{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:31:02Z","timestamp":1769283062168,"version":"3.49.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T00:00:00Z","timestamp":1614902400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T00:00:00Z","timestamp":1614902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100013285","name":"Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning","doi-asserted-by":"crossref","award":["A10GY20H002-G14"],"award-info":[{"award-number":["A10GY20H002-G14"]}],"id":[{"id":"10.13039\/501100013285","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11277-021-08288-4","type":"journal-article","created":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T16:02:39Z","timestamp":1614960159000},"page":"1425-1436","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["An Environmental Intrusion Detection Technology Based on WiFi"],"prefix":"10.1007","volume":"119","author":[{"given":"Xianxun","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Hongxuan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zhiyang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7975-8559","authenticated-orcid":false,"given":"Jiancun","family":"Zuo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,5]]},"reference":[{"issue":"12","key":"8288_CR1","doi-asserted-by":"publisher","first-page":"3941","DOI":"10.1007\/s00521-016-2294-8","volume":"28","author":"OK Oyedotun","year":"2017","unstructured":"Oyedotun, O. K., & Khashman, A. (2017). Deep learning in vision-based static hand gesture recognition. Neural Computing and Applications, 28(12), 3941\u20133951.","journal-title":"Neural Computing and Applications"},{"key":"8288_CR2","doi-asserted-by":"crossref","unstructured":"Voulodimos, A., Doulamis, N., Doulamis, A., & Protopapadakis, E. (2018). Deep learning for computer vision: A brief review.\u00a0Computational intelligence and neuroscience.","DOI":"10.1155\/2018\/7068349"},{"issue":"2","key":"8288_CR3","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/LNET.2019.2901792","volume":"1","author":"S Otoum","year":"2019","unstructured":"Otoum, S., Kantarci, B., & Mouftah, H. T. (2019). On the feasibility of deep learning in sensor network intrusion detection. IEEE Networking Letters, 1(2), 68\u201371.","journal-title":"IEEE Networking Letters"},{"issue":"10","key":"8288_CR4","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.3390\/s16101701","volume":"16","author":"T Ma","year":"2016","unstructured":"Ma, T., Wang, F., Cheng, J., Yu, Y., & Chen, X. (2016). A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks. Sensors, 16(10), 1701.","journal-title":"Sensors"},{"key":"8288_CR5","first-page":"30","volume":"12","author":"R Zhang","year":"2019","unstructured":"Zhang, R., Chen, Y. R., Chen, H., Liu, B. T., & Zhou, J. H. (2019). Off line recognition algorithm of user motion state based on breath sound. Sensors and Microsystems, 12, 30.","journal-title":"Sensors and Microsystems"},{"key":"8288_CR6","first-page":"92","volume":"3","author":"Z Zeng","year":"2019","unstructured":"Zeng, Z., Zhang, L., Chen, J. C., Huang, M., & Yang, J. J. (2019). Mechanism and experimental study of Intrusion Detection Based on WiFi signal. Application of Electronic Technology, 3, 92\u201395.","journal-title":"Application of Electronic Technology"},{"key":"8288_CR7","first-page":"103","volume":"1","author":"Q Zhou","year":"2018","unstructured":"Zhou, Q., Xing, J. C., & Yang, Q. (2018). Human intrusion detection method based on phase difference of channel state information. Journal of Sensing Technology, 1, 103\u2013109.","journal-title":"Journal of Sensing Technology"},{"issue":"1","key":"8288_CR8","first-page":"89","volume":"45","author":"JH Chen","year":"2018","unstructured":"Chen, J. H., Liu, K. Z., Chen, M. Z., Ma, J., & Wang, X. Q. (2018). Intrusion detection method for ship sensitive area based on channel state information. Journal of Dalian Maritime University, 45(1), 89\u201395.","journal-title":"Journal of Dalian Maritime University"},{"issue":"4","key":"8288_CR9","doi-asserted-by":"publisher","first-page":"2432","DOI":"10.1109\/TWC.2018.2796086","volume":"17","author":"J Wang","year":"2018","unstructured":"Wang, J., Zhang, L., Gao, Q., Pan, M., & Wang, H. (2018). Device-free wireless sensing in complex scenarios using spatial structural information. IEEE Transactions on Wireless Communications, 17(4), 2432\u20132442.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"10","key":"8288_CR10","first-page":"3218","volume":"12","author":"E Abdullah","year":"2017","unstructured":"Abdullah, E., Idris, A., & Saparon, A. (2017). Papr reduction using scs-slm technique in stfbc mimo-ofdm. ARPN Journal of Engineering and Applied Science, 12(10), 3218\u20133221.","journal-title":"ARPN Journal of Engineering and Applied Science"},{"key":"8288_CR11","doi-asserted-by":"crossref","unstructured":"Albayrak, C., Turk, K., Tugcu, E., & Yazgan, A. (2020). Seamless rate adaptation for indoor visible light communication without CSI at the transmitter. Physical Communication, p 101071.","DOI":"10.1016\/j.phycom.2020.101071"},{"key":"8288_CR12","doi-asserted-by":"publisher","first-page":"164271","DOI":"10.1016\/j.ijleo.2020.164271","volume":"206","author":"J Jiabao","year":"2020","unstructured":"Jiabao, J., Yunfu, S., Shan, O., JunJie, P., & Xianchao, W. (2020). The application of SJ-MSD adder to mean value filtering processing. Optik, 206, 164271.","journal-title":"Optik"},{"key":"8288_CR13","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.neunet.2020.01.018","volume":"124","author":"DX Zhou","year":"2020","unstructured":"Zhou, D. X. (2020). Theory of deep convolutional neural networks: Downsampling. Neural Networks, 124, 319\u2013327.","journal-title":"Neural Networks"},{"key":"8288_CR14","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.neucom.2018.04.015","volume":"307","author":"L Mici","year":"2018","unstructured":"Mici, L., Parisi, G. I., & Wermter, S. (2018). A self-organizing neural network architecture for learning human-object interactions. Neurocomputing, 307, 14\u201324.","journal-title":"Neurocomputing"},{"key":"8288_CR15","doi-asserted-by":"crossref","unstructured":"Boucher, A., & Badri, M. (2017, July). Predicting fault-prone classes in object-oriented software: an adaptation of an unsupervised hybrid SOM algorithm. In 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS) (pp. 306\u2013317). IEEE.","DOI":"10.1109\/QRS.2017.41"},{"key":"8288_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, C., Liu, X., & Bi\u015b, D. (2019, July). An Analysis on the Learning Rules of the Skip-Gram Model. In 2019 International Joint Conference on Neural Networks (IJCNN) (pp. 1\u20138). IEEE.","DOI":"10.1109\/IJCNN.2019.8852182"},{"issue":"7","key":"8288_CR17","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1109\/LSP.2018.2822810","volume":"25","author":"F Wang","year":"2018","unstructured":"Wang, F., Cheng, J., Liu, W., & Liu, H. (2018). Additive margin softmax for face verification. IEEE Signal Processing Letters, 25(7), 926\u2013930.","journal-title":"IEEE Signal Processing Letters"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08288-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08288-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08288-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T12:24:25Z","timestamp":1625487865000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08288-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,5]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["8288"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08288-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,5]]},"assertion":[{"value":"11 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}