default search action
Zhi Wang 0002
- > Home > Persons > Zhi Wang 0002
Publications
- 2025
- [j18]Cui Zhao
, Qiumin Luo, Han Ding
, Ge Wang
, Kun Zhao
, Zhi Wang
, Wei Xi
, Jizhong Zhao
:
mm-Fall: Practical and Robust Fall Detection via mmWave Signals. IEEE Trans. Mob. Comput. 24(9): 8747-8760 (2025) - 2024
- [j16]Han Ding
, Linwei Zhai
, Cui Zhao
, Fei Wang
, Ge Wang
, Wei Xi
, Zhi Wang
, Jizhong Zhao
:
Genre Classification Empowered by Knowledge-Embedded Music Representation. IEEE ACM Trans. Audio Speech Lang. Process. 32: 2764-2776 (2024) - 2021
- [j11]Kun Zhao, Xiaoxian Yang, Wei Xi, Zhiping Jiang, Xiaohong Wang, Zhi Wang, Xinyuan Ji, Zhao Yang, Jizhong Zhao:
HCAR: Human continuous activity recognition using latent structure features. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [j10]Zhi Wang, Yubing Li, Kun Zhao, Wei Shi, Liangliang Lin, Jizhong Zhao:
Worker Collaborative group estimation in spatial crowdsourcing. Neurocomputing 428: 385-391 (2021) - [j9]Kun Zhao, Wei Xi, Zhiping Jiang, Zhi Wang, Hui He, Tao Li, Xiaobin Zhang, Jizhong Zhao:
Indoor Geofencing Based on Sensorless Motion Sensing and Fingerprint Self-Updating. Mob. Networks Appl. 26(2): 851-869 (2021) - 2020
- [j8]Kun Zhao, Wei Xi, Zhi Wang, Jizhong Zhao, Ruimeng Wang, Zhiping Jiang:
SMSS: Secure Member Selection Strategy in Federated Learning. IEEE Intell. Syst. 35(4): 37-49 (2020) - 2019
- [c15]Li Zhu, Xinyu Zhao, Zhi Wang, Jizhong Zhao:
Poster: Continuous Human Activity Recognition Based on WiFi Imaging. EWSN 2019: 256-257 - 2017
- [c11]Kun Zhao, Wei Xi, Jinsong Han, Zhi Wang, Yaoxuan Yuan, Jizhong Zhao:
Efficient CSI Correction with CFO for Uplink MU-MIMO Networks. BigCom 2017: 256-264 - [c10]Yaoxuan Yuan, Jizhong Zhao, Wei Xi, Chen Qian, Xiaobin Zhang, Zhi Wang:
SALM: Smartphone-Based Identity Authentication Using Lip Motion Characteristics. SMARTCOMP 2017: 1-8 - 2016
- [j7]Jinsong Han, Chen Qian, Xing Wang, Dan Ma, Jizhong Zhao, Wei Xi, Zhiping Jiang, Zhi Wang:
Twins: Device-Free Object Tracking Using Passive Tags. IEEE/ACM Trans. Netw. 24(3): 1605-1617 (2016) - [j6]Jinsong Han, Han Ding, Chen Qian, Wei Xi, Zhi Wang, Zhiping Jiang, Longfei Shangguan, Jizhong Zhao:
CBID: A Customer Behavior Identification System Using Passive Tags. IEEE/ACM Trans. Netw. 24(5): 2885-2898 (2016) - [c8]Yuanhang Cai, Wei Xi, Zhi Wang, Kun Zhao, Jinsong Han, Chen Qian, Han Ding, Jizhong Zhao:
CSI feedback reduction by checking its validity period: poster. MobiCom 2016: 469-470 - [c7]Kun Zhao, Wei Xi, Zhiping Jiang, Zhi Wang, Hongliang Luo, Jizhong Zhao, Xiaobin Zhang:
Leveraging Topic Model for CSI Based Human Activity Recognition. MSN 2016: 23-30 - 2014
- [j5]Zhiping Jiang, Wei Xi, Xiangyang Li, Shaojie Tang, Jizhong Zhao, Jinsong Han, Kun Zhao, Zhi Wang, Bo Xiao:
Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-Based Speed Estimation. J. Comput. Sci. Technol. 29(4): 589-604 (2014) - [j4]Rui Li, Kebin Liu, Xiang-Yang Li, Yuan He, Wei Xi, Zhi Wang, Jizhong Zhao, Meng Wan:
Assessing Diagnosis Approaches for Wireless Sensor Networks: Concepts and Analysis. J. Comput. Sci. Technol. 29(5): 887-900 (2014) - [j3]Zhi Wang, Jinsong Han, Wei Xi, Jizhong Zhao:
Efficient and secure key extraction using channel state information. J. Supercomput. 70(3): 1537-1554 (2014) - [c5]Deng Chen, Li Du, Zhiping Jiang, Wei Xi, Jinsong Han, Kun Zhao, Jizhong Zhao, Zhi Wang, Rui Li:
A fine-grained indoor localization using multidimensional Wi-Fi fingerprinting. ICPADS 2014: 494-501 - [c4]Tao Li, Wei Xi, Shaojie Tang, Jinsong Han, Jizhong Zhao, Xiang-Yang Li, Zhi Wang, Zhiping Jiang:
Poster: locating RFID tags by rotation. MobiCom 2014: 379-382 - 2013
- [j2]Rui Li, Jinsong Han
, Zhi Wang
, Jizhong Zhao, Yihong Gong, Xiaobin Zhang:
Tracer: Taming Anomalous Events with CRFID Tags for Trajectory Management. Int. J. Distributed Sens. Networks 9 (2013) - [j1]Zhi Wang
, Han Ding, Jinsong Han
, Jizhong Zhao:
Secure and Efficient Control Transfer for IoT Devices. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [c2]Zhi Wang, Jizhong Zhao, Wei Xi, Zhiping Jiang:
A Scalable P2P Video Conferencing System Based on VCStream Model. ACIS-ICIS 2012: 77-82 - 2011
- [c1]Wei Xi, Jizhong Zhao, Yuan He, Zhi Wang, Lufeng Mo:
Exploiting the Associated Information to Locate Mobile Users in Ubiquitous Computing Environment. MASS 2011: 510-519
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-05-08 02:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint