Daily Arxiv

This is a page that curates AI-related papers published worldwide.
All content here is summarized using Google Gemini and operated on a non-profit basis.
Copyright for each paper belongs to the authors and their institutions; please make sure to credit the source when sharing.

Robust Federated Learning under Adversarial Attacks via Loss-Based Client Clustering

Created by
  • Haebom

Author

Emmanuil Kritharakis, Dusan Jacobetic, Antonios Makris, Konstantinos Tserpes

Outline

This paper proposes a novel algorithm for improving the robustness of Federated Learning (FL) against Byzantine attacks. Conventional federated learning systems, while not sharing data between individual clients, are vulnerable to attacks from malicious clients. In this paper, we assume a trusted server and a single trusted client, and utilize the server's trusted dataset to propose a robust federated learning algorithm that is robust against malicious client attacks. This algorithm operates without requiring prior knowledge of the number of malicious clients. Through theoretical analysis and experimental results, we demonstrate that our algorithm outperforms existing robust federated learning algorithms (Mean, Trimmed Mean, Median, Krum, and Multi-Krum). Experiments using the MNIST, FMNIST, and CIFAR-10 datasets demonstrate that our proposed algorithm effectively defends against various attack strategies, including label flipping, sign flipping, and Gaussian noise addition.

Takeaways, Limitations

Takeaways:
It presents the possibility of protecting federated learning from malicious client attacks with just a trusted server and a single client.
It provides higher performance and robustness than existing robust federated learning algorithms.
We experimentally demonstrate that it can effectively counter various types of attacks.
Limitations:
The assumption that there is a trusted server and at least one trusted client may not always be satisfied in real-world environments.
The performance of the algorithm can be affected by the size and quality of the reliable dataset held by the server.
Further robustness against more complex and sophisticated attack strategies is required.
👍