Low-Latency Federated Learning Over Wireless Channels With Differential Privacy

被引:53
作者
Wei, Kang [1 ]
Li, Jun [1 ]
Ma, Chuan [1 ,2 ]
Ding, Ming [3 ]
Chen, Cailian [4 ,5 ]
Jin, Shi [6 ]
Han, Zhu [7 ,8 ]
Poor, H. Vincent [9 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210094, Peoples R China
[2] Southeast Univ, Minist Educ, Key Lab Comp Network & Informat Integrat, Nanjing 210096, Peoples R China
[3] CSIRO, Data61, Sydney, NSW 2015, Australia
[4] Shanghai Jiao Tong Univ, Dept Automat, Shanghai 200240, Peoples R China
[5] Minist Educ China, Key Lab Syst Control & Informat Proc, Shanghai 200240, Peoples R China
[6] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[7] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
[8] Kyung Hee Univ, Dept Comp Sci & Engn, Seoul 446701, South Korea
[9] Princeton Univ, Dept Elect & Comp Engn, Princeton, NJ 08544 USA
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Wireless communication; Training; Servers; Computational modeling; Wireless sensor networks; Data models; Interference; Federated learning; differential privacy; multi-agent multi-armed bandit; max-min bipartite matching; EDGE; COMMUNICATION; OPTIMIZATION; AGGREGATION; CHALLENGES; NETWORKS; DESIGN;
D O I
10.1109/JSAC.2021.3126052
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In federated learning (FL), model training is distributed over clients and local models are aggregated by a central server. The performance of uploaded models in such situations can vary widely due to imbalanced data distributions, potential demands on privacy protections, and quality of transmissions. In this paper, we aim to minimize FL training delay over wireless channels, constrained by overall training performance as well as each client's differential privacy (DP) requirement. We solve this problem in a multi-agent multi-armed bandit (MAMAB) framework to deal with the situation where there are multiple clients confronting different unknown transmission environments, e.g., channel fading and interference. Specifically, we first transform long-term constraints on both training performance and each client's DP into a virtual queue based on the Lyapunov drift technique. Then, we convert the MAMAB to a max-min bipartite matching problem at each communication round, by estimating rewards with the upper confidence bound (UCB) approach. More importantly, we propose two efficient solutions to this matching problem, i.e., a modified Hungarian algorithm and greedy matching with a better alternative (GMBA), of which the former can achieve the optimal solution with high complexity while the latter approaches a better trade-off by enabling verified low-complexity with little performance loss. In addition, we develop an upper bound on the expected regret of this MAMAB based FL framework, which shows a linear growth over the logarithm of communication rounds, justifying its theoretical feasibility. Extensive experimental results are conducted to validate the effectiveness of our proposed algorithms, and the impacts of various parameters on the FL performance over wireless edge networks are also discussed.
引用
收藏
页码:290 / 307
页数:18
相关论文
共 44 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
Bondy JA., 2007, GRAPH THEORY
[3]   Convergence Time Optimization for Federated Learning Over Wireless Networks [J].
Chen, Mingzhe ;
Poor, H. Vincent ;
Saad, Walid ;
Cui, Shuguang .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (04) :2457-2471
[4]   Communication-efficient federated learning [J].
Chen, Mingzhe ;
Shlezinger, Nir ;
Poor, H. Vincent ;
Eldar, Yonina C. ;
Cui, Shuguang .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2021, 118 (17)
[5]   A Joint Learning and Communications Framework for Federated Learning Over Wireless Networks [J].
Chen, Mingzhe ;
Yang, Zhaohui ;
Saad, Walid ;
Yin, Changchuan ;
Poor, H. Vincent ;
Cui, Shuguang .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (01) :269-283
[6]   Wireless Powered Mobile Edge Computing: Dynamic Resource Allocation and Throughput Maximization [J].
Deng, Xiumei ;
Li, Jun ;
Shi, Long ;
Wei, Zhiqiang ;
Zhou, Xiaobo ;
Yuan, Jinhong .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (06) :2271-2288
[7]   The Algorithmic Foundations of Differential Privacy [J].
Dwork, Cynthia ;
Roth, Aaron .
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4) :211-406
[8]   Online Learning Based Computation Offloading in MEC Systems With Communication and Computation Dynamics [J].
Guo, Kun ;
Gao, Ruifeng ;
Xia, Wenchao ;
Quek, Tony Q. S. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (02) :1147-1162
[9]   An Efficiency-Boosting Client Selection Scheme for Federated Learning With Fairness Guarantee [J].
Huang, Tiansheng ;
Lin, Weiwei ;
Wu, Wentai ;
He, Ligang ;
Li, Keqin ;
Zomaya, Albert .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (07) :1552-1564
[10]   DP-ADMM: ADMM-Based Distributed Learning With Differential Privacy [J].
Huang, Zonghao ;
Hu, Rui ;
Guo, Yuanxiong ;
Chan-Tin, Eric ;
Gong, Yanmin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :1002-1012