{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T15:53:39Z","timestamp":1776182019272,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2021M700434"],"award-info":[{"award-number":["2021M700434"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872041"],"award-info":[{"award-number":["61872041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972448"],"award-info":[{"award-number":["61972448"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072040"],"award-info":[{"award-number":["62072040"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102028"],"award-info":[{"award-number":["62102028"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Natural Science Foundation of China General Technology Basic Research Joint Fund","award":["U1836212"],"award-info":[{"award-number":["U1836212"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tmc.2022.3178167","type":"journal-article","created":{"date-parts":[[2022,5,26]],"date-time":"2022-05-26T19:36:31Z","timestamp":1653593791000},"page":"1-1","source":"Crossref","is-referenced-by-count":24,"title":["Power of Redundancy: Surplus Client Scheduling for Federated Learning against User Uncertainties"],"prefix":"10.1109","author":[{"given":"Youqi","family":"Li","sequence":"first","affiliation":[{"name":"School of Cyberspace Science and Technology, and School of Computer Science, Beijing Institute of Technology, Beijing"}]},{"given":"Fan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing Institute of Technology, Beijing, 100081, China"}]},{"given":"Lixing","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Cyber Science and Technology, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, 12474 Shanghai, Shanghai, China"}]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"Institute of Cyber Science and Technology, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China, and Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai, 200240, China"}]},{"given":"Pan","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, 100081, China"}]},{"given":"Yu","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences at Temple University, Philadelphia, PA 19122, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3428757.3429152"},{"key":"ref3","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2200\/s00960ed2v01y201910aim043"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2021.1936455"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00026"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2961673"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904348"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155494"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3008091"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3040887"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/JSC.2020.0003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2020.9020029"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3033806"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467681"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3081560"},{"key":"ref17","article-title":"On the convergence of FedAvg on non-IID data","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Li"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488679"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488877"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488756"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2022.3153135"},{"key":"ref22","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155414"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00049"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488906"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155268"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488705"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488733"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488839"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2019.9010062"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00094"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3096076"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3118401"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3031503"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.23919\/ICN.2020.0015"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.23919\/CSMS.2021.0001"},{"key":"ref38","first-page":"3247","article-title":"Contextual combinatorial multi-armed bandits with volatile arms and submodular reward","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Chen"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737654"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/383082.383165"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062048"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2954310"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/354"},{"key":"ref44","first-page":"5114","article-title":"Thompson sampling for combinatorial semi-bandits","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wang"},{"issue":"1","key":"ref45","first-page":"2533","article-title":"Contextual bandits with similarity information","volume":"15","author":"Slivkins","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.2200\/s00271ed1v01y201006cnt007"},{"key":"ref47","article-title":"Supplementary: Power of redundancy: Surplus client scheduling for federated learning against user uncertainties","author":"Li","year":"2021"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488743"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2971981"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.23919\/ICN.2020.0007"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2940820"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900119"},{"key":"ref53","article-title":"Data for development: The D4D challenge on mobile phone data","author":"Blondel","year":"2012"},{"key":"ref54","first-page":"151","article-title":"Combinatorial multi-armed bandit: General framework and applications","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Chen"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref56","article-title":"Very deep convolutional networks for large-scale image recognition","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Simonyan"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.23919\/ICN.2021.0018"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2021.9010065"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3080714"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/4358975\/09782544.pdf?arnumber=9782544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T03:17:42Z","timestamp":1706757462000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9782544\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/tmc.2022.3178167","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}