{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T08:01:01Z","timestamp":1769068861278,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2050958"],"award-info":[{"award-number":["2050958"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Commonwealth Cyber Initiative","award":["VV-1Q23-015"],"award-info":[{"award-number":["VV-1Q23-015"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,23]]},"DOI":"10.1145\/3565287.3617615","type":"proceedings-article","created":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T15:59:44Z","timestamp":1695916784000},"page":"424-429","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Wi-Alert: WiFi Sensing for Real-time Package Theft Alerts at Residential Doorsteps"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-1414-7539","authenticated-orcid":false,"given":"Maya","family":"McDonough","sequence":"first","affiliation":[{"name":"Department of Computer Science, Virginia Commonwealth University, Richmond, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6302-3263","authenticated-orcid":false,"given":"Thomas","family":"Moomaw","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of North Carolina at Charlotte, Charlotte, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0487-3709","authenticated-orcid":false,"given":"Md","family":"Touhiduzzaman","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Commonwealth University, Richmond, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4744-9211","authenticated-orcid":false,"given":"Eyuphan","family":"Bulut","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Commonwealth University, Richmond, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1449","article-title":"E-commerce trends during COVID-19 Pandemic","volume":"13","author":"Bhatti Anam","year":"2020","unstructured":"Anam Bhatti, Hamza Akram, Hafiz Muhammad Basit, Ahmed Usman Khan, Syeda Mahwish Raza, Muhammad Bilal Naqvi, et al. 2020. E-commerce trends during COVID-19 Pandemic. International Journal of Future Generation Communication and Networking 13, 2 (2020), 1449--1452.","journal-title":"International Journal of Future Generation Communication and Networking"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0257601"},{"key":"e_1_3_2_1_3_1","volume-title":"Yun Hou, and Zijian Li.","author":"Guo Jingtao","year":"2023","unstructured":"Jingtao Guo, Ivan Wang-Hei Ho, Yun Hou, and Zijian Li. 2023. FedPos: A federated transfer learning framework for CSI-based Wi-Fi indoor positioning. IEEE Systems Journal (2023)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM49955.2020.00056"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500267"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3137793"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3522783.3529521"},{"key":"e_1_3_2_1_8_1","volume-title":"WiFi Sensing on the Edge: Signal Processing Techniques and Challenges for Real-World Systems","author":"Hernandez Steven M","year":"2022","unstructured":"Steven M Hernandez and Eyuphan Bulut. 2022. WiFi Sensing on the Edge: Signal Processing Techniques and Challenges for Real-World Systems. IEEE Communications Surveys & Tutorials (2022)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM56429.2023.10099079"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW56448.2022.9859522"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241548"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310194"},{"key":"e_1_3_2_1_13_1","unstructured":"Ring. [n. d.]. Doorbell Cameras. https:\/\/ring.com\/collections\/doorbell-cameras"},{"key":"e_1_3_2_1_14_1","unstructured":"Ring. [n.d.]. Improving your Ring Device Connectivity. https:\/\/support.ring.com\/hc\/en-us\/articles\/360030391371-Improving-your-Ring-Device-Connectivity-"},{"key":"e_1_3_2_1_15_1","unstructured":"Ring. [n.d.]. Ring Protect Plans. https:\/\/ring.com\/protect-plans"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833676"},{"key":"e_1_3_2_1_17_1","volume-title":"Field Studies in Environmental Criminology","author":"Stickle Ben","unstructured":"Ben Stickle, Melody Hicks, Amy Stickle, and Zachary Hutchinson. 2022. Porch pirates: Examining unattended package theft through crime script analysis. In Field Studies in Environmental Criminology. Routledge, 106--122."},{"key":"e_1_3_2_1_18_1","unstructured":"Security.org Team. 2023. 2022 Package Theft Annual Report. https:\/\/www.security.org\/package-theft\/annual-report\/#:~:text=Nationally%2C%2049%20million%20Americans%20have )%20to%20%2480%20(Alaska)."},{"key":"e_1_3_2_1_19_1","unstructured":"Aliza Vigderman and Gabe Turner. [n. d.]. How Much Are Security Cameras? https:\/\/www.security.org\/security-cameras\/cost\/"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19102335"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534606"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECON55815.2022.9918564"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASS50613.2020.00026"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2952844"}],"event":{"name":"MobiHoc '23: Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","location":"Washington DC USA","acronym":"MobiHoc '23","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3565287.3617615","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3565287.3617615","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3565287.3617615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T16:21:51Z","timestamp":1769012511000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3565287.3617615"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":24,"alternative-id":["10.1145\/3565287.3617615","10.1145\/3565287"],"URL":"https:\/\/doi.org\/10.1145\/3565287.3617615","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}