{"id":"https://openalex.org/W7155492223","doi":"https://doi.org/10.1145/3767295.3803605","title":"SwiftFL: Enabling Speculative Training for On-Device Federated Deep Learning","display_name":"SwiftFL: Enabling Speculative Training for On-Device Federated Deep Learning","publication_year":2026,"publication_date":"2026-04-24","ids":{"openalex":"https://openalex.org/W7155492223","doi":"https://doi.org/10.1145/3767295.3803605"},"language":null,"primary_location":{"id":"doi:10.1145/3767295.3803605","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3767295.3803605","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 21st European Conference on Computer Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3767295.3803605","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5134473122","display_name":"Yuhui Zhang","orcid":"https://orcid.org/0009-0009-4943-9958"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuhui Zhang","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0009-4943-9958","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102120782","display_name":"Guang Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Yan","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0009-9623-6117","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100430876","display_name":"Xi Zhang","orcid":"https://orcid.org/0000-0003-3415-5345"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Zhang","raw_affiliation_strings":["Peking University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-4185-7214","affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5134171993","display_name":"Zimu Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zimu Guo","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0002-1828-0082","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016786359","display_name":"Lutan Zhao","orcid":"https://orcid.org/0000-0003-3672-6463"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lutan Zhao","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-3672-6463","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055185142","display_name":"Jiangfeng Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiangfeng Cao","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0005-9119-8845","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054693503","display_name":"Dan Meng","orcid":"https://orcid.org/0009-0002-9868-5353"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan Meng","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0002-9868-5353","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013903881","display_name":"Rui Hou","orcid":"https://orcid.org/0000-0002-9215-7632"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Hou","raw_affiliation_strings":["State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-9215-7632","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5134473122"],"corresponding_institution_ids":["https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.94608443,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1196","last_page":"1212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.22089999914169312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.22089999914169312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.16200000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.08089999854564667,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6771000027656555},{"id":"https://openalex.org/keywords/training","display_name":"Training (meteorology)","score":0.6197999715805054},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3224000036716461},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.311599999666214},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.2750000059604645}],"concepts":[{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6771000027656555},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6391000151634216},{"id":"https://openalex.org/C2777211547","wikidata":"https://www.wikidata.org/wiki/Q17141490","display_name":"Training (meteorology)","level":2,"score":0.6197999715805054},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4959000051021576},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3224000036716461},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.311599999666214},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2750000059604645},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.27149999141693115},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.27059999108314514},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.26829999685287476},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26809999346733093},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2655999958515167},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.26190000772476196}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3767295.3803605","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3767295.3803605","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 21st European Conference on Computer Systems","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3767295.3803605","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3767295.3803605","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 21st European Conference on Computer Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2405578611","https://openalex.org/W2767079719","https://openalex.org/W2883089954","https://openalex.org/W2953901595","https://openalex.org/W2964350391","https://openalex.org/W2967033144","https://openalex.org/W2978709794","https://openalex.org/W2998506323","https://openalex.org/W3008490107","https://openalex.org/W3017949972","https://openalex.org/W3110962653","https://openalex.org/W3118874133","https://openalex.org/W3121861147","https://openalex.org/W3136022984","https://openalex.org/W3155611867","https://openalex.org/W3203503583","https://openalex.org/W3215939128","https://openalex.org/W4211124002","https://openalex.org/W4230874317","https://openalex.org/W4282937261","https://openalex.org/W4286888406","https://openalex.org/W4306178637","https://openalex.org/W4313009682","https://openalex.org/W4324134920","https://openalex.org/W4385412495","https://openalex.org/W4385800841","https://openalex.org/W4389476189","https://openalex.org/W4393591673","https://openalex.org/W4394923525","https://openalex.org/W4411446199"],"related_works":[],"abstract_inverted_index":{"Federated":[0],"deep":[1,11],"learning":[2],"(FDL)":[3],"is":[4,87],"a":[5,47,83,112,127],"promising":[6],"privacy-preserving":[7],"approach":[8],"for":[9,54,60],"training":[10,52,80,92,108,124,137],"neural":[12],"networks":[13],"on":[14],"distributed":[15],"datasets":[16],"without":[17,93],"raw":[18],"data":[19],"sharing.":[20],"But":[21],"the":[22,66,78,98,140],"classical":[23],"synchronous":[24],"FDL":[25,148],"faces":[26],"straggler":[27],"problem:":[28],"slow":[29],"trainers":[30,74,104,120],"severely":[31],"impede":[32],"overall":[33],"efficiency.":[34,138],"Inspired":[35],"by":[36,102,125],"speculative":[37,51,123],"execution":[38],"techniques":[39],"in":[40],"modern":[41],"processors,":[42],"this":[43],"paper":[44],"proposes":[45],"SwiftFL,":[46],"novel":[48],"and":[49,135,150],"efficient":[50],"system":[53],"FDL.":[55],"Instead":[56],"of":[57,158],"simply":[58],"waiting":[59],"slower":[61],"trainer,":[62],"SwiftFL":[63,144,153],"proactively":[64],"updates":[65],"global":[67],"model":[68,132,164],"with":[69,145],"predicted":[70],"gradients,":[71],"enabling":[72],"faster":[73],"to":[75,89,96],"speculatively":[76],"initiate":[77],"next":[79],"round.":[81],"Furthermore,":[82],"gradient":[84],"compensation":[85],"technique":[86],"proposed":[88],"correct":[90],"mispredicted":[91],"re-training.":[94],"Finally,":[95],"overcome":[97],"model-drift":[99],"problem":[100],"caused":[101],"fast":[103],"perform":[105,122],"more":[106],"local":[107,136],"rounds,":[109],"we":[110,142],"propose":[111],"client":[113],"selection":[114],"strategy.":[115],"This":[116],"strategy":[117],"determines":[118],"whether":[119],"should":[121],"striking":[126],"balance":[128],"between":[129],"two":[130],"metrics:":[131],"drift":[133],"degree":[134],"In":[139],"evaluation,":[141],"compare":[143],"four":[146],"state-of-the-art":[147],"systems":[149],"demonstrate":[151],"that":[152],"achieves":[154],"an":[155],"average":[156],"speedup":[157],"6.08\u00d7":[159],"while":[160],"maintaining":[161],"consistent":[162],"final":[163],"accuracy.":[165]},"counts_by_year":[],"updated_date":"2026-04-29T09:16:38.111599","created_date":"2026-04-25T00:00:00"}
