{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:59:42Z","timestamp":1729609182657,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/icassp.2015.7178411","type":"proceedings-article","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T18:45:43Z","timestamp":1439405143000},"page":"2449-2453","source":"Crossref","is-referenced-by-count":1,"title":["A tensor-based subspace wall clutter mitigation method for through-the-wall radar imaging"],"prefix":"10.1109","author":[{"given":"Fok Hing Chi","family":"Tivive","sequence":"first","affiliation":[]},{"given":"Abdesselam","family":"Bouzerdoum","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1117\/12.607742","article-title":"Experiments on wideband through the wall imaging","volume":"5808","author":"dilsavor","year":"2005","journal-title":"Proc SPIE Symposium on Defense and Security Algorithms for Synthetic Aperture Radar Imagery XII Confer-ence"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1109\/TGRS.2009.2012849","article-title":"Human activity classification based on micro-doppler signatures using a support vector machine","volume":"47","author":"kim","year":"2009","journal-title":"IEEE Transactions on Geoscience Remote Sensing"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TGRS.2008.916212"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/APS.2011.5997179"},{"key":"ref13","first-page":"5181","article-title":"Analytical, numerical, and experimental methods for through-the-wall radar imaging","author":"dehmollaian","year":"2008","journal-title":"Proc IEEE International Conference on Acoustics Speech and Signal Processing"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TGRS.2009.2019728"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.2528\/PIERB09060903"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/RADAR.2011.5960591"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ICDSP.2011.6004992"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1155\/2012\/961829"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/SPAWC.2013.6612086"},{"key":"ref28","first-page":"725","article-title":"The TOPHITS model for higherorder web link analysis","author":"kolda","year":"2006","journal-title":"Proc SIAM Data Mining Conf Workshop Link Anal Counterterrorism Security"},{"year":"2010","author":"amin","journal-title":"Through-the-Wall Radar Imaging","key":"ref4"},{"key":"ref27","first-page":"725","article-title":"Text representation: from vector to tensor","author":"liu","year":"2005","journal-title":"Fifth IEEE International Conference on Data Mining"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TGRS.2009.2030321"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1117\/1.JEI.22.2.021006"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/LGRS.2008.915742"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TGRS.2011.2170077"},{"key":"ref8","first-page":"62100m-1","article-title":"Analysis of micro-doppler signals using linear FM basis decomposition","volume":"6210","author":"setlur","year":"2006","journal-title":"Proc SPIE Radar Sensor Technol"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TIP.2013.2279953"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/LGRS.2007.900735"},{"key":"ref9","first-page":"62010h-1","article-title":"Through-the-wall target localization using dual-frequency CW radars","volume":"6201","author":"ahmad","year":"2006","journal-title":"Proc SPIE Sensors and Command Control Communications and Intelligence (C31) Technologies for Homeland Security and Homeland Defense V"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TAES.2005.1413761"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TGRS.2014.2355211"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TGRS.2014.2345259"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/LGRS.2013.2288491"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1137\/S0895479896305696"},{"year":"0","first-page":"94","article-title":"NAVY SBIR FY08.1 Solicitation, Radio Frequency (RF) Modeling of Layered Composite Dielectric Building Materials","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TPAMI.2012.140"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TSP.2008.917929"}],"event":{"name":"ICASSP 2015 - 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2015,4,19]]},"location":"South Brisbane, Queensland, Australia","end":{"date-parts":[[2015,4,24]]}},"container-title":["2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7158221\/7177909\/07178411.pdf?arnumber=7178411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T13:32:28Z","timestamp":1498224748000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7178411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icassp.2015.7178411","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}