Award Abstract # 2034870
Collaborative Research: SaTC: CORE: Small: Privately Collecting and Analyzing V2X Data for Urban Traffic Modeling

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: ILLINOIS INSTITUTE OF TECHNOLOGY
Initial Amendment Date: July 12, 2021
Latest Amendment Date: June 23, 2022
Award Number: 2034870
Award Instrument: Standard Grant
Program Manager: James Joshi
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: October 1, 2021
End Date: June 30, 2023 (Estimated)
Total Intended Award Amount: $299,930.00
Total Awarded Amount to Date: $299,930.00
Funds Obligated to Date: FY 2021 = $24,678.00
History of Investigator:
  • Yuan Hong (Principal Investigator)
    yuan.hong@uconn.edu
  • Dong Jin (Co-Principal Investigator)
Recipient Sponsored Research Office: Illinois Institute of Technology
10 W 35TH ST
CHICAGO
IL  US  60616-3717
(312)567-3035
Sponsor Congressional District: 01
Primary Place of Performance: Illinois Institute of Technology
10 West 35th Street
Chicago
IL  US  60616-3717
Primary Place of Performance
Congressional District:
01
Unique Entity Identifier (UEI): E2NDENMDUEG8
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01002122DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 7923
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

When widely deployed, Vehicle-to-Everything (V2X) communications in connected vehicles can result in very large-scale and valuable datasets that can be useful for a wide range of transportation safety, mobility, and other related applications. Mandates are being proposed for all new light vehicles to install V2X devices in the near future for such beneficial data collection. A deployable privacy preserving toolkit is critically needed for privately collecting and analyzing V2X data so that the envisioned applications can be fully functional. This project aims at addressing such privacy concerns in practical V2X data collection and analysis for urban traffic modeling, and thus will facilitate the real-world deployment of connected vehicles and V2X systems/applications. Furthermore, this project integrates research results into the curricula at Illinois Institute of Technology, and University of Washington, and provides opportunities for graduate and undergraduate students, especially under-represented and minority students, to participate in cutting-edge research. It also disseminates state-of-the-art privacy preserving techniques into the intelligent transportation and connected vehicles communities.

This project develop a series of novel privacy preserving V2X data collection and analysis techniques with provable privacy guarantees. In the first research thrust, novel V2X data collection schemes will be developed to locally perturb V2X data by each vehicle and they will be aggregated for large-scale urban traffic modeling while satisfying the emerging rigorous notion of local differential privacy (LDP). In the second research thrust, novel cryptographic protocols under the secure multiparty computation (MPC) theory will be designed for the infrastructure and vehicles to securely analyze the V2X data for small-scale urban traffic modeling. Such two categories of privacy preserving techniques are expected to fundamentally advance the literature of LDP and MPC (e.g., designing new randomization mechanisms for LDP). The research team will theoretically prove the privacy guarantees for them, and experimentally evaluate their system performance on emulation platforms, as well as deploy them in real-world connected vehicles testbeds.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 13)
Cheng, Peng and Wu, Yuexin and Hong, Yuan and Ba, Zhongjie and Lin, Feng and Lu, Li and Ren, Kui "UniAP: Protecting Speech Privacy with Non-targeted Universal Adversarial Perturbations" IEEE Transactions on Dependable and Secure Computing , 2023 https://doi.org/10.1109/TDSC.2023.3242292 Citation Details
Hong, Hanbin and Wang, Binghui and Hong, Yuan "UniCR: Universally Approximated Certified Robustness via Randomized Smoothing" Proceedings of the 17th European Conference on Computer Vision (ECCV'22) , v.13665 , 2022 Citation Details
Liu, Bingyu and Wang, Rujia and Ba, Zhongjie and Zhou, Shanglin and Ding, Caiwen and Hong, Yuan "Poster: Cryptographic Inferences for Video Deep Neural Networks" Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS) , 2022 https://doi.org/10.1145/3548606.3563543 Citation Details
Liu, Bingyu and Xie, Shangyu and Yang, Yuanzhou and Wang, Rujia and Hong, Yuan "Privacy preserving divisible double auction with a hybridized TEE-blockchain system" Cybersecurity , v.4 , 2021 https://doi.org/10.1186/s42400-021-00100-x Citation Details
Li, Xiaochen and Hu, Yuke and Liu, Weiran and Feng, Hanwen and Peng, Li and Hong, Yuan and Ren, Kui and Qin, Zhan "OpBoost: a vertical federated tree boosting framework based on order-preserving desensitization" Proceedings of the VLDB Endowment , v.16 , 2022 https://doi.org/10.14778/3565816.3565823 Citation Details
Wang, Feilong and Hong, Yuan and Ban, Xuegang "Infrastructure-Enabled GPS Spoofing Detection and Correction" IEEE Transactions on Intelligent Transportation Systems , 2023 https://doi.org/10.1109/TITS.2023.3298785 Citation Details
Wang, Han and Hong, Hanbin and Xiong, Li and Qin, Zhan and Hong, Yuan "L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response" In Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS'22) , 2022 https://doi.org/10.1145/3548606.3560636 Citation Details
Wang, Han and Sharma, Jayashree and Feng, Shuya and Shu, Kai and Hong, Yuan "A Model-Agnostic Approach to Differentially Private Topic Mining" In Proceedings of the 28th SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'22) , 2022 https://doi.org/10.1145/3534678.3539417 Citation Details
Xie, Shangyu and Hong, Yuan "Differentially Private Instance Encoding against Privacy Attacks" In Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: Student Research Workshop , 2022 https://doi.org/10.18653/v1/2022.naacl-srw.22 Citation Details
Xie, Shangyu and Hong, Yuan "Reconstruction Attack on Instance Encoding for Language Understanding" In Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing (EMNLP'21) , 2021 https://doi.org/10.18653/v1/2021.emnlp-main.154 Citation Details
Xie, Shangyu and Mohammady, Meisam and Wang, Han and Wang, Lingyu and Vaidya, Jaideep and Hong, Yuan "A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract)" In Proceedings of the 38th IEEE International Conference on Data Engineering (ICDE'22) , 2022 https://doi.org/10.1109/ICDE53745.2022.00151 Citation Details
(Showing: 1 - 10 of 13)

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page