• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Bi, Renwan (Bi, Renwan.) [1] | Xiong, Jinbo (Xiong, Jinbo.) [2] | Tian, Youliang (Tian, Youliang.) [3] | Li, Qi (Li, Qi.) [4] | Liu, Ximeng (Liu, Ximeng.) [5]

Indexed by:

EI

Abstract:

Connected autonomous vehicles (CAVs) employ the point cloud data captured by LiDAR to enhance the capability of object recognition and detection. Edge computing with its inherent advantages can help CAVs alleviate resource constraints and enable faster situational awareness and data processing. However, the point cloud data contains private information, such as vehicle identity, location and trajectory, directly uploading the raw point cloud to the edge nodes or other vehicle will lead to serious privacy leakage. To the best of our knowledge, we are the first to try to tackle this challenge and propose a privacy-preserving object detection framework over random point cloud shares for CAVs (referred to SecPCV), aiming to guarantee the privacy of both point cloud and object detection results. In SecPCV, CAVs split point cloud into two random shares based on additive secret sharing (ASS) and upload them to two competing edge nodes, respectively, which greatly compress the computational load of CAVs. Without changing the object detection network in plaintext environment, the edge nodes can cooperatively and securely extract, regress, and classify over point cloud shares. Theoretical analysis ensure the efficiency and security of the SecPCV framework. Experimental results with the real KITTI point cloud dataset indicate that SecPCV can achieve the consistent object detection accuracy as that in plaintext environment, and provide a feasible solution for CAVs secure sharing of point cloud data. © 2000-2011 IEEE.

Keyword:

Autonomous vehicles Edge computing Edge detection Feature extraction Object detection Object recognition Privacy-preserving techniques

Community:

  • [ 1 ] [Bi, Renwan]Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fuzhou; 350117, China
  • [ 2 ] [Bi, Renwan]Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, Guilin; 541004, China
  • [ 3 ] [Xiong, Jinbo]Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fuzhou; 350117, China
  • [ 4 ] [Xiong, Jinbo]Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, Guilin; 541004, China
  • [ 5 ] [Tian, Youliang]Guizhou University, State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guiyang; 550025, China
  • [ 6 ] [Li, Qi]Nanjing University of Posts and Telecommunications, School of Computer Science, Nanjing; 210023, China
  • [ 7 ] [Li, Qi]Hangzhou Normal University, Key Laboratory of Cryptography of Zhejiang Province, Hangzhou; 311121, China
  • [ 8 ] [Liu, Ximeng]Fuzhou University, College of Mathematics and Computer Science, Fuzhou; 350108, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Source :

IEEE Transactions on Intelligent Transportation Systems

ISSN: 1524-9050

Year: 2022

Issue: 12

Volume: 23

Page: 24979-24990

8 . 5

JCR@2022

7 . 9 0 0

JCR@2023

ESI HC Threshold:66

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 16

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:375/10033030
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1