{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:06:55Z","timestamp":1767773215756},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,29]]},"DOI":"10.1109\/icccn61486.2024.10637537","type":"proceedings-article","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T17:55:28Z","timestamp":1724349328000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Learning-Based WiFi Fingerprint Inpainting via Generative Adversarial Networks"],"prefix":"10.1109","author":[{"given":"Yu","family":"Chan","sequence":"first","affiliation":[{"name":"National Yang Ming Chiao Tung University,College of Artificial Intelligence,Tainan City,Taiwan"}]},{"given":"Pin-Yu","family":"Lin","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University,College of Artificial Intelligence,Tainan City,Taiwan"}]},{"given":"Yu-Yun","family":"Tseng","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University,College of Artificial Intelligence,Tainan City,Taiwan"}]},{"given":"Jen-Jee","family":"Chen","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University,College of Artificial Intelligence,Tainan City,Taiwan"}]},{"given":"Yu-Chee","family":"Tseng","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University,College of Artificial Intelligence,Tainan City,Taiwan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.1059"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s17081927"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7060497"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.905750"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2016.7883033"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DIPED.2018.8543125"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2911558"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICInfA.2014.6932662"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TePRA.2012.6215673"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2018.03.026"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348580"},{"article-title":"Walkie-markie: Indoor pathway mapping made easy","volume-title":"USENIX Symposium on Networked Systems Design and Implementation","author":"Shen","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISISS.2017.7935650"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2451641"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.02.001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/iwcmc48107.2020.9148111"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s20051443"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013801"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IPIN51156.2021.9662590"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2011.5893813"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01252-6_6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/344779.344972"},{"article-title":"Patch-based image inpainting with generative adversarial networks","year":"2018","author":"Demir","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.728"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA47591.2019.9129266"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00384"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00594"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2023.3318127"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3003404"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326103"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2464084"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2016.2595576"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2035132"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3168253"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8423008"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3095546"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/s21186107"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/s20082245"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2958201"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2979413"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9101568"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2996610"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190730"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932024"},{"key":"ref45","article-title":"Gain: Missing data imputation using generative adversarial nets","author":"Yoon","year":"2018","journal-title":"Machine Learning Research"},{"article-title":"Misgan: Learning from incomplete data with generative adversarial networks","year":"2019","author":"Li","key":"ref46"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248785"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3063955.3063989"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2320254"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2805335"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3087954"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28650-9_4"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/IPIN.2014.7275492"},{"article-title":"Adam: A method for stochastic optimization","year":"2014","author":"Kingma","key":"ref55"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.21236\/ada199190"}],"event":{"name":"2024 33rd International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2024,7,29]]},"location":"Kailua-Kona, HI, USA","end":{"date-parts":[[2024,7,31]]}},"container-title":["2024 33rd International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10637481\/10637507\/10637537.pdf?arnumber=10637537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T05:13:21Z","timestamp":1725081201000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10637537\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,29]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/icccn61486.2024.10637537","relation":{},"subject":[],"published":{"date-parts":[[2024,7,29]]}}}