{"id":"https://openalex.org/W6908380229","doi":"https://doi.org/10.25781/kaust-e6f39","title":"Better Methods and Theory for Federated Learning: Compression, Client Selection and Heterogeneity","display_name":"Better Methods and Theory for Federated Learning: Compression, Client Selection and Heterogeneity","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W6908380229","doi":"https://doi.org/10.25781/kaust-e6f39"},"language":"en","primary_location":{"id":"pmh:oai:repository.kaust.edu.sa:10754/679634","is_oa":false,"landing_page_url":"http://hdl.handle.net/10754/679634","pdf_url":null,"source":{"id":"https://openalex.org/S4306401596","display_name":"King Abdullah University of Science and Technology Repository (King Abdullah University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71920554","host_organization_name":"King Abdullah University of Science and Technology","host_organization_lineage":["https://openalex.org/I71920554"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Dissertation"},"type":"dissertation","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.25781/kaust-e6f39","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Horvath, Samuel","orcid":"https://orcid.org/0000-0003-0619-9260"},"institutions":[{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Horvath, Samuel","raw_affiliation_strings":["King Abdullah University of Science and Technology (KAUST), Thuwal, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Abdullah University of Science and Technology (KAUST), Thuwal, Saudi Arabia","institution_ids":["https://openalex.org/I71920554"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I71920554"],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.95660001039505,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.95660001039505,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.00419999985024333,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.003800000064074993,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.5881999731063843},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5138999819755554},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.48069998621940613},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.43130001425743103},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.42289999127388},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.4117000102996826},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.3799999952316284},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.36820000410079956}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8282999992370605},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.5881999731063843},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5138999819755554},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.48069998621940613},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.43130001425743103},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42739999294281006},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.42289999127388},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.414900004863739},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.4117000102996826},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.3799999952316284},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.36820000410079956},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3652999997138977},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.3644999861717224},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.3431999981403351},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31220000982284546},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.2985999882221222},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.29649999737739563},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.2912999987602234},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2754000127315521},{"id":"https://openalex.org/C2776145597","wikidata":"https://www.wikidata.org/wiki/Q25339462","display_name":"Dropout (neural networks)","level":2,"score":0.263700008392334},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.26170000433921814},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.2515000104904175}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:repository.kaust.edu.sa:10754/679634","is_oa":false,"landing_page_url":"http://hdl.handle.net/10754/679634","pdf_url":null,"source":{"id":"https://openalex.org/S4306401596","display_name":"King Abdullah University of Science and Technology Repository (King Abdullah University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71920554","host_organization_name":"King Abdullah University of Science and Technology","host_organization_lineage":["https://openalex.org/I71920554"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Dissertation"},{"id":"doi:10.25781/kaust-e6f39","is_oa":true,"landing_page_url":"https://doi.org/10.25781/kaust-e6f39","pdf_url":null,"source":{"id":"https://openalex.org/S7407051967","display_name":"KAUST Research Repository","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"thesis"}],"best_oa_location":{"id":"doi:10.25781/kaust-e6f39","is_oa":true,"landing_page_url":"https://doi.org/10.25781/kaust-e6f39","pdf_url":null,"source":{"id":"https://openalex.org/S7407051967","display_name":"KAUST Research Repository","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"thesis"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Federated":[0],"learning":[1,7,25,54,283],"(FL)":[2],"is":[3,201,219],"an":[4,17,260],"emerging":[5],"machine":[6,24,53],"paradigm":[8],"involving":[9],"multiple":[10,357],"clients,":[11],"e.g.,":[12],"mobile":[13],"phone":[14],"devices,":[15],"with":[16,85,124,134,203],"incentive":[18],"to":[19,50,70,75,104,121,221,310],"collaborate":[20],"in":[21,35,140,183,224,233,266,284,290],"solving":[22],"a":[23,29,46,71,76,320],"problem":[26],"coordinated":[27],"by":[28,37,56,67,245],"central":[30,72],"server.":[31,73],"FL":[32,79,92,131,227,287,308],"was":[33],"proposed":[34],"2016":[36],"Konecny":[38],"et":[39,43],"al.":[40,44],"and":[41,64,115,119,154,159,212,237,240,269,281,313,344],"McMahan":[42],"as":[45],"viable":[47],"privacy-preserving":[48],"alternative":[49],"traditional":[51],"centralized":[52,86,98],"since,":[55],"construction,":[57],"the":[58,68,81,125,141,146,151,165,169,187,194,225,231,241,253,271,291,302,352],"training":[59,166,188,359],"data":[60,87],"points":[61],"are":[62],"decentralized":[63],"never":[65],"transferred":[66],"clients":[69,182],"Therefore,":[74],"certain":[77],"degree,":[78],"mitigates":[80],"privacy":[82,206],"risks":[83],"associated":[84],"collection.":[88],"Unfortunately,":[89],"optimization":[90,99],"for":[91,306,323],"faces":[93],"several":[94,111,295,342],"specific":[95],"issues":[96],"that":[97,161,200],"usually":[100],"does":[101],"not":[102],"need":[103],"handle.":[105],"In":[106,138,168,316],"this":[107,285],"thesis,":[108],"we":[109,148,172,192,251,293,318],"identify":[110],"of":[112,128,177,181,186,208,214,264,273,301,348,355],"these":[113,328,349],"challenges":[114],"propose":[116,193,319],"new":[117],"methods":[118,305,325],"algorithms":[120],"address":[122,173],"them,":[123],"ultimate":[126],"goal":[127],"enabling":[129],"practical":[130],"solutions":[132],"supported":[133],"mathematically":[135],"rigorous":[136],"guarantees.":[137],"particular,":[139,317],"first":[142,195],"four":[143],"chapters":[144],"after":[145],"introduction,":[147],"focus":[149],"on":[150],"communication":[152,242,314],"bottleneck":[153],"devise":[155],"novel":[156],"compression":[157],"mechanisms":[158],"tools":[160],"can":[162],"provably":[163],"accelerate":[164],"process.":[167,189],"sixth":[170],"chapter,":[171],"another":[174,222],"significant":[175],"challenge":[176,223],"FL:":[178,209],"partial":[179],"participation":[180],"each":[184],"round":[185],"More":[190],"concretely,":[191],"importance":[196],"client":[197],"sampling":[198],"strategy":[199],"compatible":[202],"two":[204],"core":[205],"requirements":[207],"secure":[210],"aggregation":[211],"statelessness":[213],"clients.":[215],"The":[216],"seventh":[217],"chapter":[218],"dedicated":[220],"cross-device":[226,307],"setting\u2014system":[228],"heterogeneity,":[229],"i.e.,":[230],"diversity":[232],"clients\u2019":[234],"processing":[235],"capabilities":[236],"network":[238],"bandwidth,":[239],"overhead":[243],"caused":[244],"slow":[246],"connections.":[247],"To":[248],"tackle":[249,311],"this,":[250],"introduce":[252],"ordered":[254],"dropout":[255],"(OD)":[256],"mechanism.":[257],"OD":[258],"promotes":[259],"ordered,":[261],"nested":[262],"representation":[263],"knowledge":[265],"neural":[267],"networks":[268],"enables":[270,345],"extraction":[272],"lower-footprint":[274],"sub-models":[275],"without":[276],"retraining,":[277],"which":[278,331],"offers":[279],"fair":[280],"accurate":[282],"challenging":[286],"setting.":[288],"Lastly,":[289],"eigh,":[292],"study":[294],"key":[296],"algorithmic":[297],"ingredients":[298],"behind":[299],"some":[300],"most":[303],"popular":[304,353],"aimed":[309],"heterogeneity":[312],"bottleneck.":[315],"general":[321],"framework":[322],"analyzing":[324],"employing":[326],"all":[327],"techniques":[329],"simultaneously,":[330],"helps":[332],"us":[333],"better":[334,346],"understand":[335],"their":[336],"combined":[337],"effect.":[338],"Our":[339],"approach":[340],"identifies":[341],"inconsistencies":[343],"utilization":[347],"components,":[350],"including":[351],"practice":[354],"running":[356],"local":[358],"steps":[360],"before":[361],"aggregation.":[362]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
