[1] 盛攀龙.基于红外图像的人流检测技术的研究[D].上海:上海交通大学,2008:11. (SHENG P L. Research on human detecting based on infrared images[D]. Shanghai: Shanghai Jiao Tong University, 2008: 11.) [2] 吴小林.红外光控人流量统计系统[J].现代电子技术,2013,36(20):124-126. (WU X L. Pedestrian flow statistical system based on infrared detection method[J]. Modern Electronics Technique, 2013, 36(20): 124-126.) [3] 吴松,雒江涛,周云峰,等.基于移动网络信令数据的实时人流量统计方法[J].计算机应用研究,2014,31(3):776-779. (WU S, LUO J T, ZHOU Y F, et al. Method of real-time traffic statistics using mobile network signaling[J]. Application Research of Computers, 2014, 31(3): 756-759.) [4] 胡斌杰,詹益旺.基于手机信令的道路交通流量状态识别及预测[J].移动通信,2015,39(10):17-21. (HU B J, ZHAN Y W. Road traffic state identification and prediction based on mobile phone signaling[J]. Mobile Communications, 2015, 39(10): 17-21.) [5] PLAUE M, CHEN M, BÄRWOLFF G, et al. Trajectory extraction and density analysis of intersecting pedestrian flows from video recordings[C]//PIA'11: Proceedings of the 2011 ISPRS Conference on Photogrammetric Image Analysis, LNCS 6952. Berlin: Springer-Verlag, 2011: 285-296. [6] MEHRAN R, OYAMA A, SHAH M. Abnormal crowd behavior detection using social force model[C]//Proceedings of the 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2009: 935-942. [7] FREUDIGER J. How talkative is your mobile device?: an experimental study of Wi-Fi probe requests[C]//Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York: ACM, 2015: Article No. 8. [8] BARBERA M V, EPASTO A, MEI A, et al. Signals from the crowd: uncovering social relationships through smartphone probes[C]//Proceedings of the 2013 Conference on Internet Measurement. New York: ACM, 2013: 265-276. [9] MUSA A B M, ERIKSSON J. Tracking unmodified smartphones using Wi-Fi monitors[C]//Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems. New York: ACM, 2012: 281-294. [10] CUNCHE M, KAAFAR M-A, BORELI R. Linking wireless devices using information contained in Wi-Fi probe requests[J]. Pervasive and Mobile Computing, 2014, 11: 56-69. [11] KÖNINGS B, BACHMAIER C, SCHAUB F, et al. Device names in the wild: Investigating privacy risks of zero configuration networking[C]//Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management. Piscataway, NJ: IEEE, 2013, 2: 51-56. [12] Euclid Analytics. Answers and insights for physical locations[EB/OL].[2015-11-05]. http://www.euclidanalytics.com/. [13] GAST M S. 802.11 ac: A Survival Guide[M]. Sebastopol: O'Reilly, 2013: 8. [14] GAST M S.802.11无线网络权威指南[M].南京:东南大学出版社,2007: 182-211. (MATTHEW S. Gast. 802.11 Wireless Networks: the Definitive Guide[M]. Nanjing: Southeast University Press, 2007: 182-211.) [15] IEEE Standard Association. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)[S]. Piscataway, NJ: IEEE, 2012. [16] ISLAM N N, ZAREEN F. Comparison analysis of wireless network audits using open source tools[D]. Bangladesh: BRAC University, 2014: 21-29 [17] ABEDI N, BHASKAR A, CHUNG E. Bluetooth and Wi-Fi MAC address based crowd data collection and monitoring: benefits, challenges and enhancement[EB/OL]. (2013-10-02)[2015-11-07]. http://atrf.info/papers/2013/2013_abedi_bhaskar_chung.pdf. [18] 牛晓光,李蒙,魏川博,等.一种室内行人行走模式识别和轨迹追踪的方法:201310440455[P].2013-09-25. (NIU X G, LI M, WEI C B, et al. Method for identifying walking mode and tracing track of pedestrian in room: 201310440455[P]. 2013-09-25.) [19] 段渭军,陈世进.无线局域网[EB/OL].[2015-11-06].http://jpkc.nwpu.edu.cn/jp2005/09/main/multibook/4/4-7.htm#15. (DUAN W J, CHEN S J. Wireless network[EB/OL].[2015-11-06]. http://jpkc.nwpu.edu.cn/jp2005/09/main/multibook/4/4-7.htm#15/.) |