{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:13:20Z","timestamp":1764785600717,"version":"build-2065373602"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFB2904600"],"award-info":[{"award-number":["2023YFB2904600"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002300","62020106001","62394324"],"award-info":[{"award-number":["62002300","62020106001","62394324"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018542","name":"Natural Science Foundation of Sichuan Province","doi-asserted-by":"publisher","award":["2025ZNSFSC0489"],"award-info":[{"award-number":["2025ZNSFSC0489"]}],"id":[{"id":"10.13039\/501100018542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2682024ZTPY050","ZYGX2022J003"],"award-info":[{"award-number":["2682024ZTPY050","ZYGX2022J003"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Young Elite Scientists Sponsorship Program by CAST","award":["2022QNRC001"],"award-info":[{"award-number":["2022QNRC001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1109\/tmc.2025.3552220","type":"journal-article","created":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T17:46:24Z","timestamp":1742319984000},"page":"7663-7679","source":"Crossref","is-referenced-by-count":1,"title":["Domain-Specific Transport Protocols for In-Network Processing at the Edge: A Case Study of Accelerating Model Synchronization"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4041-3681","authenticated-orcid":false,"given":"Shouxi","family":"Luo","sequence":"first","affiliation":[{"name":"School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China"}]},{"given":"Peidong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China"}]},{"given":"Xin","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8281-6251","authenticated-orcid":false,"given":"Pingzhi","family":"Fan","sequence":"additional","affiliation":[{"name":"Key Laboratory of Information Coding and Transmission, CSNMT Int Coop. Res. Centre, Southwest Jiaotong University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6345-7265","authenticated-orcid":false,"given":"Huanlai","family":"Xing","sequence":"additional","affiliation":[{"name":"School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1028-8178","authenticated-orcid":false,"given":"Long","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5219-1780","authenticated-orcid":false,"given":"Hongfang","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838381"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419188"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3007787"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2967772"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1561\/9781680837896"},{"key":"ref6","first-page":"374","article-title":"Towards federated learning at scale: System design","volume-title":"Proc. 2nd Conf. Mach. Learn. Syst.","author":"Bonawitz"},{"key":"ref7","first-page":"1","article-title":"Adaptive federated optimization","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Reddi"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3484266.3487382"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148862"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741961"},{"key":"ref11","first-page":"203","article-title":"NetBricks: Taking the V out of NFV","volume-title":"Proc. 12th USENIX Conf. Operating Syst. Des. Implementation","author":"Panda"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2948764"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155345"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3214234"},{"key":"ref16","first-page":"937","article-title":"KungFu: Making training in distributed machine learning adaptive","volume-title":"Proc. 14th USENIX Conf. Operating Syst. Des. Implementation","author":"Mai"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2024.3460185"},{"key":"ref18","first-page":"1","article-title":"On the convergence of FedAvg on non-IID data","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Li"},{"key":"ref19","first-page":"20461","article-title":"On large-cohort training for federated learning","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Charles"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3625558"},{"key":"ref21","first-page":"785","article-title":"Scaling distributed machine learning with in-network aggregation","volume-title":"Proc. 18th USENIX Symp. Netw. Syst. Des. Implementation","author":"Sapio"},{"key":"ref22","first-page":"741","article-title":"ATP: In-network aggregation for multi-tenant learning","volume-title":"Proc. 18th USENIX Symp. Netw. Syst. Des. Implementation","author":"Lao"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3552326.3587436"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP59255.2023.10355636"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.10.010"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575708"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582037"},{"key":"ref28","first-page":"199","article-title":"NetRPC: Enabling in-network computation in remote procedure calls","volume-title":"Proc. 20th USENIX Symp. Netw. Syst. Des. Implementation","author":"Zhao"},{"key":"ref29","first-page":"829","article-title":"In-network aggregation for shared machine learning clusters","volume-title":"Proc. 4th Conf. Mach. Learn. Syst.","author":"Gebara"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3423380"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838266"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986616"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2996800"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3506480"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.487"},{"article-title":"Venn: Resource management across federated learning jobs","year":"2023","author":"Liu","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3399649"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS60453.2023.00222"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2932905"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2023.3293068"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2022.09.011"},{"volume-title":"Computer Networking: A Top-Down Approach","year":"2017","author":"Kurose","key":"ref42"},{"article-title":"RFC2104: HMAC: Keyed-hashing for message authentication","year":"1997","author":"Krawczyk","key":"ref43"},{"key":"ref44","first-page":"493","article-title":"BatchCrypt: Efficient homomorphic encryption for cross-silo federated learning","volume-title":"Proc. USENIX Conf. Usenix Annu. Tech. Conf.","author":"Zhang"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3663408.3663432"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3145836"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3367995"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621183"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.03.006"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3187821"},{"key":"ref51","first-page":"1421","article-title":"Towards domain-specific network transport for distributed DNN training","volume-title":"Proc. 21st USENIX Symp. Netw. Syst. Des. Implementation","author":"Wang"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3696348.3696857"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3542637.3543708"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3149783"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3166386"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3320362"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3269785"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3073009"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3315746"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3213237"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/11068893\/10930591.pdf?arnumber=10930591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T17:41:05Z","timestamp":1751996465000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10930591\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":60,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2025.3552220","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2025,8]]}}}