Computer Science ›› 2021, Vol. 48 ›› Issue (10): 246-257.doi: 10.11896/jsjkx.210100076
• Information Security • Previous Articles Next Articles
KONG Jin-sheng, LI Jing-xin, DUAN Peng-song, CAO Yang-jie
CLC Number:
[1]ANZURES G,KELLY D J,PASCALIS O,et al.Own-and other-race face identity recognition in children:the effects of pose and feature composition[J].Developmental Psychology,2014,50(2):469. [2]LEWIS G J,SHAKESHAFT N G,PLOMIN R et al.Face identity recognition and the social difficulties component of the autism-like phenotype:Evidence for phenotypic and genetic links[J].Journal of Autism and Developmental Disorders,2018,48(8):2758-2765. [3]CASTRO D C D,NOWOZIN S.From face recognition to models of identity:a bayesian approach to learning about unknown identities from unsupervised data[C]//Proceedings of the European Conference on Computer Vision (ECCV).2018:745-761. [4]ATUEGWU C,DARAMOLA S A,OKOKPUJIE K O,et al.Development of an Improved Fingerprint Feature Extraction Algorithm for Personal Verification[J].International Journal of Applied Engineering Research,2018,13(9):6608-6612. [5]LIU M.The Principle and Design of Separate Fingerprint Identification System[C]//International Conference on Machine Learning and Intelligent Communications.Cham:Springer,2019:32-41. [6]AL-WAISY A S,QAHWAJI R,IPSON S,et al.A multi-biometric iris recognition system based on a deep learning approach[J].Pattern Analysis and Applications,2018,21(3):783-802. [7]WAGHMARE L M,CHIRCHI E R.Enhancement of personidentification using iris pattern[J].International Journal of Scientific and Engineering Research,2011,2(4):37-42. [8]WANG L,TAN T,NING H,et al.Silhouette analysis-basedgait recognition for human identification[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2003,25(12):1505-1518. [9]PHILLIPS P J,SARKAR S,ROBLEDO I,et al.The gait identification challenge problem:data sets and baseline algorithm[C]//Object Recognition Supported by User Interaction for Service Robots.IEEE,2002:385-388. [10]CHEN M,LI Y F,BAO S D,et al.A Comparative Performance Study of Electrocardiogram-Based Human Identity Recognition[C]//2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Confe-rence on Embedded and Ubiquitous Computing (EUC).IEEE,2019:121-126. [11]WANG X,SONG Q,YANG F,et al.Research on intelligentidentification and disinfection early warning access control system in epidemic situation[J].Journal of Testing Technology,2020,34(5):425-430. [12]HE X L.Research and development plan of self-service temperature measurement identification device[J].Electronic Production,2020,2(4):25-26. [13]WANG Z J,XU Z M.Human body identity and motion recognition based on low-resolution infrared array sensor[J].Electrical Technology,2019,20(11):6-10. [14]PROKOSKI F.History,current status,and future of infraredidentification[C]//Proceedings IEEE Workshop on Computer Vision Beyond the Visible Spectrum:Methods and Applications (Cat.No.PR00640).IEEE,2000:5-14. [15]VARDASCA R,MAGALHAES C,SILVA P,et al.Biomedical musculoskeletal applications of infrared thermal imaging on arm and forearm:a systematic review[J].Journal of Thermal Biology,2019,82:164-177. [16]MA X,NA Z.Neural network speed identification scheme for speed sensor-less DTC induction motor drive system[C]//Third International Power Electronics and Motion Control Confe-rence.IEEE,2000:1242-1245. [17]HOWLADER M S A,FRATER M R,RYAN M J.Optimizing sensor identification in long-delay networks to account for maximum frame size and variations in propagation speed[C]//2008 Australasian Telecommunication Networks and Applications Conference.IEEE,2008:240-245. [18]PANNETIER B,DEZERT J,POLLARD E.Improvement ofmultiple ground targets tracking with GMTI sensor and fusion of identification attributes[C]//2008 IEEE Aerospace Confe-rence.IEEE,2008:1-13. [19]LANCASTER J,BLACKMAN S.Joint IMM/MHT trackingand identification for multi-sensor ground target tracking[C]//2006 9th International Conference on Information Fusion.IEEE,2006:1-7. [20]XIU-CHENG L I.Research on Target Identification Based on Sensor Signals of Ground Motion[J].Radio Engineering,2014,44(5):26-29. [21]SHUNMUGAM P,KAMARUDIN K,MOSED A A A,et al.Human Identification through Kinect's Depth,RGB,and Sound Sensor[C/OL]//IOP Conference Series Materials Science and Engineering.2019.https://www.researchgate.net/publication/337690961_Human_Identification_through_Kinect's_Depth_RGB_and_Sound_Sensor. [22]DRMANAC R.Methods and apparatus for DNA sequencing and DNA identification:U.S.Patent 6,025,136[P].2000-2-15. [23]WALKER J A,HUGHES D A,ANDERS B A,et al.Quantitative intra-short interspersed element PCR for species-specific DNA identification[J].Analytical Biochemistry,2003,316(2):259-269. [24]NATALE C D,PAOLESSE R,COMANDINI P,et al.Identification of schizophrenic patients by examination of body odor using gas chromatography-mass spectrometry and a cross-selective gas sensor array[J].Medical Science Monitor,2005,11(8):CR366-CR375. [25]WU D,XU H.The progress of identification human body odor by police dog[J].Forensic Science and Technology,2005,6(9):1008-3650. [26]BUDOWLE B,BUS M M,JOSSERAND M A,et al.A standalone humanitarian DNA identification database system to increase identification of human remains of foreign nationals[J].International Journal of Legal Medicine,2020,134(6):2039-2044. [27]BAHL P,PADMANABHAN V N.RADAR:an in-building RF-based user location and tracking system[C]//Proceedings IEEE INFOCOM 2000.Conference on Computer Communications.Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies.IEEE,2000:775-784. [28]BIANCHI V,CIAMPOLINI P,DE MUNARI I.RSSI-based indoor localization and identification for ZigBee wireless sensor networks in smart homes[J].IEEE Transactions on Instrumentation and Measurement,2018,68(2):566-575. [29]CARPI F,DAVOLI L,MARTALO M,et al.RSSI-based Me-thods for LOS/NLOS Channel Identification in Indoor Scenarios[C]//2019 16th International Symposium on Wireless Communication Systems (ISWCS).IEEE,2019:171-175. [30]HAN K,XING H,DENG Z,et al.A RSSI/PDR-based probabilistic position selection algorithm with NLOS identification for indoor localisation[J].ISPRS International Journal of Geo-Information,2018,7(6):232. [31]HALPERIN D,HU W,SHETH A,et al.Tool release:Gathe-ring 802.11 n traces with channel state information[J].ACM Sigcomm Computer Communication Review,2011,41(1):53. [32]ZENG Y,PATHAK P H,MOHAPATRA P.WiWho:wifi-based person identification in smart spaces[C]//2016 15th ACM/IEEE International Conference on Information Proces-sing in Sensor Networks (IPSN).IEEE,2016:1-12. [33]WANG W,LIU A X,SHAHZAD M.Gait recognition using wifi signals[C]//Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing.2016:363-373. [34]ZHANG J,WEI B,HU W,et al.Wifi-id:human identification using wifi signal[C]//2016 International Conference onDistri-buted Computing in Sensor Systems (DCOSS).IEEE,2016:75-82. [35]FENG C,ARSHAD S,LIU Y.Mais:multiple activity identification system using channel state information of wifi signals[C]//International Conference on Wireless Algorithms,Systems,and Applications.Cham:Springer,2017:419-432. [36]LV J,YANG W,MAN D.Device-free passive identity identification via WiFi signals[J].Sensors,2017,17(11):2520. [37]XIN T,GUO B,WANG Z,et al.FreeSense:human-behavior understanding using Wi-Fi signals[J].Journal of Ambient Intelligence and Humanized Computing,2018,9(5):1611-1622. [38]YU X D,CHEN W J,WANG D,et al.Deep learning algorithm for non-contact identity recognition[J].Journal of Xi'an Jiaotong University,2019,53(4):122-127. [39]WANG D,ZHOU Z,YU X,et al.CSIID:WiFi-based HumanIdentification via Deep Learning[C]//2019 14th International Conference on Computer Science & Education (ICCSE).IEEE,2019:326-330. [40]ZHOU Z,LIU C,YU X,et al.Deep-WiID:WiFi-Based Contactless Human Identification via Deep Learning[C]//2019 IEEE SmartWorld,Ubiquitous Intelligence & Computing,Advanced &Trusted Computing,Scalable Computing & Communications,Cloud & Big Data Computing,Internet of People and Smart City Innovation(SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).IEEE,2019:877-884. [41]DUAN P S,ZHOU Z Y,WANG C,et al.WiNet:a gait recognition model suitable for wireless sensing scenes[J].Journal of Xi'an Jiaotong University,2020,54(7):187-195. [42]ZHOU Z Y,SONG B,DUAN P S,et al.Lightweight gait recognition model LWID based on WiFi signal[J].Computer Science,47(11):25-31. [43]ZHANG L,WANG C,MA M,et al.WiDIGR:direction-independent gait recognition system using commercial Wi-Fi devices[J].IEEE Internet of Things Journal,2019,7(2):1178-1191. [44]BU Q,MING X,HU J,et al.TransferSense:towards environ-ment independent and one-shot wifi sensing[J].Personal and Ubiquitous Computing,2021,25(2):1-19. [45]SHAHZAD M,ZHANG S.Augmenting user identification with WiFi based gesture recognition[J].Proceedings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies,2018,2(3):1-27. [46]ZHENG R Y.Research on identification technology based on CSI wireless sensing[D].Nanjing:Nanjing University of Aeronautics and Astronautics,2018. [47]Hefei University of Technology.Identity verification methodbased on gesture signals in WiFi environment:CN201910717874.1[P].2019-11-05. [48]ZHAO X N.Research on Identity Authentication Technology Based on Channel State Information [D].Harbin:Harbin Engineering University,2019. [49]KONG H,LU L,YU J,et al.Continuous Authenticationthrough Finger Gesture Interaction for Smart Homes Using WiFi[J/OL].IEEE Transactions on Mobile Computing,2020.https://www.researchgate.net/publication/341536728_Continuous_Authentication_through_Finger_Gesture_Interaction_for_Smart_Homes_Using_WiFi. [50]LI C,LIU M,CAO Z.WiHF:Enable User Identified Gesture Recognition with WiFi[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications.IEEE,2020:586-595. [51]LIU X,CAO J,TANG S,et al.Wi-sleep:Contactless sleep monitoring via wifi signals[C]//2014 IEEE Real-Time Systems Symposium.IEEE,2014:346-355. [52]CAO Y,WANG F,LU X,et al.Contactless body movement re-cognition during sleep via WiFi signals[J].IEEE Internet of Things Journal,2019,7(3):2028-2037. [53]GU Y,ZHANG X,LIU Z,et al.WiFi-based real-time breathing and heart rate monitoring during sleep[C]//2019 IEEE Global Communications Conference (GLOBECOM).IEEE,2019:1-6. [54]RAMEZANI R,XIAO Y,NAEIM A.Sensing-Fi:Wi-Fi CSI and accelerometer fusion system for fall detection[C]//2018 IEEE EMBS International Conference on Biomedical & Health Informatics (BHI).IEEE,2018:402-405. [55]PALIPANA S,ROJAS D,AGRAWAL P,et al.FallDeFi:Ubi-quitous fall detection using commodity Wi-Fi devices[J].Procee-dings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies,2018,1(4):1-25. [56]YANG Z,ZHOU Z,LIU Y.From RSSI to CSI:indoor localization via channel response[J].ACM Computing Surveys (CSUR),2013,46(2):1-32. [57]ZHOU J.Research on indoor intrusion detection and behavior recognition based on CSI in wireless sensing network [D].Nanjing:Nanjing University of Posts and Telecommunications,2018. [58]BODENHAM D.Adaptive filtering and change detection forstreaming data[D].London:Imperial College London,2012. [59]LIU H,SHAH S,JIANG W.On-line outlier detection and data cleaning[J].Computers & Chemical Engineering,2004,28(9):1635-1647. [60]SUOMELA J.Median filtering is equivalent to sorting[J].ar-Xiv:1406.1717,2014. [61]JIA Y H.Digital Image Processing[M].Wuhan:Wuhan University Press,2003. [62]LU Y,LU S H,WANG X D,et al.Research review of human behavior perception technology based on WiFi signal[J].Chinese Journal of Computers,2019,434(2):3-23. [63]CHEN Y,ZHU Y,HAO Z,et al.Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi[C]//International Conference on Network and System Security.Cham:Springer,2018:237-250. [64]PU Q,GUPTA S,GOLLAKOTA S,et al.Whole-home gesture recognition using wireless signals[C]//Proceedings of the 19th Annual International Conference on Mobile Computing & Networking.2013:27-38. [65]UNAR J A,SENG W C,ABBASI A.A review of biometrictechnology along with trends and prospects[J].Pattern Recognition,2014,47(8):2673-2688. [66]CONNOR P,ROSS A.Biometric recognition by gait:a survey of modalities and features[J].Computer Vision and Image Understanding,2018,167:1-27. [67]GREFF K,SRIVASTAVA R K,KOUTNIK J,et al.LSTM:A Search Space Odyssey[J].IEEE Transactions on Neural Networks and Learning Systems,2016,28(10):2222-2232. [68]CAO X L.Identity authentication method based on dynamic gestures and its implementation on smart phones [D].Changsha:Central South University,2013. [69]LIU J,DONG Y,CHEN Y,et al.Leveraging Breathing for Continuous User Authentication[C]//Proceedings of the 24th Annual International Conference on Mobile Computing and Networking.2018:786-788. [70]SANAM T F,GODRICH H.A Multi-View Discriminant Lear-ning Approach for Indoor Localization Using Bimodal Features of CSI[J].arXiv:1908.07370,2019. [71]KARANAM C R,KORANY B,MOSTOFI Y.Tracking fromone side:multi-person passive tracking with WiFi magnitude measurements[C]//Proceedings of the 18th International Conference on Information Processing in Sensor Networks.2019:181-192. [72]DING Y S,GUO B,XIN T,et al.WiCount:a method of identif-ying people based on WiFi-CSI[J].Computer Science,2019,46(11):297-303. [73]LIU S,ZHAO Y,XUE F,et al.DeepCount:crowd countingwith WiFi via deep learning[J].arXiv:1903.05316,2019. [74]XIE X H.Research on WiFi-based indoor multi-person activity detection and recognition method[D].Changsha:Hunan University,2018. [75]WANG W,LIU A X,SHAHZAD M,et al.Understanding and modeling of wifi signal based human activity recognition[C]//Proceedings of the 21st Annual International Conference on Mobile Computing and Networking.2015:65-76. [76]FAWAZ H I,FORESTIER G,WEBER J,et al.Transfer lear-ning for time series classification[C]//2018 IEEE International Conference on Big Data (Big Data).IEEE,2018:1367-1376. [77]FAWAZ H I,FORESTIER G,WEBER J,et al.Deep learningfor time series classification:a review[J].Data Mining and Knowledge Discovery,2019,33(4):917-963. [78]FAWAZ H I,FORESTIER G,WEBER J,et al.Deep neural network ensembles for time series classification[C]//2019 International Joint Conference on Neural Networks (IJCNN).IEEE,2019:1-6. |
[1] | QING Chao-jin, DU Yan-hong, YE Qing, YANG Na, ZHANG Min-tao. Enhanced ELM-based Superimposed CSI Feedback Method with CSI Estimation Errors [J]. Computer Science, 2022, 49(6A): 632-638. |
[2] | LI Li,ZHENG Jia-li,WANG Zhe,YUAN Yuan,SHI Jing. RFID Indoor Positioning Algorithm Based on Asynchronous Advantage Actor-Critic [J]. Computer Science, 2020, 47(2): 233-238. |
[3] | LIU Feng, GE Pei-xin, ZENG Lian-sun. Transmission Scheme for Asymmetric Two-way Relay X Channel Based on Delayed CSIT [J]. Computer Science, 2019, 46(8): 152-156. |
[4] | YE Juan, CHEN Yuan-yan, WANG Ming, NI Ying-bo. Optimized Convex Localization Algorithm Using Multiple Communication Radius and Angle Correction [J]. Computer Science, 2019, 46(6A): 317-320. |
[5] | LI Xiao-wei, YU Jiang, CHANG Jun, YANG Jin-peng, RAN Ya-xin. Non-cooperative Human Behavior Recognition Method Based on CSI [J]. Computer Science, 2019, 46(12): 266-271. |
[6] | TIAN Li-wen and FENG Xiu-fang. Adaptive Correction Model Location Algorithm Based on CSI [J]. Computer Science, 2017, 44(7): 79-83. |
[7] | WANG Wei-hong, YAN Lu-qin and YANG Jie. Simulated Annealing for Weighted Localization Algorithm Based on LTE Directional Propagation Model [J]. Computer Science, 2017, 44(5): 251-256. |
[8] | LIN Wei-lan, XIAO Jin-chao and ZI Shuang-fei. Route-radius-based Adaptive Protocol for Long-chain Wireless Sensor Networks [J]. Computer Science, 2017, 44(3): 97-104. |
[9] | LI Yao-hui and CHEN Bing. Parameter Independent Access Point Positioning Method Based on CSI [J]. Computer Science, 2017, 44(12): 68-71. |
[10] | MA Wen-zhuo and ZHANG Jie. Design Robot System Based on Stereo Perception Technology Computer Engineering and Applications [J]. Computer Science, 2016, 43(Z6): 563-567. |
[11] | TANG Yang, BAI Yong, MA Yue and LAN Zhang-li. Research of WiFi-based Fingerprinting Matching Algorithm in Indoor Positioning [J]. Computer Science, 2016, 43(5): 73-75. |
[12] | XING Rong-hua and HUANG Hai-yan. Researches on Wireless Sensor Network Localization Based on Improved Gbest-guided Artificial Bee Colony Algorithm [J]. Computer Science, 2016, 43(12): 273-276. |
[13] | GUO Yan, LI Yong-tang and LI Chun-jie. Improved iSCSI Authentication Based on USB-Key [J]. Computer Science, 2015, 42(Z6): 359-361. |
[14] | WU Yi-zhi, TIAN Shuang-jie and ZHOU Yu-yan. Research of Software Defined Storage Area Network Based on iSCSI [J]. Computer Science, 2015, 42(Z6): 253-255. |
[15] | GE Bin, ZHENG Jian-bao and HAN Jiang-hong. RSSI Assisted Coordinate-tetrahedron Centroid Localization Algorithm in Three-dimensional Space [J]. Computer Science, 2015, 42(4): 81-84. |
|