Secure Distributed Optimization Under Gradient Attacks

被引:2
|
作者
Yu, Shuhua [1 ]
Kar, Soummya [1 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA 15213 USA
关键词
Optimization; Stochastic processes; Distributed databases; Servers; Threat modeling; Robustness; Signal processing algorithms; Distributed optimization; multi-agent networks; security; resilience; gradient descent; variance reduction; PARAMETER ESTIMATION; ALGORITHMS; DESCENT;
D O I
10.1109/TSP.2023.3277211
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this article, we study secure distributed optimization against arbitrary gradient attacks in multi-agent networks. In distributed optimization, there is no central server to coordinate local updates, and each agent can only communicate with its neighbors on a predefined network. We consider the scenario where out of $n$ networked agents, a fixed but unknown fraction p of the agents are under arbitrary gradient attacks in that their stochastic gradient oracles return arbitrary information to derail the optimization process, and the goal is to minimize the sum of local objective functions on unattacked agents. We propose a distributed stochastic gradient method that combines local variance reduction and clipping (CLIP-VRG). We show that, in a connected network, when the unattacked local objective functions are convex and smooth, share a common minimizer, and their sum is strongly convex, CLIP-VRG leads to almost sure convergence of the iterates to the exact sum cost minimizer at all agents. We quantify a tight upper bound on the fraction p of attacked agents in terms of problem parameters such as the condition number of the associated sum cost that guarantee exact convergence of CLIP-VRG, and characterize its asymptotic convergence rate. Finally, we empirically demonstrate the effectiveness of the proposed method under gradient attacks on both synthetic and real-world image classification datasets.
引用
收藏
页码:1802 / 1816
页数:15
相关论文
共 50 条
  • [21] Distributed Learning With Sparsified Gradient Differences
    Chen, Yicheng
    Blum, Rick S.
    Takac, Martin
    Sadler, Brian M.
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2022, 16 (03) : 585 - 600
  • [22] Robust Distributed Nash Equilibrium Seeking for Games Under Attacks and Communication Delays
    Wang, Xue-Fang
    Sun, Xi-Ming
    Ye, Maojiao
    Liu, Kun-Zhi
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (09) : 4892 - 4899
  • [23] Distributed Finite-Time ADP-Based Optimal Secure Control for Complex Interconnected Systems Under Topology Attacks
    Zhang, Longjie
    Chen, Yong
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (05): : 2872 - 2883
  • [24] Distributed Stochastic Optimization Under a General Variance Condition
    Huang, Kun
    Li, Xiao
    Pu, Shi
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (09) : 6105 - 6120
  • [25] Byzantine Resilient Non-Convex SCSG With Distributed Batch Gradient Computations
    Bulusu, Saikiran
    Khanduri, Prashant
    Kafle, Swatantra
    Sharma, Pranay
    Varshney, Pramod K.
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2021, 7 : 754 - 766
  • [26] Distributed Secure State Estimation in the Presence of Malicious Agents
    Lu, An-Yang
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (06) : 2875 - 2882
  • [27] Distributed Secure State Estimation for Cyber-Physical Systems Under False Data Injection Attacks
    Zhang, Xin-Yu
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (05): : 4443 - 4455
  • [28] Gradient-free distributed optimization with exact convergence
    Pang, Yipeng
    Hu, Guoqiang
    AUTOMATICA, 2022, 144
  • [29] Reputation-Based Optimization for Distributed Energy Management Under Persistent DoS Attacks
    Luan, Meng
    Wen, Guanghui
    Ge, Xiaohua
    Han, Qing-Long
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2025, 21 (02) : 1220 - 1229
  • [30] Corrected Gradient Methods for Distributed Optimization
    Qiu, Zhirong
    Xie, Lihua
    You, Keyou
    PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 6148 - 6153