2021 International Conference on Information and Communication Technology Convergence (ICTC) 2021
DOI: 10.1109/ictc52510.2021.9620836
|View full text |Cite
|
Sign up to set email alerts
|

Are You a Good Client? Client Classification in Federated Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…Their reweighting strategy used iteratively reweighted least squares to integrate repeated median regression. On the other hand, there are various defense attempts to prepare for possible attacks in the form of classifying anomalies (Li et al , 2020a; Shen et al , 2016; Fang et al , 2020; Tolpegin et al , 2020; Jeong et al , 2021). Li proposed spectral anomaly detection mechanism based on models’ low-dimensional embeddings (Li et al , 2020a).…”
Section: Research Issuesmentioning
confidence: 99%
See 2 more Smart Citations
“…Their reweighting strategy used iteratively reweighted least squares to integrate repeated median regression. On the other hand, there are various defense attempts to prepare for possible attacks in the form of classifying anomalies (Li et al , 2020a; Shen et al , 2016; Fang et al , 2020; Tolpegin et al , 2020; Jeong et al , 2021). Li proposed spectral anomaly detection mechanism based on models’ low-dimensional embeddings (Li et al , 2020a).…”
Section: Research Issuesmentioning
confidence: 99%
“…The aforementioned work’s objective, anomaly detection, remains the same, but several approaches leveraged clustering-based and thresholding-based approaches (Shen et al , 2016; Fang et al , 2020; Tolpegin et al , 2020; Jeong et al , 2021; Cao et al , 2020; Sun et al , 2019). Auror dealt with targeted poisoning attacks leveraging clustering and thresholding techniques.…”
Section: Research Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, previous FL research [7] often assumes that clients have fully annotated data with ground-truth labels, which can be an unrealistic assumption as labeling data is a time-consuming, expensive process that often requires the participation of domain experts. A more practical scenario is to share a limited amount of labeled data on the server while assisting clients with unlabeled data in model training [8], as proposed in recent studies.…”
Section: Introductionmentioning
confidence: 99%
“…FixMatch [9], UDA [10]), while using federated learning strategies to aggregate the learned weights. The recent method FedMatch [8] uses existing SSL methods based on pseudolabeling and enhances the consistency between predictions made across multiple models by deploying a second labeled dataset for validation on the server, but additionally increases the need for labeled data. Other approaches FedU [11], FedEMA [12], and Orchestra [13], use self-supervised strategies to correct the training results of aggregated client models by labeled data on the server.…”
Section: Introductionmentioning
confidence: 99%