2019 11th International Conference on Wireless Communications and Signal Processing (WCSP) 2019
DOI: 10.1109/wcsp.2019.8927923
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Pedestrian Detection for Smart City with Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Compared with cloud computing, it can avoid the delay caused by the large amount of data uploaded to the server. In some specific application scenarios in the field of public security, the use of edge mobile devices can better meet the requirements of application scenarios, such as realtime detection of face information and alerting the police to the criminal records of dangerous persons encountered [34]. In addition, Dany-yuan found that 89% of Wireless-Fidelity (Wi-Fi) hotspots are unsafe, and massive personal privacy data are included in the real-time transmission of large amounts of data.…”
Section: Implementation Of a Safety Supervision Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared with cloud computing, it can avoid the delay caused by the large amount of data uploaded to the server. In some specific application scenarios in the field of public security, the use of edge mobile devices can better meet the requirements of application scenarios, such as realtime detection of face information and alerting the police to the criminal records of dangerous persons encountered [34]. In addition, Dany-yuan found that 89% of Wireless-Fidelity (Wi-Fi) hotspots are unsafe, and massive personal privacy data are included in the real-time transmission of large amounts of data.…”
Section: Implementation Of a Safety Supervision Algorithmmentioning
confidence: 99%
“…Compared with cloud computing, edge computing shows excellent performance in reducing communication delays [6,7], alleviating transmission loads [8] and preventing user privacy leakages [9,10]. However, there still exist several security threats.…”
Section: Introductionmentioning
confidence: 99%