{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T18:52:47Z","timestamp":1774896767735,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92467203"],"award-info":[{"award-number":["92467203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372050"],"award-info":[{"award-number":["62372050"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Natural Science Foundation","award":["L244010"],"award-info":[{"award-number":["L244010"]}]},{"name":"Beijing Natural Science Foundation","award":["4232029"],"award-info":[{"award-number":["4232029"]}]},{"name":"Fellowship of China National Postdoctoral Program for Innovative Talents","award":["BX20240045"],"award-info":[{"award-number":["BX20240045"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1109\/tccn.2025.3527647","type":"journal-article","created":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T15:04:16Z","timestamp":1736435056000},"page":"902-913","source":"Crossref","is-referenced-by-count":5,"title":["Diffusion Model Empowered Efficient Data Distillation Method for Cloud-Edge Collaboration"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6108-034X","authenticated-orcid":false,"given":"Ze","family":"Chai","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2702-7679","authenticated-orcid":false,"given":"Yijing","family":"Lin","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0563-6396","authenticated-orcid":false,"given":"Zhipeng","family":"Gao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3404-5373","authenticated-orcid":false,"given":"Xinlei","family":"Yu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Zhiqiang","family":"Xie","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Towards integrated fine-tuning and inference when generative AI meets edge intelligence","author":"Chen","year":"2024","journal-title":"arXiv:2401.02668"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.013.2300485"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3323376"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3414628"},{"key":"ref5","article-title":"One category one prompt: Dataset distillation using diffusion models","author":"Abbasi","year":"2024","journal-title":"arXiv:2403.07142"},{"key":"ref6","article-title":"Dataset distillation","author":"Wang","year":"2018","journal-title":"arXiv:1811.10959"},{"key":"ref7","first-page":"11102","article-title":"Dataset condensation via efficient synthetic-data parameterization","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Kim"},{"key":"ref8","volume-title":"A smaller subset of 10 easily classified classes from Imagenet, and a little more French.","author":"Howard","year":"2019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00645"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01495"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00364"},{"key":"ref12","first-page":"5809","article-title":"D4: Dataset distillation via disentangled diffusion model","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit.","author":"Su"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01045"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3289444"},{"key":"ref15","article-title":"FedCache 2.0: Exploiting the potential of distilled data in knowledge cache-driven federated learning","author":"Pan","year":"2024","journal-title":"arXiv:2405.13378"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3018159"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN54540.2023.10191879"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-12423-5_14"},{"key":"ref19","article-title":"Introduction to core-sets: An updated survey","author":"Feldman","year":"2020","journal-title":"arXiv:2011.09384"},{"key":"ref20","first-page":"1121","article-title":"Herding dynamical weights to learn","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Welling"},{"key":"ref21","first-page":"6950","article-title":"Coresets for data-efficient training of machine learning models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Mirzasoleiman"},{"key":"ref22","article-title":"Dataset condensation with gradient matching","author":"Zhao","year":"2020","journal-title":"arXiv:2006.05929"},{"key":"ref23","first-page":"2256","article-title":"Deep unsupervised learning using nonequilibrium thermodynamics","volume-title":"Proc. 32nd Int. Conf. Mach. Learn.","author":"Sohl-Dickstein"},{"key":"ref24","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","volume":"33","author":"Ho"},{"key":"ref25","first-page":"8162","article-title":"Improved denoising diffusion probabilistic models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Nichol"},{"key":"ref26","first-page":"12438","article-title":"Improved techniques for training score-based generative models","volume-title":"Proc. 38th Int. Conf. Neural Inf. Process. Syst.","volume":"33","author":"Song"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref28","article-title":"Conditional image generation with score-based diffusion models","author":"Batzolis","year":"2021","journal-title":"arXiv:2111.13606"},{"key":"ref29","first-page":"11918","article-title":"Generative modeling by estimating gradients of the data distribution","volume-title":"Proc. 33rd Int. Conf. Neural Inf. Process. Syst.","volume":"32","author":"Song"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01117"},{"key":"ref31","article-title":"Label-efficient semantic segmentation with diffusion models","author":"Baranchuk","year":"2021","journal-title":"arXiv:2112.03126"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1016\/j.neucom.2020.07.133","article-title":"Defense against neural trojan attacks: A survey","volume":"423","author":"Kaviani","year":"2021","journal-title":"Neurocomputing"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref34","article-title":"BadNets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017","journal-title":"arXiv:1708.06733"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485837"},{"key":"ref36","article-title":"VillanDiffusion: A unified backdoor attack framework for diffusion models","author":"Chou","year":"2023","journal-title":"arXiv:2306.06874"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24287"},{"key":"ref38","article-title":"Active learning for convolutional neural networks: A core-set approach","author":"Sener","year":"2017","journal-title":"arXiv:1708.00489"},{"key":"ref39","article-title":"Multimodal dataset distillation for image-text retrieval","author":"Wu","year":"2023","journal-title":"arXiv:2308.07545"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00391"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687307\/10957747\/10835133.pdf?arnumber=10835133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T18:41:58Z","timestamp":1762368118000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10835133\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":40,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tccn.2025.3527647","relation":{},"ISSN":["2332-7731","2372-2045"],"issn-type":[{"value":"2332-7731","type":"electronic"},{"value":"2372-2045","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]}}}