ETECTION
Fig. 6. Percentage of participants in middle age about the use of various
Roberts et al. [6] proved us that cell-phone addiction dif- phone functionalities.
fered across the genders. Gender detection by utilizing the
smartphone depends on the distinct usage patterns for males
and females, and there have been some observations. For variance value of the phone’s elevation angle and slope angle,
example, as we know, males have larger hands and longer when the user uses the social apps.
thumbs than females on average [42]. Most people have fixed 3) Playing Game Scene: As shown in Fig. 6, more and
habits to touch their screens with either one hand or two more adults like to spend time on mobile games. The Glory of
hands [43]. All these using habits require the first joint of The King, which is the top 10 in 2016 China IP Value Game
the thumb or index finger bending and the palmar outreach or List. According to the JiGuang Big Data,4 by September 17,
adducent. More importantly, it was proved that thumb length 2017, the ratio of male and female players reaches to 1:1.
could manipulate user’s action on the screen and generate dif- This makes The Glory of The King suitable as an experimental
ferent swiping gestures [44]. Therefore, we want to explore scene. In particular, the analysis of elevation and slope angle
the operations of phone using to detect the user’s gender. shows that in the average one-round game, females spend
Based on TalkingData 2016 college student mobile life longer time than males and their phase changes are smaller
insight report,3 it figured out the difference among college stu- than males.
dents in phone choosing and application using. In this paper, 4) Application List: 2016 college student mobile life insight
we aim to mine mobile phone usage in common scenarios and report has carried out a series of analysis on the behav-
also consider the cellphone basic information (including the ior of college students. It proposed that males and females
brand of the phone, the screen size, and Android version), to have different concerns about applications. In order to detect
detect user genders. Specifically, we sampled users whose age user genders in a short time, we only focus on the applica-
is between 18 and 32 [45] from 523 users, counting their most tion installation lists and recognize the classes and quanti-
commonly used functions. As shown in Fig. 6, the users whose ties of apps. Specifically, based on Google Play Store5 and
ages range from 18 to 32 are fond of using social applications, WanDouJia,6 we categorize apps into 27 categories, includ-
such as Weibo and Wechat. They also spend a lot of time ing communication, entertainment, lifestyle, sports, shopping,
on listening to music and making phone calls. And there are comics, education, personality, travel, news, games, music,
68.75% users who like playing games. Accordingly, this paper video, photography, social, business, health, finance, weather,
mines user’s habitual operations and personal preferences in optimization, security, tools, mail.
unlocking screen, using social applications, playing games, For the number of game apps and photography apps
installed application lists, and basic cellphone information for installed in the phone, we made an analysis among 15 males
user gender detection. and 15 females. Among these 15 males, the average number
of game categories is 3 and the maximal number is 15. As for
A. Feature Extraction females, there are 5 people who only install one game, two
women have 5 game apps, and the average number is 2. For
1) Unlocking Screen Scene: According to the analysis of
photography apps, it explains the preferences of females. That
in Section IV, we use the similar method to analyze female
is, women prefer to spend time using all kinds of photography
and male users’ operations in unlocking screen. Specifically,
applications. Among 15 female users, one user installed ten
the changes of elevation angles are different when boys and
photographic applications. In contrast, only one male user has
girls picking up the phones. The corresponding curves about
six photography softwares installed and there is one does not
females show large fluctuations, indicating that females prefer
have any photography application at all. In general, there are
picking up the phone with a dramatic shaking back and forth.
about three photography apps installed in male users’ mobile
When it comes to swiping gestures, we extract features,
phones, and five in female subjects’.
including sliding start-end area, sliding angle, sliding dis-
5) Basic Information of the Phone: From the brand of
tance, sliding duration, and sliding velocity (similar with the
mobile phone, Fig. 7 shows the basic information of mobile
descriptions of swiping screen action in Section IV).
phones of 15 males and 15 females. It is observed that VIVO
2) Social App Usage Scene: In this scene, we extract
eight features, including the maximum, minimum, mean, and 4 [Online]. Available: https://www.jiguang.cn/reports/72
5 [Online]. Available: https://play.google.com/store
3 [Online]. Available: www.talkingdata.com 6 [Online]. Available: http://www.wandoujia.com/
Authorized licensed use limited to: Universidad de Lima. Downloaded on May 03,2024 at 09:37:52 UTC from IEEE Xplore. Restrictions apply.
YU et al.: INFERRING USER PROFILE ATTRIBUTES FROM MULTIDIMENSIONAL MOBILE PHONE SENSORY DATA 5157
Authorized licensed use limited to: Universidad de Lima. Downloaded on May 03,2024 at 09:37:52 UTC from IEEE Xplore. Restrictions apply.
5158 IEEE INTERNET OF THINGS JOURNAL, VOL. 6, NO. 3, JUNE 2019
Authorized licensed use limited to: Universidad de Lima. Downloaded on May 03,2024 at 09:37:52 UTC from IEEE Xplore. Restrictions apply.
YU et al.: INFERRING USER PROFILE ATTRIBUTES FROM MULTIDIMENSIONAL MOBILE PHONE SENSORY DATA 5159
TABLE I
C ORRELATIONS B ETWEEN C ONSCIENTIOUSNESS AND F EATURES
(a)
Authorized licensed use limited to: Universidad de Lima. Downloaded on May 03,2024 at 09:37:52 UTC from IEEE Xplore. Restrictions apply.
5160 IEEE INTERNET OF THINGS JOURNAL, VOL. 6, NO. 3, JUNE 2019
Authorized licensed use limited to: Universidad de Lima. Downloaded on May 03,2024 at 09:37:52 UTC from IEEE Xplore. Restrictions apply.
YU et al.: INFERRING USER PROFILE ATTRIBUTES FROM MULTIDIMENSIONAL MOBILE PHONE SENSORY DATA 5161
TABLE II
Q UESTIONNAIRE R ESULT OF THE B IG F IVE R EFERENCES
[1] J. W. Jung, D.-J. Kim, and Z. Z. Bien, “Realization of personalized
services for intelligent residential space based on user identification
method using sequential walking footprints,” J. Syst. Cybern. Informat.,
vol. 3, no. 2, pp. 90–95, 2005.
[2] M. D. Back et al., “Facebook profiles reflect actual personality, not
self-idealization,” Psychol. Sci., vol. 21, no. 3, pp. 372–374, 2010.
[3] H. K. Kabali et al., “Exposure and use of mobile media devices by
young children,” Pediatrics, vol. 136, no. 6, pp. 1044–1050, 2015.
[4] M. Salehan and A. Negahban, “Social networking on smartphones:
When mobile phones become addictive,” Comput. Human Behav.,
vol. 29, no. 6, pp. 2632–2639, 2013.
[5] T. Hays and V. Minichiello, “The meaning of music in the lives of older
people: A qualitative study,” Psychol. Music, vol. 33, no. 4, pp. 437–451,
2) Type of Phone: In age estimation and gender detection, 2005.
we use unlocking screen as one of the experimental scenes. [6] J. A. Roberts, L. H. P. Yaya, and C. Manolis, “The invisible addic-
tion: Cell-phone activities and addiction among male and female college
There is an assumption that user must swipe to unlock the students,” J. Behav. Addictions, vol. 3, no. 4, pp. 254–265, 2014.
device. However, this does not work for all phones. The up- [7] Z. S. Ali, “Mobile phone and Pakistani youth: A gender perspective,”
to-date devices like the iPhone 8 use fingerprint detection for J. Telematics Informat., vol. 1, no. 2, pp. 59–68, 2013.
[8] R. R. McCrae and O. P. John, “An introduction to the five-factor model
authenticating user and this is followed by a button (Home and its applications,” J. Pers., vol. 60, no. 2, pp. 175–215, 1992.
key) press. In our experiments, Fig. 10(a) and (b) show that if [9] Q. Li and Z. Chen, “Age differences in personality traits from 15 to
we leave out swiping screen stage for unlocking screen scene, 75: Big five domains and 10 facets in a large cross-sectional sample in
the RMSE of age estimation is 5.9205 and the precision of Chinese,” J. Psychol. Sci., vol. 38, no. 1, pp. 131–138, 2015.
[10] G. Chittaranjan, J. Blom, and D. Gatica-Perez, “Mining large-scale
gender detection is 78.60%, which is also acceptable. smartphone data for personality studies,” Pers. Ubiquitous Comput.,
3) Hands-Free When Phone Answering: In age estimation, vol. 17, no. 3, pp. 433–450, 2013.
we consider that the phone is held in hand when the user is [11] G. R. Doddington, “Speaker recognition identifying people by their
voices,” Proc. IEEE, vol. 73, no. 11, pp. 1651–1664, Nov. 1985.
answering the phone. While users may use hands-free and not [12] A. Jain, J. Huang, and S. Fang, “Gender identification using frontal facial
necessarily hold their phones. Thus, it makes the feature for images,” in Proc. IEEE Int. Conf. Multimedia Expo (ICME), 2005, p. 4.
elevation angle and slope angle during phone answering not [13] W. Lane and C. Manner, “The impact of personality traits on smartphone
ownership and use,” Int. J. Bus. Soc. Sci., vol. 2, no. 17, pp. 22–28, 2011.
functional. In fact, we did an evaluation for different feature [14] R. Kohavi et al., “A study of cross-validation and bootstrap for accuracy
combinations, including the scenario where there is no phone estimation and model selection,” in Proc. IJCAI, vol. 14. Montreal, QC,
call at all. As shown in Fig. 10(b), the RMSE is 4.2175, which Canada, 1995, pp. 1137–1145.
[15] L. Chen, J. Hoey, C. D. Nugent, D. J. Cook, and Z. Yu, “Sensor-based
can also claimed satisfactory. activity recognition,” IEEE Trans. Syst., Man, Cybern. C, Appl. Rev.,
4) Scene Choosing: It is obvious that phone calling and vol. 42, no. 6, pp. 790–808, Nov. 2012.
games are not the only functionalities of cellphone. As shown [16] Z. Yu et al., “Recognition of human computer operations based on
keystroke sensing by smartphone microphone,” IEEE Internet Things
in Figs. 2 and 6, we can observe that music listening and video J., vol. 5, no. 2, pp. 1156–1168, Apr. 2018.
watching get high rank in usage. Listen to the music and watch [17] J.-Y. Yang, J.-S. Wang, and Y.-P. Chen, “Using acceleration mea-
the video can also trigger a lot of changes in cellphone sensor surements for activity recognition: An effective learning algorithm for
constructing neural classifiers,” Pattern Recognit. Lett., vol. 29, no. 16,
data, because of the age difference. Therefore, we will add pp. 2213–2220, 2008.
video watching as a scene in our future study. [18] H. Du et al., “Group mobility classification and structure recognition
using mobile devices,” in Proc. PerCom, 2016, pp. 1–9.
[19] H. Du et al., “Recognition of group mobility level and group struc-
ture with mobile devices,” IEEE Trans. Mobile Comput., vol. 17, no. 4,
VIII. C ONCLUSION pp. 884–897, Apr. 2018.
[20] Z. Yu, H. Du, F. Yi, Z. Wang, and B. Guo, “Ten scientific prob-
In this paper, we infer user profiles in terms of age, gen- lems in human behavior understanding,” CCF Trans. Pervasive Comput.
der, and personality trait utilizing data from mobile phones. Interact., vol. 1, no. 1, pp. 1–7, 2019.
[21] Z. Wang, B. Guo, Z. Yu, and X. Zhou, “Wi-Fi CSI-based behavior recog-
Specifically, we collect sensory data and event listener data in nition: From signals and actions to activities,” IEEE Commun. Mag.,
cellphones. We use Random Forest regression to estimate the vol. 56, no. 5, pp. 109–115, May 2018.
age, apply classification models to detect the user’s gender, [22] M. Vrigkas, C. Nikou, and I. A. Kakadiaris, “A review of human activity
recognition methods,” Front. Robot. AI, vol. 2, Nov. 2015, Art. no. 28.
and utilize SVR to identify the personality traits. We eval- [23] I. Bisio, F. Lavagetto, M. Marchese, and A. Sciarrone, “Smartphone-
uate the system through real-life experiments conducted by based user activity recognition method for health remote monitoring
84 phone users. Experimental results show the outstanding of applications,” in Proc. PECCS, 2012, pp. 200–205.
[24] D. Riboni and C. Bettini, “COSAR: hybrid reasoning for context-
our approaches, achieving the RSME of 4.3696 in age esti- aware activity recognition,” Pers. Ubiquitous Comput., vol. 15, no. 3,
mation, the precision of 91.70% in gender detection, and the pp. 271–289, 2011.
RMSEs of openness, conscientiousness, extraversion, agree- [25] T. Sztyler, H. Stuckenschmidt, and W. Petrich, “Position-aware activity
ableness, and neuroticism of 0.29, 0.3506, 0.465, 0.3022, and recognition with wearable devices,” Pervasive Mobile Comput., vol. 38,
pp. 281–295, Jul. 2017.
0.452, respectively, in personality traits identification. In the [26] L. Lu and Y. Liu, “Safeguard: User reauthentication on smartphones via
future, we will increase the number of volunteers and col- behavioral biometrics,” IEEE Trans. Comput. Social Syst., vol. 2, no. 3,
lect longer term and large scale data. And we also consider pp. 53–64, Sep. 2016.
[27] C. Chao et al., “Tripimputor: Real-time imputing taxi trip purpose
to add other experimental scenes, such as taking pictures and leveraging multi-sourced urban data,” IEEE Trans. Intell. Transp. Syst.,
watching videos. vol. 19, no. 10, pp. 3292–3304, Oct. 2018.
Authorized licensed use limited to: Universidad de Lima. Downloaded on May 03,2024 at 09:37:52 UTC from IEEE Xplore. Restrictions apply.
5162 IEEE INTERNET OF THINGS JOURNAL, VOL. 6, NO. 3, JUNE 2019
[28] I. Bisio, A. Delfino, F. Lavagetto, M. Marchese, and A. Sciarrone, [54] O. Miguel-Hurtado, S. V. Stevenage, C. Bevan, and R. Guest, “Predicting
“Gender-driven emotion recognition through speech signals for ambient sex as a soft-biometrics from device interaction swipe gestures,” Pattern
intelligence applications,” IEEE Trans. Emerg. Topics Comput., vol. 1, Recognit. Lett., vol. 79, pp. 44–51, Aug. 2016.
no. 2, pp. 244–257, Dec. 2013.
[29] P. Gupta, S. Goel, and A. Purwar, “A stacked technique for gender
recognition through voice,” in Proc. 11th Int. Conf. Contemp. Comput.
(IC3), 2018, pp. 1–3.
[30] J. Staiano et al., “Friends don’t lie: Inferring personality traits from Zhiwen Yu (S’06–M’08–SM’14) received the
social network structure,” in Proc. ACM Conf. Ubiquitous Comput., Ph.D. degree in computer science and technology
2012, pp. 321–330. from Northwestern Polytechnical University, Xi’an,
[31] Y.-A. de Montjoye, J. Quoidbach, F. Robic, and A. S. Pentland, China, in 2005.
“Predicting personality using novel mobile phone-based metrics,” in He is currently a Professor with the School
Proc. Int. Conf. Soc. Comput. Behav. Cultural Model. Prediction, 2013, of Computer Science, Northwestern Polytechnical
pp. 48–55. University. He was a Visiting Researcher with
[32] G. Chittaranjan, J. Blom, and D. Gatica-Perez, “Who’s who with big- the Context-Aware Systems Department, Institute
five: Analyzing and classifying personality traits with smartphones,” in for Infocomm Research, Singapore, from 2004 to
Proc. 15th Annu. Int. Symp. Wearable Comput. (ISWC), 2011, pp. 29–36. 2005, and an Alexander von Humboldt Fellow with
[33] M. Böhmer, B. Hecht, J. Schöning, A. Krüger, and G. Bauer, “Falling Mannheim University, Mannheim, Germany, from
asleep with angry birds, Facebook and Kindle: A large scale study on 2009 to 2010.
mobile application usage,” in Proc. 13th Int. Conf. Human Comput. Dr. Yu is an Associate Editor or an Editorial Board member of the IEEE
Interact. Mobile Devices Services, 2011, pp. 47–56. T RANSACTIONS ON H UMAN –M ACHINE S YSTEMS, IEEE Communications
[34] T. M. T. Do, J. Blom, and D. Gatica-Perez, “Smartphone usage in the Magazine, and ACM/Springer Personal and Ubiquitous Computing.
wild: A large-scale analysis of applications and context,” in Proc. 13th
Int. Conf. Multimodal Interfaces, 2011, pp. 353–360.
[35] S. Zhao et al., “Discovering different kinds of smartphone users through
their application usage behaviors,” in Proc. ACM UbiComp, 2016, En Xu received the bachelor’s degree from
pp. 498–509. Northwestern Polytechnical University, Xi’an,
[36] W. Youyou, M. Kosinski, and D. Stillwell, “Computer-based personality China, where he is currently pursuing the Ph.D.
judgments are more accurate than those made by humans,” Proc. Nat. degree at the School of Computer Science.
Acad. Sci. USA, vol. 112, no. 4, pp. 1036–1040, 2015. His current research interests include ubiquitous
[37] Z. Yu, H. Xu, Z. Yang, and B. Guo, “Personalized travel package computing and mobile sensing.
with multi-point-of-interest recommendation based on crowdsourced
user footprints,” IEEE Trans. Human–Mach. Syst., vol. 46, no. 1,
pp. 151–158, Feb. 2016.
[38] A. Cooper, “The origin of personas,” Innov. Mclean Dulles Virginia,
vol. 23, no. 1, pp. 26–29, 2004.
[39] Proposed Working Definition of an Older Person in Africa for the
MDS Project: Definition of an Older or Elderly Person, World Health
Org., Geneva, Switzerland, 2013. [Online]. Available: http://www.
He Du received the bachelor’s degree from
who.int/healthinfo/survey/ageingdefnolder/en/
Northwestern Polytechnical University, Xi’an,
[40] Convention on the Rights of the Child, Unicef, New York, NY, USA,
China, where she is currently pursuing the Ph.D.
1989, p. 8.
degree at the School of Computer Science.
[41] T. Truelsen, S. Begg, and C. Mathers, The Global Burden of
Her current research interests include ubiquitous
Cerebrovascular, WHO Int., Geneva, Switzerland, 2006.
computing and mobile sensing.
[42] V. Balakrishnan and H. Paul, “Hand-size variations effect on mobile
phone texting satisfaction,” System, vol. 6, no. 7, pp. 8–10, 2007.
[43] S. Hoober. (Feb. 2013). How Do Users Really Hold Mobile Devices.
[Online]. Available: http://www.uxmatter.com
[44] C. Bevan and D. S. Fraser, “Different strokes for different folks?
Revealing the physical characteristics of smartphone users from their
swipe gestures,” Int. J. Human–Comput. Stud., vol. 88, pp. 51–61, 2016.
[45] J. Feng, I. Spence, and J. Pratt, “Playing an action video game reduces
gender differences in spatial cognition,” Psychol. Sci., vol. 18, no. 10, Bin Guo (GS’09–M’09–SM’14) received the Ph.D.
pp. 850–855, 2007. degree in computer science from Keio University,
[46] A. Caspi et al., “Children’s behavioral styles at age 3 are linked to their Tokyo, Japan, in 2009.
adult personality traits at age 26,” J. Pers., vol. 71, no. 4, pp. 495–514, He is a Professor with Northwestern Polytechnical
2003. University, Xi’an, China. He was a Post-Doctoral
[47] A. Bianchi and J. G. Phillips, “Psychological predictors of problem Researcher with the Institut TELECOM SudParis,
mobile phone use,” CyberPsychol. Behav., vol. 8, no. 1, pp. 39–51, 2005. Évry, France. His current research interests include
[48] M. Pielot, T. Dingler, J. S. Pedro, and N. Oliver, “When attention is ubiquitous computing and mobile crowd sensing.
not scarce—Detecting boredom from mobile phone usage,” in Proc.
Ubicomp, 2015, pp. 825–836.
[49] R. N. Landers and J. W. Lounsbury, “An investigation of big five and
narrow personality traits in relation to Internet usage,” Comput. Human
Behav., vol. 22, no. 2, pp. 283–293, 2006.
[50] R. J. Swickert, J. B. Hittner, J. L. Harris, and J. A. Herring, Lina Yao (A’11) received the bachelor’s degree from
“Relationships among Internet use, personality, and social support,” Shandong University, Jinan, China, in 2010, and the
Comput. Human Behav., vol. 18, no. 4, pp. 437–451, 2002. master’s and Ph.D. degree from the University of
[51] N. Dong, N. A. Smith, and C. P. Rosé, “Author age prediction from text Adelaide, Adelaide, SA, Australia, in 2014.
using linear regression,” in Proc. ACL-HLT Workshop Lang. Technol. She is currently a Senior Lecturer with the School
Cultural Heritage Soc. Sci. Humanities, 2011, pp. 115–123. of Computer Science and Engineering, University
[52] G. Guo, Y. Fu, T. S. Huang, and C. R. Dyer, “Locally adjusted robust of New South Wales, Sydney, NSW, Australia. Her
regression for human age estimation,” in Proc. IEEE Workshop Appl. current research interests include data mining and
Comput. Vis. (WACV), 2008, pp. 1–6. machine learning applications with the focuses on
[53] H. Erokyar, “Age and gender recognition for speech applications based Internet of Things analytics, recommender systems,
on support vector machines,” M.S. thesis, Univ. South Florida, Tampa, human activity recognition, and brain–computer
FL, USA, 2014. interface.
Authorized licensed use limited to: Universidad de Lima. Downloaded on May 03,2024 at 09:37:52 UTC from IEEE Xplore. Restrictions apply.