Daily Arxiv

This is a page that curates AI-related papers published worldwide.
All content here is summarized using Google Gemini and operated on a non-profit basis.
Copyright for each paper belongs to the authors and their institutions; please make sure to credit the source when sharing.

Client Clustering Meets Knowledge Sharing: Enhancing Privacy and Robustness in Personalized Peer-to-Peer Learning

Created by
  • Haebom

Author

Mohammad Mahdi Maheri, Denys Herasymuk, Hamed Haddadi

Outline

In this paper, we present a P4 (Personalized, Private, Peer-to-Peer) methodology that enables efficient and personalized learning in a distributed environment among resource-constrained heterogeneous IoT devices. P4 is designed to provide personalized models for resource-constrained IoT devices while guaranteeing differential privacy and robustness against malicious attacks. It detects client similarity while preserving privacy using a lightweight, fully distributed algorithm and forms collaborative groups, and within each group, clients jointly learn models using differential privacy knowledge distillation. We evaluate P4 on popular benchmark datasets using linear and CNN-based architectures in various heterogeneous settings and attack scenarios, and show that it achieves 5% to 30% higher accuracy than existing differential privacy peer-to-peer approaches and maintains robustness even in the presence of up to 30% malicious clients. We also demonstrate its practicality by showing that collaborative learning between two clients adds only about 7 seconds of overhead on resource-constrained devices.

Takeaways, Limitations

Takeaways:
We present an efficient and privacy-preserving distributed learning methodology for resource-constrained IoT environments.
Simultaneously ensuring differential privacy and robustness against malicious attacks.
Experimentally verified high accuracy and efficiency compared to existing methodologies.
Demonstrating practicality in real resource-constrained devices.
Limitations:
Only experimental results for specific benchmark datasets and architectures are presented, further research is needed on generalizability.
Lack of robustness verification for situations where the percentage of malicious clients exceeds 30%.
Experiments are needed for more diverse resource constraint levels and network environments.
The 7 second overhead may be a consequence of a relatively small number of clients and a simple model, and the overhead may increase for more complex systems.
👍