Sign In

Approximate and Weighted Data Reconstruction Attack in Federated Learning

์ž‘์„ฑ์ž
  • Haebom
์นดํ…Œ๊ณ ๋ฆฌ
Empty

์ €์ž

Yongcun Song, Ziqi Wang, Enrique Zuazua

๐Ÿ’ก ๊ฐœ์š”

๋ณธ ๋…ผ๋ฌธ์€ ์—ฐํ•ฉ ํ•™์Šต(Federated Learning, FL)์—์„œ ๋ฐ์ดํ„ฐ ์žฌ๊ตฌ์„ฑ ๊ณต๊ฒฉ์˜ ํšจ์œจ์„ฑ์„ ๋†’์ด๋Š” ์ƒˆ๋กœ์šด ๋ฐฉ๋ฒ•๋ก ์„ ์ œ์•ˆํ•ฉ๋‹ˆ๋‹ค. ํŠนํžˆ, ํด๋ผ์ด์–ธํŠธ๋“ค์ด ์—ฌ๋Ÿฌ ๋ฒˆ์˜ ๋กœ์ปฌ ํ•™์Šต ํ›„ ๋ชจ๋ธ ํŒŒ๋ผ๋ฏธํ„ฐ๋ฅผ ๊ณต์œ ํ•˜๋Š” ์ผ๋ฐ˜์ ์ธ FedAvg ์‹œ๋‚˜๋ฆฌ์˜ค์—์„œ ๋ฐ์ดํ„ฐ ์žฌ๊ตฌ์„ฑ์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•˜๋Š” ๋ณด๊ฐ„ ๊ธฐ๋ฐ˜ ๊ทผ์‚ฌ ๊ธฐ๋ฒ•์„ ๊ฐœ๋ฐœํ–ˆ์Šต๋‹ˆ๋‹ค. ๋˜ํ•œ, ์‹ ๊ฒฝ๋ง ๊ตฌ์กฐ์— ๋”ฐ๋ผ ๋ ˆ์ด์–ด๋ณ„ ๊ฐ€์ค‘์น˜๋ฅผ ๋ถ€์—ฌํ•˜๋Š” ์†์‹ค ํ•จ์ˆ˜๋ฅผ ์„ค๊ณ„ํ•˜์—ฌ ์žฌ๊ตฌ์„ฑ ๋ฐ์ดํ„ฐ์˜ ํ’ˆ์งˆ์„ ํ–ฅ์ƒ์‹œ์ผฐ์Šต๋‹ˆ๋‹ค.

๐Ÿ”‘ ์‹œ์‚ฌ์  ๋ฐ ํ•œ๊ณ„

โ€ข
๋ณธ ์—ฐ๊ตฌ๋Š” ๊ธฐ์กด์— ๊ณต๊ฒฉ์ด ์–ด๋ ค์› ๋˜ FedAvg ๊ธฐ๋ฐ˜ ์—ฐํ•ฉ ํ•™์Šต ํ™˜๊ฒฝ์—์„œ๋„ ํšจ๊ณผ์ ์ธ ๋ฐ์ดํ„ฐ ์žฌ๊ตฌ์„ฑ ๊ณต๊ฒฉ์ด ๊ฐ€๋Šฅํ•จ์„ ๋ณด์—ฌ์ฃผ์—ˆ์Šต๋‹ˆ๋‹ค.
โ€ข
์ œ์•ˆ๋œ ๊ทผ์‚ฌ ๋ฐ ๊ฐ€์ค‘์น˜ ๋ถ€์—ฌ ๊ณต๊ฒฉ(AWA) ๋ฐฉ๋ฒ•์€ ์ด๋ฏธ์ง€ ๋ฐ์ดํ„ฐ ์žฌ๊ตฌ์„ฑ ํ‰๊ฐ€ ์ง€ํ‘œ์—์„œ ๊ธฐ์กด ์ตœ์‹  ๋ฐฉ๋ฒ•๋ก  ๋Œ€๋น„ ์ƒ๋‹นํ•œ ์„ฑ๋Šฅ ํ–ฅ์ƒ์„ ์ž…์ฆํ–ˆ์Šต๋‹ˆ๋‹ค.
โ€ข
๊ณต๊ฒฉ ๋ฐฉ๋ฒ•๋ก ์˜ ์ตœ์ ํ™” ๊ณผ์ •์—์„œ ๋ฒ ์ด์ง€์•ˆ ์ตœ์ ํ™”๋ฅผ ์‚ฌ์šฉํ–ˆ์œผ๋‚˜, ๋ชจ๋“  ์œ ํ˜•์˜ ์‹ ๊ฒฝ๋ง ์•„ํ‚คํ…์ฒ˜์— ๋Œ€ํ•œ ์ผ๋ฐ˜ํ™” ๊ฐ€๋Šฅ์„ฑ๊ณผ ๊ณต๊ฒฉ์˜ ๊ณ„์‚ฐ ๋ณต์žก์„ฑ์— ๋Œ€ํ•œ ์ถ”๊ฐ€์ ์ธ ์—ฐ๊ตฌ๊ฐ€ ํ•„์š”ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
๐Ÿ‘