2021
DOI: 10.48550/arxiv.2109.09955
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning

Abstract: Federated learning (FL) has become an emerging machine learning technique lately due to its efficacy in safeguarding the client's confidential information. Nevertheless, despite the inherent and additional privacy-preserving mechanisms (e.g., differential privacy, secure multi-party computation, etc.), the FL models are still vulnerable to various privacy-violating and security-compromising attacks (e.g., data or model poisoning) due to their numerous attack vectors which in turn, make the models either ineffe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Trimmed mean [28], Median [28], etc.) or ( 3) state-of-theart DPFL aggregation methods [12], [15]. Particularly, we focus on the aggregation scheme of [12] which proposes to add a bounded DP-noise to the sum of the all clipped local updates, ∆w n to form a global model, ∆w g .…”
Section: Privacy Preserved Aggregation Rules In Flmentioning
confidence: 99%
See 2 more Smart Citations
“…Trimmed mean [28], Median [28], etc.) or ( 3) state-of-theart DPFL aggregation methods [12], [15]. Particularly, we focus on the aggregation scheme of [12] which proposes to add a bounded DP-noise to the sum of the all clipped local updates, ∆w n to form a global model, ∆w g .…”
Section: Privacy Preserved Aggregation Rules In Flmentioning
confidence: 99%
“…For a comprehensive understanding of recently discovered DP-exploited poisoning attacks [13], [14], [15], [29], we can consider Fig. 3 where multiple edge nodes are collaboratively updating the global model.…”
Section: Basic Mechanism Of Dp-exploited Poison-ing Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…However, defenses have arisen towards this Boosting-based model replacement attacks because it increases the l n norm of the vector of weights (see Section VI). Additionally, several proposed stealthy techniques evaded such defenses [48], [49], [50], [51], [52], [53]. Furthermore, [54] proposed Sybils that evaded and improved attacks quality.…”
Section: A Targeting Integrity and Availabilitymentioning
confidence: 99%