Byzantine Machine Learning: A Primer

被引:8
作者
Guerraoui, Rachid [1 ]
Gupta, Nirupam [1 ]
Pinot, Rafael [1 ]
机构
[1] EPFL IC IINFCOM DCL, INR 311 Batiment INR,Stn 14, CH-1015 Lausanne, Vaud, Switzerland
基金
瑞士国家科学基金会;
关键词
Byzantine machine learning; distributed SGD; robust aggregation; SECURE STATE ESTIMATION; COMMUNICATION-EFFICIENT; SUBGRADIENT METHODS; ROBUSTNESS; ALGORITHMS; CONSENSUS; NETWORKS; OPTIMIZATION; DESCENT;
D O I
10.1145/3616537
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of Byzantine resilience in distributed machine learning, a.k.a. Byzantine machine learning, consists of designing distributed algorithms that can train an accurate model despite the presence of Byzantine nodes-that is, nodes with corrupt data or machines that can misbehave arbitrarily. By now, many solutions to this important problem have been proposed, most of which build upon the classical stochastic gradient descent scheme. Yet, the literature lacks a unified structure of this emerging field. Consequently, the general understanding on the principles of Byzantine machine learning remains poor. This article addresses this issue by presenting a primer on Byzantine machine learning. In particular, we introduce three pillars of Byzantine machine learning, namely the concepts of breakdown point, robustness, and gradient complexity, to curate the efficacy of a solution. The introduced systematization enables us to (i) bring forth the merits and limitations of the state-of-the-art solutions, and (ii) pave a clear path for future advancements in this field.
引用
收藏
页数:39
相关论文
共 225 条
[1]  
Abadi M., 2015, arXiv, DOI [10.48550/arXiv.1603.04467, DOI 10.48550/ARXIV.1603.04467]
[2]   Toward an Internet of Battlefield Things: A Resilience PerspectIve [J].
Abdelzaher, Tarek ;
Ayanian, Nora ;
Basar, Tamer ;
Diggavi, Suhas ;
Diesner, Jana ;
Ganesan, Deepak ;
Govindan, Ramesh ;
Jha, Susmit ;
Lepoint, Tancrede ;
Marlin, Benjamin ;
Nahrstedt, Klara ;
Nicol, David ;
Rajkumar, Raj ;
Russell, Stephen ;
Seshia, Sanjit ;
Sha, Fei ;
Shenoy, Prashant ;
Srivastava, Mani ;
Sukhatme, Gaurav ;
Swami, Ananthram ;
Tabuada, Paulo ;
Towsley, Don ;
Vaidya, Nitin ;
Veeravalli, Venu .
COMPUTER, 2018, 51 (11) :24-36
[3]   Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications [J].
Abu Alsheikh, Mohammad ;
Lin, Shaowei ;
Niyato, Dusit ;
Tan, Hwee-Pink .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1996-2018
[4]  
Abu-Mostafa Y.S., 2012, Learning from Data, V4
[5]  
Acharya A, 2022, PR MACH LEARN RES, V151
[6]   Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning-A Review [J].
Ahsan, Mostofa ;
Nygard, Kendall E. ;
Gomes, Rahul ;
Chowdhury, Md Minhaz ;
Rifat, Nafiz ;
Connolly, Jayden F. .
JOURNAL OF CYBERSECURITY AND PRIVACY, 2022, 2 (03) :527-555
[7]  
Alistarh D, 2018, ADV NEUR IN, V31
[8]  
Alistarh D, 2018, ADV NEUR IN, V31
[9]   The Convergence of Stochastic Gradient Descent in Asynchronous Shared Memory [J].
Alistarh, Dan ;
De Sa, Christopher ;
Konstantinov, Nikola .
PODC'18: PROCEEDINGS OF THE 2018 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2018, :169-177
[10]  
Alistarh D, 2017, ADV NEUR IN, V30