2021
DOI: 10.48550/arxiv.2104.13050
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning

Yanjun Zhang,
Guangdong Bai,
Xue Li
et al.

Abstract: Federated learning enables multiple participants to collaboratively train a model without aggregating the training data. Although the training data are kept within each participant and the local gradients can be securely synthesized, recent studies have shown that such privacy protection is insufficient. The global model parameters that have to be shared for optimization are susceptible to leak information about training data. In this work, we propose Confined Gradient Descent (CGD) that enhances privacy of fe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 35 publications
0
1
0
Order By: Relevance
“…In addition, a sequential likelihood ratio test method was also used to validate the efficacy and results of the suggested system. For SCADA security, some of the recent meta-heuristic optimization techniques are developed in the existing works, which includes hybrid PSO [29], Whale Optimization (WO) [30], Self-Organizing Migration (SOM) [31], Differential Evolution (DE) [32], and Gradient Descent [33]. Sheng et al [34] employed a new cyber-physical model for identifying intrusions from the smart grid SCADA networks.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, a sequential likelihood ratio test method was also used to validate the efficacy and results of the suggested system. For SCADA security, some of the recent meta-heuristic optimization techniques are developed in the existing works, which includes hybrid PSO [29], Whale Optimization (WO) [30], Self-Organizing Migration (SOM) [31], Differential Evolution (DE) [32], and Gradient Descent [33]. Sheng et al [34] employed a new cyber-physical model for identifying intrusions from the smart grid SCADA networks.…”
Section: Related Workmentioning
confidence: 99%