{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T06:06:57Z","timestamp":1749017217738,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":81,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813342132"},{"type":"electronic","value":"9789813342149"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-33-4214-9_17","type":"book-chapter","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T05:26:34Z","timestamp":1606195594000},"page":"223-243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Device-Free Activity Recognition: A Survey"],"prefix":"10.1007","author":[{"given":"Mingzhi","family":"Pang","sequence":"first","affiliation":[]},{"given":"Xu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Peihao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Faren","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Pengpeng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,20]]},"reference":[{"issue":"2","key":"17_CR1","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.intcom.2006.08.008","volume":"19","author":"P Barr","year":"2007","unstructured":"Barr, P., Noble, J., Biddle, R.: Video game values: human-computer interaction and games. Interact. Comput. 19(2), 180\u2013195 (2007)","journal-title":"Interact. Comput."},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Foroughi, H., Aski, B.S., Pourreza, H.: Intelligent video surveillance for monitoring fall detection of elderly in home environments. In: 2008 11th International Conference on Computer and Information Technology, pp. 219\u2013224. IEEE (2008)","DOI":"10.1109\/ICCITECHN.2008.4803020"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Scheible, J., Ojala, T., Coulton, P.: MobiToss: a novel gesture based interface for creating and sharing mobile multimedia art on large public displays. In: Proceedings of the 16th ACM International Conference on Multimedia, pp. 957\u2013960. ACM (2008)","DOI":"10.1145\/1459359.1459532"},{"issue":"3","key":"17_CR4","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1111\/1467-9280.00144","volume":"10","author":"AM Burton","year":"1999","unstructured":"Burton, A.M., Wilson, S., Cowan, M., Bruce, V.: Face recognition in poor-quality video: evidence from security surveillance. Psychol. Sci. 10(3), 243\u2013248 (1999)","journal-title":"Psychol. Sci."},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1007\/978-3-319-10590-1_53","volume-title":"Computer Vision \u2013 ECCV 2014","author":"MD Zeiler","year":"2014","unstructured":"Zeiler, M.D., Fergus, R.: Visualizing and understanding convolutional networks. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8689, pp. 818\u2013833. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10590-1_53"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-3-319-46484-8_29","volume-title":"Computer Vision \u2013 ECCV 2016","author":"A Newell","year":"2016","unstructured":"Newell, A., Yang, K., Deng, J.: Stacked hourglass networks for human pose estimation. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9912, pp. 483\u2013499. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46484-8_29"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-319-46466-4_3","volume-title":"Computer Vision \u2013 ECCV 2016","author":"E Insafutdinov","year":"2016","unstructured":"Insafutdinov, E., Pishchulin, L., Andres, B., Andriluka, M., Schiele, B.: DeeperCut: a deeper, stronger, and faster multi-person pose estimation model. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9910, pp. 34\u201350. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46466-4_3"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Cao, Z., Simon, T., Wei, S.E., Sheikh, Y.: Realtime multi-person 2D pose estimation using part affinity fields. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 7291\u20137299 (2017)","DOI":"10.1109\/CVPR.2017.143"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Bahl, P., Padmanabhan, V.N.: Radar: an in-building RF-based user location and tracking system, vol. 2, pp. 775\u2013784 (2000)","DOI":"10.1109\/INFCOM.2000.832252"},{"issue":"4","key":"17_CR10","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1109\/TGRS.2011.2164411","volume":"50","author":"K Chetty","year":"2012","unstructured":"Chetty, K., Smith, G.E., Woodbridge, K.: Through-the-wall sensing of personnel using passive bistatic WIFI radar at standoff distances. IEEE Trans. Geosci. Remote Sens. 50(4), 1218\u20131226 (2012)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Adib, F., Katabi, D.: See through walls with Wi-Fi!. In: ACM SIGCOMM Conference on SIGCOMM (2013)","DOI":"10.1145\/2486001.2486039"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Pu, Q., Gupta, S., Gollakota, S., Patel, S.N.: Whole-home gesture recognition using wireless signals, pp. 27\u201338 (2013)","DOI":"10.1145\/2500423.2500436"},{"issue":"1","key":"17_CR13","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1925861.1925870","volume":"41","author":"D Halperin","year":"2011","unstructured":"Halperin, D., Hu, W., Sheth, A., Wetherall, D.: Tool release: gathering 802.11n traces with channel state information. ACM SIGCOMM Comput. Commun. Rev. 41(1), 53 (2011)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Zheng, X., Wang, J., Shangguan, L., Zhou, Z., Liu, Y.: Smokey: ubiquitous smoking detection with commercial WIFI infrastructures. In: IEEE INFOCOM - The IEEE International Conference on Computer Communications (2016)","DOI":"10.1109\/INFOCOM.2016.7524399"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Wang, G., Zou, Y., Zhou, Z., Wu, K., Ni, L.M.: We can hear you with Wi-Fi!. In: International Conference on Mobile Computing & Networking (2014)","DOI":"10.1145\/2639108.2639112"},{"issue":"2","key":"17_CR16","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.patrec.2009.09.019","volume":"31","author":"H Qian","year":"2010","unstructured":"Qian, H., Mao, Y., Xiang, W., Wang, Z.: Recognition of human activities using SVM multi-class classifier. Pattern Recogn. Lett. 31(2), 100\u2013111 (2010)","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"17_CR17","first-page":"1","volume":"2010","author":"W Kim","year":"2010","unstructured":"Kim, W., Lee, J., Kim, M., Oh, D., Kim, C.: Human action recognition using ordinal measure of accumulated motion. Eurasip J. Adv. Signal Process. 2010(1), 1\u201311 (2010)","journal-title":"Eurasip J. Adv. Signal Process."},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-12304-7_10","volume-title":"Computer Vision \u2013 ACCV 2009","author":"C-H Fang","year":"2010","unstructured":"Fang, C.-H., Chen, J.-C., Tseng, C.-C., Lien, J.-J.J.: Human action recognition using spatio-temporal classification. In: Zha, H., Taniguchi, R., Maybank, S. (eds.) ACCV 2009. LNCS, vol. 5995, pp. 98\u2013109. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12304-7_10"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Ziaeefard, M., Ebrahimnezhad, H.: Hierarchical human action recognition by normalized-polar histogram. In: 2010 20th International Conference on Pattern Recognition, pp. 3720\u20133723. IEEE (2010)","DOI":"10.1109\/ICPR.2010.906"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Vemulapalli, R., Arrate, F., Chellappa, R.: Human action recognition by representing 3D human skeletons as points in a lie group. In: IEEE Conference on Computer Vision & Pattern Recognition (2014)","DOI":"10.1109\/CVPR.2014.82"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Mahbub, U., Imtiaz, H., Ahad, M.: An optical flow based approach for action recognition. In: International Conference on Computer & Information Technology (2012)","DOI":"10.1109\/ICCITechn.2011.6164868"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Holte, M.B., Moeslund, T.B., Nikolaidis, N., Pitas, I.: 3D human action recognition for multi-view camera systems. In: 2011 International Conference on 3D Imaging, Modeling, Processing, Visualization and Transmission, pp. 342\u2013349. IEEE (2011)","DOI":"10.1109\/3DIMPVT.2011.50"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Pham, C.H., Ducournau, A., Fablet, R., Rousseau, F.: Brain MRI super-resolution using deep 3D convolutional networks. In: IEEE International Symposium on Biomedical Imaging (2017)","DOI":"10.1109\/ISBI.2017.7950500"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Rahmani, H., Mian, A.: 3D action recognition from novel viewpoints. In: IEEE Computer Vision and Pattern Recognition (2016)","DOI":"10.1109\/CVPR.2016.167"},{"key":"17_CR25","unstructured":"Lin, S., Jia, K., Yeung, D.Y., Shi, B.E.: Human action recognition using factorized spatio-temporal convolutional networks (FSTCN). In: IEEE International Conference on Computer Vision (2015)"},{"issue":"1","key":"17_CR26","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TPAMI.2012.59","volume":"35","author":"J Shuiwang","year":"2013","unstructured":"Shuiwang, J., Ming, Y., Kai, Y.: 3D convolutional neural networks for human action recognition. IEEE Trans. Pattern Anal. Mach. Intell. 35(1), 221\u2013231 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Karpathy, A., Toderici, G., Shetty, S., Leung, T., Li, F.F.: Large-scale video classification with convolutional neural networks. In: Computer Vision & Pattern Recognition (2014)","DOI":"10.1109\/CVPR.2014.223"},{"key":"17_CR28","unstructured":"Liu, C., Wei-Sheng, X.U., Qi-Di, W.U.: Spatiotemporal convolutional neural networks and its application in action recognition. Comput. Sci. (2015)"},{"issue":"5","key":"17_CR29","doi-asserted-by":"publisher","first-page":"053108","DOI":"10.1117\/1.OE.55.5.053108","volume":"55","author":"H Kim","year":"2016","unstructured":"Kim, H., Uh, Y., Ko, S., Byun, H.: Weighing classes and streams: toward better methods for two-stream convolutional networks. Opt. Eng. 55(5), 053108 (2016)","journal-title":"Opt. Eng."},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Feichtenhofer, C., Pinz, A., Zisserman, A.: Convolutional two-stream network fusion for video action recognition. In: Computer Vision & Pattern Recognition (2016)","DOI":"10.1109\/CVPR.2016.213"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Wu, Z., Jiang, Y.G., Xi, W., Hao, Y., Xue, X.: Multi-stream multi-class fusion of deep networks for video classification. In: ACM on Multimedia Conference (2016)","DOI":"10.1145\/2964284.2964328"},{"issue":"2","key":"17_CR32","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/A:1021669406132","volume":"51","author":"G Doretto","year":"2003","unstructured":"Doretto, G., Chiuso, A., Ying, N.W., Soatto, S.: Dynamic textures. Int. J. Comput. Vis. 51(2), 91\u2013109 (2003)","journal-title":"Int. J. Comput. Vis."},{"key":"17_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-319-10593-2_15","volume-title":"Computer Vision \u2013 ECCV 2014","author":"X Yan","year":"2014","unstructured":"Yan, X., Chang, H., Shan, S., Chen, X.: Modeling video dynamics with deep dynencoder. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8692, pp. 215\u2013230. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10593-2_15"},{"key":"17_CR34","unstructured":"Srivastava, N., Mansimov, E., Salakhudinov, R.: Unsupervised learning of video representations using LSTMs. In: International Conference on Machine Learning (2015)"},{"key":"17_CR35","unstructured":"Goodfellow, I.J., et al.: Generative adversarial nets. In: International Conference on Neural Information Processing Systems (2014)"},{"issue":"3","key":"17_CR36","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1016\/j.jcp.2011.07.002","volume":"231","author":"M Duarte","year":"2012","unstructured":"Duarte, M., Bonaventura, Z., Massot, M., Bourdon, A., Dumont, T.: A new numerical strategy with space-time adaptivity and error control for multi-scale streamer discharge simulations. J. Comput. Phys. 231(3), 1002\u20131019 (2012)","journal-title":"J. Comput. Phys."},{"issue":"4","key":"17_CR37","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TCYB.2016.2535122","volume":"47","author":"J Zhang","year":"2016","unstructured":"Zhang, J., Han, Y., Tang, J., Hu, Q., Jiang, J.: Semi-supervised image-to-video adaptation for video action recognition. IEEE Trans. Cybern. 47(4), 960\u2013973 (2016)","journal-title":"IEEE Trans. Cybern."},{"key":"17_CR38","doi-asserted-by":"crossref","unstructured":"Fernando, B., Anderson, P., Hutter, M., Gould, S.: Discriminative hierarchical rank pooling for activity recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1924\u20131932 (2016)","DOI":"10.1109\/CVPR.2016.212"},{"issue":"4","key":"17_CR39","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1016\/j.patrec.2011.05.001","volume":"33","author":"S Jones","year":"2012","unstructured":"Jones, S., Shao, L., Zhang, J., Liu, Y.: Relevance feedback for real-world human action retrieval. Pattern Recogn. Lett. 33(4), 446\u2013452 (2012)","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"17_CR40","doi-asserted-by":"publisher","first-page":"540375","DOI":"10.1155\/2011\/540375","volume":"2011","author":"S Sadek","year":"2011","unstructured":"Sadek, S., Al-Hamadi, A., Michaelis, B., Sayed, U.: An action recognition scheme using fuzzy log-polar histogram and temporal self-similarity. Eurasip J. Adv. Signal Process. 2011(1), 540375 (2011)","journal-title":"Eurasip J. Adv. Signal Process."},{"key":"17_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-642-15549-9_36","volume-title":"Computer Vision \u2013 ECCV 2010","author":"N Ikizler-Cinbis","year":"2010","unstructured":"Ikizler-Cinbis, N., Sclaroff, S.: Object, scene and actions: combining multiple features for human action recognition. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010. LNCS, vol. 6311, pp. 494\u2013507. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15549-9_36"},{"key":"17_CR42","unstructured":"Lui, Y.M., Beveridge, J.R.: Tangent bundle for human action recognition. In: IEEE International Conference on Automatic Face & Gesture Recognition (2013)"},{"key":"17_CR43","doi-asserted-by":"crossref","unstructured":"Wang, H., Kl\u00e4ser, A., Schmid, C., Liu, C.L.: Action recognition by dense trajectories. In: Computer Vision & Pattern Recognition (2011)","DOI":"10.1109\/CVPR.2011.5995407"},{"issue":"11","key":"17_CR44","first-page":"3781","volume":"2","author":"J Yu-Gang","year":"2015","unstructured":"Yu-Gang, J., Qi, D., Wei, L., Xiangyang, X., Chong-Wah, N.: Human action recognition in unconstrained videos by explicit motion modeling. IEEE Trans. Image Process. 2(11), 3781\u20133795 (2015)","journal-title":"IEEE Trans. Image Process."},{"key":"17_CR45","doi-asserted-by":"crossref","unstructured":"Cohen, N., Sharir, O., Shashua, A.: Deep SimNets. In: Computer Vision & Pattern Recognition (2016)","DOI":"10.1109\/CVPR.2016.517"},{"key":"17_CR46","doi-asserted-by":"crossref","unstructured":"Wang, X., Farhadi, A., Gupta, A.: Actions transformations. In: IEEE Computer Vision & Pattern Recognition (2016)","DOI":"10.1109\/CVPR.2016.291"},{"key":"17_CR47","doi-asserted-by":"crossref","unstructured":"Wang, H., Schmid, C.: Action recognition with improved trajectories. In: IEEE International Conference on Computer Vision (2014)","DOI":"10.1109\/ICCV.2013.441"},{"key":"17_CR48","doi-asserted-by":"crossref","unstructured":"Donahue, J., et al.: Long-term recurrent convolutional networks for visual recognition and description (2015)","DOI":"10.21236\/ADA623249"},{"key":"17_CR49","doi-asserted-by":"crossref","unstructured":"Wang, L., Yu, Q., Tang, X.: Action recognition with trajectory-pooled deep-convolutional descriptors. In: Computer Vision & Pattern Recognition (2015)","DOI":"10.1109\/CVPR.2015.7299059"},{"key":"17_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-319-46484-8_2","volume-title":"Computer Vision \u2013 ECCV 2016","author":"L Wang","year":"2016","unstructured":"Wang, L., et al.: Temporal segment networks: towards good practices for deep action recognition. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9912, pp. 20\u201336. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46484-8_2"},{"key":"17_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-46478-7_9","volume-title":"Computer Vision \u2013 ECCV 2016","author":"RR Varior","year":"2016","unstructured":"Varior, R.R., Shuai, B., Lu, J., Xu, D., Wang, G.: A Siamese long short-term memory architecture for human re-identification. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9911, pp. 135\u2013153. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46478-7_9"},{"issue":"10","key":"17_CR52","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MCOM.2017.1700143","volume":"55","author":"W Dan","year":"2017","unstructured":"Dan, W., Zhang, D., Xu, C., Hao, W., Xiang, L.: Device-free WIFI human sensing: from pattern-based to model-based approaches. IEEE Commun. Mag. 55(10), 91\u201397 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"17_CR53","doi-asserted-by":"crossref","unstructured":"Ali, K., Liu, A.X., Wang, W., Shahzad, M.: Keystroke recognition using WIFI signals. In: International Conference on Mobile Computing & Networking (2015)","DOI":"10.1145\/2789168.2790109"},{"key":"17_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2018.2837082","volume":"6","author":"F Dou","year":"2018","unstructured":"Dou, F., et al.: Breathing rhythm analysis in body centric networks. IEEE Access 6, 1 (2018)","journal-title":"IEEE Access"},{"key":"17_CR55","doi-asserted-by":"crossref","unstructured":"Gu, Y., Zhang, Y., Li, J., Ji, Y., An, X., Ren, F.: Sleepy: wireless channel data driven sleep monitoring via commodity WIFI devices. IEEE Trans. Big Data 1 (2019)","DOI":"10.1109\/TBDATA.2018.2851201"},{"key":"17_CR56","doi-asserted-by":"crossref","unstructured":"Villamizar, M., Suarez, J., Villanueva, J., Borja, G., Rios, E.D.L.: Design and implementation of sleep monitoring system using electrooculographs signals. In: Health Care Exchanges (2014)","DOI":"10.1109\/PAHCE.2014.6849636"},{"key":"17_CR57","unstructured":"Hong, L., Wei, Y., Wang, J., Yang, X., Huang, L.: WIFInger: talk to your smart devices with finger-grained gesture. In: ACM International Joint Conference on Pervasive & Ubiquitous Computing (2016)"},{"key":"17_CR58","doi-asserted-by":"crossref","unstructured":"Tan, S., Yang, J.: WIFInger: leveraging commodity WIFI for fine-grained finger gesture recognition. In: ACM International Symposium on Mobile Ad Hoc Networking & Computing (2016)","DOI":"10.1145\/2942358.2942393"},{"issue":"1","key":"17_CR59","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1109\/TVT.2018.2878754","volume":"68","author":"X Wu","year":"2019","unstructured":"Wu, X., Chu, Z., Yang, P., Xiang, C., Zheng, X., Huang, W.: TW-See: human activity recognition through the wall with commodity Wi-Fi devices. IEEE Trans. Veh. Technol. 68(1), 306\u2013319 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"17_CR60","unstructured":"Wei, X., Zhao, J., Li, X.Y., Zhao, K., Jiang, Z.: Electronic frog eye: counting crowd using WIFI. In: INFOCOM. IEEE (2015)"},{"key":"17_CR61","unstructured":"Yu, G., Zhan, J., Zhi, L., Jie, L., Ji, Y., Wang, X.: Sleepy: adaptive sleep monitoring from afar with commodity WIFI infrastructures. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC) (2018)"},{"issue":"5","key":"17_CR62","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/MCOM.2018.1700083","volume":"56","author":"L He","year":"2018","unstructured":"He, L., Ota, K., Dong, M., Guo, M.: Learning human activities through Wi-Fi channel state information with multiple access points. IEEE Commun. Mag. 56(5), 124\u2013129 (2018)","journal-title":"IEEE Commun. Mag."},{"issue":"11","key":"17_CR63","doi-asserted-by":"publisher","first-page":"10346","DOI":"10.1109\/TVT.2017.2737553","volume":"66","author":"Q Gao","year":"2017","unstructured":"Gao, Q., et al.: CSI-based device-free wireless localization and activity recognition using radio image features. IEEE Trans. Veh. Technol. 66(11), 10346\u201310356 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"17_CR64","unstructured":"Yan, W., Jian, L., Chen, Y., Gruteser, M., Liu, H.: E-eyes: device-free location-oriented activity identification using fine-grained WIFI signatures (2014)"},{"key":"17_CR65","unstructured":"Fu, X., Jing, C., Xiao, H.X., Gui, L., Sun, J.L., Wang, N.R.: SEARE: a system for exercise activity recognition and quality evaluation based on green sensing. IEEE Trans. Emerg. Top. Comput. 1 (2018)"},{"key":"17_CR66","doi-asserted-by":"crossref","unstructured":"Arshad, S., et al.: Wi-chase: a WIFI based human activity recognition system for sensorless environments. In: IEEE International Symposium on a World of Wireless (2017)","DOI":"10.1109\/WoWMoM.2017.7974315"},{"key":"17_CR67","doi-asserted-by":"crossref","unstructured":"Chang, J.Y., Lee, K.Y., Lin, C.J., Hsu, W.: WIFI action recognition via vision-based methods. In: IEEE International Conference on Acoustics (2016)","DOI":"10.1109\/ICASSP.2016.7472184"},{"issue":"5","key":"17_CR68","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1109\/JSAC.2017.2679658","volume":"35","author":"W Wang","year":"2017","unstructured":"Wang, W., Liu, A.X., Shahzad, M., Ling, K., Lu, S.: Device-free human activity recognition using commercial WIFI devices. IEEE J. Sel. Areas Commun. 35(5), 1118\u20131131 (2017)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"17_CR69","doi-asserted-by":"crossref","unstructured":"Zou, Y., Wang, Y., Ye, S., Wu, K., Ni, L.M.: TagFree: passive object differentiation via physical layer radiometric signatures. In: IEEE International Conference on Pervasive Computing & Communications (2017)","DOI":"10.1109\/PERCOM.2017.7917870"},{"issue":"99","key":"17_CR70","doi-asserted-by":"publisher","first-page":"16911","DOI":"10.1109\/ACCESS.2018.2814575","volume":"6","author":"Z Tian","year":"2018","unstructured":"Tian, Z., Wang, J., Yang, X., Mu, Z.: WiCatch: a Wi-Fi based hand gesture recognition system. IEEE Access 6(99), 16911\u201316923 (2018)","journal-title":"IEEE Access"},{"key":"17_CR71","doi-asserted-by":"crossref","unstructured":"Qian, K., Wu, C., Zhang, Y., Zhang, G., Yang, Z., Liu, Y.: Widar2.0: passive human tracking with a single Wi-Fi link. In: Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, pp. 350\u2013361 (2018)","DOI":"10.1145\/3210240.3210314"},{"issue":"3","key":"17_CR72","first-page":"1","volume":"25","author":"S Duan","year":"2018","unstructured":"Duan, S., Yu, T., Jie, H.: WiDriver: driver activity recognition system based on WIFI CSI. Int. J. Wirel. Inf. Netw. 25(3), 1\u201311 (2018)","journal-title":"Int. J. Wirel. Inf. Netw."},{"key":"17_CR73","doi-asserted-by":"crossref","unstructured":"Guo, X., Liu, B., Shi, C., Liu, H., Chen, Y., Chuah, M.C.: WIFI-enabled smart human dynamics monitoring. In: Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, pp. 1\u201313 (2017)","DOI":"10.1145\/3131672.3131692"},{"key":"17_CR74","doi-asserted-by":"crossref","unstructured":"Peng, H., Jia, W.: WiFind: driver fatigue detection with fine-grained Wi-Fi signal features. In: Globecom IEEE Global Communications Conference (2018)","DOI":"10.1109\/GLOCOM.2017.8253925"},{"key":"17_CR75","doi-asserted-by":"crossref","unstructured":"Zhang, L., Liu, M., Lu, L., Gong, L.: Wi-run: multi-runner step estimation using commodity Wi-Fi. In: Annual IEEE International Conference on Sensing, Communication, and Networking, SECON (2018)","DOI":"10.1109\/SAHCN.2018.8397122"},{"key":"17_CR76","doi-asserted-by":"crossref","unstructured":"Qian, K., Wu, C., Zheng, Y., Yang, C., Liu, Y.: Decimeter level passive tracking with WIFI. In: Workshop on Hot Topics in Wireless (2016)","DOI":"10.1145\/2980115.2980131"},{"issue":"2","key":"17_CR77","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1109\/TMC.2016.2557792","volume":"16","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Wu, K., Ni, L.M.: WiFall: device-free fall detection by wireless networks. IEEE Trans. Mob. Comput. 16(2), 581\u2013594 (2016)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"17_CR78","doi-asserted-by":"crossref","unstructured":"Qian, K., Wu, C., Zhou, Z., Yue, Z., Liu, Y.: Inferring motion direction using commodity Wi-Fi for interactive exergames (2017)","DOI":"10.1145\/3025453.3025678"},{"key":"17_CR79","doi-asserted-by":"crossref","unstructured":"Zhao, M., et al.: Through-wall human pose estimation using radio signals. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 7356\u20137365 (2018)","DOI":"10.1109\/CVPR.2018.00768"},{"issue":"1","key":"17_CR80","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3078855","volume":"9","author":"X Wang","year":"2017","unstructured":"Wang, X., Chao, Y., Mao, S.: TensorBeat: tensor decomposition for monitoring multi-person breathing beats with commodity WIFI. ACM Trans. Intell. Syst. Technol. 9(1), 1\u201327 (2017)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"issue":"11","key":"17_CR81","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1109\/TCSVT.2008.2005594","volume":"18","author":"P Turaga","year":"2008","unstructured":"Turaga, P., Chellappa, R., Subrahmanian, V.S., Udrea, O.: Machine recognition of human activities: a survey. IEEE Trans. Circuits Syst. Video Technol. 18(11), 1473\u20131488 (2008)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."}],"container-title":["Communications in Computer and Information Science","Wireless Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-4214-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,17]],"date-time":"2024-08-17T22:52:51Z","timestamp":1723935171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-33-4214-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789813342132","9789813342149"],"references-count":81,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-4214-9_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"20 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CWSN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Conference on Wireless Sensor Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dunhuang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cwsn2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cwsn2020.aconf.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"85","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3\/5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}