They also use a bunch of fingerprinting methods, including LLDP, MAC address lookups, and traffic profiling, among other things. It's not an exact science, as you've seen.
I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.
Please, if this post was useful, leave your kudos and mark it as solved.