{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T08:00:54Z","timestamp":1773734454427,"version":"3.50.1"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972283, 61832013"],"award-info":[{"award-number":["61972283, 61832013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2023,6,12]]},"abstract":"<jats:p>Wi-Fi fingerprinting system in the long term suffers from gradually deteriorative localization accuracy, leading to poor user experiences. To keep high accuracy yet at a low cost, we first study long-term variation of access points (APs) and characteristics of their Wi-Fi signals through over-one-year experiments. Motivated by the experimental findings, we then design MTLoc, a Multi-Target domain adaptation network-based Wi-Fi fingerprinting Localization system. As the core, MTDAN (Multi-Target Domain Adaptation Network) model adopts the framework of generative adversarial network to learn time-invariant, time-specific, and location-aware features from the source and target domains. To enhance the alignment among the source and targets, two-level cycle consistency constraints are proposed. Hence, MTDAN is able to transfer location knowledge from the source domain to multiple targets. In addition, domain selection and outlier detection are designed to avoid explosive growth of storage for targets and to limit the impact of random variations of Wi-Fi signals. Extensive experiments are carried out on five datasets collected over two years in various real-world indoor environments with a total area of 8, 350 m2. Experimental results demonstrate that MTLoc retains high localization accuracy with limited storage and training cost in the long term, which significantly outperforms its counterparts. We share our dataset to the community for other researchers to validate our results and conduct further research.<\/jats:p>","DOI":"10.1145\/3596239","type":"journal-article","created":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T18:58:16Z","timestamp":1686596296000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Automatic Update for Wi-Fi Fingerprinting Indoor Localization via Multi-Target Domain Adaptation"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-2366-9764","authenticated-orcid":false,"given":"Jiankun","family":"Wang","sequence":"first","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Jinnan Dist, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8850-2870","authenticated-orcid":false,"given":"Zenghua","family":"Zhao","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Jinnan Dist, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4829-2945","authenticated-orcid":false,"given":"Mengling","family":"Ou","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Jinnan Dist, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3401-8734","authenticated-orcid":false,"given":"Jiayang","family":"Cui","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Jinnan Dist, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8038-1362","authenticated-orcid":false,"given":"Bin","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Jinnan Dist, Tianjin, China"}]}],"member":"320","published-online":{"date-parts":[[2023,6,12]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380894"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33018009"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380091"},{"key":"e_1_2_2_4_1","first-page":"1","article-title":"Domain-Adversarial Training of Neural Networks","volume":"17","author":"Ganin Yaroslav","year":"2016","unstructured":"Yaroslav Ganin, Evgeniya Ustinova, Hana Ajakan, Pascal Germain, Hugo Larochelle, Fran\u00e7ois Laviolette, Mario Marchand, and Victor Lempitsky. 2016. Domain-Adversarial Training of Neural Networks. Journal of Machine Learning Research 17, 1 (Jan. 2016), 2096--2030.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2776128"},{"key":"e_1_2_2_6_1","volume-title":"Generative Adversarial Nets. In NIPS'14","author":"Goodfellow Ian J.","year":"2014","unstructured":"Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative Adversarial Nets. In NIPS'14. MIT Press, 2672--2680."},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534574"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2464084"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2608946"},{"key":"e_1_2_2_11_1","volume-title":"CyCADA: Cycle-Consistent Adversarial Domain Adaptation. In International Conference on Machine Learning. PMLR","author":"Hoffman Judy","year":"2018","unstructured":"Judy Hoffman, Eric Tzeng, Taesung Park, Jun-Yan Zhu, Phillip Isola, Kate Saenko, Alexei Efros, and Trevor Darrell. 2018. CyCADA: Cycle-Consistent Adversarial Domain Adaptation. In International Conference on Machine Learning. PMLR, 1989--1998."},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912808"},{"key":"e_1_2_2_13_1","volume-title":"ICML'15","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy. 2015. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. In ICML'15. JMLR.org, 448--456."},{"key":"e_1_2_2_14_1","volume-title":"Indoor Localization with WiFi Fingerprinting Using Convolutional Neural Network. In 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, USA, 753--758","author":"Jang Jin-Woo","year":"2018","unstructured":"Jin-Woo Jang and Song-Nam Hong. 2018. Indoor Localization with WiFi Fingerprinting Using Convolutional Neural Network. In 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, USA, 753--758."},{"key":"e_1_2_2_15_1","volume-title":"Adam: A Method for Stochastic Optimization. In ICLR.","author":"Kingma Diederik","year":"2015","unstructured":"Diederik Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In ICLR."},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787487"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639142"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488693"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494954"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639118"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2773081"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/data3010003"},{"key":"e_1_2_2_23_1","unstructured":"Takeru Miyato Toshiki Kataoka Masanori Koyama and Yuichi Yoshida. 2018. Spectral Normalization for Generative Adversarial Networks. In ICLR."},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560546"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397335"},{"key":"e_1_2_2_26_1","volume-title":"International conference on machine learning. PMLR, 2642--2651","author":"Odena Augustus","year":"2017","unstructured":"Augustus Odena, Christopher Olah, and Jonathon Shlens. 2017. Conditional image synthesis with auxiliary classifier GANs. In International conference on machine learning. PMLR, 2642--2651."},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1619797.1619824"},{"key":"e_1_2_2_28_1","volume-title":"Automatic Differentiation in PyTorch. In NIPS 2017 Workshop on Autodiff.","author":"Paszke Adam","year":"2017","unstructured":"Adam Paszke, Sam Gross, Soumith Chintala, Gregory Chanan, Edward Yang, Zachary DeVito, Zeming Lin, Alban Desmaison, Luca Antiga, and Adam Lerer. 2017. Automatic Differentiation in PyTorch. In NIPS 2017 Workshop on Autodiff."},{"key":"e_1_2_2_29_1","volume-title":"Venkata N Padmanabhan, and Rijurekha Sen.","author":"Rai Anshul","year":"2012","unstructured":"Anshul Rai, Krishna Kant Chintalapudi, Venkata N Padmanabhan, and Rijurekha Sen. 2012. Zee: zero-effort crowdsourcing for indoor localization. In MobiCom 12. 293--304."},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307654"},{"key":"e_1_2_2_31_1","unstructured":"Kihyuk Sohn Honglak Lee and Xinchen Yan. 2015. Learning structured output representation using deep conditional generative models. In NIPS. 3483--3491."},{"key":"e_1_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Yu Tian Jiankun Wang and Zenghua Zhao. 2021. Wi-Fi Fingerprint Update for Indoor Localization via Domain Adaptation. In 2021 IEEE ICPADS. 835--842.","DOI":"10.1109\/ICPADS53394.2021.00110"},{"key":"e_1_2_2_33_1","first-page":"2579","article-title":"Visualizing Data using t-SNE","volume":"9","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing Data using t-SNE. Journal of Machine Learning Research 9 (2008), 2579--2605.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2930611.2930623"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7498078"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307655"},{"key":"e_1_2_2_37_1","volume-title":"Low-Cost Wi-Fi Fingerprinting Indoor Localization via Generative Deep Learning","author":"Wang Jiankun","unstructured":"Jiankun Wang, Zenghua Zhao, Jiayang Cui, Yu Wang, YiYao Shi, and Bin Wu. 2021. Low-Cost Wi-Fi Fingerprinting Indoor Localization via Generative Deep Learning. In WASA. Springer International Publishing, 53--64."},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997235"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2996564"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3400066"},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2320254"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218639"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790124"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300133"},{"key":"e_1_2_2_45_1","volume-title":"Proc. of USENIX NSDI. 71--84","author":"Xiong Jie","year":"2013","unstructured":"Jie Xiong and Kyle Jamieson. 2013. ArrayTrack: a fine-grained indoor location system. In Proc. of USENIX NSDI. 71--84."},{"key":"e_1_2_2_46_1","unstructured":"Bing Xu Naiyan Wang Tianqi Chen and Mu Li. 2015. Empirical Evaluation of Rectified Activations in Convolutional Network. arXiv:1505.00853 [cs.LG]"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485937"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676430"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.310"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops53468.2022.9814523"},{"key":"e_1_2_2_51_1","volume-title":"Proceedings of the 23rd National Conference on Artificial Intelligence","author":"Zheng Vincent Wenchen","year":"2008","unstructured":"Vincent Wenchen Zheng, Evan Wei Xiang, Qiang Yang, and Dou Shen. 2008. Transferring Localization Models over Time. In Proceedings of the 23rd National Conference on Artificial Intelligence (Chicago, Illinois, USA) (AAAI '08). AAAI Press, 1421--1426."}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3596239","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3596239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T04:46:22Z","timestamp":1752468382000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3596239"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6,12]]}},"alternative-id":["10.1145\/3596239"],"URL":"https:\/\/doi.org\/10.1145\/3596239","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,12]]},"assertion":[{"value":"2023-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}