Professional Documents
Culture Documents
Bag: Behavior-Aware Group Detection in Crowded Urban Spaces Using Wifi Probes
Bag: Behavior-Aware Group Detection in Crowded Urban Spaces Using Wifi Probes
net/publication/333076097
CITATIONS READS
14 3,164
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Jiaxing Shen on 10 September 2019.
1400
of time (less than 1 second) [8]. The higher frequency a phone is 1200 Selected times
used, the more NoB is generated. Unlike RSSI, NoB is resilient to 1000
# of people
crowded environments since it only cares about whether there are 800
probes or not. 600
The vision of BaG, however, entails sparsity and fusing chal- 400
lenges when applied to real conditions. 200
1) How to handle spatiotemporal sparsity of WiFi data? First, an 0
0 0 0 00 00 00 00 00 00 00 00 00 00 0 0 0
07:0 08:0 09:0 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20:0 21:0 22:0
area is usually covered by a limited number of APs (spatial spar-
sity). Second, the probing frequency of a smartphone is affected Figure 1: Average number of people in a day in the mall.
by many factors like operating systems and users’ usage patterns
[8] (temporal sparsity). The data in common of two users could be
much sparser. Measuring user similarity with such data could lead could be found in Section 4. Although it is difficult to define crowd-
to highly biased and unreliable results. edness directly, different numbers of onsite people could reflect
2) How to cluster users fusing mobility and behaviors? The inte- different levels of crowdedness. Figure 1 highlights selected times
gration of mobility and behaviors remains an open issue. Mobility of the experiment and the average number of people in the mall. The
and behaviors have latent associations since both of them are differ- order of crowdedness is 12:00 > 16:00 > 7:00.
ent perspectives of the real grouping information. Simply combing In each experiment, we recruit around 10 volunteer groups (each
them like calculating their arithmetic mean might limit the potential group consists of 2 ∼ 5 people) and record their grouping informa-
of hidden associations and thus derive unsatisfactory results. tion and MAC addresses. We install an app on their smartphones to
For the sparsity challenge, we first represent mobility and behav- record screen on-off states as phone usage events. To ensure the au-
ior information into two matrices respectively. Then we apply matrix thenticity, volunteers are only told to keep WiFi enabled and behave
factorization (MF) to handle data sparsity by decomposing an input as normal without knowing the purposes of the experiment.
matrix into the product of several factor matrices. For the fusing
challenge, we consider sparsity-constrained collective nonnegative 2.1 RSS Difference vs. Groups
MF (SCNMF). The advantages are two-fold. First, collective MF RSSI methods calculate RSS (received signal strength) difference
(CMF) takes the correlation of both input matrices into consideration of two users. To this end, we first process users’ WiFi data with an
by factorizing them simultaneously. Second, the sparsity constraint interval of 60 seconds, as probes are sent in a granularity of minutes
of CMF makes it an alternative for clustering so that grouping results [12]. Then user i’s WiFi data in the t-th minute is represented as a
could be derived directly without extra clustering processes. vector
According to our experimental evaluation with 82 volunteer groups vit = [rss 1 , rss 2 , · · · , rss N ], (1)
in a large shopping mall, BaG achieves robust and reliable perfor- where rssn represents received signal strength of the n-th AP, N is
mance in scenarios with different levels of crowdedness. Compared the number of total APs. If no RSS is available for AP n, then rssn
with baseline approaches, BaG improves F-score of detection by is set to 0. According to [36], RSS difference of users i and j at time
3.97% ∼ 15.79% in labeled data and 6.67% ∼ 20.69% in synthetically t could be calculated with Eq. 2 and 3:
labeled data, respectively.
1 rss i − rssaj
d(vit , vtj ) =
Õ
Our main contributions are summarized as follows. · a (2)
|Ai ∩ A j |
• We introduce a new improvement of group detection in crowded a ∈Ai ∩A j
environments: phone usage behaviors. Ai = k rsski , 0, k ∈ [1, N ]
(3)
• A new feature (NoB) is extracted from WiFi probes that could
The averaged RSS difference D(i, j) over all common time slots is
effectively capture phone usage behaviors.
calculated with Eq. 4, where T is a set of common time slots of user
• We propose a new group detection method (SCNMF) that
i and j.
fuses mobility and behaviors and derives the grouping results 1 Õ
without extra clustering processes. D(i, j) = d(vit , vtj ), (4)
|T |
t ∈T
The remainder of this paper is organized as follows. We present
Then we derive a distribution Xд (k) of D(i, j) for all group pairs
preliminaries in Section 2. Section 3 introduces design details of
appear in time slot k ∈ 7 : 00, 12 : 00, 16 : 00 . Formal definition
BaG, followed by experimental evaluation of the system in Section
of Xд (k) is shown in Eq. 5, where boolean function д(i, j) returns
4. Related work is introduced in Section 5. We conclude this paper
‘True’ when user i and j are from the same group and Uk is a set of
and introduce the future work in the last section.
users appear in time slot k. Similarly, for all non-group pairs, we
have another distribution Xд̃ (k).
2 PRELIMINARIES
Xд (k) = D(i, j)д(i, j) = True; i, j ∈ Uk
First of all, we use a two-day pilot study to illustrate relationships of (5)
the following variables in crowded environments: 1) RSS difference Xд̃ (k) = D(i, j)д(i, j) = False; i, j ∈ Uk
vs. groups 2) Phone usage behaviors vs. groups ; 3) Phone usage Usually, Xд (k) and Xд̃ (k) overlap to some extent, so we cannot eas-
behaviors vs. NoB. ily find a cut-off point that completely separates both distributions.
Experiments are conducted in a large shopping mall where we However, the smaller the overlap, the better the separation perfor-
have deployed 20 APs to sniff WiFi probes. More detailed settings mance. To compare the effectiveness of using RSS difference more
BaG: Behavior-aware Group Detection in Crowded Urban Spaces using WiFi Probes WWW2019, May 2019, USA
Normalized NoB
0.4 0.4
Correlation
07:00-auc:0.92 07:00-auc:0.93 0.6
12:00-auc:0.72 12:00-auc:0.87 0.7
0.2 0.2 0.4
16:00-auc:0.83 16:00-auc:0.89 0.6
0.0 0.0 0.2
0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0 0.0
False Positive Rate False Positive Rate 0.5
0.2
0.4 0.2 0.0 0.2 0.4 0.6 0.8 1.0 1.2
(a) RSS difference (b) Behavior difference 07:00 12:00 16:00 Screen-on Ratio
(a) (b)
Figure 2: ROC curves of different features at selected times. (a)
With RSS difference; (b) With behavior difference.
Figure 3: (a) Boxplot of the correlation for all users at selected
times; (b) An example of correlation analysis of screen-on ratio
objectively, we exploit Receiver Operating Characteristic (ROC) and normalized NoB for a single user.
curve, which is usually used to illustrate the diagnostic ability of a
binary classifier system as its discrimination threshold varies. The
of wireless packets to predict the screen on-off states and achieves
curve is created by plotting the true positive rate (TPR) against the
an accuracy ranging from 93% to 100%. NoB is different from the
false positive rate (FPR) at various threshold settings.
work in two aspects. First, only WiFi probes are used here. Second,
Figure 2a shows the comparison of ROC curves using RSS dif-
we use the number of bursts instead of the number of packets.
ference at selected times. It is clear that the effectiveness of dif-
We represent user i’s NoB feature with a NoB vector:
ferent times varies significantly, indicating RSS difference is not a
consistent feature in crowded environments. Besides, the order of ni = [n 1 , n 2 , · · · , nt , · · · ], (9)
effectiveness is 7:00 > 16:00 > 12:00, which is exactly the opposite where nt is the number of bursts in the t-th minute. To handle the
order of the crowdedness. This implies crowded environment might impact of device diversity, we further calculate a normalized NoB
have a significant negative impact on RSSI methods. vector with Eq. 10, where max(.) find the largest element of an input
vector.
2.2 Smartphone Usage Behaviors vs. Groups n̂i = ni /max(ni ) (10)
To represent phone usage behaviors, we use a straightforward way. If To analyze the correlation between smartphone usage behaviors
a smartphone is in use, the screen must be on. Otherwise, the screen and NoB, we calculate the Pearson Correlation Coefficient of the
is off. To represent user i’s usage behaviors, we use a behavior vector normalized NoB vector (n̂i ) and the behavior vector (bi ) for users in
bi : all experiments. Figure 3a shows the boxplot of the correlation from
s1 s2 st
bi = [ , , · · · , , · · · ], (6) all users. It is clear that smartphone usage behaviors and NoB are
60 60 60
where st is a total number of seconds when the screen is on in the closely correlated in different crowdedness settings. Furthermore,
t-th minute. Behavior difference D ′ (i, j) of user i and j is measured an example of correlation analysis for a single user is illustrated in
with Euclidean distance in Eq. 7. Figure 3b. The correlation coefficient and the p-value are 0.88 and
s 2.1e −31 , respectively, which shows it is significant that screen-on
1 Õ i j ratio is positively correlated with NoB for the user. Furthermore, we
D ′ (i, j) = (s − st )2 (7)
60 t =1 t could find that the correlation is higher when both variables are small.
This means if the screen is on, it is more likely that the smartphone
The behavior difference distributions Yд (k) and Yд̃ (k) at time k are will send probes.
defined as:
Yд (k) = D ′ (i, j)д(i, j) = True; i, j ∈ Uk
(8) 3 SYSTEM DESIGN
Yд̃ (k) = D ′ (i, j)д(i, j) = False; i, j ∈ Uk In this section, we elaborate on design details of BaG. The overview
Similarly, we draw ROC curves for Yд (k) and Yд̃ (k). As shown in of the proposed system is illustrated in Figure 4. First, we passively
Figure 2b, the ROC curves at different times are close to each other, sniff WiFi probes from different devices (Data Collection). Then we
indicating behavior difference is stable in different crowdedness filter out data from non-mobile users (Data filtering) and separate the
settings. Besides, the performance (AUC, area under curve, are all filtered data into several crowds (User Partition). Besides, mobility
over 0.85) proves behavior difference is effective for group detection. and behavior related features are extracted and represented in matri-
ces (Feature Extraction). Last, we use collective matrix factorization
to fuse two matrices and derive grouping results (Group Detection)
2.3 Smartphone Usage Behaviors vs. NoB without extra clustering processes.
Although different smartphones have different probing patterns, it is
reported that a smartphone will send more probes when the screen 3.1 Data Collection
is on [8]. Therefore, the more frequently a smartphone is used, the We exploit off-the-shelf WiFi APs to sniff WiFi probes from nearby
more NoB is generated. A recent research work [15] uses the number devices and upload the data to a server. The AP configurations are
WWW2019, May 2019, USA Jiaxing Shen, Jiannong Cao, and Xuefeng Liu
Data Collection Data Filtering User Partition Feature Extraction Group Detection System
Component
Decision-tree Temporal Feature Collective Matrix
Classifier Analyzing Exactor Factorization
Technique Used
Mobile Users Crowds Feature Matrices Groups
u1 u2 u3 u4
u1 u2 u3 u4
t1 0.1 1 1
t2
ap1 0.8 0.7 0.2 0.1
0.5 Generated Data
ap2 0.6 0.8 0.1
t3 0.6 1 0.1
ap3 0.2 0.1
t4 1 0.8 0.2
ap4 0.6 0.7
t5 0.1 0.4 0.5
ap5 0.1 0.1 0.7 0.8 Data Flow
Figure 5: Filtering out WiFi data from non-mobile users. 2:00 ∼ 4:00, most public places are closed, and most of the people
are in sleep. Last, with the help of two scenario-dependent param-
eters τmin and τmax which represent the minimum and maximum
as follows: AR9341 (WLAN chip), 64M (RAM), and 8M (Flash dwell time, we could filter out data from staffs and passersby. In our
Memory). We use those APs for collecting probe requests only since system, we empirically set τmin = 10 and τmax = 240 which means
they have limited computational and storage capacity. people stay for at least 10 minutes and up to 4 hours. This setting
Each AP works under OpenWrt2 with a virtual network interface is based on our observation and is intended to identify customer
enabled in monitor mode. We use Tcpdump (a utility for capturing groups. If we want to detect staff groups, both parameters should be
network traffic) to sniff WiFi probes and upload the collected data to relatively larger.
the server at 2:00 AM when the bandwidth is fully available. Once Lastly, we extract desired fields from WiFi probes. For each WiFi
the upload process is complete, local WiFi data will be deleted to probe, we can get the following data entry:
make space for the new coming data.
< Timestamp, Device_MAC, AP_MAC >,
3.2 Data Filtering where Timestamp indicates the time of receiving a probe, MAC is
Data filtering services as a preprocessing of the raw WiFi data in- MAC address which uniquely represents a smartphone or an AP.
cluding three steps: combat with MAC randomization, filter out data
from non-mobile users, and extract useful data fields. 3.3 User Partition
To prevent third parties from tracking devices with MAC (Media Instead of detecting groups out of all mobile users in a whole day,
Access Control) address, several vendors have implemented MAC we first utilize temporal constraint of groups to separate users into
address randomization which implies that probe requests no longer different crowds and then identify groups out of each crowd. The
use the real MAC address of the device. However, this mechanism main advantage of user partition is that the efficiency of group
may not work as expected in reality since it is reported defeated detection can be greatly improved since it breaks down the original
in several recent works [8, 21, 37]. Besides, this randomization problem into many subproblems which can be solved independently.
mechanism is not activated in the majority of old devices, especially
for Android systems. We follow the practice described in [21] to The idea of the temporal constraint is very simple. The time gap
defeat MAC randomization. of the appearance of groups members would never be too large. An
As the collected data may come from stationary devices (like illustration is shown in Figure 6. For an extreme example, group
desktops and IP cameras) and mobile devices, we remove the data members would not appear separately in the morning and in the
of non-mobile users devices with a simple decision-tree classifier night. Formally, the temporal constraint is defined as
as illustrated in Figure 5. If a MAC is not in OUI (Organizationally max(|tai − ta j |) ≤ ψ , (11)
Unique Identifier) list, it might be a forged MAC or from unreg-
istered companies which makes no sense to us. Then we use the where tai means the appearance time of user i and ψ is a threshold.
routine of human activities to filter out stationary devices as during The physical meaning of parameter ψ is the dwell time of the most
people. The selection of ψ is discussed in Section 4.
2 OpenWrt is a highly extensible GNU/Linux distribution for embedded devices (typi- Then we equally partition the daytime into non-overlapping frag-
cally wireless routers). ments using ψ . The partition process is depicted in Figure 6. For
BaG: Behavior-aware Group Detection in Crowded Urban Spaces using WiFi Probes WWW2019, May 2019, USA
Code Features Method Table 1: Detailed results of dif- Table 2: Detailed results of dif-
ferent α when β = 0.2. ferent β when α = 0.5.
R-M G RSSI MCL verify NoB
RN-M G RSSI + NoB MCL
verify Mobility α precision recall F-score β precision recall F-score
MN-M G Mobility + NoB MCL
BaG M Mobility + NoB SCNMF verify CMF .1 .861 .887 .874 .1 .815 .912 .861
.3 .897 .898 .897 .2 .822 .918 .867
G Graph Approach M Matrix Approach
.5 .822 .914 .866 .3 .829 .915 .870
.7 .743 .884 .807 .4 .813 .905 .857
Figure 9: Illustration of baseline approaches. .9 .690 .847 .760 .5 .817 .896 .855
fp
tp
Recall(R) = tp+f n g : Group matrix approach with RSSI and NoB since it is non-trivial to find an
F-score = 2 · P·R
g̃ f n tn g̃ : Non-group appropriate way of representing RSSI in the matrix format.
P+R
4.1.6 Parameter selection. In this system, there are 3 param-
4.1.5 Baseline approaches. As mentioned in Introduction, eters to determine: ψ for user partition (Section 3.3) and α, β for
two of our contributions are an effective feature (NoB) and a cluster- group detection (Section 3.5).
ing method (CMF) for detecting groups. To verify the effectiveness In user partition, ψ represents the maximum duration time of
of both NoB and CMF, we set three baselines R-M, RN-M, and onsite customers. As discussed in Section 3.3, the physical meaning
MN-M. A baseline has two important components: feature(s) and of ψ is the dwell time of customers. While Figure 8 shows that 95%
method. Figure 9 shows detailed configurations of all approaches. customers stay in the mall for less than 2 hours. Therefore, we set ψ
According to the clustering methods used, those approaches can be to 120 minutes in our system.
further classified as graph approach (using Markov Cluster algo- For group detection, parameter α controls the relative impor-
rithm, MCL) and matrix approach (using SCNMF). Steps of graph tance of connectivity matrix over NoB matrix. According to the
approaches: 1) Measure user similarity based on some features. 2) results shown in Table 1, we set α to 0.3. Generally, small α is pre-
Construct a user graph with users as nodes and their similarities as ferred since connectivity matrix contains coarse-grained mobility
edge weights. 3) Run graph clustering algorithms to derive clusters information that has limited capacity to detect groups in crowded
or groups. environments. Parameter β balances the trade-off between accuracy
For different graph approaches, different feature combinations are of approximation and sparseness. The performance of different β
used to measure user similarity. For multiple features, we combine is illustrated in Table 2. Even though the performance is not that
WWW2019, May 2019, USA Jiaxing Shen, Jiannong Cao, and Xuefeng Liu
0.30 it also proves NoB has the capability to capture the underlying
R-M 7.3% 16.9% 23.2% R-M 12.6% 22.4% 27.0% 0.25
0.20 grouping information in different crowdedness settings.
RN-M 1.8% 4.5% 8.4% RN-M 2.8% 5.3% 8.9% 0.15 The second issue is that in the least crowded setting RN-M slightly
0.10
MN-M 3.3% 3.4% 5.2% MN-M 5.9% 6.6% 7.4% 0.05
outperforms MN-M, but the situation is just the opposite in the most
0.00 crowded setting. This phenomenon results from different recall de-
7:00 16:00 12:00 7:00 16:00 12:00
Labeled dataset Synthetically labeled dataset clining rates. When the crowdedness increases, both methods be-
come worse, but recall of RN-M declines faster than that of MN-M.
Potential reasons for different declining rates might be as follows.
Figure 10: Performance gain ratios of BaG. RSSI is more fine-grained than mobility but it is also more unreliable
when the environment gets crowded since people frequently move
around and hold their smartphones in different ways. In crowded
sensitive to β, too big β is undesirable since that might lead to worse
environments, group users might have low similarity based on RSSI
approximation [17], so β is set to 0.2.
distance measurement and thus generate more false negative detec-
tions (groups are detected as non-groups) that degrade recall.
4.2 Evaluation
To support this, in Figure 11 we show an example of similarity
As explained in Section 2.1, we use the number of onsite people matrices from a single experiment in 12:00 with 3 groups. As we can
to represent different crowdedness settings. To have a comprehen- see in Figure 11a, some group users (like e and f ) have low similarity
sive understanding of the performance of BaG, the evaluation is using RSSI. Although NoB has a certain effect, the improvement is
further explained with two datasets, four approaches, three feature quite limited as illustrated in Figure 11b. As a contrast in Figure 11c,
combinations, and two clustering methods. the combination of mobility and NoB measures user similarity in a
4.2.1 Two datasets. According to Figure 1, the order crowded- better way as mobility is more coarse-grained and thus insensitive to
ness for selected hours is 12:00 > 16:00 > 7:00. Detailed perfor- environmental changes.
mance of all approaches on labeled and synthetically labeled datasets
are shown in Table 3 and 4, respectively. 4.2.4 Two clustering methods. Two clustering methods refer
Compared with labeled dataset, all approaches have worse per- to graph approach and matrix approach. We could compare them by
formance on the synthetically labeled dataset. This is reasonable matching the performance of BaG and MN-M from performance
since changes of the number of people to be detected might alter the tables and Figure 10. Overall, BaG slightly outperforms MN-M in
clustering results. Besides, the probability that strangers are close to all situations ranging from 3.3% ∼ 7.4%.
each other or have similar smartphones usage patterns are likely to The main advantage of the matrix approach relies on the fusion
increases with the number of people. of mobility and NoB. Mobility and NoB are two different perspec-
Interestingly, the average change of precision (−11.1%) is more tives of the real grouping information and thus have some hidden
significant than that of recall (−0.7%) over all approaches and times. associations. With collective matrix factorization, we could simulta-
One possible reason is the boost of negative samples increases false neously factorize them to reveal their hidden associations. While in
detections especially false positive detections (non-groups are de- the graph approach mobility and NoB are simply combined using
tected as groups) and leads to a significant decline in precision. arithmetic mean which might have limited the potential of the latent
4.2.2 Four approaches. Averaging the performance over all association.
times, BaG improves F-score by 3.97% ∼ 15.79% and 6.67% ∼
20.69% in labeled and synthetically labeled datasets, respectively.
5 RELATED WORK
We further demonstrate the performance of BaG by showing the
F-score gain ratio over baselines. The ratio is defined in Eq. 19 Group detection can be classified as vision-based approaches, sensor-
where bl represents a baseline approach. based approaches, and WiFi-based approaches according to different
means.
F − F bl
F-score gain ratio = BaG , (19) Vision-based approaches regard group detection as a task of
F bl clustering set of users’ trajectories into disjoint subsets [9, 33]. How-
As shown in Figure 10, the ratio increases with the crowdedness in- ever, this kind of methods have some apparent limitations. First of
dicating BaG is more accurate and reliable in crowded environments. all, the biggest issue is privacy erosion. Besides, video surveillance
Besides, the improvement is slightly higher in synthetically labeled suffers from environmental issues such as non-line-of-sight, and low
data. brightness.
Sensor-based approaches use wearable devices or install apps
4.2.3 Three feature combinations. R-M, RN-M, and MN-M
on smartphones to collect users’ behavioral data. Groups are detected
are all based on the same clustering method, so we could match
through correlation analysis of multiple sensor data. For instance,
them to compare the performance of different feature combinations.
MIT researchers use specially designed wearable devices called “So-
From the performance tables, we have identified two issues on
ciometric Badges” [24, 25, 32] to measure group behavior through
both datasets. First, the performance of feature combinations with
face-to-face interaction and physical proximity. Some research works
NoB (RN-M and MN-M) are consistently higher than the other
[18, 20, 29] combine several sensor modalities (WiFi, accelerometer,
approach (R-M) over all times. The reasons might be two-fold. On
compass, etc) to measures users similarity. However, these methods
one hand, the additional feature NoB has been used. On the other,
BaG: Behavior-aware Group Detection in Crowded Urban Spaces using WiFi Probes WWW2019, May 2019, USA
1a 1b 2c 2d 3e 3f 3g 3h 1a 1b 2c 2d 3e 3f 3g 3h 1a 1b 2c 2d 3e 3f 3g 3h
1a 1 0.54 0.24 0.49 0.74 0.31 0.2 0.05 1a 1 0.58 0.44 0.2 0.6 0.33 0.12 0.25 1a 1 0.77 0.36 0.31 0.25 0.03 0.03 0.15
1b 0.54 1 0.44 0.56 0.42 0.52 0.55 0.12 1b 0.58 1 0.43 0.46 0.36 0.45 0.45 0.12 1b 0.77 1 0.43 0.5 0.38 0.47 0.47 0.04
2c 0.24 0.44 1 0.78 0.12 0.26 0.35 0.39 2c 0.44 0.43 1 0.83 0.23 0.38 0.35 0.46 2c 0.36 0.43 1 0.92 0.13 0.35 0.35 0.45
2d 0.49 0.56 0.78 1 0.35 0.44 0.47 0.22 2d 0.2 0.46 0.83 1 0.41 0.49 0.38 0.35 2d 0.31 0.5 0.92 1 0.19 0.48 0.48 0.32
3e 0.74 0.42 0.12 0.35 1 0.49 0.61 0.51 3e 0.6 0.36 0.23 0.41 1 0.57 0.66 0.65 3e 0.5 0.38 0.13 0.19 1 0.72 0.81 0.62
3f 0.31 0.52 0.26 0.44 0.49 1 0.72 0.8 3f 0.33 0.45 0.38 0.49 0.57 1 0.81 0.64 3f 0.03 0.47 0.35 0.48 0.72 1 1 0.79
3g 0.2 0.55 0.35 0.47 0.61 0.72 1 0.7 3g 0.12 0.45 0.35 0.38 0.66 0.81 1 0.92 3g 0.03 0.47 0.35 0.48 0.81 1 1 0.87
3h 0.05 0.12 0.39 0.22 0.51 0.8 0.7 1 3h 0.25 0.12 0.46 0.35 0.65 0.64 0.92 1 3h 0.15 0.04 0.45 0.32 0.62 0.79 0.87 1
Figure 11: User similarity matrix from a single experiment in 12:00 using different feature combinations. Alphabets represent people,
numbers reveal their grouping information. For example, 1a means user a is in group 1.
might be difficult to collect data on a scale, as they require user in- usage behaviors. SCNMF could reveal the hidden associations be-
tervention which would be cumbersome in some scenarios. Besides, tween mobility and behaviors by decomposing them simultaneously.
engaging multiple sensors drains smartphone battery more quickly. The experimental evaluation in a large shopping mall demonstrates
WiFi-based approaches utilize the information contained in the effectiveness and robustness of BaG in scenarios with differ-
probe request to detect groups. Compared to other approaches, ent levels of crowdedness. Compare to baseline approaches, BaG
WiFi-based approaches do not require high deployment cost or shows a significant improvement by increasing F-score of detec-
user intervention. The probe contains significant information like tion by 3.97% ∼ 15.79% in labeled dataset and 6.67% ∼ 20.69% in
time stamp, smartphone MAC address, RSSI, and SSID, which en- synthetically labeled dataset respectively.
ables a wide range of applications like passive tracking [7], crowd
counting[28, 39], and facility utilization analysis [27]. SSID and 7 ACKNOWLEDGMENTS
RSSI are two frequently used information to detect groups. Cunche We sincerely appreciate the efforts of the anonymous reviewers
et. al. [1, 2, 5] link different smartphones through SSID similar- and their insightful comments for improving this manuscript. The
ity. However, 80% of the devices reply with empty SSID list [14], presented work was supported by National Key R&D Program of
approaches that rely on SSID may not work well anymore. Then China (2018 YFB1004801). It was also partially supported by Shen-
researchers’ focus transfer to RSSI which indicate users’ mobil- zhen Basic Research Funding Scheme (JCYJ20170818104222072),
ity. Kjærgaard et. al. [19] extract spatial features, signal-strength NSFC with project No. 61332004 and 61572218.
features, and pseudo-spatial features from signal strength to detect
social groups which they call pedestrian flocks. It is found that the
performance of spatial features is unreliable, since mapping RSSI
REFERENCES
[1] Marco V Barbera, Alessandro Epasto, Alessandro Mei, Vasile C Perta, and Julinda
into locations is not accurate enough. Besides, the mapping process Stefa. [n. d.]. Signals from the crowd: uncovering social relationships through
itself is usually time-consuming and labor-intensive. To avoid the smartphone probes. In Proceedings of ACM IMC, 2013.
cumbersome mapping process, directly measure the similarity of [2] Ningning Cheng, Prasant Mohapatra, Mathieu Cunche, Mohamed Ali Kaafar,
Roksana Boreli, and Srikanth Krishnamurthy. [n. d.]. Inferring user relationship
RSSI fingerprints to detect co-located mobile users. These methods from hidden information in wlans. In Proceedings of MILCOM, 2012.
get rid of absolute locations, thus eliminate labor-intensive cali- [3] Yohan Chon, Suyeon Kim, Seungwoo Lee, Dongwon Kim, Yungeun Kim, and
Hojung Cha. [n. d.]. Sensing WiFi packets in the air: practicality and implications
bration and protect users’ privacy. SocialProbe [12] considers the in urban mobility monitoring. In Proceedings of ACM Ubicomp, 2014.
hardware diversity and uses the normalized RSSI vector to achieve [4] Varoth Chotpitayasunondh and Karen M Douglas. 2016. How "phubbing" be-
co-location detection. However, hardware difference is not the only comes the norm: The antecedents and consequences of snubbing via smartphone.
Computers in Human Behavior (2016).
factor, other factors like body attenuation, environmental disturbance, [5] Mathieu Cunche, Mohamed Ali Kaafar, and Roksana Boreli. [n. d.]. I know who
and multipath fading can also significantly affect RSSI. Therefore, you will meet this evening! linking wireless devices using wi-fi probe requests. In
RSSI based approach may not achieve reliable performance in some Proceedings of WoWMoM, 2012.
[6] Marzieh Dashti, Mohd Amiruddin Abd Rahman, Hamed Mahmoudi, and Holger
scenarios, especially in crowded urban spaces like shopping malls. Claussen. [n. d.]. Detecting co-located mobile users. In Proceedings of IEEE ICC,
SNOW [31] focuses on a certain type of group in shopping malls 2015.
[7] Adriano Di Luzio, Alessandro Mei, and Julinda Stefa. [n. d.]. Mind your probes:
using WiFi data from associated devices rather than WiFi probes. De-anonymization of large crowds through smartphone WiFi probe requests. In
Proceedings of IEEE INFOCOM, 2016.
[8] Julien Freudiger. [n. d.]. How talkative is your mobile device?: an experimental
study of Wi-Fi probe requests. In Proceedings of ACM WiSec, 2015.
6 CONCLUSION [9] Weina Ge, Robert T Collins, and R Barry Ruback. 2012. Vision-based analysis of
small groups in pedestrian crowds. IEEE TPAMI (2012), 1003–1016.
In this paper, we present a group detection system (BaG) that is veri- [10] Nicolas Gillis and François Glineur. 2012. A multilevel approach for nonnegative
fied reliable and accurate in different crowdedness settings. One of matrix factorization. J. Comput. Appl. Math. (2012), 1708–1723.
our main contributions is a new feature (NoB) extracted from WiFi [11] A Haigh. 2015. Stop phubbing.
[12] Hande Hong, Chengwen Luo, and Mun Choon Chan. [n. d.]. SocialProbe: Under-
probes. NoB could effectively capture phone usage patterns which is standing Social Interaction Through Passive WiFi Monitoring. In Proceedings of
a new perspective for detecting groups. The second contribution is a ACM MobiQuitous, 2016.
new detection method (SCNMF) that fuses mobility information and [13] Timothy M Hospedales, Jian Li, Shaogang Gong, and Tao Xiang. 2011. Identifying
rare and subtle behaviors: A weakly supervised joint topic model. IEEE TPAMI
WWW2019, May 2019, USA Jiaxing Shen, Jiannong Cao, and Xuefeng Liu
(2011). Computer Vision, 2009 IEEE 12th International Conference on. IEEE.
[14] Xueheng Hu, Lixing Song, Dirk Van Bruggen, and Aaron Striegel. [n. d.]. Is there [27] Thor S Prentow, Antonio J Ruiz-Ruiz, Henrik Blunck, Allan Stisen, and Mikkel B
wifi yet?: How aggressive probe requests deteriorate energy and throughput. In Kjærgaard. 2015. Spatio-temporal facility utilization analysis from exhaustive
Proceedings of ACM IMC, 2015. wifi monitoring. Pervasive and Mobile Computing (2015).
[15] Shuja Jamil, Sohaib Khan, Anas Basalamah, and Ahmed Lbath. [n. d.]. Classifying [28] Lorenz Schauer, Martin Werner, and Philipp Marcus. [n. d.]. Estimating crowd
smartphone screen ON/OFF state based on wifi probe patterns. In Proceedings of densities and pedestrian flows using wi-fi and bluetooth. In Proceedings of EAI
ACM UbiComp, 2016. MOBIQUITOUS, 2014.
[16] Hyunsoo Kim and Haesun Park. 2008. Nonnegative matrix factorization based on [29] Rijurekha Sen, Youngki Lee, Kasthuri Jayarajah, Archan Misra, and Rajesh Kr-
alternating nonnegativity constrained least squares and active set method. SIAM ishna Balan. [n. d.]. Grumon: Fast and accurate group monitoring for heteroge-
journal on matrix analysis and applications (2008), 713–730. neous urban spaces. In Proceedings of ACM SenSys, 2014.
[17] Jingu Kim and Haesun Park. 2008. Sparse nonnegative matrix factorization for [30] Souvik Sen, Romit Roy Choudhury, and Srihari Nelakuditi. [n. d.]. SpinLoc: Spin
clustering. Technical Report. Georgia Institute of Technology. once to know your location. In Proceedings of Workshop on ACM MobiSys, 2012.
[18] Mikkel Baun Kjærgaard, Martin Wirz, Daniel Roggen, and Gerhard Tröster. [n. d.]. [31] Jiaxing Shen, Jiannong Cao, Xuefeng Liu, and Shaojie Tang. 2018. SNOW:
Detecting pedestrian flocks by fusion of multi-modal sensors in mobile phones. In Detecting Shopping Groups Using WiFi. IEEE Internet of Things Journal (2018).
Proceedings of ACM UbiComp, 2012. [32] Jiaxing Shen, Oren Lederman, Jiannong Cao, Florian Berg, Shaojie Tang, and
[19] Mikkel Baun Kjærgaard, Martin Wirz, Daniel Roggen, and Gerhard Tröster. [n. Alex Pentland. 2018. GINA: Group Gender Identification Using Privacy-Sensitive
d.]. Mobile sensing of pedestrian flocks in indoor environments using wifi signals. Audio Data. In 2018 IEEE International Conference on Data Mining (ICDM).
In Proceedings of IEEE PerCom, 2012. IEEE, 457–466.
[20] Youngki Lee, Chulhong Min, Chanyou Hwang, Jaeung Lee, Inseok Hwang, [33] Francesco Solera, Simone Calderara, and Rita Cucchiara. 2016. Socially con-
Younghyun Ju, Chungkuk Yoo, Miri Moon, Uichin Lee, and Junehwa Song. [n. strained structural learning for groups detection in crowd. IEEE TPAMI (2016).
d.]. Sociophone: Everyday face-to-face interaction monitoring platform using [34] Sandra Soto, Elva M Arredondo, Miguel T Villodas, John P Elder, Elena Quintanar,
multi-phone sensor fusion. In Proceedings of ACM MobiSys, 2013. and Hala Madanat. 2016. Depression and chronic health conditions among latinos:
[21] Jeremy Martin, Travis Mayberry, Collin Donahue, Lucas Foppe, Lamont Brown, The role of social networks. Journal of immigrant and minority health (2016),
Chadwick Riggins, Erik C Rye, and Dane Brown. 2017. A study of MAC address 1292–1300.
randomization in mobile devices and when it fails. Proceedings on Privacy [35] Robert Tibshirani. 2011. Regression shrinkage and selection via the lasso: a retro-
Enhancing Technologies (2017). spective. Journal of the Royal Statistical Society: Series B (Statistical Methodol-
[22] S Anne Moorhead, Diane E Hazlett, Laura Harrison, Jennifer K Carroll, Anthea ogy) (2011), 273–282.
Irwin, and Ciska Hoving. 2013. A new dimension of health care: systematic review [36] Geert Vanderhulst, Afra Mashhadi, Marzieh Dashti, and Fahim Kawsar. [n. d.].
of the uses, benefits, and limitations of social media for health communication. Detecting human encounters from wifi radio signals. In Proceedings of ACM
Journal of medical Internet research (2013). MUM, 2015.
[23] Kazuaki Nakamura, Tsukasa Ono, and Noboru Babaguchi. [n. d.]. Detection of [37] Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo S Cardoso, and Frank
groups in crowd considering their activity state. In Proceedings of IEEE ICPR, Piessens. 2016. Why MAC address randomization is not enough: An analysis of
2016. Wi-Fi network discovery mechanisms. In Proceedings of ACM ASIACCS, 2016.
[24] Daniel Olguın Olguın, Peter A Gloor, and Alex Sandy Pentland. [n. d.]. Capturing ACM.
individual and group behavior with wearable sensors. In Proceedings of AAAI, [38] T Wiesenthal, G Leduc, P Cazzola, W Schade, and J Köhler. 2011. Mapping
2009. innovation in the European transport sector. An assessment of R&D efforts and pri-
[25] Daniel Olguín Olguín, Benjamin N Waber, Taemie Kim, Akshay Mohan, Koji Ara, orities, institutional capacities, drivers and barriers to innovation. JRC Scientific
and Alex Pentland. 2009. Sensible organizations: Technology and methodology for and Technical Report (2011).
automatically measuring organizational behavior. IEEE Transactions on Systems, [39] Wei Xi, Jizhong Zhao, Xiang-Yang Li, Kun Zhao, Shaojie Tang, Xue Liu, and
Man, and Cybernetics, Part B (Cybernetics) (2009). Zhiping Jiang. [n. d.]. Electronic frog eye: Counting crowd using wifi. In Proceed-
[26] Stefano Pellegrini, Andreas Ess, Konrad Schindler, and Luc Van Gool. 2009. ings of IEEE INFOCOM, 2014.
You’ll never walk alone: Modeling social behavior for multi-target tracking. In