{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:32:07Z","timestamp":1755999127338,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T00:00:00Z","timestamp":1561334400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US National Science Foundation","award":["CNS-1619251,CNS-1514381, CNS-1700039, CNS-1651954, CNS-1718078"],"award-info":[{"award-number":["CNS-1619251,CNS-1514381, CNS-1700039, CNS-1651954, CNS-1718078"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,24]]},"DOI":"10.1145\/3326285.3329068","type":"proceedings-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T12:42:33Z","timestamp":1560516153000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Secure indoor positioning against signal strength attacks via optimized multi-voting"],"prefix":"10.1145","author":[{"given":"Yunzhi","family":"Li","sequence":"first","affiliation":[{"name":"University of Delaware"}]},{"given":"Yidan","family":"Hu","sequence":"additional","affiliation":[{"name":"University of Delaware"}]},{"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Delaware"}]},{"given":"Yanchao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"Terri","family":"Hedgpeth","sequence":"additional","affiliation":[{"name":"Arizona State University"}]}],"member":"320","published-online":{"date-parts":[[2019,6,24]]},"reference":[{"volume-title":"Wi-Fi Indoor Location in Retail Worth $2.5 Billion by","year":"2020","key":"e_1_3_2_1_1_1","unstructured":"{n.d.}. Wi-Fi Indoor Location in Retail Worth $2.5 Billion by 2020 . https:\/\/www.abiresearch.com\/press\/wi-fi-indoor-location-retail-worth-25-billion-2020 {n.d.}. Wi-Fi Indoor Location in Retail Worth $2.5 Billion by 2020. https:\/\/www.abiresearch.com\/press\/wi-fi-indoor-location-retail-worth-25-billion-2020"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0531(77)90073-4"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2140\/pjm.1966.16.1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614350"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE International Conference on Computer Communications (INFOCOM'00)","volume":"2","author":"Bahl Paramvir","unstructured":"Paramvir Bahl and Venkata N. Padmanabhan . 2000. RADAR: an in-building RF-based user location and tracking system . In IEEE International Conference on Computer Communications (INFOCOM'00) , Vol. 2 . Tel Aviv, Israel, 775--784. Paramvir Bahl and Venkata N. Padmanabhan. 2000. RADAR: an in-building RF-based user location and tracking system. In IEEE International Conference on Computer Communications (INFOCOM'00), Vol. 2. Tel Aviv, Israel, 775--784."},{"key":"e_1_3_2_1_6_1","volume-title":"MSR-TR-2000-12 (Feb.","author":"Bahl Paramvir","year":"2000","unstructured":"Paramvir Bahl , Venkata N Padmanabhan , and Anand Balachandran . 2000. Enhancements to the RADAR user location and tracking system. Microsoft Research 2 , MSR-TR-2000-12 (Feb. 2000 ), 775--784. Paramvir Bahl, Venkata N Padmanabhan, and Anand Balachandran. 2000. Enhancements to the RADAR user location and tracking system. Microsoft Research 2, MSR-TR-2000-12 (Feb. 2000), 775--784."},{"key":"e_1_3_2_1_7_1","volume-title":"Mor\u00e9","author":"Calamai Paul H.","year":"1987","unstructured":"Paul H. Calamai and Jorge J . Mor\u00e9 . 1987 . Projected gradient methods for linearly constrained problems. Mathematical Programming 39, 1 (01 Sepember 1987), 93--116. Paul H. Calamai and Jorge J. Mor\u00e9. 1987. Projected gradient methods for linearly constrained problems. Mathematical Programming 39, 1 (01 Sepember 1987), 93--116."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1497290.1497292"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.040212.100291"},{"key":"e_1_3_2_1_10_1","volume-title":"WiFi-SLAM Using Gaussian Process Latent Variable Models. In International Joint Conference on Artifical Intelligence (IJCAI'07)","author":"Ferris Brian","year":"2007","unstructured":"Brian Ferris , Dieter Fox , and Neil Lawrence . 2007 . WiFi-SLAM Using Gaussian Process Latent Variable Models. In International Joint Conference on Artifical Intelligence (IJCAI'07) . Hyderabad, India, 2480--2485. Brian Ferris, Dieter Fox, and Neil Lawrence. 2007. WiFi-SLAM Using Gaussian Process Latent Variable Models. In International Joint Conference on Artifical Intelligence (IJCAI'07). Hyderabad, India, 2480--2485."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079299"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883716"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370282"},{"key":"e_1_3_2_1_14_1","volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'08)","author":"Kushki Azadeh","year":"2065","unstructured":"Azadeh Kushki , Konstantinos N. Plataniotis , and Anastasios N. Venetsanopoulos . 2008. Sensor selection for mitigation of RSS-based attacks in wireless local area network positioning . In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'08) . Las Vegas, NV , 2065 --2068. Azadeh Kushki, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos. 2008. Sensor selection for mitigation of RSS-based attacks in wireless local area network positioning. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'08). Las Vegas, NV, 2065--2068."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848178"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486398"},{"key":"e_1_3_2_1_17_1","volume-title":"Robust Statistical Methods for Securing Wireless Localization in Sensor Networks. In International Symposium on Information Processing in Sensor Networks (IPSN'05)","author":"Li Zang","year":"2005","unstructured":"Zang Li , Wade Trappe , Yanyong Zhang , and Badri Nath . 2005 . Robust Statistical Methods for Securing Wireless Localization in Sensor Networks. In International Symposium on Information Processing in Sensor Networks (IPSN'05) . Los Angeles, CA, 1--12. Zang Li, Wade Trappe, Yanyong Zhang, and Badri Nath. 2005. Robust Statistical Methods for Securing Wireless Localization in Sensor Networks. In International Symposium on Information Processing in Sensor Networks (IPSN'05). Los Angeles, CA, 1--12."},{"key":"e_1_3_2_1_18_1","volume-title":"IEEE International Conference on Computer Communications (INFOCOM'05)","volume":"2","author":"Madigan David","unstructured":"David Madigan , Eiman Elnahrawy , Richard P. Martin , Wenhua Ju , Prajindra Sankar A\/l Krishnanm , and A. S. Krishnakumar . 2005. Bayesian indoor positioning systems . In IEEE International Conference on Computer Communications (INFOCOM'05) , Vol. 2 . Miami, FL, 1217--1227 vol. 2. David Madigan, Eiman Elnahrawy, Richard P. Martin, Wenhua Ju, Prajindra Sankar A\/l Krishnanm, and A. S. Krishnakumar. 2005. Bayesian indoor positioning systems. In IEEE International Conference on Computer Communications (INFOCOM'05), Vol. 2. Miami, FL, 1217--1227 vol. 2."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1155\/ASP\/2006\/68154"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307654"},{"key":"e_1_3_2_1_21_1","volume-title":"IEEE Wireless Communications and Networking Conference (WCNC'15)","author":"Wang Xuyu","year":"2015","unstructured":"Xuyu Wang , Lingjun Gao , Shiwen Mao , and Santosh Pandey . 2015 . DeepFi: Deep learning for indoor fingerprinting using channel state information . In IEEE Wireless Communications and Networking Conference (WCNC'15) . New Orleans, LA, 1666--1671. Xuyu Wang, Lingjun Gao, Shiwen Mao, and Santosh Pandey. 2015. DeepFi: Deep learning for indoor fingerprinting using channel state information. In IEEE Wireless Communications and Networking Conference (WCNC'15). New Orleans, LA, 1666--1671."},{"key":"e_1_3_2_1_22_1","first-page":"1","article-title":"CSI-Based Fingerprinting for Indoor Localization: A Deep Learning Approach","volume":"66","author":"Wang Xuyu","year":"2017","unstructured":"Xuyu Wang , Lingjun Gao , Shiwen Mao , and Santosh Pandey . 2017 . CSI-Based Fingerprinting for Indoor Localization: A Deep Learning Approach . IEEE Transactions on Vehicular Technology 66 , 1 (January 2017), 763--776. Xuyu Wang, Lingjun Gao, Shiwen Mao, and Santosh Pandey. 2017. CSI-Based Fingerprinting for Indoor Localization: A Deep Learning Approach. IEEE Transactions on Vehicular Technology 66, 1 (January 2017), 763--776.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"e_1_3_2_1_23_1","volume-title":"IEEE International Conference on Networking, Sensing and Control (ICNSC'04)","volume":"2","author":"Wu Chaolin","year":"2004","unstructured":"Chaolin Wu , Lichen Fu , and Fengli Lian . 2004 . WLAN location determination in e-home via support vector classification . In IEEE International Conference on Networking, Sensing and Control (ICNSC'04) , Vol. 2 . Taipei, Taiwan, 1026--1031 , Vol.2. Chaolin Wu, Lichen Fu, and Fengli Lian. 2004. WLAN location determination in e-home via support vector classification. In IEEE International Conference on Networking, Sensing and Control (ICNSC'04), Vol. 2. Taipei, Taiwan, 1026--1031, Vol.2."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.214"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2207383"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1719650.1719689"},{"key":"e_1_3_2_1_27_1","volume-title":"The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption. In IEEE International Conference on Computer Communications (INFOCOM'18)","author":"Yang Zheng","year":"2018","unstructured":"Zheng Yang and Kimmo Javinen . 2018 . The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption. In IEEE International Conference on Computer Communications (INFOCOM'18) . Honolulu, HI, 1223--1231. Zheng Yang and Kimmo Javinen. 2018. The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption. In IEEE International Conference on Computer Communications (INFOCOM'18). Honolulu, HI, 1223--1231."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067193"},{"key":"e_1_3_2_1_29_1","volume-title":"Secure RSS-Fingerprint-Based Indoor Positioning: Attacks and Countermeasures. In IEEE Conference on Communications and Network Security (CNS'18)","author":"Yuan Lizhou","year":"2018","unstructured":"Lizhou Yuan , Yidan Hu , Yunzhi Li , Rui Zhang , Yanchao Zhang , and Terri Hedgpeth . 2018 . Secure RSS-Fingerprint-Based Indoor Positioning: Attacks and Countermeasures. In IEEE Conference on Communications and Network Security (CNS'18) . Beijing, 1--9. Lizhou Yuan, Yidan Hu, Yunzhi Li, Rui Zhang, Yanchao Zhang, and Terri Hedgpeth. 2018. Secure RSS-Fingerprint-Based Indoor Positioning: Attacks and Countermeasures. In IEEE Conference on Communications and Network Security (CNS'18). Beijing, 1--9."}],"event":{"name":"IWQoS '19: IEEE\/ACM International Symposium on Quality of Service","acronym":"IWQoS '19","location":"Phoenix Arizona"},"container-title":["Proceedings of the International Symposium on Quality of Service"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329068","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3326285.3329068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:00Z","timestamp":1750206360000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,24]]},"references-count":29,"alternative-id":["10.1145\/3326285.3329068","10.1145\/3326285"],"URL":"https:\/\/doi.org\/10.1145\/3326285.3329068","relation":{},"subject":[],"published":{"date-parts":[[2019,6,24]]},"assertion":[{"value":"2019-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}