<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">WiVisit: POI Visit Identification Based on Auto-Generated Wi-Fi Fingerprint</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Qiang</forename><surname>Huang</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Tencent Inc</orgName>
								<address>
									<settlement>Beijing</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Xiang</forename><surname>Li</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Tencent Inc</orgName>
								<address>
									<settlement>Beijing</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Xin</forename><surname>Li</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Tencent Inc</orgName>
								<address>
									<settlement>Beijing</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jiazhi</forename><surname>Ni</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Tencent Inc</orgName>
								<address>
									<settlement>Beijing</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Xin</forename><surname>Zhang</surname></persName>
							<email>deanxzhang@tencent.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Tencent Inc</orgName>
								<address>
									<settlement>Beijing</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ning</forename><surname>Xiao</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Tencent Inc</orgName>
								<address>
									<settlement>Beijing</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hongyi</forename><surname>Liu</surname></persName>
							<email>hongyiliu@tencent.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Tencent Inc</orgName>
								<address>
									<settlement>Beijing</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Chang</forename><surname>Liu</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Tencent Inc</orgName>
								<address>
									<settlement>Beijing</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Youchen</forename><surname>Wang</surname></persName>
							<email>youchenwang@tencent.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Tencent Inc</orgName>
								<address>
									<settlement>Beijing</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">School of Transportation Science and Engineering</orgName>
								<orgName type="institution">Beihang University</orgName>
								<address>
									<settlement>Beijing</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">WiVisit: POI Visit Identification Based on Auto-Generated Wi-Fi Fingerprint</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">B6121F35285F6382BCA647E5A7CAB195</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T02:47+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Wi-Fi Fingerprint</term>
					<term>POI</term>
					<term>Indoor Localization</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Point of Interest (POI) visit is critical information for many location-based services, such as POI recommendation and advertising push. However, most POI visit information is obtained from user's check-in data on social networks, which inevitably contains false visits and misses parts of real visits. Some work has been done to attempt mining POI visits from users' GPS trajectories, but they could not cover indoor POIs. In this paper, we proposed a Wi-Fi fingerprint-based POI visit identification system, WiVisit, in order to get accurate POI visit info, including indoor POIs. Different from traditional Wi-Fi fingerprintbased localization system, WiVisit can generate Wi-Fi fingerprints automatically with Wi-Fi and POI binding info for different POIs without any human effort. Therefore, WiVisit system could be easily and widely deployed in the real world. Moreover, a multi-model fusion based POI visit identification method was used in WiVisit to handle multiple POI types. Finally, extensive real POI visits were collected and used to assess the performance of WiVisit system. WiVisit achieved a 90% recall rate and 83% accuracy from the visited POIs, which already outperformed the state-of-the-art.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The term "Point of Interest" (POI) refers to a geographical location that someone may find interesting, useful, or visit frequently. The POI visit information of a user is very important for a lot of location-based services (LBS), such as push advertisements, next POI recommendation <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b2">3]</ref>. However, most POI visit information is obtained from users' check-in data on locationbased social networks, such as Yelp, Foursquare, and Facebook Places. Due to that POI visit information is pushed by a user manually, there are many missing and fake POI visits. Moreover, if the user pushed the visit information when they left the POI, the best time to push ads will be missed. Therefore, we wanted to build an accurate localization system which can identify real POI visits when users arrive at the POI.</p><p>Some researchers also tried to use GPS trajectory information to identify POI visit <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b5">6</ref>]. However, many POIs are indoor POIs. For these POIs, the GPS signal will be blocked, and the GPS trajectory information will be missing as well. For that reason, utilizing GPS trajectories for indoor POI visit identification is impracticable. In recent years, Wi-Fi devices have been broadly used, and Wi-Fi fingerprint-based localization techniques have been also widely applied in both outdoor and indoor environment. Based on pre-built Wi-Fi fingerprints for each POI, a localization system <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b10">11]</ref> can be used to identify if the user is at a POI and which POI they are visiting. However, in order to achieve this goal, there are several challenges. First, the amount of POI is colossal, and one POI may change frequently due to renovation or relocation. Thus, POI fingerprints are very difficult to collect and update manually. Second, different types of POI have diverse Wi-Fi environments; therefore, the features of fingerprints for distinct POIs will vary considerably.</p><p>In order to solve these challenges, we implemented an auto-generated Wi-Fi fingerprint-based POI visit identification system (WiVisit). Figure <ref type="figure" target="#fig_0">1</ref> shows the framework of WiVisit system. First, we proposed an automatic POI fingerprints collection method. The basic idea is, if the scanned Wi-Fi list in the localization query contains a POI's Wi-Fi and the RSSI is strong enough, the user is most likely to be visiting that POI. That is, they are very close to the Wi-Fi device based on the path loss model <ref type="bibr" target="#b11">[12]</ref> at the POI. In order to obtain POI's Wi-Fi information, we designed a POI-Wi-Fi binding module based on the similarity between names of the POI and Wi-Fi. Applying the POI-Wi-Fi binding information, many in-POI localization queries will be collected automatically, of which the scanned Wi-Fi list contains a POI's Wi-Fi and the RSSI is strong enough. Then, the POI's fingerprints could be built from these queries. Secondly, based on the POIs' type information, we divided all POIs into different groups, and trained different POI visit identification models for each of them. At last, we proposed a multi-model fusion mechanism to combine these models in one. The following are our main contributions in this paper:</p><p>• We proposed a POI-Wi-Fi binding module, which could discover Wi-Fi devices that are placed in the POIs. Based on the POI-Wi-Fi binding information, the WiVisit system could automatically collect and update POI fingerprints without any human effort.</p><p>• We designed a multi-model fusion based POI visit identification method which can be used for different types of POI. • We also conducted extensive experiments to test the performance and effectiveness of WiVisit system in the real world.</p><p>The following sections are organized as follows: Section 2 introduces the related work and Section 3 gives a formal definition of POI visit identification. Section 4 is a detail description about how to generate POI fingerprints automatically. Section 5 introduces the POI visit identification model. Section 6 is the experiments and evaluations about WiVisit, and Section 7 is the conclusion.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Indoor Localization</head><p>Many POIs are placed in an indoor environment, such as stores, shopping malls, restaurants, and bars. Determining whether a user is visiting a POI, rather than just passing through it, can be treated as an indoor localization problem.</p><p>Over the years, many indoor localization technologies have been developed including cameras <ref type="bibr">[13][14]</ref>, sound <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16]</ref>, radio frequency <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b16">17,</ref><ref type="bibr" target="#b17">18,</ref><ref type="bibr" target="#b18">19]</ref>, etc. Camera-based technologies <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14]</ref> can achieve a high accuracy, but the privacy concern of them is a big issue for real-life deployment. Sound-based solutions <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16]</ref> are vulnerable to environmental noises and the coverage is quite small. In addition, dedicated infrastructure is needed for UWBbased <ref type="bibr" target="#b18">[19,</ref><ref type="bibr" target="#b19">20,</ref><ref type="bibr" target="#b20">21]</ref> and Bluetooth-based <ref type="bibr" target="#b16">[17]</ref> solutions. Since Wi-Fi access points are deployed ubiquitously, we focused on Wi-Fi based indoor localization methods in our work.</p><p>Wi-Fi-based indoor localization has drawn a lot of attention from researchers in the last decade. RADAR <ref type="bibr" target="#b6">[7]</ref> is a pioneering system employing Wi-Fi RSSI information as the fingerprint for localization. After which, many RSSI-based indoor fingerprint localization methods have been developed to reduce the offline training load or to improve the accuracy <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b21">22]</ref>. However, these methods still required some human efforts on fingerprint collection and updating, which is impossible for a large number of POIs. In the past few years, some fine-grained CSIbased indoor localization methods have been proposed <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b23">24,</ref><ref type="bibr" target="#b24">25,</ref><ref type="bibr" target="#b25">26,</ref><ref type="bibr" target="#b26">27,</ref><ref type="bibr" target="#b27">28]</ref>. However, only a few commercial Wi-Fi chips could provide the CSI information to users. Hence, CSI-based indoor localization methods cannot be adopted widely in the real world.</p><p>Compared with these methods, WiVisit can automatically generate and update POIs' Wi-Fi fingerprints from localization queries without any human effort. Meanwhile, WiVisit system adopts RSSI information as the fingerprints, which are available on almost all existing Wi-Fi chips. Therefore, the WiVisit system can be deployed in the real world rapidly and widely.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">POI Visit Mining from GPS Trajectory</head><p>GPS system is widely used for outdoor localization. Consequently, in recent years, some researchers tried to mine POI visit events from users' GPS trajectory data <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b5">6]</ref>. They first extracted stay-points from a GPS trajectory as first, then they detected semantic locations from these stay-points and assigned a POI visit information for each location. However, due to privacy concerns, users would not open GPS localization service all the time. For this reason, getting a complete GPS trajectory of a user for POI visit mining is very difficult in the real world. Additionally, in an indoor POI, users may not be able to receive a GPS signal, so they cannot get the GPS location information which is required for POI visit mining.</p><p>In comparison with these methods, WiVisit system does not require users' trajectories. Whenever the user needs position information, the WiVisit system can identify the POI visit based on the user's localization query. Moreover, as Wi-Fi devices are ubiquitous in the world, almost all POIs have deployed their own Wi-Fi devices that WiVisit system can use for POI visit identification.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Definition of POI Visit Identification</head><p>Localization query: A localization query is a user scanned Wi-Fi list that contains Wi-Fi MAC address (𝑚) and RSSI value (𝑟):</p><formula xml:id="formula_0">𝑞𝑢𝑒𝑟𝑦 = {𝑚 1 : 𝑟 1 , 𝑚 2 : 𝑟 2 , . . . , 𝑚 𝐾 : 𝑟 𝐾 }<label>(1)</label></formula><p>where 𝐾 represents the number of scanned Wi-Fi. POI fingerprint: A POI fingerprint (𝐹 𝑃 𝑝 𝑗 ) records Wi-Fi information in a period of localization queries of the POI (𝑝 𝑗 ):</p><formula xml:id="formula_1">𝐹 𝑃 𝑝 𝑗 = {𝑚 𝑗1 : (𝑟 𝑗1 , 𝑜 𝑗1 ); 𝑚 𝑗2 : (𝑟 𝑗2 , 𝑜 𝑗2 ), . . . , 𝑚 𝑗𝑁 : (𝑟 𝑗𝑁 , 𝑜 𝑗𝑁 )}<label>(2)</label></formula><p>where 𝑁 is the number of Wi-Fis, 𝑟 𝑗𝑛 is the median RSSI of the Wi-Fi 𝑚 𝑗𝑛 in the POI (𝑝 𝑗 ) localization queries, used to build fingerprints and 𝑜 𝑗𝑛 is the rate of occurrence:</p><formula xml:id="formula_2">𝑜 𝑗𝑛 = | {𝑞𝑢𝑒𝑟𝑦|𝑚 𝑗𝑛 ∈ 𝑞𝑢𝑒𝑟𝑦 ∧ 𝑞𝑢𝑒𝑟𝑦 ∈ 𝑝 𝑗 } | | {𝑞𝑢𝑒𝑟𝑦|𝑞𝑢𝑒𝑟𝑦 ∈ 𝑝 𝑗 } |<label>(3)</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>POI visit identification:</head><p>The POI visit identification's task is to determine if a localization query is from a POI and which POI it is from, based on the scanned Wi-Fi list in the query and POIs' Wi-Fi fingerprints:</p><formula xml:id="formula_3">𝑝 = ⎧ ⎨ ⎩ arg max 𝑖 𝑃 (𝑝 𝑖 |𝑞𝑢𝑒𝑟𝑦), 𝑃 𝑚𝑎𝑥 ≥ 𝜃, 𝑁 𝑜𝑛𝑒, 𝑃 𝑚𝑎𝑥 &lt; 𝜃 (4)</formula><p>𝜃 is the probability threshold used to determine whether the query is in a POI.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Auto-Generated POIs' Fingerprint</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Wi-Fi POI binding</head><p>Most of Wi-Fi fingerprint based indoor localization systems <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b21">22]</ref> collect fingerprints information by human efforts. However, it is not feasible to create a mass pool of POI Wi-Fi fingerprints manually. Therefore, we proposed an effective Wi-Fi binding method, which is the key point to build Wi-Fi fingerprints of POIs automatically. Wi-Fi is ubiquitous and most of POIs have their own Wi-Fis. We noticed that most POIs have an SSID (Service Set Identifier, the WiFi name that users can see) similar to their POI name. For instance, in China, McDonald's-related Wi-Fi SSIDs are mcd-chinanet or mcdonald's. Because of this, we proposed a POI-Wi-Fi binding method, shown in Figure <ref type="figure" target="#fig_1">2</ref>. First, for each POI name, we used a natural language processing (NLP) interpreter <ref type="bibr">[29,</ref><ref type="bibr" target="#b28">30]</ref> to get its' Chinese name (CN ), Chinese pinyin (PY ), Chinese pinyin abbreviation (PYABB), English name (EN ) and English abbreviation(ENABB), shown in equation 5. Then, a text similarity between each pair of POI and Wi-Fi was computed as following:</p><formula xml:id="formula_4">𝑆(𝑚, 𝑝) = max 𝑆(𝑚 𝑙𝑎𝑏 , 𝑝 𝑙𝑎𝑏 ), 𝑙𝑎𝑏 ∈ {𝐶𝑁, 𝑃 𝑌, 𝑃 𝑌 𝐴𝐵𝐵, 𝐸𝑁, 𝐸𝑁 𝐴𝐵𝐵}<label>(5)</label></formula><p>where 𝑆(𝑚 𝑙𝑎𝑏 , 𝑝 𝑙𝑎𝑏 ) is defined as the text hamming distance. Similarity score is the maximum value among different Wi-Fi POI names.</p><p>In addition to Wi-Fi SSID and POI name's similarity, we also integrated the coordinate distance to the Wi-Fi POI matching score. It is given as:</p><formula xml:id="formula_5">𝐺(𝑚, 𝑝) = {︃ 𝑆(𝑚, 𝑝) − 𝛾𝐷(𝑚, 𝑝), 𝐷(𝑚, 𝑝) &lt;= 𝐷 𝑡ℎ 0, 𝐷(𝑚, 𝑝) &gt; 𝐷 𝑡ℎ (<label>6</label></formula><formula xml:id="formula_6">)</formula><p>where 𝛾 is a normalize factor between similarity and distance, 𝐷(𝑚, 𝑝) is the distance between Wi-Fi and POI, and 𝐷 𝑡ℎ is the distance threshold value to select candidate POI Wi-Fi pair sets for binding process <ref type="foot" target="#foot_0">1</ref> . Finally, we assigned each Wi-Fi to the POI which has the maximum score greater than 𝐺 𝑡ℎ among all candidate POIs. It is formulated as follows:</p><formula xml:id="formula_7">&lt; 𝑝, 𝑚 &gt;= ⎧ ⎨ ⎩ argmax &lt;𝑝 𝑖 ,𝑚&gt; 𝐺(𝑚, 𝑝 𝑖 ), 𝐺 𝑚𝑎𝑥 ≥ 𝐺 𝑡ℎ 𝑁 𝑜𝑛𝑒, 𝐺 𝑚𝑎𝑥 &lt; 𝐺 𝑡ℎ<label>(7)</label></formula><p>where 𝐺 𝑡ℎ is the score threshold for choosing the real matched POI-Wi-Fi-pair.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Automatic POI fingerprints generation</head><p>Applying the POI-Wi-Fi binding information, POI fingerprints can be collected automatically.</p><p>Based on the path loss model <ref type="bibr" target="#b11">[12]</ref>, the further away the user is from the Wi-Fi device, the lower the power of received Wi-Fi signal is. Thus, if a user visits a POI, the scanned POI Wi-Fi's RSSI will be higher than the user outside of the POI. For a localization query, if a scanned Wi-Fi in the query is a POI-Wi-Fi and the RSSI value is high enough<ref type="foot" target="#foot_1">2</ref> , the localization query is likely to have taken place in the POI, and was used to build the POI fingerprint information. This way, based on a period of localization queries, the fingerprint information of POIs can be generated.</p><p>For WiVisit system, the POI fingerprint records all Wi-Fi that were scanned in the history localization queries at that POI. For each Wi-Fi, it contains two statistics information, median RSSI value and the rate of occurrence, which are defined in Section 3.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">POI Visit Identification Model</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.">Sample Extraction</head><p>To train the POI visit identification model, first, we need extract a set of in-POI and out-POI queries as train samples. Similar to fingerprint generation, for WiVisit system, the in-POI queries are those that contain a POI WiFi and the RSSI value is high enough and without additional GPS info. In addition, for the WiVisit system, to make sure that the out-POI queries take place not only truly outside the POIs, but also not far from them, the out-POI queries are extracted based on three criteria: (1) they contain GPS info and their GPS location accuracy [33], <ref type="bibr">[34]</ref> is no larger than 30 meters; (2) their distance from POI positions is less than 100 meters; (3) they contain one binding Wi-Fi in their scanned Wi-Fi lists at least. Due to that the Wi-Fi signal can penetrate walls, a Wi-Fi can be scanned in multiple neighboring POIs, meaning a WiFi can appear in different POI fingerprints. Consequently, each query can generate multiple feature vectors for different POIs, whose fingerprint contains at least one Wi-Fi that is in the scanned Wi-Fi list of the query, which makes a query sample potentially correspond to multiple training samples for our identification model. For this reason, we label each sample as follows:</p><p>1. If query recalls a different POI from its raw-extracted POI, the corresponding feature vector is treated as a negative sample to the recalled POIs. 2. If a query recalls the same POI as its raw-extracted POI, the original label is used.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2.">Feature Extraction</head><p>Recently, almost all POIs deploy their own Wi-Fi routers to provide Wi-Fi services for their employees and visitors. Therefore, when a user visits a POI, the POI's Wi-Fi devices will appear on the scanned Wi-Fi list of the user. However, the range of that a Wi-Fi can be scanned is limited. If a user does not visit a POI, the user is likely to fail to scan the POI's Wi-Fi. There is a strong correlation between scanned Wi-Fi and POI visit, which is crucial for POI visit identification. Thus, given a Wi-Fi query and a POI 𝑝, 𝑃 (𝑝|𝑞𝑢𝑒𝑟𝑦) is the probability of the query occurring in POI. We extracted several features from four dimensions to reflect 𝑃 (𝑝|𝑞𝑢𝑒𝑟𝑦).</p><p>1. 𝑃 (𝑚|𝑝 𝑗 ) is defined as the probability of Wi-Fi 𝑚 scanned when users visit a POI 𝑝 𝑗 . First, we assume that each Wi-Fi scanned in a query is independent from one another. Based on the bayes formula, the posterior probability 𝑃 (𝑝 𝑗 |𝑞𝑢𝑒𝑟𝑦) is proportional to the likelihood function 𝐿(𝑞𝑢𝑒𝑟𝑦|𝑝 𝑗 ).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>𝐿(𝑞𝑢𝑒𝑟𝑦|𝑝</head><formula xml:id="formula_8">𝑗 ) = 𝑘=𝐾 ∏︁ 𝑘=1 𝑃 (𝑚 𝑘 |𝑝 𝑗 ) (<label>8</label></formula><formula xml:id="formula_9">)</formula><p>where 𝐾 is the number of scanned Wi-Fi. 𝑃 (𝑚 𝑘 |𝑝 𝑗 ) can be approximate as the rate of occurrence 𝑜 𝑗𝑘 . Thus, the first posterior probability feature is:</p><formula xml:id="formula_10">𝐹 1 = 𝑘=𝐾 ∑︁ 𝑘=1 𝑙𝑜𝑔𝑃 (𝑚 𝑘 |𝑝 𝑗 )<label>(9)</label></formula><p>However, not all of the Wi-Fi are independence with each other. Thus, we also chose some statistics features about 𝑃 (𝑚 𝑘 |𝑝 𝑗 ), which do not require independence between the Wi-Fi:</p><formula xml:id="formula_11">𝐹 2 = 𝑚𝑎𝑥(log 𝑃 (𝑚 𝑘 |𝑝 𝑗 ))<label>(10)</label></formula><formula xml:id="formula_12">𝐹 3 = 𝑚𝑒𝑎𝑛(log 𝑃 (𝑚 𝑘 |𝑝 𝑗 ))<label>(11)</label></formula><p>2. Due to that Wi-Fi signals can penetrate walls, a POI's Wi-Fi can sometimes still be scanned even when the user is outside. However, in those cases, the user is usually further away from the POI's Wi-Fi device than in the POI, which makes the signal strength of the POI's Wi-Fi weaker. Moreover, due to the obstruction of walls, the received signal strength will also be weaker when the user is outside. For these reasons, the RSSI of POI's Wi-Fi is also very important for POI visit identification. Therefore, we calculated RSSI weighted posterior probability based on the following likelihood function:</p><formula xml:id="formula_13">𝑃 𝛼 (𝑚 𝑘 , 𝑟 𝑘 |𝑝 𝑗 ) = 𝛽 𝑘 𝑃 (𝑚 𝑘 |𝑝 𝑗 )<label>(12)</label></formula><p>where 𝛽 𝑘 = [(𝑟 𝑘 + 𝑟 𝑚𝑎𝑥 )/𝑟 𝑚𝑒𝑎𝑛 ] 𝛼 . Similar to Equation 9-11, we can get RSSI weighted posterior probability features:</p><formula xml:id="formula_14">𝐹 4 = 𝑘=𝐾 ∑︁ 𝑘=1 𝑙𝑜𝑔𝑃 𝛼 (𝑚 𝑘 , 𝑟 𝑘 |𝑝 𝑗 )<label>(13)</label></formula><p>With different 𝛼, we can get different likelihood functions, which will generate different posterior probability features based on Equation <ref type="formula" target="#formula_14">13</ref>. Then, we can get a set of RSSI weighted posterior probability features. 3. In recent years, Wi-Fi is used not only to connect to the Internet, but also to communicate between smart home devices. In an indoor environment, for example, in addition to routers, there are many smart devices with Wi-Fi chips that can be scanned, such as smart TV, intelligent speakers, smart air-conditioners. Therefore, when a user is in a POI, the scanned RSSI of smart devices could also be very strong. Then, the proportion of strong Wi-Fi in the scanned Wi-Fi list will be very high. However, if the user is outside the POI, due to the obstruction of walls and their increasing distance from the smart devices and routers, the proportion of strong Wi-Fi in the scanned Wi-Fi list will decrease. Based on this intuition, we also extracted posterior probability features between POI and Wi-Fi that is filtered by the absolute RSSI value. For these features, the likelihood function can be represented as follow:</p><formula xml:id="formula_15">𝑃 𝑓 (𝑚 𝑘 |𝑝 𝑗 ) = {︃ 𝑃 (𝑚 𝑘 |𝑝 𝑗 ), 𝑟 𝑘 ≥ 𝑟 𝑓 0, 𝑟 𝑘 &lt; 𝑟 𝑓<label>(14)</label></formula><p>where 𝑟 𝑓 is the absolute RSSI threshold. For different absolute RSSI thresholds, based on Equation <ref type="formula" target="#formula_15">14</ref>, the RSSI filtered posterior probability feature can be represented as:</p><formula xml:id="formula_16">𝐹 5 = 𝑘=𝐾 ∑︁ 𝑘=1 𝑙𝑜𝑔𝑃 𝑓 (𝑚 𝑘 |𝑝 𝑗 )<label>(15)</label></formula><p>With different 𝑟 𝑓 , we can get a set of absolute RSSI filtered features. 4. For commercial Wi-Fi devices, the RSSI measurements of Wi-Fi signal will be influenced by antennas, quality of Wi-Fi chips, the position of holding the phone, etc. Thus, even in the same location, different phones scanning the same Wi-Fi will have different RSSI values. Sometimes, features generated by the absolute RSSI value will introduce such bias. Therefore, we extracted some posterior probability features between the POI and Wi-Fi that is filtered by relative RSSI information to remove this bias. First, we extracted marginal features for the query::</p><formula xml:id="formula_17">𝐹 6 = ∑︁ 𝑘∈𝑄 𝑡𝑜𝑝(𝑥) log 𝑃 (𝑚 𝑘 |𝑝)<label>(16)</label></formula><p>where 𝑄 𝑡𝑜𝑝(𝑥) is the set of the highest 𝑥 Wi-Fi based on RSSI value in the scanned Wi-Fi list of the query. Meanwhile, we extracted the edge distribution probability features for the POI:</p><formula xml:id="formula_18">𝐹 7 = ∑︁ 𝑘≤𝐾∧𝑚 𝑘 ∈𝐿 𝑡𝑜𝑝(𝑠) log 𝑃 (𝑚 𝑘 |𝑝 𝑗 )<label>(17)</label></formula><p>where 𝐿 𝑡𝑜𝑝(𝑠) means the highest 𝑠 Wi-Fi based on median RSSI value in the fingerprint of the POI. And finally, we extracted the joint probability features:</p><formula xml:id="formula_19">𝐹 8 = ∑︁ 𝑘∈𝑄 𝑡𝑜𝑝(𝑥) ∧𝑚 𝑘 ∈𝐿 𝑡𝑜𝑝(𝑠) log 𝑃 (𝑚 𝑘 |𝑝 𝑗 )<label>(18)</label></formula><p>Based on Equation <ref type="formula" target="#formula_17">16</ref>-18, with different 𝑥 and 𝑠, we can also get a set of relative RSSI filtered features. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3.">Training Model</head><p>As described in section 5.2, based on different values of hyper-parameters, we used a 784dimensions feature vector to represent each train sample. Meanwhile, the lightGBM <ref type="bibr" target="#b30">[32]</ref> classification model was used to build the POI visit identification model. For the lightGBM model, we had chosen the gradient Boosting Decision tree (GBDT) as the boosting tree and binary log-loss as the loss function. The number of leaves for each tree was set as 127. Meanwhile, to avoid over-fitting, the feature fraction was set as 0.6 and the bagging fraction was set as 0.7.</p><p>All other parameters of lightGBM model were used as their default values.</p><p>To deal with hybrid POI types, we trained 61 sub-models by dividing query samples into 61 parts based on their POI info, and then combined their predicted results to get the final result by voting. If the number of sub-models, which gives visit prediction, is larger than 30 (i.e. half of 61), the final prediction is visit and the highest score POI is the visited POI. Figure <ref type="figure" target="#fig_2">3</ref> shows the full POI visit identification model training workflow.</p><p>Moreover, in order to improve the robustness and generalization of WiVisit, we brought in several optimization methods:</p><p>1. POI queries balance: Different POIs will have different popularity. A popular POI will have more localization queries than an unpopular POI. The unbalanced query numbers of different POIs will affect the generalization of the model. Therefore, during the sample extraction phase, the maximum number of query samples in each POI is limited. 2. Training samples balance: For most of POIs, the number of negative samples is much larger than positive samples. In order to get more effective parameter estimation, we adopted random under-sampling on negative samples for each POI. Finally, for each POI, the number of negative samples is no more than 1.2 times of positive samples.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.4.">Online Prediction</head><p>Finally, we can use the trained model to predict POI visit information. In detail, for a user localization query with scanned Wi-Fi list, the related POIs' fingerprints are extracted from the fingerprint database, whose fingerprint contains at least one Wi-Fi in the scanned Wi-Fi list of the query. For each POI, the feature vector is computed, and visit prediction of sub-models is added to obtained the final visiting score. If there is at least one POI predicted as visited finally, we selected the POI with the highest visiting score as the visiting result.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">EVALUATION</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.1.">Experiment Settings</head><p>In order to evaluate WiVisit system, we extracted the top 6 hot types ('Entertainment', 'Life services', 'Restaurant', 'Shopping', 'Fitness', 'Hotel') of POIs in Beijing from Tencent Map <ref type="bibr" target="#b29">[31]</ref>, which contained 210 sub-types and had more than 90,000 POIs in total. We then applied our POI Wi-Fi binding module, introduced in Section 4, to these POIs, to get POI Wi-Fi information. We extracted these Wi-Fis which occurred at least once in last two weeks of all Tencent localization queries as the candidate Wi-Fi set to binding POI. The size of candidate Wi-Fi set is about several billions. Due to the large number of Wi-Fi existing, for a given POI, all similar Wi-Fi to the given POI cannot be computed within a reasonable time. Therefore, given a POI, we only extracted the set of Wi-Fi whose distances from the POI is less than 200 meters (𝐷 𝑡ℎ ) which is large enough compared with common indoor Wi-Fi coverage area. The threshold 𝐷 𝑡ℎ is used for filtering a small candidate binding Wi-Fi set to each POI. The normalization factor 𝛾 was set as 0.005, which means that the score of one POI-Wi-Fi pair will be equal to 0 if their similarity is 1 but their distance is larger than 𝐷 𝑡ℎ = 200. To assess the accuracy of POI-Wi-Fi binding module, we manually labeled 20,000 POI-Wi-Fi pairs as the benchmark data set. The accuracy of different binding score thresholds was calculated and shown in Figure <ref type="figure" target="#fig_3">4</ref>. Finally, POI-Wi-Fi pairs with binding scores larger than 0.8 and accuracy larger than 98% were used to generate POI fingerprints.</p><p>After POI-Wi-Fi binding, we obtained 42278 POIs which had binding Wi-Fi. For these POIs, we extracted raw user queries from 20210301 to 20210304 to build the fingerprint database. To train the POI identification model, we collected localization queries from 20210305 to 20210306 as the training set of WiVisit. To evaluate the identification performance, we collected localization queries from another two days (20210307, 20210308) as the test set to compare different methods. Moreover, we also manually collected real POI visited queries to evaluate the performance of WiVisit in the real world. For each POI, the visited queries are collected from two collectors with two different types of mobile phones and staying five minutes at least. The POI identification model consists of 61 sub-models. These sub-models were trained parallelly in cluster mode, whose training time is no more than half an hour. Online prediction is triggered on a server  when one query is received. Based on our test, the average time of predicting is less than 30ms per query. The detailed information of these sample sets is shown in Table <ref type="table" target="#tab_0">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.2.">Compared Methods</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">BASE0:</head><p>The rule for labeled visiting samples, that is, if at least one scanned Wi-Fi in the query is a binding Wi-Fi and the RSSI value is higher than -50db without any GPS info, then the query is visit sample and the corresponding POI is the visited POI. For evaluation, we only compare BASE0 with other methods in manual set. 2. BASE1: One intuitive assumption is that one localization query having more overlapped Wi-Fi with a POI fingerprint is more likely to occur in this POI. Based on this assumption, we computed ratios of Wi-Fi overlapping between a localization query and POIs' fingerprints.</p><formula xml:id="formula_20">𝑅 𝑗 = | {𝑚|𝑚 ∈ 𝑞𝑢𝑒𝑟𝑦 ∧ 𝑚 ∈ 𝐹 𝑃 𝑗 } | | {𝑚|𝑚 ∈ 𝑞𝑢𝑒𝑟𝑦} |<label>(19)</label></formula><p>Where 𝑅 𝑗 is the ratio of Wi-Fi overlapping between the query and POI 𝑗. If the maximum overlapping ratio is larger than the given threshold, this query is labeled as a visit query and the POI corresponding to the maximum ratio is the visited POI. In order to choose the best threshold, we plotted the overlapping ratios between query and its associated POI for each training sample shown in Figure <ref type="figure" target="#fig_4">5</ref> <ref type="foot" target="#foot_2">3</ref> . As shown in the figure, the best threshold is 0.84. 3. BASE2: In addition to the ratio of Wi-Fi overlapping, we included the RSSI strength and the rate of occurrence of each Wi-Fi to define a visiting score as follows:</p><formula xml:id="formula_21">𝑃 𝑣 (𝑝 𝑗 |𝑞𝑢𝑒𝑟𝑦) = ∑︁ 𝑚 𝑖 𝑤 𝑖 𝑜 𝑗𝑖<label>(20)</label></formula><p>where 𝑃 𝑣 (𝑝 𝑗 |𝑞𝑢𝑒𝑟𝑦) is defined as the score of a user in POI 𝑝 𝑗 with the scanned query, and 𝑤 𝑖 is the weight of Wi-Fi 𝑚 𝑖 in query with 𝑟 𝑖 . Based on the path loss model <ref type="bibr" target="#b11">[12]</ref>, the weight function is 𝑤 𝑚 𝑖 = 10 (𝑟 𝑖 −𝑟 0 )/𝑟 𝑡ℎ , where 𝑟 𝑖 is the signal strength of Wi-Fi 𝑚 𝑖 , 𝑟 0 is the maximum of RSSIs of the given query, and 𝑟 𝑡ℎ is a measure of divergence of all RSSIs. In our evaluation, 𝑟 𝑡ℎ was fixed as 50. 𝑜 𝑗𝑖 is the co-occur probability of 𝑝 𝑗 and 𝑚 𝑖 , which was defined in Section 3. For this method, the best threshold is 0.12, with the highest F score in the Train Set. 4. WiVisit-1: The same classification model as WiVisit with only one lightGBM model. 5. WiVisit: Our fusion POI-visiting model for different POI types.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.3.">Metrics</head><p>For POI visit identification, the objective is to not only determine if a localization query occurs in a POI, but also to identify which POI it is from. Thus, we used four dimensions metrics (precision, recall, F score, accuracy) to evaluate the performance. The following are definitions about these metrics: </p><formula xml:id="formula_22">• TP: {𝑞𝑢𝑒𝑟𝑦|(𝑝𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑣𝑖𝑠𝑖𝑡) ∧ (𝑟𝑒𝑎𝑙 𝑣𝑖𝑠𝑖𝑡)} • FP: {𝑞𝑢𝑒𝑟𝑦|(𝑝𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑣𝑖𝑠𝑖𝑡) ∧ (𝑟𝑒𝑎𝑙 𝑢𝑛-𝑣𝑖𝑠𝑖𝑡)} • FN: {𝑞𝑢𝑒𝑟𝑦|(𝑝𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑢𝑛-𝑣𝑖𝑠𝑖𝑡) ∧ (𝑟𝑒𝑎𝑙 𝑣𝑖𝑠𝑖𝑡)}</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.4.">Results</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.4.1.">Test Set</head><p>First, we compared these methods on the Test Set, which was collected by the same rules as the Training Set, but in different time period. Table <ref type="table" target="#tab_1">2</ref> shows the evaluation result. BASE1 can accurately determine whether the user is visiting (92.3% Precision), but its predicted POI is not the real visited (39.3% Accuracy). That is, POIs with the maximum of overlapping Wi-Fis were not always the visited POIs. BASE2 had a higher recall rate and accuracy, which means the RSSI and rate of co-occurrence is more useful to find the right visited POI. However, the lower precision means it's not enough to decide whether a localization query is occurring in a POI. Compared with these two baseline methods, WiVisit-1 achieved much better performance in both POI visit judgment and final visited POI identification. Moreover, compared with WiVisit-1, since the fusion model is more robust in various POIs, WiVisit could obtained about 10% improvements in both precision and accuracy.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.4.2.">POI Types</head><p>We further compared these methods in different POI types, since the different types of POI had various Wi-Fi environments. As shown in Figure <ref type="figure" target="#fig_6">6</ref>, for the 6 types of POIs, we used the F scores to show the performance on POI visit judgment and accuracies to show the performance on final visited POI identification. For POI visit judgment, as shown in the figure, BASE1 and WiVisit-1 yielded a similar performance while WiVisit-1 yielded a more robust result in different types of POIs. BASE2 gave in the worst F score with a much better accuracy for visited POI identification. Obviously, BASE1 and BASE2 were both affected by POI types, especially for "Hotel". WiVisit-1 and WiVisit achieved much robust performance in terms of F score and accuracy. Moreover, WiVisit obtained much better performance in all types of POIs compared with other methods.   </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.4.3.">Manual Set Comparison</head><p>We further compared the above methods on the Manual Set, shown in Table <ref type="table">III</ref>. Since Manual Set only contained visit samples, we only used recall and accuracy to assess the performance. BASE0 achieved 100% accuracy, meaning the rule for visit query extraction was very effective.</p><p>Meanwhile, strict rules have caused a lower recall rate 32.4% for BASE0. BASE1 obtained a remarkable improvement in recall rate. However, it did not achieve a reasonable accuracy. BASE2 had a much better balance performance in both recall and accuracy. The accuracy is much lower than the recall which means that both BASE1 and BASE2 still cannot distinguish the true visited POI among POI dense area. WiVisit1 and WiVisit still had the best performance than other methods. While WiVisit had a similar recall rate with BASE2, it achieved a significant accuracy improvement from 73.3% to 83.6%.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Conclusion</head><p>In this paper, we proposed an auto-generated Wi-Fi fingerprint-based POI visiting identification system, WiVisit, which collects accurate user' POI visit information, including indoor POIs. It is crucial for various LBS. Meanwhile, compared with traditional Wi-Fi fingerprint-based localization methods, WiVisit does not require any human effort in fingerprint collection and updating. Therefore, WiVisit can be deployed in the real world widely and easily. Moreover, WiVisit system adopts a multi-model fusion based method for POI visit identification, which can deal with different types of POI in the real world. Based on our extensive experiments, the recall rate of WiVisit is around 90% and the accuracy is 83%, which already outperforms state-of-the-art. However, there are still many POIs cannot be bound with Wi-Fis, due to their irregular Wi-Fi SSID or no Wi-Fi device is deployed in them. In the future, crowd-sourcing methods can be used to collect more POIs' Wi-Fi information, which will make WiVisit system versatile for more POIs in the real world.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Framework of WiVisit.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: POI-Wi-Fi binding module. Based on the similarity among different forms of POI name, Wi-Fi SSID and their coordinate distance, a set of precise Wi-Fi POI binding pairs were created.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: POI visit identification model training workflow.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Wi-Fi POI binding score vs. accuracy.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Ratio of overlapping Wi-Fi.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Comparison of different methods over different POI types. POI types shorted as follows. E: Entertainment, L: Life services, R: Restaurant, S: Shopping, F: Fitness, H: Hotel</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc></figDesc><table><row><cell>Sample Sets</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Data Set</cell><cell>Time</cell><cell cols="3">POI Set In-POI Out-POI</cell></row><row><cell>Train</cell><cell>20210305-20210306</cell><cell>42278</cell><cell cols="2">1178542 1994754</cell></row><row><cell>Test</cell><cell>20210307-20210308</cell><cell>19506</cell><cell>61349</cell><cell>61012</cell></row><row><cell cols="2">MANUAL 20210307-20210320</cell><cell>592</cell><cell>6237</cell><cell>0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Test Set Performance</figDesc><table><row><cell></cell><cell cols="2">Method</cell><cell cols="3">Precision Recall F Score Accuracy</cell></row><row><cell></cell><cell cols="2">BASE1</cell><cell>92.3%</cell><cell>80.8%</cell><cell>0.86</cell><cell>39.3%</cell></row><row><cell></cell><cell cols="2">BASE2</cell><cell>51.6%</cell><cell>83.6%</cell><cell>0.64</cell><cell>66.3%</cell></row><row><cell></cell><cell cols="2">WiVisit-1</cell><cell>81.1%</cell><cell>96.2%</cell><cell>0.88</cell><cell>73.4%</cell></row><row><cell></cell><cell cols="2">WiVisit</cell><cell>91.5%</cell><cell>96.4%</cell><cell>0.94</cell><cell>83.4%</cell></row><row><cell cols="5">• HP: {𝑞𝑢𝑒𝑟𝑦|(𝑝𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑃 𝑂𝐼) ≡ (𝑟𝑒𝑎𝑙 𝑃 𝑂𝐼)}</cell></row><row><cell cols="2">• Precision: 𝑃 𝑃 𝑉 =</cell><cell cols="2">|𝑇 𝑃 | |𝑇 𝑃 |+|𝐹 𝑃 |</cell><cell></cell></row><row><cell>• Recall: 𝑇 𝑃 𝑅 =</cell><cell cols="2">|𝑇 𝑃 | |𝑇 𝑃 |+|𝐹 𝑁 |</cell><cell></cell><cell></cell></row><row><cell cols="3">• F score: 2×𝑃 𝑃 𝑉 ×𝑇 𝑃 𝑅 𝑃 𝑃 𝑉 + 𝑇 𝑃 𝑅</cell><cell></cell><cell></cell></row><row><cell cols="3">• Accuracy: |𝐻𝑃 | |𝑇 𝑃 |+|𝐹 𝑃 |</cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3</head><label>3</label><figDesc>Manual Set Comparison</figDesc><table><row><cell cols="3">Methods Recall Accuracy</cell></row><row><cell>BASE0</cell><cell>32.4%</cell><cell>100%</cell></row><row><cell>BASE1</cell><cell>65.4%</cell><cell>63.7%</cell></row><row><cell>BASE2</cell><cell>88.4%</cell><cell>73.3%</cell></row><row><cell cols="2">WiVisit-1 84.4%</cell><cell>80.7%</cell></row><row><cell>WiVisit</cell><cell>87.2%</cell><cell>83.6%</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">Wi-Fi positions were calculated from history localization logs, which is omitted due to out of scope of this paper. POI positions obtained from Tencent Map<ref type="bibr" target="#b29">[31]</ref>.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">For WiVisit system, we choose −50𝑑𝑏 as the threshold.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">We remove samples whose overlapping ratio is 1 to make the figure easy to read. For negative samples, 1overlapping-ratio samples are no more than 0.5%. For Positive sample, 1-overlapping-ratio samples are nearly 73.2%.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Exploiting geographical influence for collaborative point-of-interest recommendation</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Yin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W.-C</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D.-L</forename><surname>Lee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of SIGIR&apos;11</title>
				<meeting>SIGIR&apos;11</meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="325" to="334" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Friendship and mobility: User movement in location-based social networks</title>
		<author>
			<persName><forename type="first">E</forename><surname>Cho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Myers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Leskovec</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of SIGKDD&apos;11</title>
				<meeting>SIGKDD&apos;11</meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="1082" to="1090" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Spatial-aware hierarchical collaborative deep learning for poi recommendation</title>
		<author>
			<persName><forename type="first">H</forename><surname>Yin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Knowledge and Data Engineering</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="2537" to="2551" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Personalized visited-poi assignment to individual raw gps trajectories</title>
		<author>
			<persName><forename type="first">J</forename><surname>Suzuki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Suhara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Toda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Nishida</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Spatial Algorithms Syst</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Learning significant locations and predicting user movement with gps</title>
		<author>
			<persName><forename type="first">D</forename><surname>Ashbrook</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Starner</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings. Sixth International Symposium on Wearable Computers</title>
				<meeting>Sixth International Symposium on Wearable Computers</meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="101" to="108" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Mining significant semantic locations from gps data</title>
		<author>
			<persName><forename type="first">X</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Cong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">S</forename><surname>Jensen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. VLDB Endow</title>
				<meeting>VLDB Endow</meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="1009" to="1020" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Radar: an in-building rf-based user location and tracking system</title>
		<author>
			<persName><forename type="first">P</forename><surname>Bahl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Padmanabhan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings IEEE INFOCOM</title>
				<meeting>IEEE INFOCOM</meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="775" to="784" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Ariel: Automatic wi-fi based room fingerprinting for indoor localization</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Pan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Lv</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">P</forename><surname>Dick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hannigan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Shang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of UbiComp&apos;12</title>
				<meeting>UbiComp&apos;12</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="441" to="450" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Enhancing wifi-based localization with visual clues</title>
		<author>
			<persName><forename type="first">H</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Shangguan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Yi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of UbiComp&apos;15</title>
				<meeting>UbiComp&apos;15</meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="963" to="974" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">The horus wlan location determination system</title>
		<author>
			<persName><forename type="first">M</forename><surname>Youssef</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Agrawala</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of MobiSys&apos;05</title>
				<meeting>MobiSys&apos;05</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="205" to="218" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Wifi-based indoor positioning for multi-floor environment</title>
		<author>
			<persName><forename type="first">H.-H</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y.-N</forename><surname>Yang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">TENCON 2011 -2011 IEEE Region 10 Conference</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="597" to="601" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<author>
			<persName><forename type="first">T</forename><surname>Rappaport</surname></persName>
		</author>
		<title level="m">Wireless Communications: Principles and Practice</title>
				<imprint>
			<publisher>Prentice Hall PTR</publisher>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
	<note>2nd ed</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Automatic tracking of human motion in indoor scenes across multiple synchronized video streams</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Cai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Aggarwal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Sixth International Conference on Computer Vision</title>
				<imprint>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page" from="356" to="362" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A survey of video datasets for human action and activity recognition</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Chaquet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">J</forename><surname>Carmona</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Fernández-Caballero</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Comput. Vis. Image Underst</title>
		<imprint>
			<biblScope unit="volume">117</biblScope>
			<biblScope unit="page" from="633" to="659" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Cat: High-precision acoustic motion tracking</title>
		<author>
			<persName><forename type="first">W</forename><surname>Mao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Qiu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of MobiCom&apos;16</title>
				<meeting>MobiCom&apos;16</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="69" to="81" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Turning a mobile device into a mouse in the air</title>
		<author>
			<persName><forename type="first">S</forename><surname>Yun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y.-C</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Qiu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of MobiSys&apos;</title>
				<meeting>MobiSys&apos;</meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="15" to="29" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Bluetooth indoor localization with multiple neural networks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Altini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Brunelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Farella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Benini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 5th International Symposium on Wireless Pervasive Computing</title>
				<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="295" to="300" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Tagoram: Real-time tracking of mobile rfid tags to high precision using cots devices</title>
		<author>
			<persName><forename type="first">L</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X.-Y</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Xiao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of MobiCom&apos;14</title>
				<meeting>MobiCom&apos;14</meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="237" to="248" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Localization via ultra-wideband radios: a look at positioning aspects for future sensor networks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gezici</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Tian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Giannakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Kobayashi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Molisch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Poor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Sahinoglu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Signal Processing Magazine</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="page" from="70" to="84" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Uwb positioning for industrial applications: the galvanic plating case study</title>
		<author>
			<persName><forename type="first">A</forename><surname>Martinelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Jayousi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Caputo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Mucchi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IPIN&apos;19</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="7" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Evaluation of range error calibration models for indoor uwb positioning applications</title>
		<author>
			<persName><forename type="first">H</forename><surname>Perakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Gikas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IPIN&apos;</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="206" to="212" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Enhancing wifi rss fingerprint positioning accuracy: lobe-forming in radiation pattern enabled by an air-gap</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lembo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Horsmanheimo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Somersalo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Laukkanen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Tuomimäki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Huilla</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IPIN&apos;19</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Monophy: Mono-stream-based device-free wlan localization via physical layer information</title>
		<author>
			<persName><forename type="first">H</forename><surname>Abdel-Nasser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Samir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Sabek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Youssef</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Wireless Communications and Networking Conference</title>
				<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="4546" to="4551" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Indoor localization without the pain</title>
		<author>
			<persName><forename type="first">K</forename><surname>Chintalapudi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Iyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">N</forename><surname>Padmanabhan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of MobiCom&apos;10</title>
				<meeting>MobiCom&apos;10</meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="173" to="184" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Dynamic-music: Accurate device-free indoor localization</title>
		<author>
			<persName><forename type="first">X</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Xiong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Mei</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of UbiComp&apos;16</title>
				<meeting>UbiComp&apos;16</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="196" to="207" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Fila: Fine-grained indoor localization</title>
		<author>
			<persName><forename type="first">K</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Xiao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Yi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">M</forename><surname>Ni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings IEEE INFOCOM</title>
				<meeting>IEEE INFOCOM</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="2210" to="2218" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Decimeter-level localization with a single wifi access point</title>
		<author>
			<persName><forename type="first">D</forename><surname>Vasisht</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Katabi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">NSDI&apos;16</title>
				<imprint>
			<publisher>USENIX Association</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="165" to="178" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Enhanced csi fingerprinting localization for massive machine-type communications in wi-fi ambient connectivity</title>
		<author>
			<persName><forename type="first">B</forename><surname>Berruet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Baala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Caminada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Guillet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E-Loc</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IPIN&apos;19</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<title/>
		<author>
			<persName><surname>Tencent Fanyijun</surname></persName>
		</author>
		<ptr target="https://fanyi.qq.com" />
		<imprint>
			<date type="published" when="2021-07-02">July 2, 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<title level="m" type="main">Tencent map</title>
		<ptr target="http://map.qq.com" />
		<imprint>
			<date type="published" when="2021-07-02">July 2, 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Lightgbm: A highly efficient gradient boosting decision tree</title>
		<author>
			<persName><forename type="first">G</forename><surname>Ke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Meng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Finley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Ye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T.-Y</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Neural Information Processing Systems</title>
				<editor>
			<persName><forename type="first">I</forename><surname>Guyon</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">U</forename><forename type="middle">V</forename><surname>Luxburg</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Bengio</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Wallach</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Fergus</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Vishwanathan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Garnett</surname></persName>
		</editor>
		<imprint>
			<publisher>Curran Associates, Inc</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="volume">30</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
