{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T00:03:41Z","timestamp":1774569821219,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/infocom.2014.6848217","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T15:18:13Z","timestamp":1406647093000},"page":"2688-2696","source":"Crossref","is-referenced-by-count":95,"title":["LiFi: Line-Of-Sight identification with WiFi"],"prefix":"10.1109","author":[{"given":"Zimu","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Chenshu","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851203"},{"key":"17","article-title":"NLOS identification and mitigation for UWB localization systems","author":"guvenc","year":"2007","journal-title":"Proc of IEEE WCNC"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/VETEC.1998.686556"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MAP.2013.6529362"},{"key":"16","author":"rappaport","year":"2002","journal-title":"Wireless Communications Principles and Practice"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115548"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348581"},{"key":"11","article-title":"Array track: A fine-grained indoor location system","author":"xiong","year":"2013","journal-title":"Proc of USENIX NSDI"},{"key":"12","article-title":"Pin point: Localizing interfering radios","author":"joshi","year":"2013","journal-title":"Proc of USENIX NSDI"},{"key":"21","article-title":"NLOS identification and weighted least-squares localization for UWB systems using multipath channel statistics","author":"guvenc","year":"2008","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1836-8_3"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2007.629"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.03.090197"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.102"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409949"},{"key":"26","article-title":"You are facing the mona lisa: Spot localization using PHY layer information","author":"sen","year":"2012","journal-title":"Proc of ACM Mobisys"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.809457"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.194"},{"key":"29","article-title":"From RSSI to CSI: Indoor localization via channel response","volume":"46","author":"yang","year":"2014","journal-title":"ACM Computing Surveys"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1145\/2534169.2491687","article-title":"Whole-home gesture recognition using wireless signals","author":"pu","year":"2013","journal-title":"Proc of ACM MobiCom"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486039"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079306"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067193"},{"key":"30","article-title":"FIMD: Fine-grained device-free motion detection","author":"xiao","year":"2012","journal-title":"Proc IEEE ICPAD"},{"key":"7","article-title":"Back to the basics: Avoiding multipath to revive inbuilding wifi localization","author":"sen","year":"2013","journal-title":"Proc of ACM Mobisys"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.214"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.90"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030642"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.070318"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2003.814338"}],"event":{"name":"IEEE INFOCOM 2014 - IEEE Conference on Computer Communications","location":"Toronto, ON, Canada","start":{"date-parts":[[2014,4,27]]},"end":{"date-parts":[[2014,5,2]]}},"container-title":["IEEE INFOCOM 2014 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6839150\/6847911\/06848217.pdf?arnumber=6848217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T09:01:07Z","timestamp":1565686867000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6848217\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/infocom.2014.6848217","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}