{"id":"https://openalex.org/W7138189893","doi":"https://doi.org/10.1609/aaai.v40i34.40100","title":"FedSEA-LLaMA: A Secure, Efficient and Adaptive Federated Splitting Framework for Large Language Models","display_name":"FedSEA-LLaMA: A Secure, Efficient and Adaptive Federated Splitting Framework for Large Language Models","publication_year":2026,"publication_date":"2026-03-14","ids":{"openalex":"https://openalex.org/W7138189893","doi":"https://doi.org/10.1609/aaai.v40i34.40100"},"language":null,"primary_location":{"id":"doi:10.1609/aaai.v40i34.40100","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i34.40100","pdf_url":null,"source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1609/aaai.v40i34.40100","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100299226","display_name":"Zishuai Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zishuai Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129688865","display_name":"Hainan Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hainan Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129745797","display_name":"Weihua Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Weihua Li","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129673317","display_name":"Qinnan Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qinnan Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129713479","display_name":"Jin Song Dong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jin Dong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129740777","display_name":"Yongxin Tong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yongxin Tong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5129733744","display_name":"Zhiming Zheng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhiming Zheng","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100299226"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40663456,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"40","issue":"34","first_page":"28680","last_page":"28688"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.7059999704360962,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.7059999704360962,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.17010000348091125,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.024800000712275505,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.5830000042915344},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5819000005722046},{"id":"https://openalex.org/keywords/partition","display_name":"Partition (number theory)","score":0.5819000005722046},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43470001220703125},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.4251999855041504},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4226999878883362},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.3720000088214874},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.362199991941452}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8313000202178955},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.5830000042915344},{"id":"https://openalex.org/C42812","wikidata":"https://www.wikidata.org/wiki/Q1082910","display_name":"Partition (number theory)","level":2,"score":0.5819000005722046},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5819000005722046},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43790000677108765},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43470001220703125},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.4251999855041504},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4226999878883362},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3720000088214874},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.362199991941452},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3434000015258789},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34060001373291016},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3176000118255615},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.31709998846054077},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.30399999022483826},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3018999993801117},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.2955000102519989},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.27079999446868896},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.26899999380111694},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.263700008392334},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2621999979019165}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1609/aaai.v40i34.40100","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i34.40100","pdf_url":null,"source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1609/aaai.v40i34.40100","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i34.40100","pdf_url":null,"source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Private":[0],"data":[1,17,64],"holds":[2],"promise":[3],"for":[4,173],"improving":[5],"LLMs":[6,25,89],"due":[7],"to":[8,47,62,79,111,140,155,167,197,203],"its":[9,13],"high":[10,21,102],"quality,":[11],"but":[12],"scattered":[14],"distribution":[15],"across":[16],"silos":[18],"and":[19,98,123,151,161,187,200,208,215,227],"the":[20,35,48,60,170,221],"computational":[22],"demands":[23],"of":[24,88,212,223],"limit":[26],"their":[27],"deployment":[28],"in":[29,206,225],"federated":[30,37,92],"environments.":[31],"To":[32],"address":[33],"this,":[34],"transformer-based":[36],"split":[38,93],"models":[39],"are":[40],"proposed,":[41],"which":[42],"offload":[43],"most":[44],"model":[45],"parameters":[46],"server":[49],"(or":[50],"distributed":[51],"clients)":[52],"while":[53],"retaining":[54],"only":[55,96],"a":[56,120],"small":[57],"portion":[58],"on":[59,129,177,182],"client":[61],"ensure":[63],"privacy.":[65],"Despite":[66],"this":[67,115],"design,":[68],"they":[69],"still":[70],"face":[71],"three":[72],"challenges:":[73],"1)":[74],"Peer-to-peer":[75],"key":[76],"encryption":[77],"struggles":[78],"secure":[80,142],"transmitted":[81],"vectors":[82],"effectively;":[83],"2)":[84],"The":[85],"auto-regressive":[86],"nature":[87],"means":[90],"that":[91,192],"learning":[94],"can":[95],"train":[97],"infer":[99],"sequentially,":[100],"causing":[101],"communication":[103,157],"overhead;":[104],"3)":[105],"Fixed":[106],"partition":[107,171,217],"points":[108,172,218],"lack":[109],"adaptability":[110],"downstream":[112],"tasks.":[113],"In":[114],"paper,":[116],"we":[117,132,147,164],"introduce":[118],"FedSEA-LLaMA,":[119],"Secure,":[121],"Efficient,":[122],"Adaptive":[124],"Federated":[125],"splitting":[126],"framework":[127],"based":[128,176],"LLaMA2.":[130],"First,":[131],"inject":[133],"Gaussian":[134],"noise":[135],"into":[136],"forward-pass":[137],"hidden":[138],"states":[139],"enable":[141],"end-to-end":[143],"vector":[144],"transmission.":[145],"Second,":[146],"employ":[148],"attention-mask":[149],"compression":[150],"KV":[152],"cache":[153],"collaboration":[154],"reduce":[156],"costs,":[158],"accelerating":[159],"training":[160,207],"inference.":[162,209],"Third,":[163],"allow":[165],"users":[166],"dynamically":[168],"adjust":[169],"input/output":[174],"blocks":[175],"specific":[178],"task":[179],"requirements.":[180],"Experiments":[181],"natural":[183],"language":[184],"understanding,":[185],"summarization,":[186],"conversational":[188],"QA":[189],"tasks":[190],"show":[191],"FedSEA-LLaMA":[193,224],"maintains":[194],"performance":[195],"comparable":[196],"centralized":[198],"LLaMA2":[199],"achieves":[201],"up":[202],"8\u00d7":[204],"speedups":[205],"Further":[210],"analysis":[211],"privacy":[213],"attacks":[214],"different":[216],"also":[219],"demonstrates":[220],"effectiveness":[222],"security":[226],"adaptability.":[228]},"counts_by_year":[],"updated_date":"2026-03-18T06:31:55.123368","created_date":"2026-03-18T00:00:00"}
