{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,6]],"date-time":"2023-08-06T17:05:49Z","timestamp":1691341549679},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T00:00:00Z","timestamp":1565827200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T00:00:00Z","timestamp":1565827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11036-019-01329-0","type":"journal-article","created":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T08:03:12Z","timestamp":1565856192000},"page":"851-869","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Indoor Geofencing Based on Sensorless Motion Sensing and Fingerprint Self-Updating"],"prefix":"10.1007","volume":"26","author":[{"given":"Kun","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Wei","family":"Xi","sequence":"additional","affiliation":[]},{"given":"Zhiping","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"He","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaobin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jizhong","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,15]]},"reference":[{"key":"1329_CR1","unstructured":"Using iw to Manage Wireless LAN in Linux. http:\/\/ict.siit.tu.ac.th\/help\/iw\/. Accessed Sep. 4, 2018"},{"key":"1329_CR2","unstructured":"Abhand AL, Desai VR, Mahale CL, More SV (2017) Geofencing for bag tracking system. Int J, 2(10)"},{"key":"1329_CR3","unstructured":"Adib F, Kabelac Z, Katabi D, Miller RC (2013) 3D tracking via body radio reflections. In: Proceedings of the 10th symposium on networked systems design and implementation, vol 14. USENIX"},{"key":"1329_CR4","doi-asserted-by":"crossref","unstructured":"Adib F, Katabi D (2013) See through walls with Wi-Fi!. In: Proceedings of the annual conference of the ACM special interest group on data communication. ACM, USA, pp 75\u201386","DOI":"10.1145\/2534169.2486039"},{"issue":"4","key":"1329_CR5","first-page":"317","volume":"2","author":"JC Alves","year":"2008","unstructured":"Alves JC, Ramos TM, Cruz NA (2008) A reconfigurable computing system for an autonomous sailboat. Comput Mater Continua 2(4):317\u2013336","journal-title":"Comput Mater Continua"},{"key":"1329_CR6","doi-asserted-by":"crossref","unstructured":"Azizyan M, Constandache I, Roy Choudhury R (2009) Surroundsense: mobile phone localization via ambience fingerprinting. In: Proceedings of the 15th annual international conference on mobile computing and networking. ACM, USA, pp 261\u2013272","DOI":"10.1145\/1614320.1614350"},{"key":"1329_CR7","doi-asserted-by":"crossref","unstructured":"Bahl P, Padmanabhan VN (2000) RADAR: an in-building RF-based user location and tracking system. In: Proceedings of the 19th conference on computer communications, vol 2. IEEE Computer Society, USA, pp 775\u2013784","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"1329_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3023-4_1","volume-title":"The maximum clique problem","author":"IM Bomze","year":"1999","unstructured":"Bomze IM, Budinich M, Pardalos PM, Pelillo M (1999) The maximum clique problem. Springer, US"},{"key":"1329_CR9","volume-title":"Statistics for experimenters","author":"GE Box","year":"1978","unstructured":"Box GE, Hunter WG, Hunter JS, et al. (1978) Statistics for experimenters. Wiley, New York"},{"key":"1329_CR10","doi-asserted-by":"crossref","unstructured":"Chen G, Wu S (2017) Design of a regional perimeter optical fiber security and protection system. In: MATEC Web of conferences, vol 100. EDP Sciences, p 04004","DOI":"10.1051\/matecconf\/201710004004"},{"key":"1329_CR11","doi-asserted-by":"crossref","unstructured":"Chintalapudi K, Padmanabha Iyer A, Padmanabhan VN (2010) Indoor localization without the pain. In: Proceedings of the 16th annual international conference on mobile computing and networking. ACM, USA, pp 173\u2013184","DOI":"10.1145\/1859995.1860016"},{"key":"1329_CR12","unstructured":"Cover TM, Thomas JA (2012) Elements of information theory. Wiley"},{"key":"1329_CR13","unstructured":"Franceschetti G, Stornelli S (2006) Wireless networks: from the physical layer to communication, computing, sensing and control. Academic Press Inc"},{"issue":"5","key":"1329_CR14","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/JRPROC.1946.234568","volume":"34","author":"HT Friis","year":"1946","unstructured":"Friis HT (1946) A note on a simple transmission formula. Proc IRE 34(5):254\u2013256","journal-title":"Proc IRE"},{"key":"1329_CR15","doi-asserted-by":"crossref","unstructured":"Garg A, Choudhary S, Bajaj P, Agrawal S, Kedia A, Agrawal S (2017) Smart geo-fencing with location sensitive product affinity. In: Proceedings of the 25th ACM SIGSPATIAL international conference on advances in geographic information systems. ACM, p 39","DOI":"10.1145\/3139958.3140059"},{"issue":"5","key":"1329_CR16","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1119\/1.4976698","volume":"85","author":"J G\u00f3mez-Correa","year":"2017","unstructured":"G\u00f3mez-Correa J, Balderas-Mata S, Coello V, Puente N, Rogel-Salazar J, Ch\u00e1vez-Cerda S (2017) On the physics of propagating bessel modes in cylindrical waveguides. Am J Phys 85(5):341\u2013345","journal-title":"Am J Phys"},{"key":"1329_CR17","unstructured":"Group IW et al (1997) Wireless LAN medium access control (MAC) and physical layer (PHY) specifications"},{"issue":"4","key":"1329_CR18","first-page":"31","volume":"8","author":"S Guha","year":"2012","unstructured":"Guha S, Plarre K, Lissner D, Mitra S, Krishna B, Dutta P, Kumar S (2012) Autowitness: locating and tracking stolen property while tolerating gps and radio outages. ACM Trans Sensor Netw (TOSN) 8 (4):31","journal-title":"ACM Trans Sensor Netw (TOSN)"},{"issue":"1","key":"1329_CR19","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1925861.1925870","volume":"41","author":"D Halperin","year":"2011","unstructured":"Halperin D, Hu W, Sheth A, Wetherall D (2011) Tool release: gathering 802.11n traces with channel state information. ACM SIGCOMM Comput Commun Rev 41(1):53\u201353","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"1329_CR20","doi-asserted-by":"crossref","unstructured":"Hamilton JD (1994) Time series analysis","DOI":"10.1515\/9780691218632"},{"key":"1329_CR21","doi-asserted-by":"crossref","unstructured":"Han J, Qian C, Ma D, Wang X, Zhao J, Zhang P, Xi W, Jiang Z (2014) Twins: device-free object tracking using passive tags. In: Proceedings of the 33th conference on computer communications. IEEE Computer Society, USA","DOI":"10.1109\/INFOCOM.2014.6847970"},{"issue":"2","key":"1329_CR22","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1109\/TNET.2015.2391300","volume":"24","author":"J Han","year":"2016","unstructured":"Han J, Qian C, Yang P, Ma D, Jiang Z, Xi W, Zhao J (2016) Geneprint: generic and accurate physical-layer identification for uhf rfid tags. IEEE\/ACM Trans Network (TON) 24(2):846\u2013858","journal-title":"IEEE\/ACM Trans Network (TON)"},{"key":"1329_CR23","doi-asserted-by":"crossref","unstructured":"Jiang Z, Zhao J, Han J, Tang S, Zhao J, Xi W (2013) Wi-fi fingerprint based indoor localization without indoor space measurement. In: Proceedings of the 10th international conference on mobile ad-hoc and sensor systems. IEEE Computer Society, USA, pp 384\u2013392","DOI":"10.1109\/MASS.2013.84"},{"key":"1329_CR24","doi-asserted-by":"crossref","unstructured":"Jiang Z, Zhao J, Li X, Han J, Xi W (2013) Rejecting the attack: source authentication for Wi-Fi management frames using csi information. In: Proceedings of the 32th conference on computer communications. IEEE Computer society, USA, pp 2544\u20132552","DOI":"10.1109\/INFCOM.2013.6567061"},{"key":"1329_CR25","doi-asserted-by":"crossref","unstructured":"Jun J, Gu Y, Cheng L, Lu B, Sun J, Zhu T, Niu J (2013) Social-loc: improving indoor localization with social sensing","DOI":"10.1145\/2517351.2517352"},{"issue":"1","key":"1329_CR26","first-page":"24","volume":"53","author":"J Kaur","year":"2015","unstructured":"Kaur J, Kaur K (2015) A fuzzy approach for an iot-based automated employee performance appraisal. Comput Mater Continua 53(1):24\u201338","journal-title":"Comput Mater Continua"},{"key":"1329_CR27","doi-asserted-by":"crossref","unstructured":"Kung H, Lin CK, Lin TH, Vlah D (2009) Localization with snap-inducing shaped residuals (SISR): coping with errors in measurement. In: Proceedings of the 15th annual international conference on mobile computing and networking. ACM, pp 333\u2013344","DOI":"10.1145\/1614320.1614357"},{"issue":"1","key":"1329_CR28","first-page":"1","volume":"3","author":"A LaMarca","year":"2008","unstructured":"LaMarca A, De Lara E (2008) Location systems: an introduction to the technology behind location awareness. Synth Lect Mob Pervas Comput 3(1):1\u2013122","journal-title":"Synth Lect Mob Pervas Comput"},{"key":"1329_CR29","doi-asserted-by":"crossref","unstructured":"Liu H, Gan Y, Yang J, Sidhom S, Wang Y, Chen Y, Ye F (2012) Push the limit of WiFi based localization for smartphones. In: Proceedings of the 18th annual international conference on mobile computing and networking. ACM, USA, pp 305\u2013316","DOI":"10.1145\/2348543.2348581"},{"key":"1329_CR30","doi-asserted-by":"crossref","unstructured":"Nandakumar R, Chintalapudi KK, Padmanabhan VN (2012) Centaur: locating devices in an office environment. In: Proceedings of the 18th annual international conference on mobile computing and networking. ACM, USA, pp 281\u2013292","DOI":"10.1145\/2348543.2348579"},{"issue":"1","key":"1329_CR31","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N Otsu","year":"1979","unstructured":"Otsu N (1979) A threshold selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9 (1):62\u201366","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"1329_CR32","doi-asserted-by":"crossref","unstructured":"Pu Q, Gupta S, Gollakota S, Patel S (2013) Whole-home gesture recognition using wireless signals. In: Proceedings of the 19th annual international conference on mobile computing & networking. ACM, pp 27\u201338","DOI":"10.1145\/2500423.2500436"},{"key":"1329_CR33","doi-asserted-by":"crossref","unstructured":"Rai A, Chintalapudi KK, Padmanabhan VN, Sen R (2012) Zee: zero-effort crowdsourcing for indoor localization. In: Proceedings of the 18th annual international conference on mobile computing and networking. ACM, USA, pp 293\u2013304","DOI":"10.1145\/2348543.2348580"},{"key":"1329_CR34","volume-title":"Wireless communications: principles and practice, vol 2","author":"TS Rappaport","year":"1996","unstructured":"Rappaport TS (1996) Wireless communications: principles and practice, vol 2. Prentice Hall PTR, New Jersey"},{"key":"1329_CR35","doi-asserted-by":"crossref","unstructured":"Sen S, Choudhury RR, Nelakuditi S (2012) Spinloc: spin once to know your location. In: Proceedings of the twelfth workshop on mobile computing systems & applications. ACM, USA, p 12","DOI":"10.1145\/2162081.2162099"},{"key":"1329_CR36","doi-asserted-by":"crossref","unstructured":"Sen S, Radunovic B, Choudhury RR, Minka T (2012) You are facing the Mona Lisa: spot localization using phy layer information. In: Proceedings of the 10th international conference on mobile systems, applications, and services. ACM, USA, pp 183\u2013196","DOI":"10.1145\/2307636.2307654"},{"issue":"1","key":"1329_CR37","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/TNET.2016.2590996","volume":"25","author":"L Shangguan","year":"2017","unstructured":"Shangguan L, Yang Z, Liu AX, Zhou Z, Liu Y (2017) STPP: spatial-temporal phase profiling-based method for relative RFID tag localization. IEEE\/ACM Trans Network 25(1):596\u2013609","journal-title":"IEEE\/ACM Trans Network"},{"issue":"2","key":"1329_CR38","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1080\/17489725.2012.694723","volume":"6","author":"H Steck","year":"2012","unstructured":"Steck H (2012) Probability kernel regression for WiFi localisation. J Loc Based Serv 6(2):81\u2013100","journal-title":"J Loc Based Serv"},{"key":"1329_CR39","doi-asserted-by":"crossref","unstructured":"Wang J, Katabi D (2013) Dude, where\u2019s my card?: RFID positioning that works with multipath and non-line of sight. In: Proceedings of the annual conference of the ACM special interest group on data communication. ACM, USA, pp 51\u201362","DOI":"10.1145\/2534169.2486029"},{"issue":"5","key":"1329_CR40","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/JSEN.2016.2642221","volume":"17","author":"Y Wang","year":"2017","unstructured":"Wang Y, Jin B, Wang Y, Wang D, Liu X, Bai Q (2017) Real-time distributed vibration monitoring system using phi-otdr. IEEE Sensors J 17(5):1333\u20131341","journal-title":"IEEE Sensors J"},{"issue":"3","key":"1329_CR41","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1109\/TMC.2017.2737004","volume":"17","author":"C Wu","year":"2018","unstructured":"Wu C, Yang Z, Xiao C (2018) Automatic radio map adaptation for indoor localization using smartphones. IEEE Trans Mob Comput 17(3):517\u2013528","journal-title":"IEEE Trans Mob Comput"},{"key":"1329_CR42","doi-asserted-by":"crossref","unstructured":"Xi W, Zhao J, Li X, Zhao K, Tang S, Liu X, Jiang Z (2014) Electronic frog eye: counting crowd using wi-fi. In: Proceedings of the 33th conference on computer communications. IEEE Computer Society, USA","DOI":"10.1109\/INFOCOM.2014.6847958"},{"key":"1329_CR43","doi-asserted-by":"crossref","unstructured":"Xiao Z, Wen H, Markham A, Trigoni N (2014) Lightweight map matching for indoor localisation using conditional random fields. In: International symposium on information processing in sensor networks, pp 131\u2013142","DOI":"10.1109\/IPSN.2014.6846747"},{"key":"1329_CR44","unstructured":"Xiong J, Jamieson K (2013) Arraytrack: a fine-grained indoor location system. In: Proceedings of the 10th symposium on networked systems design and implementation. USENIX , pp 71\u201384"},{"key":"1329_CR45","doi-asserted-by":"crossref","unstructured":"Yang Z, Wu C, Liu Y (2012) Locating in fingerprint space: wireless indoor localization with little human intervention. In: Proceedings of the 18th annual international conference on Mobile computing and networking. ACM, USA, pp 269\u2013280","DOI":"10.1145\/2348543.2348578"},{"issue":"2","key":"1329_CR46","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/2543581.2543592","volume":"46","author":"Z Yang","year":"2013","unstructured":"Yang Z, Zhou Z, Liu Y (2013) From RSSI to CSI: indoor localization via channel response. ACM Comput Surv (CSUR) 46(2):25","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"3","key":"1329_CR47","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s11276-006-0725-7","volume":"14","author":"M Youssef","year":"2008","unstructured":"Youssef M, Agrawala A (2008) The Horus location determination system. Wirel Netw 14(3):357\u2013374","journal-title":"Wirel Netw"},{"issue":"4","key":"1329_CR48","first-page":"357","volume":"53","author":"C Yuan","year":"2015","unstructured":"Yuan C, Li X, Wu QMJ, Li J, Sun X (2015) Fingerprint liveness detection from different fingerprint materials using convolutional neural network and principal component analysis. Comput Mater Continua 53(4):357\u2013371","journal-title":"Comput Mater Continua"},{"key":"1329_CR49","unstructured":"Zhou D, Lai TH (2005) A compatible and scalable clock synchronization protocol in IEEE 802.11 ad hoc networks. In: null. IEEE, pp 295\u2013302"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01329-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-019-01329-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01329-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T17:20:58Z","timestamp":1620494458000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-019-01329-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,15]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["1329"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01329-0","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,15]]},"assertion":[{"value":"15 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}