{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:12:27Z","timestamp":1775229147226,"version":"3.50.1"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072319"],"award-info":[{"award-number":["62072319"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001348","name":"A*STAR","doi-asserted-by":"crossref","award":["C210112046"],"award-info":[{"award-number":["C210112046"]}],"id":[{"id":"10.13039\/501100001348","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Sichuan Science and Technology Program","award":["2023YFQ0022"],"award-info":[{"award-number":["2023YFQ0022"]}]},{"name":"Sichuan Science and Technology Program","award":["2022YFG0041"],"award-info":[{"award-number":["2022YFG0041"]}]},{"name":"Luzhou Science and Technology Innovation R&amp;D Program","award":["2022CDLZ-6"],"award-info":[{"award-number":["2022CDLZ-6"]}]},{"name":"Sichuan University-Luzhou","award":["2021CDLZ-11"],"award-info":[{"award-number":["2021CDLZ-11"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1109\/tmc.2023.3292229","type":"journal-article","created":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T17:43:07Z","timestamp":1688492587000},"page":"4520-4532","source":"Crossref","is-referenced-by-count":14,"title":["WiSR: Wireless Domain Generalization Based on Style Randomization"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6634-4808","authenticated-orcid":false,"given":"Shijia","family":"Liu","sequence":"first","affiliation":[{"name":"College of Computer Science, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1719-0328","authenticated-orcid":false,"given":"Zhenghua","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research (I2R) and Centre for Frontier AI Research (CFAR), A*STAR, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0977-3600","authenticated-orcid":false,"given":"Min","family":"Wu","sequence":"additional","affiliation":[{"name":"Machine Intellection Department at Institute for Infocomm Research (I2R), A*STAR, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9827-9286","authenticated-orcid":false,"given":"Chang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6166-890X","authenticated-orcid":false,"given":"Liangyin","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and the Institute for Industrial Internet Research, Sichuan University, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2878233"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2022.3226742"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2849655"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3045635"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3196270"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3133114"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops53468.2022.9814523"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2023.100703"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3570325"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3195549"},{"key":"ref12","first-page":"10","article-title":"Domain generalization via invariant feature representation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Muandet"},{"key":"ref13","first-page":"22405","article-title":"SWAD: Domain generalization by seeking flat minima","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Cha"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.167"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2973272"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-019-01360-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241548"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00037"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3064890"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/wcnc55385.2023.10118941"},{"key":"ref21","article-title":"Prototypical networks for few-shot learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Snell"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3012433"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103073"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3114309"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326081"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3009561"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3463504"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3063135"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3517241"},{"key":"ref30","article-title":"Feature alignment and restoration for domain generalization and adaptation","author":"Jin","year":"2020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00258"},{"key":"ref32","first-page":"3811","article-title":"On the out-of-distribution generalization of probabilistic image modelling","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01257"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3154000"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.33"},{"key":"ref36","first-page":"7313","article-title":"Domain generalization using causal matching","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Mahajan"},{"key":"ref37","first-page":"7728","article-title":"Efficient domain generalization via common-specific low-rank decomposition","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Piratla"},{"issue":"4","key":"ref38","article-title":"Human activity sensing with wireless signals: A survey","volume-title":"Sensors","volume":"20","author":"Liu","year":"2020"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2389824"},{"issue":"19","key":"ref41","article-title":"PriRepvGG: Privacy-preserving 3-party inference framework for image-based defect detection","volume-title":"Appl. Sci.","volume":"12","author":"Liu","year":"2022"},{"key":"ref42","article-title":"mixup: Beyond empirical risk minimization","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Zhang"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923743"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790124"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.12.211"},{"key":"ref47","article-title":"Principles of risk minimization for learning theory","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Vapnik"},{"key":"ref48","article-title":"Invariant risk minimization","author":"Arjovsky","year":"2019"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00948"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58536-5_8"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00566"},{"issue":"59","key":"ref52","first-page":"1","article-title":"Domain-adversarial training of neural networks","volume-title":"J. Mach. Learn. Res.","volume":"17","author":"Ganin","year":"2016"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2022.3230665"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/10491282\/10172243.pdf?arnumber=10172243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T20:06:26Z","timestamp":1712693186000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10172243\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":53,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2023.3292229","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5]]}}}