With the rapid development of the Internet of Things and the improvement of computing power, edge-computing becomes an emergency computing paradigm that communicates between the terminal and cloud. One of the most representative works of edge-computing is to achieve human-activity recognition at the edge side, as it has lower latency and it could reduce transmission costs, compared with processing at the cloud side. However, existing approaches have many drawbacks: (1) they can merely recognize separated actions as it is incompetence for continuous activity recognition; and (2) they are not robust to action transformation and environmental noise due to the value-feature-based matching strategy. In this paper, we propose HCAR, a structure-feature-based human continuous activity recognition system, which is insensitive to action transformation and environmental noise. Firstly, we leverage word2vec to embed the CSI sequences to CSI value space. Secondly, we select representative features from the embedded vectors and use HMM-LDA to cluster them into different action categories. Lastly, for each new coming sequence, we calculate the Hellinger distance and bi-modality coefficient to different categories and then identify the corresponding action(s). We implement HCAR by Intel 5300 NIC to evaluate the activity recognition precision in different cases. The experiments show that HCAR can recognize actions corresponding to the unsegmented CSI sequence with high accuracy, ie, >90%.Recently, with the wide application of mobile-computing and Internet-of-Things (IoT) technology, computer-human interaction (CHI) has become an indispensable component of social life and has a far-reaching influence for daily work and life of human beings, eg, smart home, 1 intelligent transportation, 2 and services combination. 3 Here, a question becomes as follows: where and how to place the CHI computing plan? On the one hand, terminal devices, eg, AP and receiver, the resources may be insufficient for calculation. On the other hand, computing at the cloud side and then feeding back to the terminal is time consuming and communication bandwidth wasting. Edge computing pushes the computing power away from the cloud and puts it closer to the users. Human activity interaction and recognition, one of the most representative researches of edge computing. [4][5][6] There are two main categories to implement human activity recognition, ie, camera based and noncamera based. The former 7-9 can catch human activities in a fast and exact way. In addition, camera-based solutions can implement continuous action recognition with ease. However, camera-based solutions have three main weakness: (1) they are vulnerable to privacy attack since images can offer users' over-detailed profiles;