首页 > 最新文献

IEEE Transactions on Mobile Computing最新文献

英文 中文
An Overlapping Coalition Game Approach for Collaborative Block Mining and Edge Task Offloading in MEC-Assisted Blockchain Networks mec辅助区块链网络中协同块挖掘和边缘任务卸载的重叠联盟博弈方法
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-22 DOI: 10.1109/TMC.2025.3591822
Licheng Ye;Zehui Xiong;Lin Gao;Dusit Niyato
Mobile edge computing (MEC) is a promising technology that enhances the efficiency of mobile blockchain networks, by enabling miners, often acted by mobile users (MUs) with limited computing resources, to offload resource-intensive mining tasks to nearby edge computing servers. Collaborative block mining can further boost mining efficiency by allowing multiple miners to form coalitions, pooling their computing resources and transaction data together to mine new blocks collaboratively. Therefore, an MEC-assisted collaborative blockchain network can leverage the strengths of both technologies, offering improved efficiency, security, and scalability for blockchain systems. While existing research in this area has mainly focused on the single-coalition collaboration mode, where each miner can only join one coalition, this work explores a more comprehensive multi-coalition collaboration mode, which allows each miner to join multiple coalitions. To analyze the behavior of miners and the edge computing service provider (ECP) in this scenario, we propose a novel two-stage Stackelberg game. In Stage I, the ECP, as the leader, determines the prices of computing resources for all MUs. In Stage II, each MU decides the coalitions to join, resulting in an overlapping coalition formation (OCF) game; Subsequently, each coalition decides how many edge computing resources to purchase from the ECP, leading to an edge resource competition (ERC) game. We derive the closed-form Nash equilibrium for the ERC game, based on which we further propose an OCF-based alternating algorithm to achieve a stable coalition structure for the OCF game and develop a near-optimal pricing strategy for the ECP’s resource pricing problem. Simulation results show that the proposed multi-coalition collaboration mode can improve the system efficiency by $12.64% sim 17.63%$, compared to the traditional single-coalition collaboration mode.
移动边缘计算(MEC)是一种很有前途的技术,它通过使矿工(通常由计算资源有限的移动用户(mu)操作)将资源密集型挖掘任务卸载到附近的边缘计算服务器,从而提高了移动区块链网络的效率。协作区块挖掘可以通过允许多个矿工组成联盟,将他们的计算资源和交易数据集中在一起,从而协作挖掘新的区块,从而进一步提高挖掘效率。因此,mec辅助的协作b区块链网络可以利用这两种技术的优势,为区块链系统提供更高的效率、安全性和可扩展性。该领域的现有研究主要集中在单联盟协作模式上,每个矿工只能加入一个联盟,而本研究探索了更全面的多联盟协作模式,允许每个矿工加入多个联盟。为了分析矿工和边缘计算服务提供商(ECP)在这种情况下的行为,我们提出了一种新的两阶段Stackelberg博弈。在第一阶段,ECP作为领导者,决定所有mu的计算资源价格。在第二阶段,每个MU决定加入联盟,形成重叠联盟形成(OCF)博弈;随后,每个联盟决定从ECP购买多少边缘计算资源,导致边缘资源竞争(ERC)博弈。在此基础上,我们进一步提出了一种基于OCF的交替算法,以实现OCF博弈的稳定联盟结构,并为ECP的资源定价问题制定了接近最优的定价策略。仿真结果表明,与传统的单联盟协作模式相比,所提出的多联盟协作模式可将系统效率提高12.64%至17.63%。
{"title":"An Overlapping Coalition Game Approach for Collaborative Block Mining and Edge Task Offloading in MEC-Assisted Blockchain Networks","authors":"Licheng Ye;Zehui Xiong;Lin Gao;Dusit Niyato","doi":"10.1109/TMC.2025.3591822","DOIUrl":"https://doi.org/10.1109/TMC.2025.3591822","url":null,"abstract":"Mobile edge computing (MEC) is a promising technology that enhances the efficiency of mobile blockchain networks, by enabling miners, often acted by mobile users (MUs) with limited computing resources, to offload resource-intensive mining tasks to nearby edge computing servers. Collaborative block mining can further boost mining efficiency by allowing multiple miners to form <i>coalitions</i>, pooling their computing resources and transaction data together to mine new blocks collaboratively. Therefore, an MEC-assisted collaborative blockchain network can leverage the strengths of both technologies, offering improved efficiency, security, and scalability for blockchain systems. While existing research in this area has mainly focused on the <i>single-coalition</i> collaboration mode, where each miner can only join one coalition, this work explores a more comprehensive <i>multi-coalition</i> collaboration mode, which allows each miner to join multiple coalitions. To analyze the behavior of miners and the edge computing service provider (ECP) in this scenario, we propose a novel two-stage Stackelberg game. In Stage I, the ECP, as the leader, determines the prices of computing resources for all MUs. In Stage II, each MU decides the coalitions to join, resulting in an <i>overlapping coalition formation (OCF) game</i>; Subsequently, each coalition decides how many edge computing resources to purchase from the ECP, leading to an <i>edge resource competition (ERC) game</i>. We derive the closed-form Nash equilibrium for the ERC game, based on which we further propose an OCF-based alternating algorithm to achieve a stable coalition structure for the OCF game and develop a near-optimal pricing strategy for the ECP’s resource pricing problem. Simulation results show that the proposed multi-coalition collaboration mode can improve the system efficiency by <inline-formula><tex-math>$12.64% sim 17.63%$</tex-math></inline-formula>, compared to the traditional single-coalition collaboration mode.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 12","pages":"13710-13724"},"PeriodicalIF":9.2,"publicationDate":"2025-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145442731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cost-Efficient and Secure Federated Learning for Edge Computing 边缘计算的经济高效和安全的联邦学习
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-21 DOI: 10.1109/TMC.2025.3590799
Zhuangzhuang Zhang;Libing Wu;Zhibo Wang;Jiahui Hu;Chao Ma;Qin Liu
Due to the collaborative machine learning nature of Federated Learning (FL), it enables the training of machine learning models on large-scale distributed datasets in edge computing environments. Nevertheless, the application of FL in edge computing still faces three crucial challenges: resource constraint, privacy leakage, and Byzantine failures. Unfortunately, current approaches lack the ability to effectively balance these three challenges. In this paper, we propose FedEdge, a cost-efficient and secure FL for edge computing. FedEdge contains two main mechanisms: adaptive compression perturbation and dynamic update filtering. The adaptive compression perturbation mechanism reduces the communication overhead, provides different levels of privacy protection for edge nodes, and prevents Byzantine attacks. The dynamic update filtering mechanism is used to further filter Byzantine attacks and limit the impact of adaptive compression perturbation on the global model performance. The experimental results on the MNIST, CIFAR-10, CIFAR-100, and CelebA datasets demonstrate the effectiveness of FedEdge against free-riders, label-flipping, and sign-flipping attacks. Theoretical analysis also demonstrate that FedEdge can still converge even when the majority of edge nodes are malicious.
由于联邦学习(FL)的协作机器学习特性,它可以在边缘计算环境中的大规模分布式数据集上训练机器学习模型。然而,FL在边缘计算中的应用仍然面临着三个关键挑战:资源约束、隐私泄漏和拜占庭故障。不幸的是,目前的方法缺乏有效平衡这三个挑战的能力。在本文中,我们提出了FedEdge,一个经济高效和安全的边缘计算FL。FedEdge包含两种主要机制:自适应压缩扰动和动态更新过滤。自适应压缩扰动机制减少了通信开销,为边缘节点提供了不同级别的隐私保护,并防止了拜占庭攻击。采用动态更新过滤机制进一步过滤拜占庭攻击,限制自适应压缩扰动对模型全局性能的影响。在MNIST、CIFAR-10、CIFAR-100和CelebA数据集上的实验结果证明了FedEdge对搭便车攻击、标签翻转攻击和符号翻转攻击的有效性。理论分析还表明,即使大多数边缘节点是恶意节点,FedEdge仍然可以收敛。
{"title":"Cost-Efficient and Secure Federated Learning for Edge Computing","authors":"Zhuangzhuang Zhang;Libing Wu;Zhibo Wang;Jiahui Hu;Chao Ma;Qin Liu","doi":"10.1109/TMC.2025.3590799","DOIUrl":"https://doi.org/10.1109/TMC.2025.3590799","url":null,"abstract":"Due to the collaborative machine learning nature of Federated Learning (FL), it enables the training of machine learning models on large-scale distributed datasets in edge computing environments. Nevertheless, the application of FL in edge computing still faces three crucial challenges: resource constraint, privacy leakage, and Byzantine failures. Unfortunately, current approaches lack the ability to effectively balance these three challenges. In this paper, we propose FedEdge, a cost-efficient and secure FL for edge computing. FedEdge contains two main mechanisms: adaptive compression perturbation and dynamic update filtering. The adaptive compression perturbation mechanism reduces the communication overhead, provides different levels of privacy protection for edge nodes, and prevents Byzantine attacks. The dynamic update filtering mechanism is used to further filter Byzantine attacks and limit the impact of adaptive compression perturbation on the global model performance. The experimental results on the MNIST, CIFAR-10, CIFAR-100, and CelebA datasets demonstrate the effectiveness of FedEdge against free-riders, label-flipping, and sign-flipping attacks. Theoretical analysis also demonstrate that FedEdge can still converge even when the majority of edge nodes are malicious.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 12","pages":"13615-13632"},"PeriodicalIF":9.2,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145442724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EP-GSPR: An Efficient Privacy-Preserving Graph Shortest Path Retrieval Scheme EP-GSPR:一种有效的保护隐私的图最短路径检索方案
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-21 DOI: 10.1109/TMC.2025.3591097
Chenbin Zhao;Ruifeng Zhu;Jing Chen;Ruiying Du;Kun He;Jianting Ning;Yang Xiang
The continuous development of mobile terminal applications, online maps, and other navigation services have become widely used, simultaneously giving rise to significant security risks. To address the issues of privacy leakage and low efficiency in traditional graph shortest path retrieval schemes, an efficient privacy-preserving graph shortest path retrieval scheme is proposed, called EP-GSPR. Specifically, this scheme addresses the privacy security problems in the existing graph shortest path retrieval solutions by ensuring the bilateral privacy protection of the user’s query location and the database privacy of the cloud server. Throughout the retrieval process, the cloud server cannot obtain the user’s location information, and the user cannot access any database information other than the retrieval results. To overcome the performance bottlenecks in existing schemes, a progressive iterative retrieval framework is designed as the fundamental modular, called Pirf, achieving sub-linear retrieval costs and low storage overhead on the cloud server side. Finally, the security analyses demonstrate the EP-GSPR scheme achieves the bilateral privacy-preserving in terms of user and server sides. The comprehensive experiment evaluations also state the efficiency and practicality of the proposed scheme.
移动端应用程序、在线地图等导航服务的不断发展,已被广泛使用,同时也带来了重大的安全风险。针对传统图最短路径检索方案存在的隐私泄露和效率低的问题,提出了一种高效的保护隐私的图最短路径检索方案EP-GSPR。具体来说,该方案通过保证用户查询位置的双边隐私保护和云服务器的数据库隐私保护,解决了现有图最短路径检索方案中的隐私安全问题。在整个检索过程中,云服务器无法获取用户的位置信息,用户也无法访问检索结果之外的任何数据库信息。为了克服现有方案的性能瓶颈,设计了一个渐进式迭代检索框架作为基本模块,称为Pirf,实现了亚线性检索成本和云服务器端的低存储开销。最后,安全性分析表明,EP-GSPR方案在用户端和服务器端实现了双边隐私保护。综合实验评价表明了该方案的有效性和实用性。
{"title":"EP-GSPR: An Efficient Privacy-Preserving Graph Shortest Path Retrieval Scheme","authors":"Chenbin Zhao;Ruifeng Zhu;Jing Chen;Ruiying Du;Kun He;Jianting Ning;Yang Xiang","doi":"10.1109/TMC.2025.3591097","DOIUrl":"https://doi.org/10.1109/TMC.2025.3591097","url":null,"abstract":"The continuous development of mobile terminal applications, online maps, and other navigation services have become widely used, simultaneously giving rise to significant security risks. To address the issues of privacy leakage and low efficiency in traditional graph shortest path retrieval schemes, an efficient privacy-preserving graph shortest path retrieval scheme is proposed, called EP-GSPR. Specifically, this scheme addresses the privacy security problems in the existing graph shortest path retrieval solutions by ensuring the bilateral privacy protection of the user’s query location and the database privacy of the cloud server. Throughout the retrieval process, the cloud server cannot obtain the user’s location information, and the user cannot access any database information other than the retrieval results. To overcome the performance bottlenecks in existing schemes, a progressive iterative retrieval framework is designed as the fundamental modular, called Pirf, achieving sub-linear retrieval costs and low storage overhead on the cloud server side. Finally, the security analyses demonstrate the EP-GSPR scheme achieves the bilateral privacy-preserving in terms of user and server sides. The comprehensive experiment evaluations also state the efficiency and practicality of the proposed scheme.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 12","pages":"13633-13647"},"PeriodicalIF":9.2,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145442693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Modal Based 3D Localization via the Channel Adjustment LED-Tag 基于通道调节led标签的多模态3D定位
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-21 DOI: 10.1109/TMC.2025.3590801
Shiyuan Ma;Lei Xie;Chuyu Wang;Yanling Bu;Long Fan;Jingyi Ning;Qing Guo;Baoliu Ye;Sanglu Lu
With the rise of intelligent systems like assisted driving and robotics, all-weather target identification and 3D localization systems have become crucial for reliable obstacle avoidance and navigation. However, vision-based methods struggle to provide accurate target locations under low light or bad weather. Radar-based solutions like mmWave radar and LiDAR are robust but hindered by high costs and challenges in recognizing target identities at scale. In this paper, we propose a low-cost, all-weather target identification and 3D localization system based on LED-tags, which system can address the needs of intelligent systems for obstacle avoidance in complex environments. We explore the backscatter communication of LED devices and design a dual-modal LED-Tag, which includes two features: a backscatter RF signal detectable by RF devices and visual light spot information detectable by cameras, both sharing the same ID. To enhance the limited backscatter capability, we propose a multi-branch parallel model that enhances the signal strength using beamforming synthesis and a channel adjustment mechanism to improve robustness in complex environments, ensuring accurate 3D localization. For multi-target identification, we design an LED-tag encoding system, assigning each tag a unique encoding sequence. Each target’s identity can be recognized with our customized ID decoding method, which leverages prior information and time-domain sampling characteristics. Extensive experimental results show that the backscatter communication and target detection range of LED-tags can reach 15 m. Moreover, the system achieves an average localization error of 7.3 cm within a 5 m range, demonstrating the system’s excellent performance in terms of practicality and accuracy.
随着辅助驾驶和机器人等智能系统的兴起,全天候目标识别和3D定位系统已成为可靠避障和导航的关键。然而,基于视觉的方法很难在弱光或恶劣天气下提供准确的目标位置。基于雷达的解决方案,如毫米波雷达和激光雷达,虽然功能强大,但受到高成本和大规模识别目标身份的挑战的阻碍。本文提出了一种基于led标签的低成本全天候目标识别和三维定位系统,该系统可以满足智能系统在复杂环境下的避障需求。我们探索了LED器件的后向散射通信,并设计了一种双模态LED标签,该标签包括两个特征:RF器件可检测的后向散射射频信号和相机可检测的视觉光斑信息,两者共享相同的ID。为了增强有限的后向散射能力,我们提出了一种多分支并行模型,该模型使用波束形成合成和信道调整机制来增强信号强度,以提高复杂环境下的鲁棒性,确保精确的3D定位。为了实现多目标识别,我们设计了一个led标签编码系统,为每个标签分配一个唯一的编码序列。每个目标的身份可以通过我们定制的ID解码方法来识别,该方法利用了先验信息和时域采样特性。大量实验结果表明,led标签的后向散射通信和目标检测距离可达15 m。在5 m范围内,系统的平均定位误差为7.3 cm,显示了系统在实用性和精度方面的优异性能。
{"title":"Multi-Modal Based 3D Localization via the Channel Adjustment LED-Tag","authors":"Shiyuan Ma;Lei Xie;Chuyu Wang;Yanling Bu;Long Fan;Jingyi Ning;Qing Guo;Baoliu Ye;Sanglu Lu","doi":"10.1109/TMC.2025.3590801","DOIUrl":"https://doi.org/10.1109/TMC.2025.3590801","url":null,"abstract":"With the rise of intelligent systems like assisted driving and robotics, all-weather target identification and 3D localization systems have become crucial for reliable obstacle avoidance and navigation. However, vision-based methods struggle to provide accurate target locations under low light or bad weather. Radar-based solutions like mmWave radar and LiDAR are robust but hindered by high costs and challenges in recognizing target identities at scale. In this paper, we propose a <italic>low-cost, all-weather target identification and 3D localization system</i> based on <italic>LED-tags</i>, which system can address the needs of intelligent systems for obstacle avoidance in complex environments. We explore the backscatter communication of LED devices and design a <italic>dual-modal LED-Tag</i>, which includes two features: a backscatter RF signal detectable by RF devices and visual light spot information detectable by cameras, both sharing the same ID. To enhance the limited backscatter capability, we propose a <italic>multi-branch parallel model</i> that enhances the signal strength using beamforming synthesis and a <italic>channel adjustment mechanism</i> to improve robustness in complex environments, ensuring accurate 3D localization. For multi-target identification, we design an LED-tag encoding system, assigning each tag a unique encoding sequence. Each target’s identity can be recognized with our customized <italic>ID decoding method</i>, which leverages prior information and time-domain sampling characteristics. Extensive experimental results show that the backscatter communication and target detection range of LED-tags can reach <italic>15 m</i>. Moreover, the system achieves an <italic>average localization error of 7.3 cm within a 5 m range</i>, demonstrating the system’s excellent performance in terms of practicality and accuracy.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 12","pages":"13567-13585"},"PeriodicalIF":9.2,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145442696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quality-of-Service Aware LLM Routing for Edge Computing With Multiple Experts 多专家边缘计算的服务质量感知LLM路由
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-21 DOI: 10.1109/TMC.2025.3590969
Jin Yang;Qiong Wu;Zhiying Feng;Zhi Zhou;Deke Guo;Xu Chen
Large Language Models (LLMs) have demonstrated remarkable capabilities, leading to a significant increase in user demand for LLM services. However, cloud-based LLM services often suffer from high latency, unstable responsiveness, and privacy concerns. Therefore, multiple LLMs are usually deployed at the network edge to boost real-time responsiveness and protect data privacy, particularly for many emerging smart mobile and IoT applications. Given the varying response quality and latency of LLM services, a critical issue is how to route user requests from mobile and IoT devices to an appropriate LLM service (i.e., edge LLM expert) to ensure acceptable quality-of-service (QoS). Existing routing algorithms fail to simultaneously address the heterogeneity of LLM services, the interference among requests, and the dynamic workloads necessary for maintaining long-term stable QoS. To meet these challenges, in this paper we propose a novel deep reinforcement learning (DRL)-based QoS-aware LLM routing framework for sustained high-quality LLM services. Due to the dynamic nature of the global state, we propose a dynamic state abstraction technique to compactly represent global state features with a heterogeneous graph attention network (HAN). Additionally, we introduce an action impact estimator and a tailored reward function to guide the DRL agent in maximizing QoS and preventing latency violations. Extensive experiments on both Poisson and real-world workloads demonstrate that our proposed algorithm significantly improves average QoS and computing resource efficiency compared to existing baselines.
大型语言模型(LLM)已经展示了非凡的能力,导致用户对LLM服务的需求显著增加。但是,基于云的LLM服务通常存在高延迟、不稳定的响应性和隐私问题。因此,通常在网络边缘部署多个llm,以提高实时响应能力并保护数据隐私,特别是对于许多新兴的智能移动和物联网应用。考虑到LLM服务的不同响应质量和延迟,一个关键问题是如何将用户请求从移动和物联网设备路由到适当的LLM服务(即边缘LLM专家),以确保可接受的服务质量(QoS)。现有的路由算法无法同时解决LLM服务的异构性、请求之间的干扰以及维持长期稳定QoS所需的动态工作负载。为了应对这些挑战,本文提出了一种新的基于深度强化学习(DRL)的qos感知LLM路由框架,用于持续的高质量LLM服务。鉴于全局状态的动态性,提出了一种动态状态抽象技术,利用异构图注意网络(HAN)紧凑地表示全局状态特征。此外,我们引入了一个动作影响估计器和一个定制的奖励函数,以指导DRL代理最大化QoS和防止延迟违规。在泊松和实际工作负载上进行的大量实验表明,与现有基线相比,我们提出的算法显着提高了平均QoS和计算资源效率。
{"title":"Quality-of-Service Aware LLM Routing for Edge Computing With Multiple Experts","authors":"Jin Yang;Qiong Wu;Zhiying Feng;Zhi Zhou;Deke Guo;Xu Chen","doi":"10.1109/TMC.2025.3590969","DOIUrl":"https://doi.org/10.1109/TMC.2025.3590969","url":null,"abstract":"Large Language Models (LLMs) have demonstrated remarkable capabilities, leading to a significant increase in user demand for LLM services. However, cloud-based LLM services often suffer from high latency, unstable responsiveness, and privacy concerns. Therefore, multiple LLMs are usually deployed at the network edge to boost real-time responsiveness and protect data privacy, particularly for many emerging smart mobile and IoT applications. Given the varying response quality and latency of LLM services, a critical issue is how to route user requests from mobile and IoT devices to an appropriate LLM service (i.e., edge LLM expert) to ensure acceptable quality-of-service (QoS). Existing routing algorithms fail to simultaneously address the heterogeneity of LLM services, the interference among requests, and the dynamic workloads necessary for maintaining long-term stable QoS. To meet these challenges, in this paper we propose a novel deep reinforcement learning (DRL)-based QoS-aware LLM routing framework for sustained high-quality LLM services. Due to the dynamic nature of the global state, we propose a dynamic state abstraction technique to compactly represent global state features with a heterogeneous graph attention network (HAN). Additionally, we introduce an action impact estimator and a tailored reward function to guide the DRL agent in maximizing QoS and preventing latency violations. Extensive experiments on both Poisson and real-world workloads demonstrate that our proposed algorithm significantly improves average QoS and computing resource efficiency compared to existing baselines.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 12","pages":"13648-13662"},"PeriodicalIF":9.2,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145442688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing Non-Intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters 防止非侵入式负载监控隐私入侵:一种针对联网智能电表的精确对抗性攻击方案
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-21 DOI: 10.1109/TMC.2025.3590765
Jialing He;Jiacheng Wang;Ning Wang;Shangwei Guo;Liehuang Zhu;Dusit Niyato;Tao Xiang
Smart grid, through networked smart meters employing the non-intrusive load monitoring (NILM) technique, can considerably discern the usage patterns of residential appliances. However, this technique also incurs privacy leakage. To address this issue, we propose an innovative scheme based on adversarial attack in this paper. The scheme effectively prevents NILM models from violating appliance-level privacy, while also ensuring accurate billing calculation for users. To achieve this objective, we overcome two primary challenges. First, as NILM models fall under the category of time-series regression models, direct application of traditional adversarial attacks designed for classification tasks is not feasible. To tackle this issue, we formulate a novel adversarial attack problem tailored specifically for NILM and providing a theoretical foundation for utilizing the Jacobian of the NILM model to generate imperceptible perturbations. Leveraging the Jacobian, our scheme can produce perturbations, which effectively misleads the signal prediction of NILM models to safeguard users’ appliance-level privacy. The second challenge pertains to fundamental utility requirements, where existing adversarial attack schemes struggle to achieve accurate billing calculation for users. To handle this problem, we introduce an additional constraint, mandating that the sum of added perturbations within a billing period must be precisely zero. Experimental validation on real-world power datasets REDD and U.K.-DALE demonstrates the efficacy of our proposed solutions, which can significantly amplify the discrepancy between the output of the targeted NILM model and the actual power signal of appliances, and enable accurate billing at the same time. Additionally, our solutions exhibit transferability, making the generated perturbation signal from one target model applicable to other diverse NILM models.
智能电网通过采用非侵入式负荷监测(NILM)技术的联网智能电表,可以很好地识别家用电器的使用模式。然而,这种技术也会导致隐私泄露。为了解决这一问题,本文提出了一种基于对抗性攻击的创新方案。该方案有效防止NILM模型侵犯设备级隐私,同时保证用户计费计算的准确性。为实现这一目标,我们克服了两个主要挑战。首先,由于NILM模型属于时间序列回归模型的范畴,直接应用为分类任务设计的传统对抗性攻击是不可行的。为了解决这个问题,我们制定了一个专门针对NILM的新型对抗性攻击问题,并为利用NILM模型的雅可比矩阵产生难以察觉的扰动提供了理论基础。利用雅可比矩阵,我们的方案可以产生扰动,有效地误导NILM模型的信号预测,以保护用户的设备级隐私。第二个挑战涉及基本的公用事业需求,其中现有的对抗性攻击方案难以为用户实现准确的计费计算。为了处理这个问题,我们引入了一个额外的约束,强制要求在一个计费周期内添加的扰动之和必须精确地为零。在实际电力数据集REDD和uk - dale上的实验验证证明了我们提出的解决方案的有效性,该解决方案可以显着放大目标NILM模型输出与设备实际功率信号之间的差异,同时实现准确的计费。此外,我们的解决方案具有可转移性,使从一个目标模型生成的扰动信号适用于其他不同的NILM模型。
{"title":"Preventing Non-Intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters","authors":"Jialing He;Jiacheng Wang;Ning Wang;Shangwei Guo;Liehuang Zhu;Dusit Niyato;Tao Xiang","doi":"10.1109/TMC.2025.3590765","DOIUrl":"https://doi.org/10.1109/TMC.2025.3590765","url":null,"abstract":"Smart grid, through networked smart meters employing the non-intrusive load monitoring (NILM) technique, can considerably discern the usage patterns of residential appliances. However, this technique also incurs privacy leakage. To address this issue, we propose an innovative scheme based on adversarial attack in this paper. The scheme effectively prevents NILM models from violating appliance-level privacy, while also ensuring accurate billing calculation for users. To achieve this objective, we overcome two primary challenges. First, as NILM models fall under the category of time-series regression models, direct application of traditional adversarial attacks designed for classification tasks is not feasible. To tackle this issue, we formulate a novel adversarial attack problem tailored specifically for NILM and providing a theoretical foundation for utilizing the Jacobian of the NILM model to generate imperceptible perturbations. Leveraging the Jacobian, our scheme can produce perturbations, which effectively misleads the signal prediction of NILM models to safeguard users’ appliance-level privacy. The second challenge pertains to fundamental utility requirements, where existing adversarial attack schemes struggle to achieve accurate billing calculation for users. To handle this problem, we introduce an additional constraint, mandating that the sum of added perturbations within a billing period must be precisely zero. Experimental validation on real-world power datasets REDD and U.K.-DALE demonstrates the efficacy of our proposed solutions, which can significantly amplify the discrepancy between the output of the targeted NILM model and the actual power signal of appliances, and enable accurate billing at the same time. Additionally, our solutions exhibit transferability, making the generated perturbation signal from one target model applicable to other diverse NILM models.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 12","pages":"13696-13709"},"PeriodicalIF":9.2,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145442691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Generalization Ability of Spatiotemporal Model in Urban Scenario 城市情景时空模型的概化能力评价
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-18 DOI: 10.1109/TMC.2025.3590606
Hongjun Wang;Jiyuan Chen;Tong Pan;Zheng Dong;Renhe Jiang;Xuan Song
Spatiotemporal neural networks have shown great promise in urban scenarios by effectively capturing temporal and spatial correlations. However, urban environments are constantly evolving, and current model evaluations are often limited to traffic scenarios and use data mainly collected only a few weeks after training period to evaluate model performance. The generalization ability of these models remains largely unexplored. To address this, we propose a Spatiotemporal Out-of-Distribution (ST-OOD) benchmark, which comprises six urban scenario: bike-sharing, 311 services, pedestrian counts, traffic speed, traffic flow, ride-hailing demand, and bike-sharing, each with in-distribution (same year) and out-of-distribution (next years) settings. We extensively evaluate state-of-the-art spatiotemporal models and find that their performance degrades significantly in out-of-distribution settings, with most models performing even worse than a simple Multi-Layer Perceptron (MLP). Our findings suggest that current leading methods tend to over-rely on parameters to overfit training data, which may lead to good performance on in-distribution data but often results in poor generalization. We also investigated whether dropout could mitigate the negative effects of overfitting. Our results showed that a slight dropout rate could significantly improve generalization performance on most datasets, with minimal impact on in-distribution performance. However, balancing in-distribution and out-of-distribution performance remains a challenging problem. We hope that the proposed benchmark will encourage further research on this critical issue.
时空神经网络通过有效地捕获时空相关性,在城市场景中显示出巨大的前景。然而,城市环境是不断变化的,目前的模型评估往往局限于交通场景,并且主要使用训练期后几周收集的数据来评估模型的性能。这些模型的泛化能力在很大程度上仍未被探索。为了解决这个问题,我们提出了一个时空分布外(ST-OOD)基准,它包括六个城市场景:共享单车、311服务、行人数量、交通速度、交通流量、网约车需求和共享单车,每个场景都有分布内(同一年)和分布外(明年)的设置。我们对最先进的时空模型进行了广泛的评估,发现它们的性能在非分布环境下显著下降,大多数模型的表现甚至比简单的多层感知器(MLP)还要差。我们的研究结果表明,目前的主要方法倾向于过度依赖参数来过拟合训练数据,这可能会导致在分布数据上的良好性能,但往往导致较差的泛化。我们还研究了辍学是否可以减轻过拟合的负面影响。我们的研究结果表明,在大多数数据集上,轻微的辍学率可以显著提高泛化性能,而对分布内性能的影响最小。然而,平衡分布内和分布外的性能仍然是一个具有挑战性的问题。我们希望拟议的基准将鼓励对这一关键问题进行进一步研究。
{"title":"Evaluating the Generalization Ability of Spatiotemporal Model in Urban Scenario","authors":"Hongjun Wang;Jiyuan Chen;Tong Pan;Zheng Dong;Renhe Jiang;Xuan Song","doi":"10.1109/TMC.2025.3590606","DOIUrl":"https://doi.org/10.1109/TMC.2025.3590606","url":null,"abstract":"Spatiotemporal neural networks have shown great promise in urban scenarios by effectively capturing temporal and spatial correlations. However, urban environments are constantly evolving, and current model evaluations are often limited to traffic scenarios and use data mainly collected only a few weeks after training period to evaluate model performance. The generalization ability of these models remains largely unexplored. To address this, we propose a Spatiotemporal Out-of-Distribution (ST-OOD) benchmark, which comprises six urban scenario: bike-sharing, 311 services, pedestrian counts, traffic speed, traffic flow, ride-hailing demand, and bike-sharing, each with in-distribution (same year) and out-of-distribution (next years) settings. We extensively evaluate state-of-the-art spatiotemporal models and find that their performance degrades significantly in out-of-distribution settings, with most models performing even worse than a simple Multi-Layer Perceptron (MLP). Our findings suggest that current leading methods tend to over-rely on parameters to overfit training data, which may lead to good performance on in-distribution data but often results in poor generalization. We also investigated whether dropout could mitigate the negative effects of overfitting. Our results showed that a slight dropout rate could significantly improve generalization performance on most datasets, with minimal impact on in-distribution performance. However, balancing in-distribution and out-of-distribution performance remains a challenging problem. We hope that the proposed benchmark will encourage further research on this critical issue.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 12","pages":"13535-13548"},"PeriodicalIF":9.2,"publicationDate":"2025-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145442692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint DNN Model Deployment, Selection, and Configuration for Heterogeneous Inference Services Toward Edge Intelligence 面向边缘智能的异构推理服务的联合DNN模型部署、选择和配置
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-10 DOI: 10.1109/TMC.2025.3586793
Hebin Huang;Junbin Liang;Geyong Min
Edge intelligence is an emerging paradigm in edge computing that deploys Deep Neural Network (DNN) models on edge servers with limited storage and computation capacities to provide inference services for high mobility and real-time applications, such as autonomous driving or smart surveillance, with varying accuracy and delay requirements. Adapting application configurations (e.g., image resolution or video frame rate) while selecting different DNN models and deployment locations can provide high-accuracy, low-delay inference services that meet user requirements. However, the configurations and DNN models of various inference services are highly heterogeneous. As balancing inference accuracy, resource cost, and delay is a multi-objective programming problem, it is a great challenge to obtain the optimal solution. To address this challenge, we propose a novel online framework to jointly optimize the configuration adaption, DNN model selection, and deployment for heterogeneous inference services. Specifically, we first formulate this joint optimization problem as an integer linear programming problem and prove it is NP-hard. Then, we further model the problem as a Partial Observable Markov Decision Process (POMDP) and solve it by developing a Heterogeneous-Agent Reinforcement Learning (HARL) based algorithm, named Heterogeneous Inference Service ProvidER (HISPER). It allows agents to have different action spaces corresponding to different types of configurations and DNN models. Finally, extensive experiments demonstrate that the proposed algorithm outperforms other state-of-the-art counterparts.
边缘智能是边缘计算中的一种新兴范例,它将深度神经网络(DNN)模型部署在存储和计算能力有限的边缘服务器上,为具有不同精度和延迟要求的高移动性和实时应用(如自动驾驶或智能监控)提供推理服务。在选择不同DNN模型和部署位置的同时调整应用程序配置(例如,图像分辨率或视频帧率),可以提供满足用户需求的高精度、低延迟推理服务。然而,各种推理服务的配置和DNN模型是高度异构的。由于平衡推理精度、资源成本和延迟是一个多目标规划问题,获得最优解是一个很大的挑战。为了解决这一挑战,我们提出了一个新的在线框架来共同优化异构推理服务的配置适应、DNN模型选择和部署。具体来说,我们首先将这个联合优化问题表述为一个整数线性规划问题,并证明了它是np困难的。然后,我们进一步将该问题建模为部分可观察马尔可夫决策过程(POMDP),并通过开发基于异构智能体强化学习(HARL)的算法来解决该问题,该算法称为异构推理服务提供者(HISPER)。它允许代理有不同的动作空间,对应于不同类型的配置和DNN模型。最后,大量的实验表明,所提出的算法优于其他最先进的同行。
{"title":"Joint DNN Model Deployment, Selection, and Configuration for Heterogeneous Inference Services Toward Edge Intelligence","authors":"Hebin Huang;Junbin Liang;Geyong Min","doi":"10.1109/TMC.2025.3586793","DOIUrl":"https://doi.org/10.1109/TMC.2025.3586793","url":null,"abstract":"Edge intelligence is an emerging paradigm in edge computing that deploys Deep Neural Network (DNN) models on edge servers with limited storage and computation capacities to provide inference services for high mobility and real-time applications, such as autonomous driving or smart surveillance, with varying accuracy and delay requirements. Adapting application configurations (e.g., image resolution or video frame rate) while selecting different DNN models and deployment locations can provide high-accuracy, low-delay inference services that meet user requirements. However, the configurations and DNN models of various inference services are highly heterogeneous. As balancing inference accuracy, resource cost, and delay is a multi-objective programming problem, it is a great challenge to obtain the optimal solution. To address this challenge, we propose a novel online framework to jointly optimize the configuration adaption, DNN model selection, and deployment for heterogeneous inference services. Specifically, we first formulate this joint optimization problem as an integer linear programming problem and prove it is NP-hard. Then, we further model the problem as a Partial Observable Markov Decision Process (POMDP) and solve it by developing a Heterogeneous-Agent Reinforcement Learning (HARL) based algorithm, named Heterogeneous Inference Service ProvidER (HISPER). It allows agents to have different action spaces corresponding to different types of configurations and DNN models. Finally, extensive experiments demonstrate that the proposed algorithm outperforms other state-of-the-art counterparts.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 11","pages":"12726-12741"},"PeriodicalIF":9.2,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145223671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Source Routing for LEO Mega-Constellations Based on Bloom Filter 基于布隆滤波器的LEO巨型星座源路由
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-10 DOI: 10.1109/TMC.2025.3586626
Hefan Zhang;Zhiyuan Wang;Wenhao Lu;Shan Zhang;Hongbin Luo
Low-earth-orbit (LEO) mega-constellations with inter-satellite links (ISLs) are becoming the Internet backbone in space. Satellites within LEO often need the capability to enforce data forwarding paths. For example, they may need to bypass the satellites over the untrusted areas for the data of mission-critical applications or minimize latency for the data of time-sensitive applications. However, typical source/segment routing techniques (e.g., SRv6) suffer from scalability issue, since they record source-route-style forwarding information via the list-based structure. This results in great payload and forwarding overhead. To overcome this drawback, we propose a source/segment routing architecture for LEO mega-constellations, which is named as Link-identified Routing (LiR). LiR leverages in-packet bloom filter (BF) to record source-route-style forwarding information. BF could efficiently record multiple elements via a probabilistic data structure, but overlooks the order of the encoded elements. To address this, LiR identifies each unidirectional ISL, and represents the path by encoding ISL identifiers into BF. We investigate how to optimize BF configuration and ISL encoding policy to address false positives caused by BF. We implement LiR in Linux kernel and develop a container-based emulator for performance evaluation. Results show that LiR significantly outperforms SRv6 in terms of packet forwarding and data delivery efficiency.
具有卫星间链路(ISLs)的低地球轨道(LEO)巨型星座正在成为太空互联网的骨干。低轨道卫星通常需要执行数据转发路径的能力。例如,对于关键任务应用程序的数据,它们可能需要绕过不受信任区域的卫星,或者将时间敏感应用程序的数据延迟降至最低。然而,典型的源/段路由技术(例如,SRv6)存在可伸缩性问题,因为它们通过基于列表的结构记录源路由类型的转发信息。这将导致巨大的负载和转发开销。为了克服这一缺点,我们提出了一种用于LEO巨型星座的源/段路由架构,称为链路识别路由(Link-identified routing, LiR)。LiR利用包内布隆过滤器(BF)记录源路由类型的转发信息。BF可以通过概率数据结构有效地记录多个元素,但忽略了编码元素的顺序。为了解决这个问题,LiR识别每个单向ISL,并通过将ISL标识符编码到BF来表示路径。我们研究了如何优化BF配置和ISL编码策略来解决BF引起的误报问题。我们在Linux内核中实现了LiR,并开发了一个基于容器的仿真器来进行性能评估。结果表明,LiR在数据包转发和数据传输效率方面明显优于SRv6。
{"title":"Source Routing for LEO Mega-Constellations Based on Bloom Filter","authors":"Hefan Zhang;Zhiyuan Wang;Wenhao Lu;Shan Zhang;Hongbin Luo","doi":"10.1109/TMC.2025.3586626","DOIUrl":"https://doi.org/10.1109/TMC.2025.3586626","url":null,"abstract":"Low-earth-orbit (LEO) mega-constellations with inter-satellite links (ISLs) are becoming the Internet backbone in space. Satellites within LEO often need the capability to enforce data forwarding paths. For example, they may need to bypass the satellites over the untrusted areas for the data of mission-critical applications or minimize latency for the data of time-sensitive applications. However, typical source/segment routing techniques (e.g., SRv6) suffer from scalability issue, since they record source-route-style forwarding information via the list-based structure. This results in great payload and forwarding overhead. To overcome this drawback, we propose a source/segment routing architecture for LEO mega-constellations, which is named as Link-identified Routing (LiR). LiR leverages in-packet bloom filter (BF) to record source-route-style forwarding information. BF could efficiently record multiple elements via a probabilistic data structure, but overlooks the order of the encoded elements. To address this, LiR identifies each unidirectional ISL, and represents the path by encoding ISL identifiers into BF. We investigate how to optimize BF configuration and ISL encoding policy to address false positives caused by BF. We implement LiR in Linux kernel and develop a container-based emulator for performance evaluation. Results show that LiR significantly outperforms SRv6 in terms of packet forwarding and data delivery efficiency.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 11","pages":"12487-12504"},"PeriodicalIF":9.2,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145223679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Parameter-Efficient Federated Fine-Tuning on Heterogeneous Devices 异构设备的自适应参数高效联邦微调
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-07 DOI: 10.1109/TMC.2025.3586644
Jun Liu;Yunming Liao;Hongli Xu;Yang Xu;Jianchun Liu;Chen Qian
Federated fine-tuning (FedFT) has been proposed to fine-tune the pre-trained language models in a distributed manner. However, there are two critical challenges for efficient FedFT in practical applications, i.e., resource constraints and system heterogeneity. Existing works rely on parameter-efficient fine-tuning methods, e.g., low-rank adaptation (LoRA)1, but with major limitations. Herein, based on the inherent characteristics of FedFT, we observe that LoRA layers with higher ranks added close to the output help to save resource consumption while achieving comparable fine-tuning performance. Then we propose a novel LoRA-based FedFT framework, termed LEGEND, which faces the difficulty of determining the number of LoRA layers (called, LoRA depth) and the rank of each LoRA layer (called, rank distribution). We analyze the coupled relationship between LoRA depth and rank distribution, and design an efficient LoRA configuration algorithm for heterogeneous devices, thereby promoting fine-tuning efficiency. Extensive experiments are conducted on a physical platform with 80 commercial devices. The results show that LEGEND can achieve a speedup of 1.5-2.8× and save communication costs by about 42.3% when achieving the target accuracy, compared to the advanced solutions.
联邦微调(Federated fine-tuning, FedFT)被提出以分布式的方式对预训练好的语言模型进行微调。然而,在实际应用中,有效的FedFT存在两个关键挑战,即资源约束和系统异质性。现有的工作依赖于参数高效的微调方法,如低秩自适应(LoRA)1,但存在很大的局限性。在这里,基于FedFT的固有特征,我们观察到在接近输出的地方添加更高秩的LoRA层有助于节省资源消耗,同时获得相当的微调性能。然后,我们提出了一种新的基于LoRA的FedFT框架,称为LEGEND,该框架面临确定LoRA层的数量(称为LoRA深度)和每个LoRA层的秩(称为秩分布)的困难。分析了LoRA深度与rank分布之间的耦合关系,设计了一种高效的异构设备LoRA配置算法,从而提高了微调效率。在80台商用设备的物理平台上进行了广泛的实验。结果表明,在达到目标精度的情况下,与先进的解决方案相比,LEGEND可以实现1.5-2.8倍的加速,节省约42.3%的通信成本。
{"title":"Adaptive Parameter-Efficient Federated Fine-Tuning on Heterogeneous Devices","authors":"Jun Liu;Yunming Liao;Hongli Xu;Yang Xu;Jianchun Liu;Chen Qian","doi":"10.1109/TMC.2025.3586644","DOIUrl":"https://doi.org/10.1109/TMC.2025.3586644","url":null,"abstract":"Federated fine-tuning (FedFT) has been proposed to fine-tune the pre-trained language models in a distributed manner. However, there are two critical challenges for efficient FedFT in practical applications, i.e., resource constraints and system heterogeneity. Existing works rely on parameter-efficient fine-tuning methods, e.g., low-rank adaptation (LoRA)<sup>1</sup>, but with major limitations. Herein, based on the inherent characteristics of FedFT, we observe that LoRA layers with higher ranks added close to the output help to save resource consumption while achieving comparable fine-tuning performance. Then we propose a novel LoRA-based FedFT framework, termed LEGEND, which faces the difficulty of determining the number of LoRA layers (called, LoRA depth) and the rank of each LoRA layer (called, rank distribution). We analyze the coupled relationship between LoRA depth and rank distribution, and design an efficient LoRA configuration algorithm for heterogeneous devices, thereby promoting fine-tuning efficiency. Extensive experiments are conducted on a physical platform with 80 commercial devices. The results show that LEGEND can achieve a speedup of 1.5-2.8× and save communication costs by about 42.3% when achieving the target accuracy, compared to the advanced solutions.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 11","pages":"12533-12549"},"PeriodicalIF":9.2,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145221219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1