{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:13:04Z","timestamp":1726060384986},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811517846"},{"type":"electronic","value":"9789811517853"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-1785-3_19","type":"book-chapter","created":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T09:03:14Z","timestamp":1574758994000},"page":"251-262","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Integrated Redundant APs Reduction and Transfer Learning for Indoor WLAN Intrusion Detection via Link-Layer Data Transformation"],"prefix":"10.1007","author":[{"given":"Xinyue","family":"Li","sequence":"first","affiliation":[]},{"given":"Mu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yaoping","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Zengshan","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,27]]},"reference":[{"issue":"1","key":"19_CR1","doi-asserted-by":"publisher","first-page":"119","DOI":"10.3390\/s17010119","volume":"17","author":"J Moreau","year":"2017","unstructured":"Moreau, J., Ambellouis, S., Ruichek, Y.: Fisheye-based method for GPS localization improvement in unknown semi-obstructed areas. Sensors 17(1), 119 (2017)","journal-title":"Sensors"},{"issue":"4","key":"19_CR2","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/76.120772","volume":"1","author":"JY Nam","year":"2015","unstructured":"Nam, J.Y., Rao, K.R.: Image coding using a classified DCT\/VQ based on two-channel conjugate vector quantization. IEEE Trans. Circuits Syst. Video Technol. 1(4), 325\u2013336 (2015)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"19_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.mechatronics.2018.02.012","volume":"51","author":"L Yi","year":"2018","unstructured":"Yi, L., Zhao, H., Yue, H., et al.: Integration of vision and topological self-localization for intelligent vehicles. Mechatronics 51, 46\u201358 (2018)","journal-title":"Mechatronics"},{"key":"19_CR4","first-page":"1","volume":"99","author":"D Cichon","year":"2019","unstructured":"Cichon, D., Psiuk, R., Brauer, H., et al.: A hall-sensor-based localization method with six degrees of freedom using unscented Kalman filter. IEEE Sens. J. 99, 1 (2019)","journal-title":"IEEE Sens. J."},{"issue":"99","key":"19_CR5","first-page":"1","volume":"7","author":"J Fan","year":"2019","unstructured":"Fan, J., Awan, A.S.: Non-line-of-sight identification based on unsupervised machine learning in ultra wideband systems. IEEE Access 7(99), 1 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"19_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1049\/iet-ifs.2017.0629","volume":"13","author":"SA Musavi","year":"2019","unstructured":"Musavi, S.A., Hashemi, M.R.: HPCgnature: a hardware-based application-level intrusion detection system. IET Inf. Secur. 13(1), 19\u201326 (2019)","journal-title":"IET Inf. Secur."},{"issue":"5","key":"19_CR7","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1002\/(SICI)1098-111X(200005)15:5<389::AID-INT2>3.0.CO;2-8","volume":"15","author":"T Beaubouef","year":"2000","unstructured":"Beaubouef, T., Petry, F.E.: Fuzzy rough set techniques for uncertainty processing in a relational database. Int. J. Intell. Syst. 15(5), 389\u2013424 (2000)","journal-title":"Int. J. Intell. Syst."},{"issue":"8","key":"19_CR8","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1109\/TSP.2019.2901370","volume":"67","author":"W Tian","year":"2019","unstructured":"Tian, W., Qun, L., Bucci, D.J., et al.: K-medoids clustering of data sequences with composite distributions. IEEE Trans. Signal Process. 67(8), 2093\u20132106 (2019)","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"19_CR9","first-page":"771","volume":"21","author":"Z Yi","year":"2018","unstructured":"Yi, Z.: Optimized detection algorithm of complex intrusion interference signal in mobile wireless network. J. Discrete Math. Sci. Crypt. 21(3), 771\u2013779 (2018)","journal-title":"J. Discrete Math. Sci. Crypt."},{"issue":"4","key":"19_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LSENS.2019.2905020","volume":"3","author":"S Dey","year":"2019","unstructured":"Dey, S., Hossain, A.: Session-key establishment and authentication in a smart home network using public key cryptography. IEEE Sensors Lett. 3(4), 1\u20134 (2019)","journal-title":"IEEE Sensors Lett."},{"issue":"9","key":"19_CR11","first-page":"39","volume":"39","author":"W Qi","year":"2013","unstructured":"Qi, W., Yi, Z., Jing, G.: Target positioning algorithm based on WSN in perimeter intrusion detection. Comput. Eng. 39(9), 39\u201344 (2013)","journal-title":"Comput. Eng."},{"issue":"2","key":"19_CR12","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1108\/OIR-12-2015-0394","volume":"41","author":"R Singh","year":"2017","unstructured":"Singh, R., Kumar, H., Singla, R.K., et al.: Internet attacks and intrusion detection system. Online Inf. Rev. 41(2), 171\u2013184 (2017)","journal-title":"Online Inf. Rev."},{"issue":"7","key":"19_CR13","doi-asserted-by":"publisher","first-page":"2045","DOI":"10.1016\/j.patcog.2012.12.012","volume":"46","author":"Z Shang","year":"2013","unstructured":"Shang, Z., Da, C., Qiao, X., et al.: Optimizing the Gaussian kernel function with the formulated kernel target alignment criterion for two-class pattern classification. Pattern Recogn. 46(7), 2045\u20132054 (2013)","journal-title":"Pattern Recogn."},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Kosba, A.E., Saeed, A., Youssef, M.: RASID: a robust WLAN device-free passive motion detection system. In: IEEE International Conference on Pervasive Computing and Communications, pp. 180\u2013189, March 2012","DOI":"10.1109\/PerCom.2012.6199865"},{"issue":"1","key":"19_CR15","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.csl.2008.04.002","volume":"23","author":"MA Fattah","year":"2009","unstructured":"Fattah, M.A., Ren, F.: GA, MR, FFNN, PNN and GMM based models for automatic text summarization. Comput. Speech Lang. 23(1), 126\u2013144 (2009)","journal-title":"Comput. Speech Lang."},{"issue":"6","key":"19_CR16","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1109\/72.809088","volume":"10","author":"DP Mandic","year":"1999","unstructured":"Mandic, D.P., Chambers, J.A.: Toward an optimal PRNN-based nonlinear predictor. IEEE Trans. Neural Netw. 10(6), 1435\u20131442 (1999)","journal-title":"IEEE Trans. Neural Netw."}],"container-title":["Communications in Computer and Information Science","Wireless Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-1785-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T09:06:01Z","timestamp":1574759161000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-1785-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811517846","9789811517853"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-1785-3_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"27 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CWSN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Conference on Wireless Sensor Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chongqing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cwsn2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cwsn2019.org.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"None","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"158","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"96","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31 English papers and 65 Chinese papers were accepted. 27 of the 31 English papers are included in CCIS 1101.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}