Self-Supervised Learning for WiFi CSI-Based Human Activity Recognition:
A Systematic Study
- URL: http://arxiv.org/abs/2308.02412v1
- Date: Wed, 19 Jul 2023 06:21:15 GMT
- Title: Self-Supervised Learning for WiFi CSI-Based Human Activity Recognition:
A Systematic Study
- Authors: Ke Xu, Jiangtao Wang, Hongyuan Zhu, Dingchang Zheng
- Abstract summary: WiFi CSI-based HAR has gained increasing attention from academic and industry communities.
SSL has emerged as a promising approach for learning meaningful representations from data without heavy reliance on labeled examples.
We provide an in-depth investigation of SSL algorithms in the context of WiFi CSI-based HAR.
- Score: 21.687282393567425
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Recently, with the advancement of the Internet of Things (IoT), WiFi
CSI-based HAR has gained increasing attention from academic and industry
communities. By integrating the deep learning technology with CSI-based HAR,
researchers achieve state-of-the-art performance without the need of expert
knowledge. However, the scarcity of labeled CSI data remains the most prominent
challenge when applying deep learning models in the context of CSI-based HAR
due to the privacy and incomprehensibility of CSI-based HAR data. On the other
hand, SSL has emerged as a promising approach for learning meaningful
representations from data without heavy reliance on labeled examples.
Therefore, considerable efforts have been made to address the challenge of
insufficient data in deep learning by leveraging SSL algorithms. In this paper,
we undertake a comprehensive inventory and analysis of the potential held by
different categories of SSL algorithms, including those that have been
previously studied and those that have not yet been explored, within the field.
We provide an in-depth investigation of SSL algorithms in the context of WiFi
CSI-based HAR. We evaluate four categories of SSL algorithms using three
publicly available CSI HAR datasets, each encompassing different tasks and
environmental settings. To ensure relevance to real-world applications, we
design performance metrics that align with specific requirements. Furthermore,
our experimental findings uncover several limitations and blind spots in
existing work, highlighting the barriers that need to be addressed before SSL
can be effectively deployed in real-world WiFi-based HAR applications. Our
results also serve as a practical guideline for industry practitioners and
provide valuable insights for future research endeavors in this field.
Related papers
- Unified Approaches in Self-Supervised Event Stream Modeling: Progress and Prospects [2.491611479869045]
Self-Supervised Learning (SSL) has emerged as a promising paradigm to address these challenges.
We systematically review and synthesize SSL methodologies tailored for ES modeling across multiple domains.
We propose a future research agenda aimed at developing scalable, domain-agnostic SSL frameworks for ES modeling.
arXiv Detail & Related papers (2025-02-07T13:05:55Z) - Mining Limited Data Sufficiently: A BERT-inspired Approach for CSI Time Series Application in Wireless Communication and Sensing [15.489377651710106]
Channel State Information (CSI) is the cornerstone in both wireless communication and sensing systems.
In wireless sensing systems, CSI can be leveraged to infer environmental changes, facilitating various functions.
Deep learning methods have demonstrated significant advantages over model-based approaches in these fine-grained CSI classification tasks.
We propose CSI-BERT2 for CSI prediction and classification tasks, effectively utilizing limited data through a pre-training and fine-tuning approach.
arXiv Detail & Related papers (2024-12-09T06:44:04Z) - Context-Aware Predictive Coding: A Representation Learning Framework for WiFi Sensing [0.0]
WiFi sensing is an emerging technology that utilizes wireless signals for various sensing applications.
In this paper, we introduce a novel SSL framework called Context-Aware Predictive Coding (CAPC)
CAPC effectively learns from unlabelled data and adapts to diverse environments.
Our evaluations demonstrate that CAPC not only outperforms other SSL methods and supervised approaches, but also achieves superior generalization capabilities.
arXiv Detail & Related papers (2024-09-16T17:59:49Z) - Semantic Meta-Split Learning: A TinyML Scheme for Few-Shot Wireless Image Classification [50.28867343337997]
This work presents a TinyML-based semantic communication framework for few-shot wireless image classification.
We exploit split-learning to limit the computations performed by the end-users while ensuring privacy-preserving.
meta-learning overcomes data availability concerns and speeds up training by utilizing similarly trained tasks.
arXiv Detail & Related papers (2024-09-03T05:56:55Z) - A Survey of the Self Supervised Learning Mechanisms for Vision Transformers [5.152455218955949]
The application of self supervised learning (SSL) in vision tasks has gained significant attention.
We develop a comprehensive taxonomy of systematically classifying the SSL techniques.
We discuss the motivations behind SSL, review popular pre-training tasks, and highlight the challenges and advancements in this field.
arXiv Detail & Related papers (2024-08-30T07:38:28Z) - Can We Break Free from Strong Data Augmentations in Self-Supervised Learning? [18.83003310612038]
Self-supervised learning (SSL) has emerged as a promising solution for addressing the challenge of limited labeled data in deep neural networks (DNNs)
We explore SSL behavior across a spectrum of augmentations, revealing their crucial role in shaping SSL model performance and learning mechanisms.
We propose a novel learning approach that integrates prior knowledge, with the aim of curtailing the need for extensive data augmentations.
arXiv Detail & Related papers (2024-04-15T12:53:48Z) - Self-Supervision for Tackling Unsupervised Anomaly Detection: Pitfalls
and Opportunities [50.231837687221685]
Self-supervised learning (SSL) has transformed machine learning and its many real world applications.
Unsupervised anomaly detection (AD) has also capitalized on SSL, by self-generating pseudo-anomalies.
arXiv Detail & Related papers (2023-08-28T07:55:01Z) - A Survey on Self-supervised Learning: Algorithms, Applications, and Future Trends [82.64268080902742]
Self-supervised learning (SSL) aims to learn discriminative features from unlabeled data without relying on human-annotated labels.
SSL has garnered significant attention recently, leading to the development of numerous related algorithms.
This paper presents a review of diverse SSL methods, encompassing algorithmic aspects, application domains, three key trends, and open research questions.
arXiv Detail & Related papers (2023-01-13T14:41:05Z) - Collaborative Intelligence Orchestration: Inconsistency-Based Fusion of
Semi-Supervised Learning and Active Learning [60.26659373318915]
Active learning (AL) and semi-supervised learning (SSL) are two effective, but often isolated, means to alleviate the data-hungry problem.
We propose an innovative Inconsistency-based virtual aDvErial algorithm to further investigate SSL-AL's potential superiority.
Two real-world case studies visualize the practical industrial value of applying and deploying the proposed data sampling algorithm.
arXiv Detail & Related papers (2022-06-07T13:28:43Z) - DATA: Domain-Aware and Task-Aware Pre-training [94.62676913928831]
We present DATA, a simple yet effective NAS approach specialized for self-supervised learning (SSL)
Our method achieves promising results across a wide range of computation costs on downstream tasks, including image classification, object detection and semantic segmentation.
arXiv Detail & Related papers (2022-03-17T02:38:49Z) - Graph-based Semi-supervised Learning: A Comprehensive Review [51.26862262550445]
Semi-supervised learning (SSL) has tremendous value in practice due to its ability to utilize both labeled data and unlabelled data.
An important class of SSL methods is to naturally represent data as graphs, which corresponds to graph-based semi-supervised learning (GSSL) methods.
GSSL methods have demonstrated their advantages in various domains due to their uniqueness of structure, the universality of applications, and their scalability to large scale data.
arXiv Detail & Related papers (2021-02-26T05:11:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.