{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:34:48Z","timestamp":1740173688614,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602319","U1713212","61572330","61672358"],"award-info":[{"award-number":["61602319","U1713212","61572330","61672358"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2017A030313357"],"award-info":[{"award-number":["2017A030313357"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Project in the Science and Technology Plan of Shenzhen","award":["JCYJ20170302154032530"],"award-info":[{"award-number":["JCYJ20170302154032530"]}]},{"name":"Research and Development Foundation from Shenzhen city, China","award":["CYZZ20160304165036893"],"award-info":[{"award-number":["CYZZ20160304165036893"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/tcss.2018.2858799","type":"journal-article","created":{"date-parts":[[2018,8,16]],"date-time":"2018-08-16T18:37:27Z","timestamp":1534444647000},"page":"871-883","source":"Crossref","is-referenced-by-count":1,"title":["SODAR: Nonobtrusive Off-Line Social Structure Reconstruction Through Passive Wireless Sensing"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0293-0781","authenticated-orcid":false,"given":"Chengwen","family":"Luo","sequence":"first","affiliation":[]},{"given":"Chaoxi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hande","family":"Hong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2208-962X","authenticated-orcid":false,"given":"Jianqiang","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4731-3226","authenticated-orcid":false,"given":"Wei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Ming","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3090-1059","authenticated-orcid":false,"given":"Albert Y.","family":"Zomaya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/1067170.1067193"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/INFOCOM.2014.6847958"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/PerCom.2013.6526732"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TKDE.2016.2620141"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/2815675.2815709"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1002\/widm.30"},{"key":"ref12","first-page":"873","article-title":"LiPS: Learning social relationships in probe space","author":"li","year":"2017","journal-title":"Proc Advances in Multimedia Information Processing"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/COMST.2017.2691349"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TVT.2016.2623666"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TII.2017.2651880"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/INFOCOM.2006.223"},{"key":"ref17","first-page":"20","article-title":"SocialWeaver: Collaborative inference of human conversation networks using smartphones","author":"luo","year":"2013","journal-title":"Proc ACM Conf Embedded Netw Sensor Syst (SenSys)"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TMC.2016.2550452"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/IPSN.2014.6846748"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/PerCom.2014.6813953"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/WoWMoM.2012.6263700"},{"key":"ref27","first-page":"111","volume":"32","author":"gast","year":"2005","journal-title":"802 11 Wireless Networks The Definitive Guide"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/2964284.2964291"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1145\/2766498.2766517","article-title":"How talkative is your mobile device?: An experimental study of Wi-Fi probe requests","author":"freudiger","year":"2015","journal-title":"Proc 6th ACM Conf Secur Privacy Wirel Mobile Netw (WiSec)"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/2668332.2668340"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1352533.1352542"},{"year":"2014","author":"goldberg","journal-title":"word2vec explained deriving mikolov et al's negative-sampling word-embedding method","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/2502081.2502096"},{"key":"ref2","first-page":"395","article-title":"The scrambler attack: A robust physical layer attack on location privacy in vehicular networks","author":"bloessl","year":"2015","journal-title":"Proc IEEE Int Conf Comput Netw Commun (ICNC)"},{"key":"ref9","first-page":"94","article-title":"Socialprobe: Understanding social interaction through passive WiFi monitoring","author":"hong","year":"2016","journal-title":"Proc ACM 13th Int Conf Mobile Ubiquitous Syst Comput Netw Services (Mobiquitous)"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/INFCOM.2000.832252"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TMC.2017.2698453"},{"key":"ref22","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der maaten","year":"2008","journal-title":"J Mach Learn Res"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.jnca.2015.12.008","article-title":"Accuracy-aware wireless indoor localization: Feasibility and applications","volume":"62","author":"luo","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref24","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"Proc Adv Neural Inf Process Syst"},{"year":"2013","author":"mikolov","journal-title":"Efficient Estimation of Word Representations in Vector Space","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.pmcj.2014.12.006"},{"key":"ref25","first-page":"2319","article-title":"Trilateration based localization algorithm for wireless sensor network","volume":"7","author":"oguejiofor","year":"2013","journal-title":"ABI Int J Modern Sci Eng"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/8464016\/08438306.pdf?arnumber=8438306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T10:43:24Z","timestamp":1643193804000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8438306\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":33,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2018.2858799","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"type":"electronic","value":"2329-924X"},{"type":"electronic","value":"2373-7476"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}