{"id":"https://openalex.org/W7128711097","doi":"https://doi.org/10.48550/arxiv.2602.10564","title":"SplitCom: Communication-efficient Split Federated Fine-tuning of LLMs via Temporal Compression","display_name":"SplitCom: Communication-efficient Split Federated Fine-tuning of LLMs via Temporal Compression","publication_year":2026,"publication_date":"2026-02-11","ids":{"openalex":"https://openalex.org/W7128711097","doi":"https://doi.org/10.48550/arxiv.2602.10564"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.10564","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125743058","display_name":"Tao Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Li, Tao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125727681","display_name":"Yulin Tang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tang, Yulin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125772417","display_name":"Yiyang Song","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Song, Yiyang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125716116","display_name":"Cong Wu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wu, Cong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120025676","display_name":"Xihui Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Xihui","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125720498","display_name":"Pan Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Pan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5125726055","display_name":"Xianhao Chen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Xianhao","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5125743058"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.5530999898910522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.5530999898910522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.24199999868869781,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.023499999195337296,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.6543999910354614},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5412999987602234},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.503600001335144},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.4668999910354614},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.45249998569488525},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3878999948501587},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.3684000074863434},{"id":"https://openalex.org/keywords/telecommunications-link","display_name":"Telecommunications link","score":0.36230000853538513},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.3513999879360199}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7955999970436096},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.6543999910354614},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5412999987602234},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.503600001335144},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.4668999910354614},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.45249998569488525},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44119998812675476},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3878999948501587},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.3684000074863434},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36500000953674316},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.36230000853538513},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.3513999879360199},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.34860000014305115},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.32350000739097595},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.31940001249313354},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.3158000111579895},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31529998779296875},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.30559998750686646},{"id":"https://openalex.org/C158156997","wikidata":"https://www.wikidata.org/wiki/Q1416645","display_name":"Models of communication","level":2,"score":0.30480000376701355},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.2973000109195709},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2915000021457672},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.28780001401901245},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.2824999988079071},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.28209999203681946},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.27810001373291016},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.2727999985218048},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.262800008058548},{"id":"https://openalex.org/C157657479","wikidata":"https://www.wikidata.org/wiki/Q2367247","display_name":"Closed captioning","level":3,"score":0.26100000739097595},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.25119999051094055}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.10564","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.10564","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.10564","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.10564","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"score":0.431180864572525,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Federated":[0],"fine-tuning":[1],"of":[2,104],"on-device":[3],"large":[4],"language":[5],"models":[6],"(LLMs)":[7],"mitigates":[8],"privacy":[9],"concerns":[10],"by":[11,98,187,199],"preventing":[12],"raw":[13],"data":[14],"sharing.":[15],"However,":[16],"the":[17,45,56,101,165,169],"intensive":[18],"computational":[19],"and":[20,50,125,177,195],"memory":[21,158],"demands":[22],"pose":[23],"significant":[24],"challenges":[25],"for":[26,85],"resource-constrained":[27],"edge":[28],"devices.":[29],"To":[30,75,121],"overcome":[31,76],"these":[32],"limitations,":[33],"split":[34],"federated":[35],"learning":[36,126],"(SFL)":[37],"emerges":[38],"as":[39],"a":[40,61,81,114],"promising":[41],"solution":[42],"that":[43,87,181],"partitions":[44],"model":[46,210],"into":[47],"lightweight":[48],"client-side":[49,157],"compute-intensive":[51],"server-side":[52],"sub-models,":[53],"thus":[54],"offloading":[55],"primary":[57],"training":[58,95],"workload":[59],"to":[60,71,155,164,189,201],"powerful":[62],"server.":[63],"Nevertheless,":[64],"high-dimensional":[65],"activation":[66,110],"exchanges":[67],"in":[68,91,108,191,203],"SFL":[69,83],"lead":[70],"excessive":[72],"communication":[73,123,185,197],"overhead.":[74],"this,":[77],"we":[78,128,150,161],"propose":[79],"SplitCom,":[80],"communication-efficient":[82],"framework":[84,106],"LLMs":[86],"exploits":[88],"temporal":[89],"redundancy":[90],"activations":[92],"across":[93],"consecutive":[94],"epochs.":[96],"Inspired":[97],"video":[99],"compression,":[100],"core":[102],"innovation":[103],"our":[105],"lies":[107],"selective":[109],"uploading":[111],"only":[112],"when":[113],"noticeable":[115],"deviation":[116],"from":[117],"previous":[118],"epochs":[119],"occurs.":[120],"balance":[122],"efficiency":[124],"performance,":[127],"introduce":[129],"two":[130],"adaptive":[131],"threshold":[132],"control":[133,139],"schemes":[134],"based":[135],"on":[136],"1)":[137],"bang-bang":[138],"or":[140],"2)":[141],"deep":[142],"deterministic":[143],"policy":[144],"gradient":[145],"(DDPG)-based":[146],"reinforcement":[147],"learning.":[148],"Moreover,":[149],"implement":[151],"dimensionality":[152],"reduction":[153],"techniques":[154],"alleviate":[156],"requirements.":[159],"Furthermore,":[160],"extend":[162],"SplitCom":[163,182],"U-shape":[166,205],"architecture,":[167],"ensuring":[168],"server":[170],"never":[171],"accesses":[172],"clients'":[173],"labels.":[174],"Extensive":[175],"simulations":[176],"laboratory":[178],"experiments":[179],"demonstrate":[180],"reduces":[183],"uplink":[184],"costs":[186,198],"up":[188,200],"98.6\\,\\%":[190],"its":[192,204],"standard":[193],"configuration":[194],"total":[196],"95.8\\,\\%":[202],"variant":[206],"without":[207],"noticeably":[208],"compromising":[209],"performance.":[211]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-13T00:00:00"}
