2021
DOI: 10.36227/techrxiv.16691230.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Decentralized Deep Learning for Multi-Access Edge Computing: A Survey on Communication Efficiency and Trustworthiness

Abstract: A survey paper.

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…For example, a semantic backdoor flips the labels of images containing specific natural features to cause misclassification when these features are present as triggers [6]. Moreover, a malicious model update generated through label flipping typically results in a larger norm of model weights than a benign update [10].…”
Section: A Poisoning Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, a semantic backdoor flips the labels of images containing specific natural features to cause misclassification when these features are present as triggers [6]. Moreover, a malicious model update generated through label flipping typically results in a larger norm of model weights than a benign update [10].…”
Section: A Poisoning Attacksmentioning
confidence: 99%
“…Notably, a compromised client might inject malicious model parameters into the FL system, causing malfunction and influencing other clients in the system (Figure 1a). Furthermore, these attacks in FL are typically either untargeted or targeted [10]. The aim of an untargeted attack is to degrade the performance of a client model in general, while a targeted attack aims to cause a client model to misclassify samples of a specific class into the attacker's desired class.…”
Section: Introductionmentioning
confidence: 99%