{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T15:09:16Z","timestamp":1725980956823},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319942674"},{"type":"electronic","value":"9783319942681"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94268-1_62","type":"book-chapter","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T12:49:21Z","timestamp":1528807761000},"page":"748-753","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information"],"prefix":"10.1007","author":[{"given":"Liangyi","family":"Gong","sequence":"first","affiliation":[]},{"given":"Chundong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Likun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yiyang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Chaocan","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,13]]},"reference":[{"key":"62_CR1","doi-asserted-by":"crossref","unstructured":"Adelstein, F., Alla, P., Joyce, R., Iii, G.G.R.: Physically locating wireless intruders. In: Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC, vol. 1, pp. 482\u2013489 (2004)","DOI":"10.1109\/ITCC.2004.1286503"},{"issue":"6","key":"62_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1255\/nirn.593","volume":"11","author":"Tom Fearn","year":"2000","unstructured":"Fearn, T.: Savitzky-Golay filters, pp. 14\u201315 (2000)","journal-title":"NIR news"},{"key":"62_CR3","doi-asserted-by":"crossref","unstructured":"Qian, K., Wu, C., Yang, Z., Liu, Y., Zhou, Z.: PADS: passive detection of moving targets with dynamic speed using PHY layer information. In: IEEE International Conference on Parallel and Distributed Systems, pp. 1\u20138 (2015)","DOI":"10.1109\/PADSW.2014.7097784"},{"key":"62_CR4","doi-asserted-by":"crossref","unstructured":"Qian, K., Wu, C., Zhou, Z., Zheng, Y., Yang, Z., Liu, Y.: Inferring motion direction using commodity Wi-Fi for interactive exergames. In: CHI Conference, pp. 1961\u20131972 (2017)","DOI":"10.1145\/3025453.3025678"},{"key":"62_CR5","unstructured":"Schweitzer, D., Brown, W., Boleng, J.: Using visualization to locate rogue access points. Consortium for Computing Sciences in Colleges (2007)"},{"issue":"3","key":"62_CR6","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1109\/TWC.2010.03.081204","volume":"9","author":"SFA Shah","year":"2010","unstructured":"Shah, S.F.A., Srirangarajan, S., Tewfik, A.H.: Implementation of a directional beacon-based position location algorithm in a signal processing framework. IEEE Trans. Wirel. Commun. 9(3), 1044\u20131053 (2010)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"62_CR7","doi-asserted-by":"crossref","unstructured":"Subramanian, A.P., Deshpande, P., Jie, G., Das, S.R.: Drive-by localization of roadside WiFi networks. In: The Conference on Computer Communications, INFOCOM 2008, pp. 718\u2013725. IEEE (2008)","DOI":"10.1109\/INFOCOM.2008.122"},{"issue":"2","key":"62_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2543581.2543592","volume":"46","author":"Z Yang","year":"2013","unstructured":"Yang, Z., Zhou, Z., Liu, Y.: From RSSI to CSI: indoor localization via channel response. ACM Comput. Surv. 46(2), 1\u201332 (2013)","journal-title":"ACM Comput. Surv."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94268-1_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T10:18:06Z","timestamp":1571480286000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-94268-1_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319942674","9783319942681"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94268-1_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}