{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:43:59Z","timestamp":1767339839797,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1109\/ciss48834.2020.1570617398","type":"proceedings-article","created":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T02:27:40Z","timestamp":1588904860000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Towards a Robust WiFi-based Fall Detection with Adversarial Data Augmentation"],"prefix":"10.1109","author":[{"given":"Tuan-Duy H.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Huu-Nghia H.","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2769493.2769540"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3310194"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2949123"},{"key":"ref13","article-title":"Generalizing to unseen domains via adversarial data augmentation","author":"volpi","year":"2018","journal-title":"Proceedings of NIPS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3161183"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790124"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971658"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2009.08.001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2557792"},{"key":"ref28","article-title":"Generating images with perceptual similarity metrics based on deep networks","volume":"abs 1602 2644","author":"dosovitskiy","year":"2016","journal-title":"CoRR"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2007.4352627"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1137\/1115049"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1093\/ageing\/afm169"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.1991.684830"},{"key":"ref5","first-page":"42","article-title":"Approaches and principles of fall detection for elderly and patient","author":"yu","year":"2008","journal-title":"e-health Networking Applications and Services 2008 HealthCom 2008 10th International Conference on"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2012.2234129"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s141019806"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1046\/j.1532-5415.2002.50352.x"},{"key":"ref9","first-page":"94","article-title":"A survey on automatic fall detection in the context of ambient assisted living systems","volume":"4","author":"spasova","year":"2014","journal-title":"International Journal of Advanced Computer Research"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/ageing\/afl084"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19312-0_15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2826227"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2557795"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790093"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700082"},{"article-title":"A dirt-t approach to unsupervised domain adaptation","year":"2018","author":"shu","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241548"}],"event":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","start":{"date-parts":[[2020,3,18]]},"location":"Princeton, NJ, USA","end":{"date-parts":[[2020,3,20]]}},"container-title":["2020 54th Annual Conference on Information Sciences and Systems (CISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9081570\/9086165\/09086250.pdf?arnumber=9086250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:47:05Z","timestamp":1656344825000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9086250\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ciss48834.2020.1570617398","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}