2020
DOI: 10.1109/comst.2019.2934489
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Sensing for Human Activity: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
89
0
5

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 215 publications
(96 citation statements)
references
References 119 publications
0
89
0
5
Order By: Relevance
“…Wireless- [59] and IR- [60] based systems rely on anomalous activity detection. They utilize the signatures for a fall that are not immediately obvious to the naked eye [61]. Large amounts of data are generally required to train a model to detect falls.…”
Section: Poses Captured By Caploc For Fall Detectionmentioning
confidence: 99%
“…Wireless- [59] and IR- [60] based systems rely on anomalous activity detection. They utilize the signatures for a fall that are not immediately obvious to the naked eye [61]. Large amounts of data are generally required to train a model to detect falls.…”
Section: Poses Captured By Caploc For Fall Detectionmentioning
confidence: 99%
“…Non-contact methods for HAR have also been studied recently [ 32 , 33 , 34 , 35 , 36 , 37 ]. These approaches use ambient Wi-Fi signals or radars to track user activities.…”
Section: Related Researchmentioning
confidence: 99%
“…These approaches use ambient Wi-Fi signals or radars to track user activities. The techniques based on Wi-Fi signals use the channel state information from Wi-Fi signals to infer human activities [ 34 , 35 , 37 ]. In particular, Taylor et al [ 37 ] use radio signals from a USRP radio system to identify standing up and sitting down.…”
Section: Related Researchmentioning
confidence: 99%
“…Human behaviors have also been employed as credentials. For example, prior works have shown it is possible to identify individuals based on hand gestures [21,22], voice commands [5,41], as well as finger inputs made on touchscreens [29,31,32], solid surfaces [23], and wearable devices [3]. These are less personally identifiable, and thus pose a smaller risk to user privacy, but can be challenging to associate with a given identity due to natural inconsistencies users exhibit when asked to reproduce these characteristics Proposals have been made to measure credentials in a passive, low-effort manner, which we consider closely related to EchoLock.…”
Section: Related Workmentioning
confidence: 99%