{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:13:27Z","timestamp":1763968407957,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"National Key Research and Development Progra","award":["2016YFC0800406"],"award-info":[{"award-number":["2016YFC0800406"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>For the airports worldwide, it is important to establish a \"passenger integrity system\" based on the basic information of passengers and their related credit system. Correspondingly, this paper develops a new risk assessment model for the passenger graded security check by introducing several new technologies to obtain the passengers\u2019 real-time status information as well as historical data. We first propose to deploy a variety of 5G-IoT devices to monitor the passengers in real time, including high-definition cameras, millimeter-wave security detectors, etc. We then rely on machine learning to analyze the passenger risk level and integrate improved analytic hierarchy process (AHP) with group decision theory, namely GD-AHP. According to the risk level, the passengers can be classified into known, ordinary and dangerous targets. The differentiated handling of different targets could significantly save the time of security check and improve the passenger experience.<\/jats:p>","DOI":"10.1186\/s13638-020-01886-z","type":"journal-article","created":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T20:05:26Z","timestamp":1609963526000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A passenger risk assessment method based on 5G-IoT"],"prefix":"10.1186","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2692-7598","authenticated-orcid":false,"given":"Weishi","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yifeng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xianfeng","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,6]]},"reference":[{"issue":"10","key":"1886_CR1","first-page":"46","volume":"22","author":"WG Feng","year":"2018","unstructured":"W.G. Feng, J. Huang, Early warning for civil aviation security checks based on deep learning. Data Anal. Knowl. Discov. 22(10), 46\u201353 (2018)","journal-title":"Data Anal. Knowl. Discov."},{"issue":"4","key":"1886_CR2","first-page":"130","volume":"53","author":"QQ Cao","year":"2018","unstructured":"Q.Q. Cao, Y. Zhao, New progress of American security check between 2016 and 2017. China Public Secur. 53(4), 130\u2013134 (2018)","journal-title":"China Public Secur."},{"issue":"34","key":"1886_CR3","first-page":"254","volume":"8","author":"XJ Liu","year":"2018","unstructured":"X.J. Liu, Review and prospect on civil aviation security check efficiency research. Sci. Technol. Vis. 8(34), 254\u2013256 (2018)","journal-title":"Sci. Technol. Vis."},{"issue":"12","key":"1886_CR4","first-page":"15","volume":"6","author":"GS Liao","year":"2018","unstructured":"G.S. Liao, D.M. Wang, Application of block chain technology in differential security inspection. Civ. Aviat. Manag. 6(12), 15\u201318 (2018)","journal-title":"Civ. Aviat. Manag."},{"issue":"3","key":"1886_CR5","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MNET.2015.7113226","volume":"29","author":"S Sun","year":"2015","unstructured":"S. Sun, M. Kadoch, L. Gong, B. Rong, Integrating network function virtualization with SDR and SDN for 4G\/5G networks. IEEE Netw. 29(3), 54\u201359 (2015)","journal-title":"IEEE Netw."},{"issue":"6","key":"1886_CR6","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MCOM.2015.7120046","volume":"53","author":"N Zhang","year":"2015","unstructured":"N. Zhang, N. Cheng, A.T. Gamage, K. Zhang, J.W. Mark, X. Shen, Cloud assisted HetNets toward 5G wireless networks. IEEE Commun. Mag. 53(6), 59\u201365 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"1886_CR7","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1109\/TBC.2012.2199598","volume":"58","author":"Y Wu","year":"2012","unstructured":"Y. Wu, B. Rong, K. Salehian, G. Gagnon, Cloud transmission: a new spectrum-reuse friendly digital terrestrial broadcasting transmission system. IEEE Trans. Broadcast. 58(3), 329\u2013337 (2012)","journal-title":"IEEE Trans. Broadcast."},{"key":"1886_CR8","unstructured":"B. Matthew, S. Arunesh, S. Aaron, T. Milind, One size does not fit all: a game-theoretic approach for dynamically and effectively screening for threats, in AAAI'16 Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (2016), pp. 425\u2013431"},{"key":"1886_CR9","doi-asserted-by":"publisher","DOI":"10.1201\/9781420031232","volume-title":"The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments","author":"DJ Landoll","year":"2005","unstructured":"D.J. Landoll, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments (CRC Press, New York, 2005)."},{"key":"1886_CR10","unstructured":"Risk management-Guidelines, 2018. ISO 31000\u00a0: 2018."},{"issue":"5","key":"1886_CR11","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1111\/j.1539-6924.2012.01905.x","volume":"33","author":"MG Stewart","year":"2013","unstructured":"M.G. Stewart, J. Mueller, Terrorism risks and cost-benefit analysis of aviation security. Risk Anal. 33(5), 893\u2013908 (2013)","journal-title":"Risk Anal."},{"issue":"4","key":"1886_CR12","first-page":"599","volume":"23","author":"Q Huang","year":"2007","unstructured":"Q. Huang, Y. Ren, Y.Z. Lin, Application of uncertain type of AHP to condition assessment of cable-stayed bridges. J. Southeast Univ. (Engl. Ed.) 23(4), 599\u2013603 (2007)","journal-title":"J. Southeast Univ. (Engl. Ed.)"},{"issue":"11","key":"1886_CR13","first-page":"14336","volume":"38","author":"A Ishizaka","year":"2011","unstructured":"A. Ishizaka, A. Labib, Review of the main developments in the analytic hierarchy process. Expert Syst. Appl. 38(11), 14336\u201314345 (2011)","journal-title":"Expert Syst. Appl."},{"key":"1886_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27476-3","volume-title":"Computational intelligence techniques for new product design","author":"KY Chan","year":"2012","unstructured":"K.Y. Chan, C.K. Kwong, Y. Wong, Computational Intelligence Techniques for New Product Design (Springer, Heidelberg, 2012)."},{"key":"1886_CR15","unstructured":"H.B. Bai, N.C. Wang, Research on the selection of scale in AHP, in Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (2010)"},{"issue":"4","key":"1886_CR16","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1057\/jors.2010.23","volume":"62","author":"A Ishizaka","year":"2011","unstructured":"A. Ishizaka, D. Balkenborg, T. Kaplan, Influence of aggregation and measurement scale on ranking a compromise alternative in AHP. J. Oper. Res. Soc. 62(4), 700\u2013710 (2011)","journal-title":"J. Oper. Res. Soc."},{"issue":"5","key":"1886_CR17","first-page":"780","volume":"25","author":"GY Bao","year":"2010","unstructured":"G.Y. Bao, X.L. Lian, M. He et al., Improved two-tuple linguistic representation model based on new linguistic evaluation scale. Control Decis. 25(5), 780\u2013784 (2010)","journal-title":"Control Decis."},{"issue":"5","key":"1886_CR18","first-page":"785","volume":"39","author":"WF Hu","year":"2011","unstructured":"W.F. Hu, W. Yao, M. Zhou, Comprehensive evaluation on performance of existing residential buildings based on fuzzy and analytic hierarchy process. J. Tongji Univ. (Nat. Sci.) 39(5), 785\u2013790 (2011)","journal-title":"J. Tongji Univ. (Nat. Sci.)"},{"issue":"5","key":"1886_CR19","first-page":"1","volume":"20","author":"YJ Lv","year":"2013","unstructured":"Y.J. Lv, W.C. Chen, L. Zhong, Research on some problems of the scale of analytic hierarchy process. J. Qiongzhou Univ. 20(5), 1\u20136 (2013)","journal-title":"J. Qiongzhou Univ."},{"issue":"3\/4","key":"1886_CR20","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1002\/mcda.1500","volume":"21","author":"S Sironen","year":"2014","unstructured":"S. Sironen, P. Leskinen, A. Kangas et al., Variation of preference inconsistency when applying ratio and interval scale pairwise comparisons. J. Multi-Criteria Decis. Anal. 21(3\/4), 183\u2013195 (2014)","journal-title":"J. Multi-Criteria Decis. Anal."},{"issue":"5","key":"1886_CR21","first-page":"340","volume":"4","author":"L Lin","year":"2012","unstructured":"L. Lin, C. Wang, On consistency and ranking of alternatives in uncertain AHP. Nat. Sci. 4(5), 340 (2012)","journal-title":"Nat. Sci."},{"key":"1886_CR22","unstructured":"W. Zhengtian, W. Min, W. Lizheng, Applying fuzzy matter-element method to evaluating the green degree of ship, in 2010 6th International Conference on Advanced Information Management and Service (IMS), Seoul (2010), pp. 118\u2013121"},{"issue":"6","key":"1886_CR23","doi-asserted-by":"publisher","first-page":"1496","DOI":"10.1109\/TCYB.2016.2549639","volume":"47","author":"K Mistry","year":"2017","unstructured":"K. Mistry, L. Zhang, S.C. Neoh, C.P. Lim, B. Fielding, A micro-GA embedded PSO feature selection approach to intelligent facial emotion recognition. IEEE Trans. Cybern. 47(6), 1496\u20131509 (2017)","journal-title":"IEEE Trans. Cybern."},{"issue":"3","key":"1886_CR24","doi-asserted-by":"publisher","first-page":"170","DOI":"10.12677\/MOS.2017.63020","volume":"6","author":"N Zhang","year":"2017","unstructured":"N. Zhang, Z.Y. Li, T.T. Zhou et al., Modeling and application of airport security system efficiency. Model. Simul. 6(3), 170\u2013178 (2017)","journal-title":"Model. Simul."},{"issue":"1","key":"1886_CR25","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MITP.2017.9","volume":"19","author":"N Al-Falahy","year":"2017","unstructured":"N. Al-Falahy, O.Y. Alani, Technologies for 5G networks: challenges and opportunities. IT Prof. 19(1), 12\u201320 (2017)","journal-title":"IT Prof."},{"issue":"4","key":"1886_CR26","doi-asserted-by":"publisher","first-page":"2509","DOI":"10.1109\/TVT.2007.912595","volume":"57","author":"B Rong","year":"2008","unstructured":"B. Rong, Y. Qian, K. Lu, H. Chen, M. Guizani, Call admission control optimization in WiMAX networks. IEEE Trans. Veh. Technol. 57(4), 2509\u20132522 (2008)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"1886_CR27","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MWC.2017.1600139WC","volume":"24","author":"N Chen","year":"2017","unstructured":"N. Chen, B. Rong, X. Zhang, M. Kadoch, Scalable and flexible massive MIMO precoding for 5G H-CRAN. IEEE Wirel. Commun. 24(1), 46\u201352 (2017)","journal-title":"IEEE Wirel. Commun."},{"issue":"20","key":"1886_CR28","first-page":"85","volume":"19","author":"JF Ren","year":"2017","unstructured":"J.F. Ren, Y. Gao, Summary of research on application of face recognition technology in airport. China New Telecommun. 19(20), 85 (2017)","journal-title":"China New Telecommun."},{"key":"1886_CR29","first-page":"53","volume":"289","author":"J Li","year":"2019","unstructured":"J. Li, W. Cao, L. Huang, W.S. Chen, An overview of the millimeter wave human body screening technology and its application. China Civ. Aviat. 289, 53\u201354 (2019)","journal-title":"China Civ. Aviat."},{"issue":"7","key":"1886_CR30","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1109\/TPAMI.2018.2842770","volume":"41","author":"R He","year":"2019","unstructured":"R. He, X. Wu, Z. Sun, T. Tan, Wasserstein CNN: learning invariant features for NIR-VIS face recognition. IEEE Trans. Pattern Anal. Mach. Intell. 41(7), 1761\u20131773 (2019)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"1886_CR31","first-page":"1","volume":"1193","author":"DY Liliana","year":"2019","unstructured":"D.Y. Liliana, Emotion recognition from facial expression using deep convolutional neural network. J. Phys. Conf. Ser. 1193(1), 1\u20135 (2019)","journal-title":"J. Phys. Conf. Ser."},{"issue":"4","key":"1886_CR32","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1109\/TPAMI.2017.2700390","volume":"40","author":"C Ding","year":"2018","unstructured":"C. Ding, D. Tao, Trunk-Branch ensemble convolutional neural networks for video-based face recognition. IEEE Trans. Pattern Anal. Mach. Intell. 40(4), 1002\u20131014 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1886_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1665-1","volume-title":"Models, Methods, Concepts and Applications of the Analytic Hierarchy Process","author":"TL Saaty","year":"2001","unstructured":"T.L. Saaty, L.G. Vargas, Models, Methods, Concepts and Applications of the Analytic Hierarchy Process (Springer, New York, 2001)."},{"issue":"1","key":"1886_CR34","first-page":"83","volume":"1","author":"TL Saaty","year":"2008","unstructured":"T.L. Saaty, Decision making with the analytic hierarchy process. Int. J. Serv. Sci. 1(1), 83\u201398 (2008)","journal-title":"Int. J. Serv. Sci."},{"issue":"3","key":"1886_CR35","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.dss.2010.03.003","volume":"49","author":"YC Dong","year":"2010","unstructured":"Y.C. Dong, G.Q. Zhang, W.C. Hong et al., Consensus models for AHP group decision making under row geometric mean prioritization method. Decis. Support Syst. 49(3), 281\u2013289 (2010)","journal-title":"Decis. Support Syst."},{"issue":"3","key":"1886_CR36","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1109\/TFUZZ.2011.2116029","volume":"19","author":"W Pedrycz","year":"2011","unstructured":"W. Pedrycz, M. Song, Analytic hierarchy process (AHP) in group decision making and its optimization with an allocation of information granularity. IEEE Trans. Fuzzy Syst. 19(3), 527\u2013539 (2011)","journal-title":"IEEE Trans. Fuzzy Syst."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01886-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-020-01886-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01886-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T22:14:30Z","timestamp":1610230470000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-020-01886-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,6]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["1886"],"URL":"https:\/\/doi.org\/10.1186\/s13638-020-01886-z","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2021,1,6]]},"assertion":[{"value":"9 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"5"}}