{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:12:08Z","timestamp":1775837528939,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:00:00Z","timestamp":1725408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,4]]},"DOI":"10.1145\/3677525.3678638","type":"proceedings-article","created":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T18:23:25Z","timestamp":1723055005000},"page":"36-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Estimating the People Density in Restricted Spaces Using Probe Requests for Wi-Fi Connections"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0434-0446","authenticated-orcid":false,"given":"Fabio","family":"Salice","sequence":"first","affiliation":[{"name":"Department of Electronics Information and Bioengineering, Politecnico di Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3441-6049","authenticated-orcid":false,"given":"Pasquale Salvatore","family":"Formicola","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0724-0969","authenticated-orcid":false,"given":"Edoardo","family":"Galimberti","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7432-6887","authenticated-orcid":false,"given":"Fabrizio","family":"Travagnini","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7623-9382","authenticated-orcid":false,"given":"Andrea","family":"Masciadri","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9554-8815","authenticated-orcid":false,"given":"Sara","family":"Comai","sequence":"additional","affiliation":[{"name":"Department of Electronics Information and Bioengineering, Politecnico di Milano (POLIMI), Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,9,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"[1] J. Yang N. Shiwakoti R. Tay \"Exploring Melbourne Metro Train Passengers\u2019 Pre-Boarding Behaviors and Perceptions.\" Sustainability 2023 15 no. 15: 11564.","DOI":"10.3390\/su151511564"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"[2] Peftitsi S.; Jenelius E.; Cats O. \"Determinants of passengers\u2019 metro car choice revealed through automated data sources: a Stockholm case study\". 2020","DOI":"10.1080\/23249935.2020.1720040"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-021-00959-z"},{"key":"e_1_3_2_1_4_1","volume-title":"partially occluded humans in a single image by Bayesian combination of edgelet part detectors.\" Tenth IEEE International conference on computer vision","author":"Wu R.","year":"2005","unstructured":"[4] B. Wu, R. Nevatia \"Detection of multiple, partially occluded humans in a single image by Bayesian combination of edgelet part detectors.\" Tenth IEEE International conference on computer vision. 2005."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"[5] P. Sabzmeydani G. Mori \"Detecting pedestrians by learning shapelet features.\" IEEE Computer Society conference on computer vision and pattern recognition. 2007.","DOI":"10.1109\/CVPR.2007.383134"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"e_1_3_2_1_7_1","volume-title":"Feature mining for localised crowd counting.\" British machine vision conference","author":"Ke C","year":"2012","unstructured":"[7] Ke C, Chen CL, Gong S et al \"Feature mining for localised crowd counting.\" British machine vision conference. 2012."},{"key":"e_1_3_2_1_8_1","volume-title":"proc. 23rd International Conference on Neural Information Processing Systems -","volume":"1332","author":"Lempitsky A.","year":"2010","unstructured":"[8] V. Lempitsky, A. Zisserman, \"Learning To count objects in images\", proc. 23rd International Conference on Neural Information Processing Systems - Volume 1l pp. 1324\u20131332, 2010."},{"key":"e_1_3_2_1_9_1","first-page":"589","article-title":"Single-image crowd counting via multi-column convolutional neural network","author":"Zhang Y-Y","year":"2016","unstructured":"[9] Zhang Y-Y, Zhou D, Chen S et al. \"Single-image crowd counting via multi-column convolutional neural network.\" IEEE Conf Comput Vis Pattern Recognit, pp. 589\u2013597, 2016.","journal-title":"IEEE Conf Comput Vis Pattern Recognit"},{"key":"e_1_3_2_1_10_1","first-page":"10","article-title":"Multi-Scale Attention Network for Crowd Counting","author":"Rahul Rama B.","year":"2019","unstructured":"[10] V. Rahul Rama, B. Shuai, J. Tighe and D. Modolo. \u201cMulti-Scale Attention Network for Crowd Counting.\u201d, Computer Vision and Pattern Recognition, 2019. 10.48550\/arXiv.1901.06026","journal-title":"Computer Vision and Pattern Recognition"},{"key":"e_1_3_2_1_11_1","first-page":"10","article-title":"A multi-scale fusion and dual attention network for crowd counting","author":"De Zhang","year":"2024","unstructured":"[11] De Zhang, Yiting Wang, Xiaoping Zhou, Liangliang Su \"A multi-scale fusion and dual attention network for crowd counting\" Multimedia Tools and Applications, 2024. 10.1007\/s11042-024-19326-1","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_3_2_1_12_1","volume-title":"Shi X and Yeung D-Y \"Spatiotemporal modeling for crowd counting in videos.\" IEEE Int Conf Comput Vis ICCV","author":"Xiong F","year":"2017","unstructured":"[12] Xiong F, Shi X and Yeung D-Y \"Spatiotemporal modeling for crowd counting in videos.\" IEEE Int Conf Comput Vis ICCV. 2017."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2902824"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"[14]Masciadri A Lin C Comai S Salice F. \"A Multi-Resident Number Estimation Method for Smart Homes.\" Sensors 22(13):4823. 2022. https:\/\/doi.org\/10.3390\/s22134823","DOI":"10.3390\/s22134823"},{"key":"e_1_3_2_1_15_1","first-page":"1027","volume-title":"ACM Int. Joint Conf. Pervasive Ubiquitous Comput. (UbiComp)","author":"Raykov E.","year":"2016","unstructured":"[15] Y. P. Raykov, E. Ozer, G. Dasika, A. Boukouvalas, and M. A. Little, \"Predicting room occupancy with a single passive infrared (PIR) sensor through behavior extraction,\" in Proc. ACM Int. Joint Conf. Pervasive Ubiquitous Comput. (UbiComp), pp. 1016\u20131027,1. 2016."},{"key":"e_1_3_2_1_16_1","first-page":"199","article-title":"Human Behavior Drift Detection in a Smart Home Environment","volume":"242","author":"Masciadri A.","year":"2017","unstructured":"[16]A. Masciadri, A. Trofimova, M. Matteucci and F. Salice, Human Behavior Drift Detection in a Smart Home Environment, Stud Health Technol Inform, vol. 242, pp. 199-203, 2017.","journal-title":"Stud Health Technol Inform"},{"key":"e_1_3_2_1_17_1","first-page":"320","volume-title":"Proc. IEEE Int. Conf. Ind. Technol. (ICIT)","author":"Hashimoto A.","unstructured":"[17] M. Hashimoto, A. Tsuji, A. Nishio, and K. Takahashi, \u201cLaser based tracking of groups of people with sudden changes in motion,\u201d in Proc. IEEE Int. Conf. Ind. Technol. (ICIT), pp. 315\u2013320. 2015."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2430272"},{"key":"e_1_3_2_1_19_1","volume-title":"Wi-Counter: Smartphone-based people counter using crowdsourced Wi-Fi signal data","author":"Li","unstructured":"[19] H. Li et al., \u201cWi-Counter: Smartphone-based people counter using crowdsourced Wi-Fi signal data,\u201d IEEE Trans. Human\u2013Mach. Syst., vol. 45, no. 4, pp. 442\u2013452, 2015."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAT.2013.6522018"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCS.2015.7204005"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.12.012"},{"key":"e_1_3_2_1_23_1","volume-title":"EDBT\/ICDT Workshops.","author":"Handte M.U.","year":"2014","unstructured":"[23] M. Handte, M.U. Iqbal, S. Wagner, W. Apolinarski, P. Marr\u00f3n, E. Mu\u00f1oz Navarro, S. Martinez, S.I. Barthelemy,M.G. Fern\u00e1ndez, M.G \u201cCrowd Density Estimation for Public Transport Vehicles.\u201d EDBT\/ICDT Workshops. 2014."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trpro.2020.08.122"},{"key":"e_1_3_2_1_25_1","first-page":"35","volume-title":"CEUR Workshop Proceedings, 2940","author":"Vaccari S.","year":"2021","unstructured":"[25] I. Vaccari, S. Narteni, M. Mongelli, M. Aiello, E. Cambiaso Perpetrate cyber-attacks using IoT devices as attack vector: the Espressif ESP8266 use case, CEUR Workshop Proceedings, 2940, 2021 Pages 35-46."},{"key":"e_1_3_2_1_26_1","volume-title":"Wi-Fi-Probes: Are they dangerous?","author":"Marvin Tessitore","year":"2023","unstructured":"[26] Marvin Tessitore, David Henkelmann, and NicolasRost. (2023). \"Wi-Fi-Probes: Are they dangerous?\"."},{"key":"e_1_3_2_1_27_1","unstructured":"[27] https:\/\/www.transilien.com\/en\/page-deplacements\/affluence"},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications","author":"Tan S..","year":"2021","unstructured":"[28] J. Tan and S.. -H. Gary Chan, \"Efficient Association of Wi-Fi Probe Requests under MAC Address Randomization,\" IEEE INFOCOM 2021 - IEEE Conference on Computer Communications, Vancouver, BC, Canada, 2021, pp. 1-10"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/en13061446"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4956"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109393"},{"key":"e_1_3_2_1_32_1","volume-title":"A dataset of labelled device Wi-Fi probe requests for MAC address de-randomization.\" Computer Networks. 205. 108783. 10.1016\/j.comnet.2022.108783","author":"Pintor L.","year":"2022","unstructured":"[32]L. Pintor, L. Atzori (2022) \"A dataset of labelled device Wi-Fi probe requests for MAC address de-randomization.\" Computer Networks. 205. 108783. 10.1016\/j.comnet.2022.108783."}],"event":{"name":"GoodIT '24: International Conference on Information Technology for Social Good","location":"Bremen Germany","acronym":"GoodIT '24","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"]},"container-title":["Proceedings of the 2024 International Conference on Information Technology for Social Good"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677525.3678638","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3677525.3678638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T14:45:02Z","timestamp":1755873902000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677525.3678638"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,4]]},"references-count":32,"alternative-id":["10.1145\/3677525.3678638","10.1145\/3677525"],"URL":"https:\/\/doi.org\/10.1145\/3677525.3678638","relation":{},"subject":[],"published":{"date-parts":[[2024,9,4]]},"assertion":[{"value":"2024-09-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}