{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T18:10:08Z","timestamp":1746727808813,"version":"3.40.5"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2022YFF0604502"],"award-info":[{"award-number":["2022YFF0604502"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62402267","62341201"],"award-info":[{"award-number":["62402267","62341201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guoqiang Institute"},{"DOI":"10.13039\/501100004147","name":"Tsinghua University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004147","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/tmc.2025.3528967","type":"journal-article","created":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T20:26:05Z","timestamp":1736972765000},"page":"5202-5213","source":"Crossref","is-referenced-by-count":0,"title":["DualRec: A Collaborative Training Framework for Device and Cloud Recommendation Models"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3038-9259","authenticated-orcid":false,"given":"Ye","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science, Beijing Information Science and Technology University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3010-3812","authenticated-orcid":false,"given":"Yongheng","family":"Deng","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3416-8181","authenticated-orcid":false,"given":"Sheng","family":"Yue","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China"}]},{"given":"Qiushi","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2782-183X","authenticated-orcid":false,"given":"Ju","family":"Ren","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3028705"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2964552"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3535101"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-0716-2197-4_1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3282907"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219823"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2988450.2988454"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419188"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403176"},{"key":"ref10","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3178167"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3137321"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3363916"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3448099"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_16"},{"article-title":"Federated collaborative filtering for privacy-preserving personalized recommendation system","year":"2019","author":"Ammad-Ud-Din","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3014880"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3550302"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401081"},{"article-title":"FedGNN: Federated graph neural network for privacy-preserving recommendation","year":"2021","author":"Wu","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3560905.3568503"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/582415.582418"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2022.3192506"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467681"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/222"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3560486"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441800"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4135\/9781071810118"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512202"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3532059"},{"article-title":"Automated data denoising for recommendation","year":"2023","author":"Ge","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462919"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220021"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412005"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449878"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467319"},{"key":"ref38","first-page":"317","article-title":"Decentralized recommendation based on matrix factorization: A comparison of gossip and federated learning","volume-title":"Proc. Eur. Conf. Mach. Learn. Knowl. Discov. Databases","author":"Hegeds"},{"article-title":"Practical secure aggregation for federated learning on user-held data","year":"2016","author":"Bonawitz","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00017"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3466628"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155414"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557320"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN61024.2024.00020"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-021-00700-6"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3558005"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557668"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-022-01046-x"},{"key":"ref49","first-page":"14068","article-title":"Group knowledge transfer: Federated learning of large CNNs at the edge","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"He"},{"article-title":"FedGEMS: Federated learning of larger server models via selective knowledge fusion","year":"2021","author":"Cheng","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/399"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228954"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467097"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449942"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591976"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/10990048\/10840283.pdf?arnumber=10840283","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T17:41:36Z","timestamp":1746726096000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10840283\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":55,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2025.3528967","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}