A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Toward Smart Security Enhancement of Federated Learning Networks
[article]
2020
arXiv
pre-print
been proposed as a promising alternative paradigm to support the training of machine learning (ML) models. ...
As traditional centralized learning networks (CLNs) are facing increasing challenges in terms of privacy preservation, communication overheads, and scalability, federated learning networks (FLNs) have ...
If a vulnerable ED is under attack, the labels of training data will be flipped randomly. Moreover, a scale factor is imposed to magnify the poisoned model updates by 20 times. ...
arXiv:2008.08330v1
fatcat:7nnkpn45oncbnfl2ef5wfexzjq
Data Poisoning Attacks Against Federated Learning Systems
[article]
2020
arXiv
pre-print
Federated learning (FL) is an emerging paradigm for distributed training of large-scale deep neural networks in which participants' data remains on their own devices with only model updates being shared ...
We additionally show that the attacks can be targeted, i.e., they have a large negative impact only on classes that are under attack. ...
Label Flipping Attacks in Federated Learning We use a label flipping attack to implement targeted data poisoning in FL. ...
arXiv:2007.08432v2
fatcat:sod5gwqwdnaxzgui5j5a57rcta
Vulnerabilities in Federated Learning
2021
IEEE Access
A new decentralized training paradigm, known as Federated Learning (FL), enables multiple clients located at different geographical locations to learn a machine learning model collaboratively without sharing ...
We highlight the vulnerabilities sources, key attacks on FL, defenses, as well as their unique challenges, and discuss promising future research directions towards more robust FL. ...
One typical example of a dirty-label poisoning attack is label-flipping. Fig. 2 highlights how an adversary might corrupt the trained model by flipping labels. ...
doi:10.1109/access.2021.3075203
doaj:5e62c955db514036939a1c65011f46b8
fatcat:viv7tij6cffnlev4l52wggkxfe
Byzantine-Resilient Federated Learning with Heterogeneous Data Distribution
[article]
2022
arXiv
pre-print
, and perform secure aggregation for global model update. ...
For mitigating Byzantine behaviors in federated learning (FL), most state-of-the-art approaches, such as Bulyan, tend to leverage the similarity of updates from the benign clients. ...
Results for same value and label flip attacks are included in Section 8. ...
arXiv:2010.07541v4
fatcat:w6ujccz5kjdxresmixh6wj2iii
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
[article]
2021
arXiv
pre-print
models. ...
The goal of this work is to systematically categorize and discuss a wide range of dataset vulnerabilities and exploits, approaches for defending against these threats, and an array of open problems in ...
Additionally, support for Li and Xie was provided by NSF grant CCF-1910100 and the Amazon research award program. ...
arXiv:2012.10544v4
fatcat:2tpz6l2dpbgrjcyf5yxxv3pvii
Advances and Open Problems in Federated Learning
[article]
2021
arXiv
pre-print
Federated learning (FL) is a machine learning setting where many clients (e.g. mobile devices or whole organizations) collaboratively train a model under the orchestration of a central server (e.g. service ...
FL embodies the principles of focused data collection and minimization, and can mitigate many of the systemic privacy risks and costs resulting from traditional, centralized machine learning and data science ...
Acknowledgments The authors would like to thank Alex Ingerman and David Petrou for their useful suggestions and insightful comments during the review process. ...
arXiv:1912.04977v3
fatcat:efkbqh4lwfacfeuxpe5pp7mk6a
Federated and Transfer Learning: A Survey on Adversaries and Defense Mechanisms
[article]
2022
arXiv
pre-print
The advent of federated learning has facilitated large-scale data exchange amongst machine learning models while maintaining privacy. ...
One of the most significant advancements in this domain is the incorporation of transfer learning into federated learning, which overcomes fundamental constraints of primary federated learning, particularly ...
Acknowledgements This work is supported by the Natural Sciences and Engineering Research Council of Canada (NSERC) under funding reference numbers CGSD3-569341-2022 and RGPIN-2021-02968. ...
arXiv:2207.02337v1
fatcat:rf4fdiunnnehjpvjhbmncrt3ka
From Distributed Machine Learning to Federated Learning: A Survey
[article]
2022
arXiv
pre-print
In this paper, we provide a comprehensive survey of existing works for federated learning. We propose a functional architecture of federated learning systems and a taxonomy of related techniques. ...
Federated learning emerges as an efficient approach to exploit distributed data and computing resources, so as to collaboratively train machine learning models, while obeying the laws and regulations and ...
The modification of the labels is denoted by the label flipping attack. As a result, the accuracy of the trained model has low accuracy in terms of Class C [165] . ...
arXiv:2104.14362v3
fatcat:sgip6r7vy5djpfapk74jygldni
A Systematic Review of Federated Learning in the Healthcare Area: From the Perspective of Data Properties and Applications
2021
Applied Sciences
Excellent deep learning models are heavily data-driven. The more data trained, the more robust and more generalizable the performance of the deep learning model. ...
Federated learning resolves the previous challenges with a shared global deep learning model using a central aggregator server. ...
Acknowledgments: This study was supported by the Ministry of Science and Technology of Taiwan under the project grants MOST 110-2321-B-468-001 and MOST 110-2511-H-468-005. ...
doi:10.3390/app112311191
fatcat:m6aq2o22cfbp5o3y4cgo7yk4au
AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler?
[article]
2022
arXiv
pre-print
envisioned to play a pivotal role in empowering intelligent, adaptive and autonomous security management in 5G and beyond networks, thanks to its potential to uncover hidden patterns from a large set of time-varying ...
This strategy can be used against models that leverage distributed learning (e.g., federated learning), which relies on several agents for training. ...
Serving Phase Training and Test Phase • The addition of noise to the execution time of the ML model.
B. ...
arXiv:2201.02730v1
fatcat:upuk2pjcfzag5bjs5woeiwkxe4
Editorial Special Issue on AI Innovations in Intelligent Transportation Systems
2022
IEEE transactions on intelligent transportation systems (Print)
It is shown to be robust against various potential attacks through detailed security analysis including the simulation-based formal security verification. ...
propose a semi-supervised federated learning (SSFL) framework that can accurately identify travel modes without using users' raw trajectories data or relying on notable data labels. ...
doi:10.1109/tits.2022.3152067
fatcat:w5qyxfyp7zfzjckdkhsmddvzwm
Orchestrating the Development Lifecycle of Machine Learning-Based IoT Applications: A Taxonomy and Survey
2020
ACM Computing Surveys
For supervised cases when a class label is available for training, TML aims to map the input data to the labels by optimising a model, which can be used to infer unseen data at the test stage. ...
To begin with modeling, it is essential for users to choose a suitable learning concept at the first stage. ...
A label flipping attack attempts to add a noise label to the training data. ...
doi:10.1145/3398020
fatcat:zzgfcjxjxbhnhf53dmlo63rs3i
Edge Intelligence: Architectures, Challenges, and Applications
[article]
2020
arXiv
pre-print
Edge intelligence refers to a set of connected systems and devices for data collection, caching, processing, and analysis in locations close to where data is captured based on artificial intelligence. ...
We then aim for a systematic classification of the state of the solutions by examining research results and observations for each of the four components and present a taxonomy that includes practical problems ...
IoT devices connect to the Internet through a gateway. They design two models for IoT device identification and anomaly detection. ...
arXiv:2003.12172v2
fatcat:xbrylsvb7bey5idirunacux6pe
Orchestrating the Development Lifecycle of Machine Learning-Based IoT Applications: A Taxonomy and Survey
[article]
2020
arXiv
pre-print
This paper provides a comprehensive and systematic survey on the development lifecycle of ML-based IoT application. ...
sensors into ML models, thereby employing results to improve their business processes and services. ...
Bonawitz against SVMs which utilizes label flipping to poison the training data [363] . A label flipping attack attempts to add a noise label to the training data. ...
arXiv:1910.05433v5
fatcat:ffvjipmylve6feuzdbav2syxfu
Towards Security Threats of Deep Learning Systems: A Survey
[article]
2020
arXiv
pre-print
In particular, we focus on four types of attacks associated with security threats of deep learning: model extraction attack, model inversion attack, poisoning attack and adversarial attack. ...
In order to unveil the security weaknesses and aid in the development of a robust deep learning system, we undertake an investigation on attacks towards deep learning, and analyze these attacks to conclude ...
Poisoning Attack Approach
Manipulating Mislabeled Data Learning model usually experiences training under labeled data in advance. ...
arXiv:1911.12562v2
fatcat:m3lyece44jgdbp6rlcpj6dz2gm
« Previous
Showing results 1 — 15 out of 1,188 results