Skip to main content

Showing 1–19 of 19 results for author: Ding, A Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.10397  [pdf, other

    cs.CV

    Analyzing and Mitigating Bias for Vulnerable Classes: Towards Balanced Representation in Dataset

    Authors: Dewant Katare, David Solans Noguero, Souneil Park, Nicolas Kourtellis, Marijn Janssen, Aaron Yi Ding

    Abstract: The accuracy and fairness of perception systems in autonomous driving are essential, especially for vulnerable road users such as cyclists, pedestrians, and motorcyclists who face significant risks in urban driving environments. While mainstream research primarily enhances class performance metrics, the hidden traits of bias inheritance in the AI models, class imbalances and disparities within the… ▽ More

    Submitted 12 May, 2024; v1 submitted 18 January, 2024; originally announced January 2024.

  2. arXiv:2304.14271  [pdf, other

    cs.RO cs.AI cs.LG

    A Survey on Approximate Edge AI for Energy Efficient Autonomous Driving Services

    Authors: Dewant Katare, Diego Perino, Jari Nurmi, Martijn Warnier, Marijn Janssen, Aaron Yi Ding

    Abstract: Autonomous driving services rely heavily on sensors such as cameras, LiDAR, radar, and communication modules. A common practice of processing the sensed data is using a high-performance computing unit placed inside the vehicle, which deploys AI models and algorithms to act as the brain or administrator of the vehicle. The vehicular data generated from average hours of driving can be up to 20 Terab… ▽ More

    Submitted 13 April, 2023; originally announced April 2023.

  3. arXiv:2206.09523  [pdf, other

    eess.AS cs.CY cs.SD

    Towards Trustworthy Edge Intelligence: Insights from Voice-Activated Services

    Authors: W. T. Hutiri, A. Y. Ding

    Abstract: In an age of surveillance capitalism, anchoring the design of emerging smart services in trustworthiness is urgent and important. Edge Intelligence, which brings together the fields of AI and Edge computing, is a key enabling technology for smart services. Trustworthy Edge Intelligence should thus be a priority research concern. However, determining what makes Edge Intelligence trustworthy is not… ▽ More

    Submitted 19 June, 2022; originally announced June 2022.

  4. arXiv:2204.02281  [pdf, other

    eess.AS cs.CY cs.LG

    Design Guidelines for Inclusive Speaker Verification Evaluation Datasets

    Authors: Wiebke Toussaint Hutiri, Lauriane Gorce, Aaron Yi Ding

    Abstract: Speaker verification (SV) provides billions of voice-enabled devices with access control, and ensures the security of voice-driven technologies. As a type of biometrics, it is necessary that SV is unbiased, with consistent and reliable performance across speakers irrespective of their demographic, social and economic attributes. Current SV evaluation practices are insufficient for evaluating bias:… ▽ More

    Submitted 13 September, 2022; v1 submitted 5 April, 2022; originally announced April 2022.

    Comments: Accepted to INTERSPEECH 2022 (submitted version)

  5. arXiv:2201.07677  [pdf, other

    cs.LG cs.CY cs.SE eess.AS

    Tiny, always-on and fragile: Bias propagation through design choices in on-device machine learning workflows

    Authors: Wiebke Toussaint, Aaron Yi Ding, Fahim Kawsar, Akhil Mathur

    Abstract: Billions of distributed, heterogeneous and resource constrained IoT devices deploy on-device machine learning (ML) for private, fast and offline inference on personal data. On-device ML is highly context dependent, and sensitive to user, usage, hardware and environment attributes. This sensitivity and the propensity towards bias in ML makes it important to study bias in on-device settings. Our stu… ▽ More

    Submitted 17 March, 2023; v1 submitted 19 January, 2022; originally announced January 2022.

    Comments: To be published in ACM Transactions on Software Engineering and Methodology

  6. arXiv:2112.00616  [pdf, other

    cs.DC cs.AI

    Roadmap for Edge AI: A Dagstuhl Perspective

    Authors: Aaron Yi Ding, Ella Peltonen, Tobias Meuser, Atakan Aral, Christian Becker, Schahram Dustdar, Thomas Hiessl, Dieter Kranzlmuller, Madhusanka Liyanage, Setareh Magshudi, Nitinder Mohan, Joerg Ott, Jan S. Rellermeyer, Stefan Schulte, Henning Schulzrinne, Gurkan Solmaz, Sasu Tarkoma, Blesson Varghese, Lars Wolf

    Abstract: Based on the collective input of Dagstuhl Seminar (21342), this paper presents a comprehensive discussion on AI methods and capabilities in the context of edge computing, referred as Edge AI. In a nutshell, we envision Edge AI to provide adaptation for data-driven applications, enhance network and radio access, and allow the creation, optimization, and deployment of distributed AI/ML pipelines wit… ▽ More

    Submitted 27 November, 2021; originally announced December 2021.

    Comments: for ACM SIGCOMM CCR

    ACM Class: I.2.11

  7. arXiv:2107.12049  [pdf, other

    cs.SD cs.AI eess.AS

    SVEva Fair: A Framework for Evaluating Fairness in Speaker Verification

    Authors: Wiebke Toussaint, Aaron Yi Ding

    Abstract: Despite the success of deep neural networks (DNNs) in enabling on-device voice assistants, increasing evidence of bias and discrimination in machine learning is raising the urgency of investigating the fairness of these systems. Speaker verification is a form of biometric identification that gives access to voice assistants. Due to a lack of fairness metrics and evaluation frameworks that are appr… ▽ More

    Submitted 4 October, 2022; v1 submitted 26 July, 2021; originally announced July 2021.

    Comments: This unpublished paper has been superseded by "Bias in Automated Speaker Recognition" (published at ACM FAccT 2022): arXiv:2201.09486

  8. arXiv:2106.14975  [pdf, other

    cs.HC

    Design Considerations for Data Daemons: Co-creating Design Futures to Explore Ethical Personal Data Management

    Authors: Wiebke Toussaint, Alejandra Gomez Ortega, Jered Vroon, Julian Harty, Gürkan Solmaz, Olya Kudina, Ella Peltonen, Jacky Bourgeois, Aaron Yi Ding

    Abstract: Mobile applications and online service providers track our virtual and physical behaviour more actively and with a broader scope than ever before. This has given rise to growing concerns about ethical personal data management. Even though regulation and awareness around data ethics are increasing, end-users are seldom engaged when defining and designing what a future with ethical personal data man… ▽ More

    Submitted 26 July, 2021; v1 submitted 28 June, 2021; originally announced June 2021.

  9. Machine Learning Systems in the IoT: Trustworthiness Trade-offs for Edge Intelligence

    Authors: Wiebke Toussaint, Aaron Yi Ding

    Abstract: Machine learning systems (MLSys) are emerging in the Internet of Things (IoT) to provision edge intelligence, which is paving our way towards the vision of ubiquitous intelligence. However, despite the maturity of machine learning systems and the IoT, we are facing severe challenges when integrating MLSys and IoT in practical context. For instance, many machine learning systems have been developed… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

    Comments: In Proceedings of the Second International Conference on Cognitive Machine Intelligence (CogMI 2020)

  10. arXiv:2006.04950   

    cs.CY cs.LG

    Machine Learning Systems for Intelligent Services in the IoT: A Survey

    Authors: Wiebke Toussaint, Aaron Yi Ding

    Abstract: Machine learning (ML) technologies are emerging in the Internet of Things (IoT) to provision intelligent services. This survey moves beyond existing ML algorithms and cloud-driven design to investigate the less-explored systems, scaling and socio-technical aspects for consolidating ML and IoT. It covers the latest developments (up to 2020) on scaling and distributing ML across cloud, edge, and IoT… ▽ More

    Submitted 1 December, 2020; v1 submitted 29 May, 2020; originally announced June 2020.

    Comments: Requires rework

  11. arXiv:2005.07731  [pdf, other

    eess.SP cs.LG

    Enabling Seamless Device Association with DevLoc using Light Bulb Networks for Indoor IoT Environments

    Authors: Michael Haus, Jörg Ott, Aaron Yi Ding

    Abstract: To enable serendipitous interaction for indoor IoT environments, spontaneous device associations are of particular interest so that users set up a connection in an ad-hoc manner. Based on the similarity of light signals, our system named DevLoc takes advantage of ubiquitous light sources around us to perform continuous and seamless device grou**. We provide a configuration framework to control t… ▽ More

    Submitted 15 May, 2020; originally announced May 2020.

  12. arXiv:1912.04521  [pdf, other

    cs.LG stat.ML

    Transfer Learning-Based Outdoor Position Recovery with Telco Data

    Authors: Yige Zhang, Aaron Yi Ding, Jorg Ott, Mingxuan Yuan, Jia Zeng, Kun Zhang, Weixiong Rao

    Abstract: Telecommunication (Telco) outdoor position recovery aims to localize outdoor mobile devices by leveraging measurement report (MR) data. Unfortunately, Telco position recovery requires sufficient amount of MR samples across different areas and suffers from high data collection cost. For an area with scarce MR samples, it is hard to achieve good accuracy. In this paper, by leveraging the recently de… ▽ More

    Submitted 10 December, 2019; originally announced December 2019.

  13. Ethical Hacking for IoT Security: A First Look into Bug Bounty Programs and Responsible Disclosure

    Authors: Aaron Yi Ding, Gianluca Limon De Jesus, Marijn Janssen

    Abstract: The security of the Internet of Things (IoT) has attracted much attention due to the growing number of IoT-oriented security incidents. IoT hardware and software security vulnerabilities are exploited affecting many companies and persons. Since the causes of vulnerabilities go beyond pure technical measures, there is a pressing demand nowadays to demystify IoT "security complex" and develop practi… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

    Comments: Pre-print version for conference publication at ICTRS 2019

  14. arXiv:1903.00951  [pdf, other

    cs.NI

    Practical Prediction of Human Movements Across Device Types and Spatiotemporal Granularities

    Authors: Babak Alipour, Leonardo Tonetto, Roozbeh Ketabi, Aaron Yi Ding, Jörg Ott, Ahmed Helmy

    Abstract: Understanding and predicting mobility are essential for the design and evaluation of future mobile edge caching and networking. Consequently, research on prediction of human mobility has drawn significant attention in the last decade. Employing information-theoretic concepts and machine learning methods, earlier research has shown evidence that human behavior can be highly predictable. Despite e… ▽ More

    Submitted 3 March, 2019; originally announced March 2019.

    ACM Class: I.6.4; C.2.5; J.1

  15. arXiv:1810.08415  [pdf, other

    cs.CR

    IoT-KEEPER: Securing IoT Communications in Edge Networks

    Authors: Ibbad Hafeez, Markku Antikainen, Aaron Yi Ding, Sasu Tarkoma

    Abstract: The increased popularity of IoT devices have made them lucrative targets for attackers. Due to insecure product development practices, these devices are often vulnerable even to very trivial attacks and can be easily compromised. Due to the sheer number and heterogeneity of IoT devices, it is not possible to secure the IoT ecosystem using traditional endpoint and network security solutions. To add… ▽ More

    Submitted 19 October, 2018; originally announced October 2018.

    Comments: 20 pages, 9 figures, 4 tables

  16. 5G Applications: Requirements, Challenges, and Outlook

    Authors: Aaron Yi Ding, Marijn Janssen

    Abstract: The increasing demand for mobile network capacity driven by Internet of Things (IoT) applications results in the need for understanding better the potential and limitations of 5G networks. Vertical application areas like smart mobility, energy networks, industrial IoT applications, and AR/VR enhanced services all pose different requirements on the use of 5G networks. Some applications need low lat… ▽ More

    Submitted 14 October, 2018; originally announced October 2018.

    Comments: Author version for conference publication at ICTRS 2018

  17. arXiv:1810.00827  [pdf, other

    cs.NI

    Five Driving Forces of Multi-Access Edge Computing

    Authors: Madhusanka Liyanage, Pawani Porambage, Aaron Yi Ding

    Abstract: The emergence of Multi-Access Edge Computing (MEC) technology aims at extending cloud computing capabilities to the edge of the wireless access networks. MEC provides real-time, high-bandwidth, low-latency access to radio network resources, allowing operators to open their networks to a new ecosystem and value chain. Moreover, it will provide a new insight to the design of future 5th Generation (5… ▽ More

    Submitted 1 October, 2018; originally announced October 2018.

    Comments: Submitted to IEEE Communications Magazine

  18. arXiv:1712.07740  [pdf, other

    cs.CR cs.NI

    Securing Edge Networks with Securebox

    Authors: Ibbad Hafeez, Aaron Yi Ding, Sasu Tarkoma

    Abstract: The number of mobile and IoT devices connected to home and enterprise networks is growing fast. These devices offer new services and experiences for the users; however, they also present new classes of security threats pertaining to data and device safety and user privacy. In this article, we first analyze the potential threats presented by these devices connected to edge networks. We then propose… ▽ More

    Submitted 20 December, 2017; originally announced December 2017.

  19. arXiv:1712.05958  [pdf, ps, other

    cs.CR

    Toward Secure Edge Networks Taming Device to Device (D2D) Communication in IoT

    Authors: Ibbad Hafeez, Aaron Yi Ding, Markku Antikainen, Sasu Tarkoma

    Abstract: The growing popularity of Internet-of-Things (IoT) has created the need for network-based traffic anomaly detection systems that could identify misbehaving devices. In this work, we propose a lightweight technique, IoT-guard, for identifying malicious traffic flows. IoT-guard uses semi-supervised learning to distinguish between malicious and benign device behaviours using the network traffic gener… ▽ More

    Submitted 16 October, 2018; v1 submitted 16 December, 2017; originally announced December 2017.

    Comments: Appeared in 12th International Conference on Network and System Security, NSS, August 2018 (http://www4.comp.polyu.edu.hk/~nss2018/program.html)