{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:23:12Z","timestamp":1740140592040,"version":"3.37.3"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872038"],"award-info":[{"award-number":["61872038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Comput. Biol. and Bioinf."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1109\/tcbb.2023.3238064","type":"journal-article","created":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T18:37:04Z","timestamp":1677091024000},"page":"1051-1059","source":"Crossref","is-referenced-by-count":1,"title":["CASL: Capturing Activity Semantics Through Location Information for Enhanced Activity Recognition"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-2804-6915","authenticated-orcid":false,"given":"Xiao","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4473-3030","authenticated-orcid":false,"given":"Shan","family":"Cui","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5879-5980","authenticated-orcid":false,"given":"Tao","family":"Zhu","sequence":"additional","affiliation":[{"name":"Computer School, University of South China, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0200-7989","authenticated-orcid":false,"given":"Liming","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Informatics, University of Ulster, Newtownabbey, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5478-7898","authenticated-orcid":false,"given":"Fang","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6413-193X","authenticated-orcid":false,"given":"Huansheng","family":"Ning","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2022.3214198"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3447744"},{"key":"ref3","first-page":"230","article-title":"Recognizing concurrent and interleaved activities in social interactions","volume-title":"Proc. IEEE 9th Int. Conf. Dependable Auton. Secure Comput.","author":"Zaslavsky"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.02.003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2985082"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/9781119010258"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3144699"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld.2018.00317"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2010.112"},{"article-title":"Temporal ensembling for semi-supervised learning","year":"2016","author":"Laine","key":"ref11"},{"article-title":"MixMatch: A holistic approach to semi-supervised learning","year":"2019","author":"Berthelot","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971701"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489106"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330966"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2927224"},{"key":"ref17","first-page":"74","article-title":"Robust active learning using crowdsourced annotations for activity recognition","volume-title":"Proc. Workshops 25th AAAI Conf. Artif. Intell.","author":"Zhao"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441912"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3214269"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330688"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2007.17"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.063"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3472291"},{"article-title":"Unsupervised data augmentation for consistency training","year":"2019","author":"Xie","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7687-1_79"},{"key":"ref26","article-title":"Siamese neural networks for one-shot image recognition","volume-title":"Proc. ICML Deep Learn. Workshop","volume":"2","author":"Koch"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3414\/ME0592"},{"volume-title":"Deep Learning With Python","year":"2017","author":"Chollet","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1214\/06-BA104"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/279943.279962"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2009.24"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2008.2010404"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3115\/1613715.1613855"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015349"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74958-5_14"},{"article-title":"Improved regularization of convolutional neural networks with cutout","year":"2017","author":"DeVries","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00612"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2918285"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/779"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3090076"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12078"}],"container-title":["IEEE\/ACM Transactions on Computational Biology and Bioinformatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8857\/10631805\/10049737.pdf?arnumber=10049737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T06:13:56Z","timestamp":1723270436000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10049737\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":41,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcbb.2023.3238064","relation":{},"ISSN":["1545-5963","1557-9964","2374-0043"],"issn-type":[{"type":"print","value":"1545-5963"},{"type":"electronic","value":"1557-9964"},{"type":"electronic","value":"2374-0043"}],"subject":[],"published":{"date-parts":[[2024,7]]}}}