Recognizing Emergencies and Multi-User Behavior Patterns Using Imperfect Data From Distributed Access Points. A Non-Intrusive Proof of Concept

0Citations
Citations of this article
37Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper presents a privacy-preserving proof of concept for assessing human behavior in emergency scenarios using aggregated data from multiple WiFi access points. The proposed method focuses on preserving individual privacy by avoiding tracking and metadata analysis, while still achieving effective multi-user activity recognition. To implement our approach, raw data from the Eduroam WiFi network at Polytechnique Montreal was collected and analyzed using standard supervised and anomaly detection techniques. The initial test was on recognizing patterns of academic activity, serving as the foundation for our investigation. Subsequently, the same methodology was applied during an evacuation drill scenario to recognize anomaly situations. Through our research, we demonstrate the potential to assess human situations effectively while safeguarding privacy, providing a critical capability for the early detection of emergency situations.

Cite

CITATION STYLE

APA

Manzanilla-Salazar, O. G., Mellah, H., & Sanso, B. (2023). Recognizing Emergencies and Multi-User Behavior Patterns Using Imperfect Data From Distributed Access Points. A Non-Intrusive Proof of Concept. IEEE Access, 11, 91234–91246. https://doi.org/10.1109/ACCESS.2023.3306328

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free