Proceedings of the 38th Annual Computer Security Applications Conference 2022
DOI: 10.1145/3564625.3567991
|View full text |Cite
|
Sign up to set email alerts
|

AFLGuard: Byzantine-robust Asynchronous Federated Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
156
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 74 publications
(159 citation statements)
references
References 11 publications
3
156
0
Order By: Relevance
“…The problems of the Byzantine attacks, that is, data poisoning attacks have recently been studied in many fields, such as crowdsourcing and crowdsensing scenarios [10], [27], applications of Internet of Things [31], [54], electric power grids [42] and machine learning algorithms [8], [25], [26]. However, combating Byzantine attacks in LDP protocols is a relatively new topic that has few state-of-the-art papers.…”
Section: Related Workmentioning
confidence: 99%
“…The problems of the Byzantine attacks, that is, data poisoning attacks have recently been studied in many fields, such as crowdsourcing and crowdsensing scenarios [10], [27], applications of Internet of Things [31], [54], electric power grids [42] and machine learning algorithms [8], [25], [26]. However, combating Byzantine attacks in LDP protocols is a relatively new topic that has few state-of-the-art papers.…”
Section: Related Workmentioning
confidence: 99%
“…In untargeted attack poisoning, the adversary seeks to undermine the performance of the FL model. In a byzantine attack [63,13,173], the adversary players change their outputs to have the same distribution as the right model updates in order to evade detection. It behaves completely arbitrarily to diminish model performance.…”
Section: Threats In Model Training Of Federated Learningmentioning
confidence: 99%
“…Most of the above robust aggregation schemes suffer from significant performance degradation when a relatively large proportion of clients are compromised, or data among clients is highly Non-IID. Furthermore, recently proposed poisoning attacks [63,13,173] for FL can bypass these robust aggregation algorithms. Motivated by these new challenges, the Byzantine-robust federated optimization approaches have been proposed [218,157,158], which reveals the further challenges for robust aggregation techniques.…”
Section: Robustness To Byzantine Problemmentioning
confidence: 99%
See 2 more Smart Citations