Robust Federated Learning: Maximum Correntropy Aggregation Against Byzantine Attacks

被引:4
作者
Luan, Zhirong [1 ]
Li, Wenrui [2 ,3 ]
Liu, Meiqin [2 ,3 ]
Chen, Badong [2 ,3 ]
机构
[1] Xian Univ Technol, Sch Elect Engn, Xian 710048, Peoples R China
[2] Xian Univ Technol, Natl Key Lab Human Machine Hybrid Augmented Intel, Natl Engn Res Ctr Visual Informat & Applicat, Xian 710049, Peoples R China
[3] Xian Univ Technol, Inst Artificial Intelligence & Robot, Xian 710049, Peoples R China
基金
中国国家自然科学基金;
关键词
Federated learning; Vectors; Training; Convergence; Robustness; Optimization; Servers; Byzantine attacks; federated learning; maximum correntropy criterion (MCC); robust aggregation;
D O I
10.1109/TNNLS.2024.3383294
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As an emerging decentralized machine learning technique, federated learning organizes collaborative training and preserves the privacy and security of participants. However, untrustworthy devices, typically Byzantine attackers, pose a significant challenge to federated learning since they can upload malicious parameters to corrupt the global model. To defend against such attacks, we propose a novel robust aggregation method-maximum correntropy aggregation (MCA), which applies the maximum correntropy criterion (MCC) to derive a central value from parameters. Different from the previous use of MCC for denoising, we utilize it as a similarity metric to measure parameter distribution and aggregate a robust center. Correntropy in MCC, with all even-order moments of the parameter, contains high-order statistical properties, which allows for a comprehensive capture of parameter characteristics, thus helping to prevent interference from attackers. Meanwhile, correntropy extracts information from the parameters themselves, without requiring the proportion of malicious attackers. Through the fixed-point iteration, we solve the optimization objective, demonstrating the linear convergence of the iteration formula. Theoretical analysis reveals the robustness aggregation property of MCA and the error bound between MCA and the global optimal solution, with linear convergence to the optimal solution neighborhood. By performing independent identically distribution (IID) and non-IID experiments on three different datasets, we show that MCA exhibits significant robustness under mainstream attacks, whereas other methods cannot withstand all of them.
引用
收藏
页码:62 / 75
页数:14
相关论文
共 44 条
  • [1] Agarwal R. P., 2001, Fixed Point Theory and Applications
  • [2] Alistarh D, 2018, ADV NEUR IN, V31
  • [3] Allen-Zhu Z, 2021, Arxiv, DOI arXiv:2012.14368
  • [4] Ammad-ud-din M, 2019, Arxiv, DOI arXiv:1901.09888
  • [5] Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
  • [6] Baruch M, 2019, ADV NEUR IN, V32
  • [7] Bhagoji AN, 2019, PR MACH LEARN RES, V97
  • [8] Blanchard P, 2017, ADV NEUR IN, V30
  • [9] FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping
    Cao, Xiaoyu
    Fang, Minghong
    Liu, Jia
    Gong, Neil Zhenqiang
    [J]. 28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [10] Effects of Outliers on the Maximum Correntropy Estimation: A Robustness Analysis
    Chen, Badong
    Xing, Lei
    Zhao, Haiquan
    Du, Shaoyi
    Principe, Jose C.
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (06): : 4007 - 4012