Computer Science ›› 2019, Vol. 46 ›› Issue (12): 266-271.doi: 10.11896/jsjkx.190200349
• Graphics ,Image & Pattern Recognition • Previous Articles Next Articles
LI Xiao-wei, YU Jiang, CHANG Jun, YANG Jin-peng, RAN Ya-xin
CLC Number:
[1]WANG L.Research on human behavior recognition technology based on wearable sensor network[D].Nanjing:Nanjing University,2014.[2]WU C S,YANG Z,ZHOU Z M,et al.Non-invasive detection of moving and stationary human with Wi-Fi[J].IEEE Journal on Selected Areas in Communications,2015,33(11):2329-2342.[3]QIAN K,WU C,YANG Z,et al.Enabling Contactless Detection of Moving Humans with Dynamic Speeds Using CSI[J].ACM Transactions on Embedded Computing Systems,2018,17(2):1-18.[4]ZEHUA D,FANGMIN L,JULANG Y,et al.Indoor Motion Detection Using Wi-Fi Channel State Information in Flat Floor Environments Versus in Staircase Environments[J].Sensors,2018,18(7):2177.[5]LIU M G,ZHANG L,YANG P L,et al.Wi-Run:Device-free step estimation system with commodity Wi-Fi[J].Journal of Network and Computer Applications,2019,143(1):77-88.[6]YOUSSEF M,MAH M.Challenges:Device-free Passive Localization for Wireless[C]//Acm International Conference on Mobile Computing & Networking.Montréal,Québec,Canada:ACM,2007.[7]SIGG S,SCHOLZ M,SHI S,et al.RF-Sensing of Activities from Non-Cooperative Subjects in Device-Free Recognition Systems Using Ambient and Local Signals[J].IEEE Transactions on Mobile Computing,2014,13(4):907-920.[8]YANG Z,ZHOU Z,LIU Y.From RSSI to CSI:Indoor Localization via Channel Response[J].ACM Computing Surveys,2013,46(2):1-32.[9]YANG Z,LIU Y H.Wi-Fi Radar:From RSSI to CSI[J].Chinese Computer Society,2014,10(11):55-60.[10]TIAN X H,ZHU S J,XIONG S J,et al.Performance Analysis of Wi-Fi Indoor Localization with Channel State Information [J].IEEE Transactions on Mobile Computing,2019,18(8):1870-1884.[11]ZHANG Y,LI D P,WANG Y J.An Indoor Passive Positioning Method Using CSI Fingerprint Based on Adaboost [J].IEEE Sensors Journal,2019,19(14):5792-5800.[12]XIN T,GUO B,WANG Z,et al.FreeSense:human-behavior understanding using Wi-Fi signals [J].Journal of Ambient Intelligence and Humanized Computing,2018,9(5):1611-1622.[13]LI W D,TAN B,PIECHOCKI R J.Wi-Fi based passive sensing system for human presence and activity event classification [J].IET Wireless Sensor Systems,2018,8(6):276-283.[14]LI L X.Research and Design of Personnel Perception and Intrusion Detection Technology Based on WLAN[D].Beijing:Beijing University of Posts and Telecommunications,2018.[15]XIAO L,PAN H.Human motion recognition system based on Wi-Fi signal[J].Journal of Beijing University of Posts and Telecommunications,2018,41(3):119-124.[16]WANG T,YANG D D,ZHANG S Q,et al.Wi-Alarm:Low-Cost Passive Intrusion DetectionUsing Wi-Fi[J].Sensors,2019,19(10):2335.[17]WU K,XIAO J,YI Y,et al.FILA:Fine-grained indoor localization[C]//Proceedings of IEEE INFOCOM.2012:2210-2218.[18]WANG W,LIU A X,SHAHZAD M,et al.Device-Free Human Activity Recognition Using Commercial Wi-Fi Devices[J].IEEE Journal on Selected Areas in Communications,2017,35(5):1118-1131.[19]LI Y H,CHEN B.A Parameter-Independent Access Point Location Method Based on CSI[J].Computer Science,2017,44(12):74-77.[20]GENG Y,CHEN J,FU R,et al.Enlighten Wearable Physiological Monitoring Systems:On-body RF Characteristics Based Human Motion Classification Using a Support Vector Machine[J].IEEE Transactions on Mobile Computing,2016,15(3):656-671. |
[1] | HAO Qiang, LI Jie, ZHANG Man, WANG Lu. Spatial Non-cooperative Target Components Recognition Algorithm Based on Improved YOLOv3 [J]. Computer Science, 2022, 49(6A): 358-362. |
[2] | QING Chao-jin, DU Yan-hong, YE Qing, YANG Na, ZHANG Min-tao. Enhanced ELM-based Superimposed CSI Feedback Method with CSI Estimation Errors [J]. Computer Science, 2022, 49(6A): 632-638. |
[3] | LUO Jing-jie, WANG Yong-li. ADCSM:A Fine-grained Driving Cycle Model Construction Method [J]. Computer Science, 2021, 48(6A): 289-294. |
[4] | XIANG Chang-sheng, CHEN Zhi-gang. Chaotic Prediction Model of Network Traffic for Massive Data [J]. Computer Science, 2021, 48(5): 289-293. |
[5] | ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei. Prevention of Dishonest Behavior in Supply-Demand Matching [J]. Computer Science, 2021, 48(4): 303-308. |
[6] | KONG Jin-sheng, LI Jing-xin, DUAN Peng-song, CAO Yang-jie. Survey of Human Identification Algorithms Based on Wi-Fi Signal [J]. Computer Science, 2021, 48(10): 246-257. |
[7] | LI Xiang-li, JIA Meng-xue. Nonnegative Matrix Factorization Algorithm with Hypergraph Based on Per-treatments [J]. Computer Science, 2020, 47(7): 71-77. |
[8] | LIU Feng, GE Pei-xin, ZENG Lian-sun. Transmission Scheme for Asymmetric Two-way Relay X Channel Based on Delayed CSIT [J]. Computer Science, 2019, 46(8): 152-156. |
[9] | DU Zhen, MA Li-peng, SUN Guo-zi. Network Traffic Anomaly Detection Based on Wavelet Analysis [J]. Computer Science, 2019, 46(8): 178-182. |
[10] | TIAN Li-wen and FENG Xiu-fang. Adaptive Correction Model Location Algorithm Based on CSI [J]. Computer Science, 2017, 44(7): 79-83. |
[11] | LI Yao-hui and CHEN Bing. Parameter Independent Access Point Positioning Method Based on CSI [J]. Computer Science, 2017, 44(12): 68-71. |
[12] | HE Qing-bi, HUANG Da-rong and YANG Yong-qin. Super-resolution Reconstruction Method Based on Wavelet Analysis and Polynomial Subdivision Location [J]. Computer Science, 2016, 43(3): 313-316. |
[13] | ZHOU Feng and PI De-chang. Prediction Algorithm for Seasonal Satellite Parameters Based on Time Series Decomposition [J]. Computer Science, 2016, 43(2): 9-12. |
[14] | ZHANG Heng-wei, ZHANG Jian and HAN Ji-hong. Defense Strategies Selection Method Based on Non-cooperative Game Attack Forecast [J]. Computer Science, 2016, 43(1): 195-201. |
[15] | GUO Yan, LI Yong-tang and LI Chun-jie. Improved iSCSI Authentication Based on USB-Key [J]. Computer Science, 2015, 42(Z6): 359-361. |
|