{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:31:25Z","timestamp":1767339085147,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T00:00:00Z","timestamp":1615852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T00:00:00Z","timestamp":1615852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402008","61702006","61672038"],"award-info":[{"award-number":["61402008","61702006","61672038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Provincial Key Research and Development Program of Anhui Province","award":["202004a05020009","201904a05020071"],"award-info":[{"award-number":["202004a05020009","201904a05020071"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11036-021-01738-0","type":"journal-article","created":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T12:33:50Z","timestamp":1617971630000},"page":"1974-1985","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Protocol for the Tag-information Sampling Problem in RFID Systems"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8758-5763","authenticated-orcid":false,"given":"Xiujun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yan","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yangzhao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Xuangou","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,16]]},"reference":[{"issue":"6","key":"1738_CR1","doi-asserted-by":"publisher","first-page":"4632","DOI":"10.1109\/JIOT.2018.2795893","volume":"5","author":"J Li","year":"2018","unstructured":"Li J, Feng G, Wei W, Luo C, Cheng L, Wang H, Song H, Ming Z (2018) Psotrack: A rfid-based system for random moving objects tracking in unconstrained indoor environment. IEEE Internet of Things Journal 5(6):4632\u20134641","journal-title":"IEEE Internet of Things Journal"},{"key":"1738_CR2","doi-asserted-by":"crossref","unstructured":"Shangguan L, Jamieson K (2016) The design and implementation of a mobile rfid tag sorting robot. In: Proceedings of the 14th annual international conference on mobile systems, applications, and services, pp 31\u201342","DOI":"10.1145\/2906388.2906417"},{"key":"1738_CR3","doi-asserted-by":"crossref","unstructured":"Xie L, Sun J, Cai Q, Wang C, Jie W u, see Sanglu Lu. (2016) Tell me what i: Recognize rfid tagged objects in augmented reality systems. In: Proceedings of the 2016 ACM International joint conference on pervasive and ubiquitous computing, pp 916\u2013927","DOI":"10.1145\/2971648.2971661"},{"issue":"12","key":"1738_CR4","doi-asserted-by":"publisher","first-page":"3145","DOI":"10.1109\/TPDS.2013.2297103","volume":"25","author":"X Liu","year":"2014","unstructured":"Liu X, Li K, Min G, Lin K, Xiao B, Shen Y, Qu W (2014) Efficient unknown tag identification protocols in large-scale rfid systems. IEEE Trans Parallel Distrib Syst 25(12):3145\u20133155","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1738_CR5","doi-asserted-by":"crossref","unstructured":"Reyes PM, Worthington WJ, Collins JD (2015) Knowledge management enterprise and rfid systems. Management Research Review","DOI":"10.1108\/MRR-01-2013-0011"},{"key":"1738_CR6","unstructured":"Wang X, Liu Z, Gao Y, Zheng X, Dang Z, Shen X (2019) A near-optimal protocol for the grouping problem in rfid systems. IEEE Trans. Mob. Comput: 1\u20131"},{"issue":"6","key":"1738_CR7","doi-asserted-by":"publisher","first-page":"1255","DOI":"10.1109\/TII.2015.2482921","volume":"11","author":"K Bu","year":"2015","unstructured":"Bu K, Xu M, Liu X, Luo J, Zhang S, Weng M (2015) Deterministic detection of cloning attacks for anonymous rfid systems. IEEE Trans Industr Inform 11(6):1255\u20131266","journal-title":"IEEE Trans Industr Inform"},{"key":"1738_CR8","doi-asserted-by":"crossref","unstructured":"Liu X, Li K, Jie W u, Liu AX, Xie X, Zhu C, Xue W (2016) Top-k queries for multi-category rfid systems. In: IEEE INFOCOM 2016-The 35th Annual IEEE international conference on computer communications. IEEE, pp 1\u20139","DOI":"10.1109\/INFOCOM.2016.7524576"},{"key":"1738_CR9","doi-asserted-by":"publisher","first-page":"21857","DOI":"10.1109\/ACCESS.2019.2897154","volume":"7","author":"X Wang","year":"2019","unstructured":"Wang X, Liu Z, Gao Y, Zheng X, Chen X, Wu C (2019) Near-optimal data structure for approximate range emptiness problem in information-centric internet of things. IEEE Access 7:21857\u201321869","journal-title":"IEEE Access"},{"key":"1738_CR10","doi-asserted-by":"crossref","unstructured":"Xie L, Han H, Li Q, Wu J, Lu S (2014) Efficiently collecting histograms over rfid tags. In: IEEE INFOCOM 2014-IEEE Conference on computer communications. IEEE, pp 145\u2013153","DOI":"10.1109\/INFOCOM.2014.6847934"},{"key":"1738_CR11","unstructured":"Li Q, Qu H, Liu Z, Zhou N, Sun W, Sigg S, Li J (2019) Af-dcgan: Amplitude feature deep convolutional gan for fingerprint construction in indoor localization systems. IEEE Transactions on Emerging Topics in Computational Intelligence"},{"key":"1738_CR12","doi-asserted-by":"crossref","unstructured":"Chen S, Zhang M, Xiao B (2011) Efficient information collection protocols for sensor-augmented rfid networks. In: 2011 Proceedings IEEE INFOCOM. IEEE, pp 3101\u20133109","DOI":"10.1109\/INFCOM.2011.5935155"},{"issue":"3","key":"1738_CR13","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1109\/TNET.2019.2914412","volume":"27","author":"X Liu","year":"2019","unstructured":"Liu X, Cao J, Yang Y, Qu W, Zhao X, Li K, Yao D (2019) Fast rfid sensory data collection: Trade-off between computation and communication costs. IEEE\/ACM Trans Networking 27 (3):1179\u20131191","journal-title":"IEEE\/ACM Trans Networking"},{"issue":"5","key":"1738_CR14","doi-asserted-by":"publisher","first-page":"1873","DOI":"10.1109\/TNET.2019.2936977","volume":"27","author":"X Liu","year":"2019","unstructured":"Liu X, Xie X, Wang S, Liu J, Yao D, Cao J, Li K (2019) Efficient range queries for large-scale sensor-augmented rfid systems. IEEE\/ACM Trans Networking 27(5):1873\u20131886","journal-title":"IEEE\/ACM Trans Networking"},{"key":"1738_CR15","unstructured":"WISP: Wireless Identification and Sensing Platform, 2011"},{"key":"1738_CR16","doi-asserted-by":"crossref","unstructured":"Gu Y, Wang Y, Liu Z, Liu J, Li J (2020) Sleepguardian: An rf-based healthcare system guarding your sleep from afar. IEEE Network","DOI":"10.1109\/MNET.001.1900235"},{"issue":"1","key":"1738_CR17","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCI.2019.2954641","volume":"15","author":"Hu Han","year":"2020","unstructured":"Han H u, Liu Z, An J (2020) Mining mobile intelligence for wireless systems: A deep neural network approach. IEEE Comput Intell Mag 15(1):24\u201331","journal-title":"IEEE Comput Intell Mag"},{"issue":"3","key":"1738_CR18","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1007\/s11036-018-1031-1","volume":"24","author":"Z Liu","year":"2019","unstructured":"Liu Z, Tsuda T, Watanabe H, Ryuo S, Iwasawa N (2019) Data driven cyber-physical system for landslide detection. Mob Netw Appl 24(3):991\u20131002","journal-title":"Mob Netw Appl"},{"issue":"10","key":"1738_CR19","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCOM.2018.1800089","volume":"56","author":"Wu Celimuge","year":"2018","unstructured":"Celimuge W u, Liu Z, Di Z, Yoshinaga T, Ji Y (2018) Spatial intelligence toward trustworthy vehicular IoT. IEEE Commun Mag 56(10):22\u201327","journal-title":"IEEE Commun Mag"},{"key":"1738_CR20","doi-asserted-by":"crossref","unstructured":"Liu J, Chen S, Xiao B, Wang Y, Chen L (2017) Category information collection in rfid systems. In: 2017 IEEE 37th International conference on distributed computing systems (ICDCS). IEEE, pp 2220\u20132225","DOI":"10.1109\/ICDCS.2017.320"},{"issue":"3","key":"1738_CR21","doi-asserted-by":"publisher","first-page":"3994","DOI":"10.1109\/JIOT.2018.2881295","volume":"6","author":"X Liu","year":"2018","unstructured":"Liu X, Yang Q, Luo J, Bo D, Zhang S (2018) An energy-aware offloading framework for edge-augmented mobile rfid systems. IEEE Internet of Things Journal 6(3):3994\u20134004","journal-title":"IEEE Internet of Things Journal"},{"issue":"10","key":"1738_CR22","doi-asserted-by":"publisher","first-page":"2792","DOI":"10.1109\/TMC.2017.2677912","volume":"16","author":"X Xie","year":"2017","unstructured":"Xie X, Liu X, Li K, Xiao B, Qi H (2017) Minimal perfect hashing-based information collection protocol for rfid systems. IEEE Trans Mob Comput 16(10):2792\u20132805","journal-title":"IEEE Trans Mob Comput"},{"issue":"3","key":"1738_CR23","doi-asserted-by":"publisher","first-page":"1548","DOI":"10.1109\/TNET.2015.2423311","volume":"24","author":"Y Qiao","year":"2015","unstructured":"Qiao Y, Chen S, Li T, Chen S (2015) Tag-ordering polling protocols in rfid systems. IEEE\/ACM Trans Networking 24(3):1548\u20131561","journal-title":"IEEE\/ACM Trans Networking"},{"key":"1738_CR24","doi-asserted-by":"crossref","unstructured":"Wang X, Ji Y, Dang Z, Zheng X, Zhao B (2015) Improved weighted bloom filter and space lower bound analysis of algorithms for approximated membership querying. In: International conference on database systems for advanced applications. Springer, pp 346\u2013362","DOI":"10.1007\/978-3-319-18123-3_21"},{"issue":"7","key":"1738_CR25","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom BH (1970) Space\/time trade-offs in hash coding with allowable errors. Commun ACM 13 (7):422\u2013426","journal-title":"Commun ACM"},{"issue":"1","key":"1738_CR26","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/358808.358813","volume":"23","author":"RJ Cichelli","year":"1980","unstructured":"Cichelli RJ (1980) Minimal perfect hash functions made simple. Commun ACM 23(1):17\u201319","journal-title":"Commun ACM"},{"issue":"4","key":"1738_CR27","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/TCOMM.2015.2402660","volume":"63","author":"X Liu","year":"2015","unstructured":"Liu X, Qi H, Li K, Stojmenovic I, Liu AX, Shen Y, Qu W, Xue W (2015) Sampling bloom filter-based detection of unknown rfid tags. IEEE Trans Commun 63(4):1432\u20131442","journal-title":"IEEE Trans Commun"},{"issue":"1","key":"1738_CR28","first-page":"283","volume":"65","author":"F Zhu","year":"2016","unstructured":"Zhu F, Xiao B, Liu J, Chen L (2016) Efficient physical-layer unknown tag identification in large-scale rfid systems. IEEE Trans Commun 65(1):283\u2013295","journal-title":"IEEE Trans Commun"},{"key":"1738_CR29","unstructured":"EPCGlobal (2018) EPC Radio-frequency identity protocols generation-2 UHF RFID standard, Specification for RFID Air Interface Protocol for Communications at 860 MHz - 960 MHz. Tech. Rep."},{"key":"1738_CR30","volume-title":"Probability and computing: Randomization and probabilistic techniques in algorithms and data analysis","author":"M Mitzenmacher","year":"2017","unstructured":"Mitzenmacher M, Upfal E (2017) Probability and computing: Randomization and probabilistic techniques in algorithms and data analysis. Cambridge University Press, Cambridge"},{"issue":"1","key":"1738_CR31","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1109\/TNET.2014.2361149","volume":"24","author":"Z Zhou","year":"2014","unstructured":"Zhou Z, Chen B, Yu H (2014) Understanding rfid counting protocols. IEEE\/ACM Trans Netw 24(1):312\u2013327","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"1","key":"1738_CR32","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1109\/TNET.2018.2884961","volume":"27","author":"Q Xiao","year":"2019","unstructured":"Xiao Q, Chen S, Liu J, Cheng G, Luo J (2019) A protocol for simultaneously estimating moments and popular groups in a multigroup rfid system. IEEE\/ACM Trans Netw 27(1):143\u2013158","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"1","key":"1738_CR33","doi-asserted-by":"publisher","first-page":"897","DOI":"10.4086\/toc.2013.v009a030","volume":"9","author":"K-M Chung","year":"2013","unstructured":"Chung K-M, Mitzenmacher M, Vadhan S (2013) Why simple hash functions work: Exploiting the entropy in a data stream. Theory of Computing 9(1):897\u2013945","journal-title":"Theory of Computing"},{"key":"1738_CR34","doi-asserted-by":"crossref","unstructured":"Zhu L, Wang X, Yang Y, Xu S, Wu X, Zhao W, Feng H (2020) Epc-based efficient tag selection in rfid systems. IEEE Access","DOI":"10.1109\/ACCESS.2020.2969188"},{"key":"1738_CR35","doi-asserted-by":"crossref","unstructured":"Waldrop J, Engels DW, Sarma SE (2003) Colorwave: an anticollision algorithm for the reader collision problem. In: IEEE International Conference on Communications, 2003. ICC\u201903, vol 2. IEEE, pp 1206\u20131210","DOI":"10.1109\/ICC.2003.1204562"},{"key":"1738_CR36","doi-asserted-by":"crossref","unstructured":"Tang S, Yuan J, Li X-Y, Chen G, Liu Y, Zhao J (2009) Raspberry: A stable reader activation scheduling protocol in multi-reader rfid systems. In: 2009 17th IEEE International conference on network protocols. IEEE, pp 304\u2013313","DOI":"10.1109\/ICNP.2009.5339672"},{"key":"1738_CR37","doi-asserted-by":"crossref","unstructured":"Tang S, Wang C, Li X-Y, Jiang C (2011) Reader activation scheduling in multi-reader rfid systems: A study of general case. In: 2011 IEEE International Parallel & Distributed Processing Symposium. IEEE, pp 1147\u20131155","DOI":"10.1109\/IPDPS.2011.109"},{"issue":"1","key":"1738_CR38","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/TNET.2018.2883508","volume":"27","author":"J Liu","year":"2018","unstructured":"Liu J, Chen S, Xiao Q, Chen M, Xiao B, Chen L (2018) Efficient information sampling in multi-category rfid systems. IEEE\/ACM Trans Netw 27(1):159\u2013172","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"5","key":"1738_CR39","doi-asserted-by":"publisher","first-page":"2036","DOI":"10.1109\/TCOMM.2017.2666790","volume":"65","author":"J Yu","year":"2017","unstructured":"Yu J, Chen L, Zhang R, Wang K (2017) Finding needles in a haystack Missing tag detection in large rfid systems. IEEE Trans Commun 65(5):2036\u20132047","journal-title":"IEEE Trans Commun"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-021-01738-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-021-01738-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-021-01738-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T04:36:16Z","timestamp":1639197376000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-021-01738-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,16]]},"references-count":39,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["1738"],"URL":"https:\/\/doi.org\/10.1007\/s11036-021-01738-0","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2021,3,16]]},"assertion":[{"value":"17 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}