Aaron Ding

Aaron Ding
Delft University of Technology | TU

PhD

About

78
Publications
26,715
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,375
Citations
Citations since 2017
58 Research Items
1229 Citations
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
Introduction
Director of CPI Lab, Tenured Associate Professor at TU Delft
Additional affiliations
September 2014 - September 2015
Columbia University
Position
  • Nokia Foundation Scholar
Description
  • Advised by Prof. Henning Schulzrinne
January 2011 - December 2015
University of Cambridge
Position
  • Researcher
Description
  • Advised by Prof. Jon Crowcroft
April 2007 - December 2022
University of Helsinki
Position
  • Associate Professor (permanent)
Description
  • https://www.cs.helsinki.fi/u/yding/

Publications

Publications (78)
Article
Human mobility shapes our daily lives, our urban environment and even the trajectory of a global pandemic. While various aspects of human mobility and inter-personal contact duration have already been studied separately, little is known about how these two key aspects of our daily lives are fundamentally connected. Better understanding of such inte...
Article
Based on the collective input of Dagstuhl Seminar (21342), this paper presents a comprehensive discussion on AI methods and capabilities in the context of edge computing, referred as Edge AI. In a nutshell, we envision Edge AI to provide adaptation for data-driven applications, enhance network and radio access, and allow the creation, optimization,...
Preprint
Full-text available
Automated speaker recognition uses data processing to identify speakers by their voice. Today, automated speaker recognition technologies are deployed on billions of smart devices and in services such as call centres. Despite their wide-scale deployment and known sources of bias in face recognition and natural language processing, bias in automated...
Preprint
Full-text available
Billions of distributed, heterogeneous and resource constrained smart consumer devices deploy on-device machine learning (ML) to deliver private, fast and offline inference on personal data. On-device ML systems are highly context dependent, and sensitive to user, usage, hardware and environmental attributes. Despite this sensitivity and the propen...
Article
Widespread adoption of mobile augmented reality (AR) and virtual reality (VR) applications depends on their smoothness and immersiveness. Modern AR applications applying computationally intensive computer vision algorithms can burden today's mobile devices, and cause high energy consumption and/or poor performance. To tackle this challenge, it is p...
Article
Full-text available
italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Edge Intelligence (EI) is an emerging computing and communication paradigm that enables Artificial Intelligence (AI) functionality at the network edge. In this article, we highlight EI as an emerging and important field of research, discuss the state o...
Article
Full-text available
Federated learning (FL) is a promising privacy-preserving solution to build powerful AI models. In many FL scenarios, such as healthcare or smart city monitoring, the user's devices may lack the required capabilities to collect suitable data which limits their contributions to the global model. We contribute social-aware federated learning as a sol...
Article
Full-text available
Mobility is a fundamental characteristic of human society that shapes various aspects of our everyday interactions. This pervasiveness of mobility makes it paramount to understand factors that govern human movement and how it varies across individuals. Currently, factors governing variations in personal mobility are understudied with existing resea...
Preprint
Full-text available
Based on the collective input of Dagstuhl Seminar (21342), this paper presents a comprehensive discussion on AI methods and capabilities in the context of edge computing, referred as Edge AI. In a nutshell, we envision Edge AI to provide adaptation for data-driven applications, enhance network and radio access, and allow the creation, optimization,...
Article
As digital platforms are dominating the digital economy, complex ecologies of platforms are emerging. While the openness of digital platforms is an important theme in platform studies, the openness between platforms has hardly been studied. This paper explores factors that affect decisions by platform owners to open their platforms to other platfor...
Article
Outstanding users (OUs) denote the influential, "core" or "bridge" users in the online community. How to accurately detect and rank them is an important problem for third-party online service providers and researchers. Conventional efforts, ranging from early graph-based algorithms to recent machine learning-based approaches, typically rely on an e...
Article
Full-text available
The emergence of Multi-Access Edge Computing (MEC) technology aims to extend cloud computing capabilities to the edge of the wireless access networks, i.e., closer to the end-users. Thus, MEC-enabled 5G wireless systems are envisaged to offer real-time, low-latency, and high-bandwidth access to the radio network resources. Thus, MEC allows network...
Article
Full-text available
Computational artificial intelligence (AI) algorithms are increasingly used to support decision making by governments. Yet algorithms often remain opaque to the decision makers and devoid of clear explanations for the decisions made. In this study, we used an experimental approach to compare decision making in three situations: humans making decisi...
Article
Full-text available
The Internet of Things (IoT) connects smart devices to enable various intelligent services. The deployment of IoT encounters several challenges, such as difficulties in controlling and managing IoT applications and networks, problems in programming existing IoT devices, long service provisioning time, underused resources, as well as complexity, iso...
Preprint
To enable serendipitous interaction for indoor IoT environments, spontaneous device associations are of particular interest so that users set up a connection in an ad-hoc manner. Based on the similarity of light signals, our system named DevLoc takes advantage of ubiquitous light sources around us to perform continuous and seamless device grouping....
Article
Telecommunication (Telco) outdoor position recovery aims to localize outdoor mobile devices by leveraging measurement report (MR) data. Unfortunately, Telco position recovery requires sufficient amount of MR samples across different areas and suffers from high data collection cost. For an area with scarce MR samples, it is hard to achieve good accu...
Article
IoT devices are notoriously vulnerable even to trivial attacks and can be easily compromised. In addition, resource constraints and heterogeneity of IoT devices make it impractical to secure IoT installations using traditional endpoint and network security solutions. To address this problem, we present IOTKEEPER, a lightweight system which secures...
Preprint
Telecommunication (Telco) outdoor position recovery aims to localize outdoor mobile devices by leveraging measurement report (MR) data. Unfortunately, Telco position recovery requires sufficient amount of MR samples across different areas and suffers from high data collection cost. For an area with scarce MR samples, it is hard to achieve good accu...
Conference Paper
Understanding and predicting mobility are essential for the design and evaluation of future mobile edge caching and networking. Consequently, research on human mobility prediction has drawn significant attention in the last decade. Employing information-theoretic concepts and machine learning methods, earlier research has shown evidence that human...
Preprint
The security of the Internet of Things (IoT) has attracted much attention due to the growing number of IoT-oriented security incidents. IoT hardware and software security vulnerabilities are exploited affecting many companies and persons. Since the causes of vulnerabilities go beyond pure technical measures, there is a pressing demand nowadays to d...
Conference Paper
The security of the Internet of Things (IoT) has attracted much attention due to the growing number of IoT-oriented security incidents. IoT hardware and software security vulnerabilities are exploited affecting many companies and persons. Since the causes of vulnerabilities go beyond pure technical measures, there is a pressing demand nowadays to d...
Conference Paper
Future computing environments are embedded with many sensors for applications like augmented reality. Much of the deployed Internet of Things (IoT) technology is designed to be invisible. To support user's privacy awareness, a map of surrounding sensing devices is beneficial to determine the nature of data collection taking place in any given area....
Conference Paper
Detecting and reacting efficiently to road condition hazards are challenging given practical restrictions such as limited data availability and lack of infrastructure support. In this paper, we present an edge-cloud chaining solution that bridges the cloud and road infrastructures to enhance road safety. We exploit the roadside infrastructure (e.g....
Preprint
Full-text available
Understanding and predicting mobility are essential for the design and evaluation of future mobile edge caching and networking. Consequently, research on prediction of human mobility has drawn significant attention in the last decade. Employing information-theoretic concepts and machine learning methods, earlier research has shown evidence that hum...
Preprint
Full-text available
The increased popularity of IoT devices have made them lucrative targets for attackers. Due to insecure product development practices, these devices are often vulnerable even to very trivial attacks and can be easily compromised. Due to the sheer number and heterogeneity of IoT devices, it is not possible to secure the IoT ecosystem using tradition...
Conference Paper
Full-text available
The increasing demand for mobile network capacity driven by Internet of Things (IoT) applications results in the need for understanding better the potential and limitations of 5G networks. Vertical application areas like smart mobility, energy networks, industrial IoT applications, and AR/VR enhanced services all pose different requirements on the...
Preprint
Full-text available
The emergence of Multi-Access Edge Computing (MEC) technology aims at extending cloud computing capabilities to the edge of the wireless access networks. MEC provides real-time, high-bandwidth, low-latency access to radio network resources, allowing operators to open their networks to a new ecosystem and value chain. Moreover, it will provide a new...
Preprint
Full-text available
The emergence of Multi-Access Edge Computing (MEC) technology aims at extending cloud computing capabilities to the edge of the wireless access networks. MEC provides real-time, high-bandwidth, low-latency access to radio network resources, allowing operators to open their networks to a new ecosystem and value chain. Moreover, it will provide a new...
Chapter
The growing popularity of Internet-of-Things (IoT) has created the need for network-based traffic anomaly detection systems that could identify misbehaving devices. In this work, we propose a lightweight technique, IoTguard, for identifying malicious traffic flows. IoTguard uses semi-supervised learning to distinguish between malicious and benign d...
Conference Paper
Two major factors affecting mobile network performance are mobility and traffic patterns. Simulations and analytical-based performance evaluations rely on models to approximate factors affecting the network. Hence, the understanding of mobility and traffic is imperative to the effective evaluation and efficient design of future mobile networks. Cur...
Article
Full-text available
Two major factors affecting mobile network performance are mobility and traffic patterns. Simulations and analytical-based performance evaluations rely on models to approximate factors affecting the network. Hence, the understanding of mobility and traffic is imperative to the effective evaluation and efficient design of future mobile networks. Cur...
Article
Full-text available
Lightweight Virtualization (LV) technologies have refashioned the world of software development by introducing flexibility and new ways of managing and distributing software. Edge computing complements today's powerful centralized data centers with a large number of distributed nodes that provide virtualization close to the data source and end user...
Article
Full-text available
The number of mobile and IoT devices connected to home and enterprise networks is growing fast. These devices offer new services and experiences for the users; however, they also present new classes of security threats pertaining to data and device safety and user privacy. In this article, we first analyze the potential threats presented by these d...
Article
Full-text available
Security problems in environments hosting Internet-of-Things (IoT) devices have become apparent, as traditional signature-based anomaly detection techniques fail to secure them due to complex device-to-device (D2D) interactions and heterogeneous traffic patterns. To tackle this emerging security disparity, we propose IoT-KEEPER, a two-tier platform...
Conference Paper
Managing IoT devices in urban areas is becoming crucial because the majority of people living in cities and the number of deployed IoT devices are steadily increasing. In this demo, we present iConfig, an edge-driven platform dedicated to manage densely deployed IoT devices in smart cities. Our goal is to address three challenging issues in current...
Conference Paper
We present IoTurva, a platform dedicated to securing Device-to-Device (D2D) communication in IoT networks. IoTurva targets an alarming and yet unexplored region in IoT security, where the interactions and dependencies across heterogeneous IoT devices are extremely hard to secure and regulate. Different from existing proposals that mostly tackle con...
Conference Paper
Managing IoT devices in urban areas is becoming crucial because the majority of people living in cities and the number of deployed IoT devices are steadily increasing. In this paper we present iConfig, an edge-driven platform dedicated to manage IoT devices in smart cities. The goal is to address three major issues in current IoT management: regist...
Conference Paper
In this poster we present IoTurva, a platform for securing Device-to-Device (D2D) communication in IoT. Our solution takes a blackbox approach to secure IoT edge-networks. We combine user and device-centric context-information together with network data to classify network communication as normal or malicious. We have designed a dual-layer traffic...
Conference Paper
In this paper we make the case for IoT edge offloading, which strives to exploit the resources on edge computing devices by offloading fine-grained computation tasks from the cloud closer to the users and data generators (i.e., IoT devices). The key motive is to enhance performance, security and privacy for IoT services. Our proposal bridges the ga...
Conference Paper
FADES is an edge offloading architecture that empowers us to run compact, single purpose tasks at the edge of the network to support a variety of IoT and cloud services. The design principle behind FADES is to efficiently exploit the resources of constrained edge devices through fine-grained computation offloading. FADES takes advantage of MirageOS...
Article
Abstract: Device-to-Device (D2D) communication presents a new paradigm in mobile networking to facilitate data exchange between physically proximate devices. The development of D2D is driven by mobile operators to harvest short range communications for improving network performance and supporting proximity-based services. In this article, we invest...
Conference Paper
In this paper we present Securebox, an affordable and deployable platform for securing and managing IoT networks. Our proposal targets an alarming spot in the fast growing IoT industry where security is often overlooked due to device limitation, budget constraint, and development deadline. In contrast to existing host-centric and hardware-coupled s...
Conference Paper
Mobile and wearable devices like smartphones or tablets are data hubs of our digital life and contain a high amount of sensitive data, which makes them a potential target for attackers. The aim of our P²Hub approach is to consider the privacy-by-architecture principle directly during the system design phase. We enhance the isolation of sensitive pr...
Conference Paper
Offloading mobile traffic to WiFi networks (WiFi Offloading) is a cost-effective technique to alleviate the pressure on mobile networks for meeting the surge of data capacity demand. However, most existing proposals from standards developing organizations (SDOs) and research communities are facing a deployment dilemma, either due to overlooking dev...
Conference Paper
We demonstrate the first cloud-based solution for providing network security as a service in smart home IoT environments. Our solution uses Software-defined Networking (SDN) for controlling traffic flows inside the network and offloads traffic analysis tasks to a smart Cloud-based Traffic Analyzer (CbTA), which uses a crowd sourced knowledge base f...
Conference Paper
This demonstration presents a novel software defined platform for achieving collaborative and energy-aware WiFi offloading. The platform consists of an extensible central controller, programmable offloading agents, and offloading extensions on mobile devices. Driven by our extensive measurements of energy consumption on smartphones, we propose an e...
Conference Paper
Full-text available
A major challenge of future mobile networks is providing the needed elastic scaling to the increased traffic demand, number of users and applications with acceptable cost. Another challenge is suitability for numerous communications applications while curbing unwanted traffic on the air interface and the mobile devices. This paper proposes a vision...
Article
In recent years we have seen a fast change in the networking industry: leading by the Software Defined Networking (SDN) paradigm that separates the control plane from the data plane to enable programmability and centralized control of the network infrastructure, the SDN design not only simplifies the network management but also accelerates the inno...
Conference Paper
The fast increase of mobile traffic from smartphone-like devices has created a huge pressure for the cellular operators to manage the network infrastructure and resources. Offloading the mobile traffic to alternative networks such as WiFi is sought as a promising direction to solve this problem cost-effectively. According to our study and experimen...
Article
The participation of the network research community in the Internet Standards Development Organizations (SDOs) has been relatively low over the recent years, and this has drawn attention from both academics and industry due to its possible negative impact. The reasons for this gap are complex and extend beyond the purely technical. In this editoria...
Conference Paper
We introduce CoSense, a collaborative sensing platform for mobile devices that opportunistically distributes sensing tasks between familiar devices in close proximity. We use empirical energy measurements together with data collected from everyday transportation behaviour to demonstrate that our solution can significantly reduce power consumption w...
Conference Paper
Searching for mobile data offloading solutions has been topical in recent years. In this paper, we present a collaborative WiFi-based mobile data offloading architecture - Metropolitan Advanced Delivery Network (MADNet), targeting at improving the energy efficiency for smartphones. According to our measurements,WiFi-based mobile data offloading for...
Conference Paper
Providing acceptable quality level for interactive media flows such as interactive video or audio is challenging in the presence of TCP traffic. Volatile TCP traffic such as Web traffic causes transient queues to appear and vanish rapidly introducing jitter to the packets of the media flow. Meanwhile long-lived TCP connections cause standing queues...
Article
Operator controlled IP traffic offloading in cellular networks has been a lively topic in both product and standard development during recent years. Specifically, 3GPP has developed multiple IP traffic offloading solutions for their system architecture, typically requiring 3GPP-specific modifications for user equipment. We argue that an adequate li...
Conference Paper
Searching for mobile data offloading solutions has become topical in recent years. In the Metropolitan Advanced Delivery Network (MADNet) project, we explore the potential of multiple interfaces on smartphones through a collaborative design to enable energy-aware WiFi-based mobile data offloading. We advocate that the vertical collaboration across...
Conference Paper
During the transition from IPv4 to IPv6 hosts in IPv6-only networks need to communicate with IPv4 hosts as most of the Internet services are not yet supporting IPv6. Hosts with IPv6 access would benefit from discovering the presence of NAT64 and learning a prefix needed for IPv6 address synthesis. We propose two mechanisms and systematically evalua...
Article
A bottleneck router typically resides close to the edge of the network where the aggregate traffic is often limited to a single or a few users only. With such limited aggregate traffic Random Early Detection (RED) on the bottleneck router is not able to properly respond to TCP slow start that causes rapid increase in load of the bottleneck. This re...
Conference Paper
Offloading mobile data traffic away from cellular networks has become a main concern for mobile operators to guarantee the quality of service of various applications offered to end-users. Given the explosive growth of smartphone users and mobile data traffic, it is crucial to develop efficient and scalable mechanisms to meet the increasing demand o...

Network

Cited By

Projects

Projects (4)
Project
The SPATIAL (Security and Privacy Accountable Technology Innovations, Algorithms, and machine Learning) project seeks to address the challenges of black-box AI and data management in cybersecurity by designing and developing resilient accountable metrics, privacy-preserving methods, verification tools and system framework that will serve as critical building blocks to achieve trustworthy AI in security solutions. The main objectives include: 1) To develop systematic verification and validation software/hardware mechanisms that ensure AI transparency and explainability in security solution development; 2) To develop system solutions, platforms, and standards that enhance resilience in the training and deployment of AI in decentralized, uncontrolled environments; 3) To define effective and practical adoption and adaptation guidelines to ensure streamlined implementation of trustworthy AI solutions; 4) To create an educational modules that provide technical skills, ethical and socio-legal awareness to current and future AI engineers/developers to ensure the accountable development of security solutions; 5) To develop a communication framework that enables accountable and transparent understanding of AI applications for users, software developers and security service providers. Besides technical measures, SPATIAL project aims to facilitate generating appropriate skills and education for AI security to strike a balance among technological complexity, societal complexity and value conflicts in AI deployment. The project covers data privacy, resilience engineering, and legal-ethical accountability that are in line with EU top agenda to achieve trustworthy AI. In addition, the work carried out in SPATIAL on both social and technical aspects will serve as a stepping stone to establish an appropriate governance and regulatory framework for AI-driven security in Europe.