Award Abstract # 2326341
Collaborative Research: Data Poisoning Attacks and Infrastructure-Enabled Solutions for Traffic State Estimation and Prediction

NSF Org: CMMI
Division of Civil, Mechanical, and Manufacturing Innovation
Recipient: UNIVERSITY OF CONNECTICUT
Initial Amendment Date: September 8, 2023
Latest Amendment Date: September 8, 2023
Award Number: 2326341
Award Instrument: Standard Grant
Program Manager: Daan Liang
dliang@nsf.gov
 (703)292-2441
CMMI
 Division of Civil, Mechanical, and Manufacturing Innovation
ENG
 Directorate for Engineering
Start Date: September 1, 2023
End Date: August 31, 2026 (Estimated)
Total Intended Award Amount: $169,924.00
Total Awarded Amount to Date: $169,924.00
Funds Obligated to Date: FY 2023 = $169,924.00
History of Investigator:
  • Yuan Hong (Principal Investigator)
    yuan.hong@uconn.edu
Recipient Sponsored Research Office: University of Connecticut
438 WHITNEY RD EXTENSION UNIT 1133
STORRS
CT  US  06269-9018
(860)486-3622
Sponsor Congressional District: 02
Primary Place of Performance: University of Connecticut
438 WHITNEY RD EXTENSION UNIT 1133
STORRS
CT  US  06269-1133
Primary Place of Performance
Congressional District:
02
Unique Entity Identifier (UEI): WNTPS995QBM7
Parent UEI:
NSF Program(s): CIS-Civil Infrastructure Syst
Primary Program Source: 01002324DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 029E, 5225, 8027
Program Element Code(s): 163100
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.041

ABSTRACT

This award will support research to investigate "data poisoning" attacks in transportation systems and develop new defense methods to enhance transportation cybersecurity. With ubiquitous data and widely applied data-driven methods in transportation, data poisoning attacks are becoming a critical cybersecurity threat to traffic state estimation and prediction (TSEP), as well as to decision making related to vehicle fleet management and traffic control. This research will have profound societal benefits and impacts by identifying new data poisoning attacks and developing novel defense methods on essential transportation applications. The research will also help raise awareness of data security and facilitate the development of infrastructure-enabled solutions to strengthen transportation security. The team will integrate research results into existing and new courses and will advise both graduate and undergraduate students, especially students from groups underrepresented in science and engineering research, to participate in cutting-edge research. The project team members will participate in multiple outreach programs by providing inputs in science and engineering from this project to K-12 students, especially high school students. The team will also convey research findings to transportation agencies, the academic community, and industry partners. The researchers will transfer research findings to practice, to make significant impacts in the real world.

This research will develop a new paradigm in designing transportation data poisoning attacks and developing innovative defense solutions to ensure transportation data security. Data poisoning attacks are first formulated as sensitivity analysis of optimization problems over data perturbations (attacks). Lipschitz continuity-based analysis methods and semi-derivative based algorithms will be developed to help design attack models that are more general and applicable to transportation applications. The team will also develop approximation schemes of the complex objective functions and/or constraints of learning models and study the transferability of attack methods on deep learning models. To defend against the attacks, an infrastructure-enabled defense framework will be developed by leveraging existing and newly deployed secure infrastructure data/information to detect and mitigate attacks. This new defense framework will help develop a secure data network to effectively defend against different attacks on various applications. The research will also provide useful insights to study attacks and develop novel defense methods in other engineering and science fields.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Yang, Yuxin and Li, Qiang and Jia, Jinyuan and Hong, Yuan and Wang, Binghui "Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses" , 2024 https://doi.org/10.1145/3658644.3690187 Citation Details
Feng, Shuya and Mohammady, Meisam and Wang, Han and Li, Xiaochen and Qin, Zhan and Hong, Yuan "DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming" , 2024 https://doi.org/10.1109/SP54263.2024.00124 Citation Details
Hong, Hanbin and Zhang, Xinyu and Wang, Binghui and Ba, Zhongjie and Hong, Yuan "Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence" , 2024 https://doi.org/10.1145/3658644.3690343 Citation Details
Li, Xiaochen and Liu, Weiran and Lou, Jian and Hong, Yuan and Zhang, Lei and Qin, Zhan and Ren, Kui "Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory" Proceedings of the ACM on Management of Data , v.2 , 2024 https://doi.org/10.1145/3639285 Citation Details
Noorbakhsh, Sayedeh L and Zhang, Binghui and Hong, Yuan and Wang, Binghui "Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks" , 2024 Citation Details
Wang, Feilong and Wang, Xin and Hong, Yuan and Tyrrell_Rockafellar, R and Ban, Xuegang Jeff "Data poisoning attacks on traffic state estimation and prediction" Transportation Research Part C: Emerging Technologies , 2024 https://doi.org/10.1016/j.trc.2024.104577 Citation Details
Yang, Yuxin and Li, Qiang and Hong, Yuan and Wang, Binghui "FedGMark: Certifiably Robust Watermarking for Federated Graph Learning" , 2025 Citation Details
Yang, Yuxin and Li, Qiang and Nie, Chenfei and Hong, Yuan and Wang, Binghui "Breaking State-of-the-Art Poisoning Defenses to Federated Learning: An Optimization-Based Attack Framework" , 2024 https://doi.org/10.1145/3627673.3679566 Citation Details
Yan, Shenao and Wang, Shen and Duan, Yue and Hong, Hanbin and Lee, Kiho and Kim, Doowon and Hong, Yuan "An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection" , 2024 Citation Details
Zhang, Xinyu and Hong, Hanbin and Hong, Yuan and Huang, Peng and Wang, Binghui and Ba, Zhongjie and Ren, Kui "Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks" , 2024 https://doi.org/10.1109/SP54263.2024.00053 Citation Details

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page