{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T22:40:21Z","timestamp":1764715221473,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,10]],"date-time":"2023-09-10T00:00:00Z","timestamp":1694304000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,10]],"date-time":"2023-09-10T00:00:00Z","timestamp":1694304000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,10]]},"DOI":"10.1109\/aciiw59127.2023.10388204","type":"proceedings-article","created":{"date-parts":[[2024,1,16]],"date-time":"2024-01-16T18:17:34Z","timestamp":1705429054000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Leveraging WiFi Sensing toward Automatic Recognition of Pain Behaviors"],"prefix":"10.1109","author":[{"given":"Xijia","family":"Wei","sequence":"first","affiliation":[{"name":"University College London,UCL Interaction Centre,London,UK"}]},{"given":"Temitayo","family":"Olugbade","sequence":"additional","affiliation":[{"name":"University of Sussex,School of Engineering &#x0026; Informatics,Brighton,UK"}]},{"given":"Fangzhan","family":"Shi","sequence":"additional","affiliation":[{"name":"University College London,Dept of Security &#x0026; Crime Science,London,UK"}]},{"given":"Shuang","family":"Wu","sequence":"additional","affiliation":[{"name":"University College London,Dept of CEGE,London,UK"}]},{"given":"Amanda","family":"William","sequence":"additional","affiliation":[{"name":"University College London,Clinical, Edu &#x0026; Hlth Psychology,London,UK"}]},{"given":"Nicolas","family":"Gold","sequence":"additional","affiliation":[{"name":"University College London,Dept of Computer Science,London,UK"}]},{"given":"Youngjun","family":"Cho","sequence":"additional","affiliation":[{"name":"University College London,Dept of Computer Science,London,UK"}]},{"given":"Kevin","family":"Chetty","sequence":"additional","affiliation":[{"name":"University College London,Dept of Security &#x0026; Crime Science,London,UK"}]},{"given":"Nadia","family":"Bianchi-Berthouze","sequence":"additional","affiliation":[{"name":"University College London,UCL Interaction Centre,London,UK"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3959(01)00344-X"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3959(98)00229-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2015.2462830"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2018.2798576"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3299095"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s21227488"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IPIN.2019.8911768"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IPIN51156.2021.9662519"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700082"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2934489"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1097\/01.brs.0000176195.16128.27"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpainsymman.2008.05.009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2009.04.005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.apmr.2010.07.009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACIIW.2019.8925084"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3534970"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACII55700.2022.9953851"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACII55700.2022.9953831"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790093"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2017.7974315"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/T-AFFC.2013.29"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973762"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8121433"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015015"},{"article-title":"Decimeter-level localization with a single WiFi access point","volume-title":"Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016","author":"Vasisht","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC55385.2023.10119022"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1145\/3131473.3131476","volume-title":"Nexmon: The C-based Firmware Patching Framework","author":"Schulz","year":"2017"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3349623.3355477"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IPIN54987.2022.9918135"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6289098"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790093"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Machine learning"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"article-title":"Where are movement sensing, emotion inferring technologies in the real world?","year":"2021","author":"Olugbade","key":"ref35"}],"event":{"name":"2023 11th International Conference on Affective Computing and Intelligent Interaction Workshops and Demos (ACIIW)","start":{"date-parts":[[2023,9,10]]},"location":"Cambridge, MA, USA","end":{"date-parts":[[2023,9,13]]}},"container-title":["2023 11th International Conference on Affective Computing and Intelligent Interaction Workshops and Demos (ACIIW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10388069\/10388071\/10388204.pdf?arnumber=10388204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T01:55:26Z","timestamp":1705542926000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10388204\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,10]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/aciiw59127.2023.10388204","relation":{},"subject":[],"published":{"date-parts":[[2023,9,10]]}}}