{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T19:20:28Z","timestamp":1774898428231,"version":"3.50.1"},"reference-count":279,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/comst.2024.3482978","type":"journal-article","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T17:56:48Z","timestamp":1729187808000},"page":"2085-2128","source":"Crossref","is-referenced-by-count":12,"title":["Socialized Learning: A Survey of the Paradigm Shift for Edge Intelligence in Networked Systems"],"prefix":"10.1109","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7223-1030","authenticated-orcid":false,"given":"Xiaofei","family":"Wang","sequence":"first","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6767-7233","authenticated-orcid":false,"given":"Yunfeng","family":"Zhao","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2224-2292","authenticated-orcid":false,"given":"Chao","family":"Qiu","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7765-8095","authenticated-orcid":false,"given":"Qinghua","family":"Hu","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3529-2640","authenticated-orcid":false,"given":"Victor C. M.","family":"Leung","sequence":"additional","affiliation":[{"name":"Artificial Intelligence Research Institute, Shenzhen MSU-BIT University, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3149714"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918437"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2866942"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800286"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000292"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800526"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024645"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2984887"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3119950"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3189962"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2993457"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.3036852"},{"key":"ref13","volume-title":"Social Learning Theory","author":"Bandura","year":"1977"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00131"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.07.003"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.312"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3604933"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1900025"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3036948"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-021-03583-3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3055679"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2021.3078100"},{"key":"ref26","first-page":"5867","article-title":"Fully Decentralized multi-agent reinforcement learning with networked agents","volume-title":"Proc. ICML","author":"Zhang"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103304"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2021.743074"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s12119-019-09681-9"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1017\/S1461145709990174"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1177\/0149206320901565"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-68734-4"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1186\/s12889-018-6337-1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1093\/geronb\/58.3.S151"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2015.01282"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6939-15-82"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1055\/s-0033-1356728"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-58069-7_38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.1999.782657"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2970550"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705720"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894727"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1038\/075450a0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.21236\/ad0289565"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/BF00155579"},{"key":"ref46","volume-title":"An Introduction to Multiagent Systems","author":"Wooldridge","year":"2009"},{"key":"ref47","volume-title":"Collective Intelligence: Mankind\u2019s Emerging World in Cyberspace","author":"L\u00e9vy","year":"1997"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"issue":"6","key":"ref49","first-page":"176","article-title":"The rise of crowdsourcing","volume":"14","author":"Howe","year":"2006","journal-title":"Wired Mag."},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069707"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3062546"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3096076"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3155447"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229031"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3127712"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7565183"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2956224"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2855746"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800132"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2968343"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2944926"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108228"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3217134"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3486221"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106401"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102882"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-021-00243-9"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2022.3146615"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701069"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406965"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3357223.3362709"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2879578"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2885348"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.035"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2937342"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3042320"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00595-3"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-96284-w"},{"key":"ref79","volume-title":"Cisco visual networking index: Global mobile data traffic forecast update, (2017\u20132022)","author":"Forecast","year":"2019"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3418908"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2946140"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3279579"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3472456.3472468"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.1081070"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2023.3234165"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414181"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2016.8"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00046"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419194"},{"key":"ref90","first-page":"5330","article-title":"Can decentralized algorithms outperform centralized algorithms? A case study for decentralized parallel stochastic gradient descent","volume-title":"Proc. 31st NeurIPS","author":"Lian"},{"key":"ref91","first-page":"7111","article-title":"Optimal complexity in Decentralized training","volume-title":"Proc. ICML","author":"Lu"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2231991"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904348"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2743240"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3292040.3219655"},{"key":"ref96","first-page":"1002","article-title":"A decentralized policy gradient approach to multi-task reinforcement learning","volume-title":"Proc. 37th UAI","author":"Zeng"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20825"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/srds51746.2020.00017"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/3318216.3363304"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467097"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3160699"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3090331"},{"key":"ref103","first-page":"8253","article-title":"FetchSGD: Communication-efficient federated learning with sketching","volume-title":"Proc. 37th ICML","author":"Rothchild"},{"key":"ref104","article-title":"MC2-SF: Slow-fast learning for mobile-cloud collaborative recommendation","author":"Chen","year":"2021","journal-title":"arXiv:2109.12314v1"},{"key":"ref105","volume-title":"Thinking, Fast and Slow","author":"Kahneman","year":"2011"},{"key":"ref106","first-page":"1","article-title":"Fast and slow learning of recurrent independent mechanisms","volume-title":"Proc. ICLR","author":"Madan"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918951"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3202203"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.07.009"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2022.3206407"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2019.08.016"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00431"},{"key":"ref113","first-page":"9458","article-title":"Few-shot domain adaptation by causal mechanism transfer","volume-title":"Proc. ICML","author":"Teshima"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401314"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00848"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220082"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3119185"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413518"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/3409382"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref121","first-page":"4171","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","volume-title":"Proc. NAACL-HLT","author":"Devlin"},{"key":"ref122","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"NeurIPS"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.667"},{"key":"ref124","first-page":"1","article-title":"Spatial transformer networks","volume-title":"Proc. NeurIPS","volume":"28","author":"Jaderberg"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.469"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/d19-1002"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58536-5_25"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2310992"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3065247"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2343216"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3213246"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3152732"},{"key":"ref133","first-page":"1","article-title":"FitNets: Hints for thin deep nets","volume-title":"Proc. ICLR","author":"Romero"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.754"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-29763-x"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.3048075"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475353"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3183326"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.57"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.451"},{"key":"ref141","first-page":"222","article-title":"Connecting the dots with landmarks: Discriminatively learning domain-invariant features for unsupervised domain adaptation","volume-title":"Proc. 30th ICML","author":"Gong"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.03.020"},{"key":"ref143","first-page":"1180","article-title":"Unsupervised domain adaptation by backpropagation","volume-title":"Proc. ICML","author":"Ganin"},{"key":"ref144","first-page":"22968","article-title":"Cycle self-training for domain adaptation","volume-title":"Proc. 35th NeurIPS","volume":"34","author":"Liu"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2976762"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007379606734"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512093"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357823"},{"key":"ref149","first-page":"343","article-title":"Sparse coding for multitask and transfer learning","volume-title":"Proc. 30th ICML","author":"Maurer"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10283-5"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.06.005"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105151"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3102945"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106883"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2017.01.008"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10263-9"},{"key":"ref157","first-page":"271","article-title":"Feudal reinforcement learning","volume-title":"Proc. NeurIPS","volume":"5","author":"Dayan"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2021.3071062"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/3559540"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2920407"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952656"},{"key":"ref162","first-page":"6755","article-title":"Banach wasserstein GAN","volume-title":"Proc. NeurIPS","volume":"31","author":"Adler"},{"key":"ref163","first-page":"1666","article-title":"Synthesizing programs for images using reinforced adversarial learning","volume-title":"Proc. ICML","author":"Ganin"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/747"},{"key":"ref165","first-page":"3365","article-title":"Communication-efficient distributed learning via lazily aggregated quantized gradients","volume-title":"Proc. 33rd NeurIPS","author":"Sun"},{"key":"ref166","first-page":"4651","article-title":"Perceiver: General perception with iterative attention","volume-title":"Proc. 38th ICML","author":"Jaegle"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3290019"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155237"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3241286"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3314888"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3242724"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3062227"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3321755"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/S1574-0005(05)80019-0"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3335051"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3357874"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488741"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3092179"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612585"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241559"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2787700"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3247049"},{"key":"ref183","first-page":"13434","article-title":"Is normalization indispensable for training deep neural network?","volume-title":"Proc. NeurIPS","volume":"33","author":"Shao"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1145\/3349614.3356023"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737614"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3276937"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1145\/3267809.3267828"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1145\/3093336.3037698"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6855235"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2947893"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/iccw.2016.7503859"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3098816"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2021.3111731"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2961237"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.226"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3377156"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1145\/3363347.3363366"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3177755"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS57875.2023.00062"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100778"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586176"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467078"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS53863.2021.00040"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Spring51267.2021.9449054"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3007035"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC50174.2021.9569707"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3229033"},{"key":"ref210","first-page":"1","article-title":"Towards flexible inference in sequential decision problems via bidirectional transformers","volume-title":"Proc. ICLR Workshop","author":"Carroll"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3237572"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.3390\/s22166097"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2209\/1\/012029"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3143229"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600863"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3191118"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2023.109053"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3253905"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2933631"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2703901"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2536019"},{"key":"ref222","first-page":"78906","article-title":"CoPriv: Network\/protocol co-optimization for communication-efficient private inference","volume-title":"Proc. NeurIPS","volume":"36","author":"Zeng"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3239339"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3142685"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.3390\/app9102117"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04146-z"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3019805"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-20105-w"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100868"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3219261"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103656"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900199"},{"key":"ref233","first-page":"101","article-title":"Energy aware resource allocation and complexity reduction approach for cognitive radio networks using game theory","volume":"42","author":"KN","year":"2020","journal-title":"Phys. Commun."},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3233667"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3227102"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102592"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-022-01974-y"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3007787"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2021.9382202"},{"key":"ref240","volume-title":"Privacy Protection\u2014Privacy Guidelines for Smart Cities","year":"2021"},{"key":"ref241","volume-title":"Guidelines for Security and Privacy in Internet of Things","year":"2021"},{"key":"ref242","volume-title":"CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements","year":"2020"},{"key":"ref243","volume-title":"Harmonizing standards for edge computing","year":"2020"},{"key":"ref244","volume-title":"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; System Architecture for The 5G System; Stage 2; (Release 15)","year":"2018"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2692307"},{"key":"ref246","article-title":"FedML: A research library and benchmark for federated machine learning","author":"He","year":"2020","journal-title":"arXiv:2007.13518"},{"key":"ref247","volume-title":"Fate","year":"2024"},{"key":"ref248","volume-title":"HarmonyOS","year":"2023"},{"key":"ref249","volume-title":"CVX: MATLAB software for disciplined convex programming, version 2.1","author":"Grant","year":"2014"},{"key":"ref250","volume-title":"Mosek","year":"2022"},{"key":"ref251","volume-title":"Gurobi"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2443731"},{"issue":"189","key":"ref253","first-page":"1","article-title":"Learning to optimize: A primer and a benchmark","volume":"23","author":"Chen","year":"2022","journal-title":"J. Mach. Learn. Res."},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-021-03544-w"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3007211"},{"key":"ref256","volume-title":"White paper on RF enabling 6G\u2013opportunities and challenges from technology to spectrum","author":"Amakawa","year":"2021"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3017668"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3018817"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3058213"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3067447"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.018.2200568"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3318609"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3060484"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3230758"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3257308"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.01.148"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2020.7032"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3072221"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3353265"},{"key":"ref270","first-page":"3203","article-title":"Seq2seq dependency parsing","volume-title":"Proc. 27th COLING","author":"Li"},{"key":"ref271","first-page":"22470","article-title":"Combiner: Full attention transformer with sparse computation cost","volume-title":"Proc. NeurIPS","volume":"34","author":"Ren"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25069-9_38"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-018-9711-0"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3280459"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3347172"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/SECON48991.2020.9158429"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3247182"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2018.05.012"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2023.3262255"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9739\/11032135\/10720847.pdf?arnumber=10720847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:25:33Z","timestamp":1749792333000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10720847\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":279,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/comst.2024.3482978","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}