2015
DOI: 10.1016/j.dcan.2015.02.006
|View full text |Cite
|
Sign up to set email alerts
|

A review on radio based activity recognition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 91 publications
(40 citation statements)
references
References 56 publications
0
40
0
Order By: Relevance
“…Threats that attempt to infer private information, usercontexts or user-activities by capturing related electromagnetic, acoustic, optical and/or mechanical emanations from a target device or user and employing them as information side-channels have been well-studied in the literature [40], [27], [4], [6], [11], [9], [7], [46], [8], [21], [5], [49], [28]. With the advent of smartphones, researchers started focusing on employing the phone's on-board hardware and software sensors to investigate the feasibility of similar inference attacks [45].…”
Section: Related Workmentioning
confidence: 99%
“…Threats that attempt to infer private information, usercontexts or user-activities by capturing related electromagnetic, acoustic, optical and/or mechanical emanations from a target device or user and employing them as information side-channels have been well-studied in the literature [40], [27], [4], [6], [11], [9], [7], [46], [8], [21], [5], [49], [28]. With the advent of smartphones, researchers started focusing on employing the phone's on-board hardware and software sensors to investigate the feasibility of similar inference attacks [45].…”
Section: Related Workmentioning
confidence: 99%
“…[6], where the aim is to face the phenomenon of aging population. Following the same unobtrusive approach, researchers are working also on radio-based techniques [7], where they take advantage of signal attenuation due to the body, and channel fading of wireless radio. Other works have been also published considering wearable devices, such as smartphones, that can be used to collect data and to classify actions [8].…”
Section: Methods and Technologies For Harmentioning
confidence: 99%
“…The advantage of camera assistance is that multiple subjects can be detected at the same time without the aid of other devices [6]. Although the accuracy rate is high in some cases, the practical value of this method is undermined by its high requirements of equipment and its tendency to suffer high interference from environmental factors [7]. Moreover, camera-based methods can generate privacy issues [8].…”
Section: Introductionmentioning
confidence: 99%