{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:13Z","timestamp":1750221253976,"version":"3.41.0"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2018,9,18]],"date-time":"2018-09-18T00:00:00Z","timestamp":1537228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Plan","award":["2016YFB1001200"],"award-info":[{"award-number":["2016YFB1001200"]}]},{"name":"Peking University Information Technology Institute"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2018,9,18]]},"abstract":"<jats:p>Device-free sensing using ubiquitous Wi-Fi signals has recently attracted lots of attention. Among the sensed information, two important basic contexts are (i) whether a target is still or not and (ii) where the target is located. Continuous monitoring of these contexts provides us with rich datasets to obtain important high-level semantics of the target such as living habits, physical conditions and emotions. However, even to obtain these two basic contexts, offline training and calibration are needed in traditional methods, limiting the real-life adoption of the proposed sensing systems. In this paper, using the commodity Wi-Fi infrastructure, we propose a training-free human vitality sensing platform, WiVit. It could capture these two contexts together with the target's movements speed information in real-time without any human effort in offline training or calibration. Based on our extensive experiments in three typical indoor environments, the precision of activity detection is higher than 98% and the area detection accuracy is close to 100%. Moreover, we implement a short-term activity recognition system on our platform to recognize 4 types of actions, and we can reach an average accuracy of 94.2%. We also take a feasibility study of monitoring long-term activities of daily living to show our platform's potential applications in practice.<\/jats:p>","DOI":"10.1145\/3264931","type":"journal-article","created":{"date-parts":[[2018,9,19]],"date-time":"2018-09-19T11:58:41Z","timestamp":1537358321000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Training-Free Human Vitality Monitoring Using Commodity Wi-Fi Devices"],"prefix":"10.1145","volume":"2","author":[{"given":"Xiang","family":"Li","sequence":"first","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies (Ministry of Education), School of Electronics Engineering and Computer Science, Peking University, Beijing, China"}]},{"given":"Daqing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies (Ministry of Education), School of Electronics Engineering and Computer Science, Peking University, Beijing, China"}]},{"given":"Jie","family":"Xiong","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, Massachusetts, USA"}]},{"given":"Yue","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies (Ministry of Education), School of Electronics Engineering and Computer Science, Peking University, Beijing, China"}]},{"given":"Shengjie","family":"Li","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies (Ministry of Education), School of Electronics Engineering and Computer Science, Peking University, Beijing, China"}]},{"given":"Yasha","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies (Ministry of Education), National Engineering Research Center for Software Engineering, Peking University, Beijing, China"}]},{"given":"Hong","family":"Mei","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies (Ministry of Education), School of Electronics Engineering and Computer Science, Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,9,18]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555311"},{"volume-title":"Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI '14)","author":"Adib Fadel","key":"e_1_2_2_2_1"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPIN.2012.6418879"},{"volume-title":"Proceedings of the Sixth International Conference on Computer Vision (ICCV '98)","author":"Cai Q.","key":"e_1_2_2_5_1"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.51"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.25.4.041003"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2015836.2015854"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2754578"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.469"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409640"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535790"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2729594"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2012.6199865"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787487"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639109"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971738"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66188-9_18"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971665"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130940"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2505729"},{"key":"e_1_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Beth Logan Jennifer Healey Matthai Philipose Emmanuel Munguia Tapia and Stephen Intille. 2007. A Long-Term Evaluation of Sensing Modalities for Activity Recognition. In UbiComp 2007: Ubiquitous Computing. Springer Berlin Heidelberg Berlin Heidelberg 483--500.   Beth Logan Jennifer Healey Matthai Philipose Emmanuel Munguia Tapia and Stephen Intille. 2007. A Long-Term Evaluation of Sensing Modalities for Activity Recognition. In UbiComp 2007: Ubiquitous Computing. Springer Berlin Heidelberg Berlin Heidelberg 483--500.","DOI":"10.1007\/978-3-540-74853-3_28"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973755"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/365024.365126"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.338"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500436"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/PADSW.2014.7097784"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980115.2980131"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971691"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2013.2287480"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.1986.1143830"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.106"},{"volume-title":"Surveillance Tracking System Using Passive Infrared Motion Sensors in Wireless Sensor Network. In 2008 International Conference on Information Networking. 1--5.","year":"2008","author":"Song Byunghun","key":"e_1_2_2_34_1"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971744"},{"volume-title":"MFDL: A Multicarrier Fresnel Penetration Model based Device-Free Localization System leveraging Commodity Wi-Fi Cards. CoRR abs\/1707.07514","year":"2017","author":"Wang Hao","key":"e_1_2_2_36_1"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2557795"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973776"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790093"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2679658"},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973764"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639143"},{"key":"e_1_2_2_43_1","unstructured":"Lloyd R. Welch. 2003. Hidden Markov Models and the Baum-Welch Algorithm. 53 4 (Dec 2003) 10--13.  Lloyd R. Welch. 2003. Hidden Markov Models and the Baum-Welch Algorithm. 53 4 (Dec 2003) 10--13."},{"volume-title":"'16 Wi-Fi\u00ae predictions 2016","year":"2018","author":"Wi-Fi","key":"e_1_2_2_44_1"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_17"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2430294"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2012.40"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.49"},{"volume-title":"Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI '13)","year":"2013","author":"Xiong Jie","key":"e_1_2_2_49_1"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790125"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067193"},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287880"},{"key":"e_1_2_2_53_1","doi-asserted-by":"crossref","unstructured":"Zhaoyuan Yu Linwang Yuan Wen Luo Linyao Feng and Guonian Lv. 2016. Spatio-Temporal Constrained Human Trajectory Generation from the PIR Motion Detector Sensor Network Data: A Geometric Algebra Approach. Sensors 16 1 (2016).  Zhaoyuan Yu Linwang Yuan Wen Luo Linyao Feng and Guonian Lv. 2016. Spatio-Temporal Constrained Human Trajectory Generation from the PIR Motion Detector Sensor Network Data: A Geometric Algebra Approach. Sensors 16 1 (2016).","DOI":"10.3390\/s16010043"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3191785"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264931","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:00Z","timestamp":1750212480000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264931"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,18]]},"references-count":54,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,9,18]]}},"alternative-id":["10.1145\/3264931"],"URL":"https:\/\/doi.org\/10.1145\/3264931","relation":{},"ISSN":["2474-9567"],"issn-type":[{"type":"electronic","value":"2474-9567"}],"subject":[],"published":{"date-parts":[[2018,9,18]]},"assertion":[{"value":"2018-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}