{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T19:23:58Z","timestamp":1768073038504,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"China National Key R&D Program","doi-asserted-by":"publisher","award":["2018YFB2100302"],"award-info":[{"award-number":["2018YFB2100302"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902066"],"award-info":[{"award-number":["61902066"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20190336"],"award-info":[{"award-number":["BK20190336"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,30]]},"DOI":"10.1109\/icnp55882.2022.9940424","type":"proceedings-article","created":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T22:04:38Z","timestamp":1668463478000},"page":"1-11","source":"Crossref","is-referenced-by-count":11,"title":["CONST: Exploiting Spatial-Temporal Correlation for Multi-Gateway based Reliable LoRa Reception"],"prefix":"10.1109","author":[{"given":"Zeyu","family":"Zhang","sequence":"first","affiliation":[{"name":"Southeast University"}]},{"given":"Weiwei","family":"Chen","sequence":"additional","affiliation":[{"name":"Southeast University"}]},{"given":"Junwen","family":"Wang","sequence":"additional","affiliation":[{"name":"Southeast University"}]},{"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[{"name":"Southeast University"}]},{"given":"Tian","family":"He","sequence":"additional","affiliation":[{"name":"Southeast University"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2018.00013"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9040680"},{"key":"ref12","article-title":"Dare: Data recovery through application layer coding for lorawan","author":"marcelis","year":"2020","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00056"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.034"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2652320"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s16091466"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.03.004"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259397"},{"key":"ref19","first-page":"2","article-title":"Overview of the ransac algorithm","volume":"4","author":"derpanis","year":"2010","journal-title":"Image Rochester NY"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2019.8904298"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2974464"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2020.102828"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2018.8589188"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3408308.3431118"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388915"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485928"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/app11167642"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3274783.3275165"},{"key":"ref20","author":"tapparel","year":"2019","journal-title":"Complete Reverse Engineering of LoRA PHY"},{"key":"ref22","article-title":"Decoding lora: Realizing a modern lpwan with sdr","volume":"1","author":"knight","year":"0","journal-title":"Proceedings of the GNU Radio Conference"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5220\/0006668400410051"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP52444.2021.9651936"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430723"}],"event":{"name":"2022 IEEE 30th International Conference on Network Protocols (ICNP)","location":"Lexington, KY, USA","start":{"date-parts":[[2022,10,30]]},"end":{"date-parts":[[2022,11,2]]}},"container-title":["2022 IEEE 30th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9940251\/9940258\/09940424.pdf?arnumber=9940424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:57:48Z","timestamp":1670875068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9940424\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,30]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icnp55882.2022.9940424","relation":{},"subject":[],"published":{"date-parts":[[2022,10,30]]}}}