2021 8th International Conference on Dependable Systems and Their Applications (DSA) 2021
DOI: 10.1109/dsa52907.2021.00081
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Mitigation of Label-Flipping Attacks in Federated Learning Systems with KPCA and K-Means

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
30
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(31 citation statements)
references
References 16 publications
1
30
0
Order By: Relevance
“…Here, notation D denotes the total number of aggregations and d l represents the number of times the l-th participant is judged to be a benign participant historically. Importantly, some excellent references [27][28][29] use the clustering method to defend the poisoning attacks. However, the clustering method is only one evidence of our proposed D-S evidence theorybased defense strategy in our paper.…”
Section: Evidence Definitionsmentioning
confidence: 99%
“…Here, notation D denotes the total number of aggregations and d l represents the number of times the l-th participant is judged to be a benign participant historically. Importantly, some excellent references [27][28][29] use the clustering method to defend the poisoning attacks. However, the clustering method is only one evidence of our proposed D-S evidence theorybased defense strategy in our paper.…”
Section: Evidence Definitionsmentioning
confidence: 99%
“…For example, Wikipedia's introduction to a country, such as Japan, includes the following attributes: 'Climate', 'Biodiversity', 'Environment', 'Agriculture and Fishery', 'Industry', 'Science and Technology', 'Art and Architecture', 'Etiquette', 'Cuisine' and so on. However, Wiki has already grouped these attributes: 'Climate', 'Biodiversity', 'Environment'; these factors are equivalent to𝑢 1 (1) , 𝑢 2 (1) , and, 𝑢 3 (1) in Figure 1, which describe the attribute 'Geography'; thus, we consider 𝑢 1 (1) , 𝑢 2 (1) , and 𝑢 3 (1) to be three child factors of 𝑈 1 , i.e., the parent factor "Geography"; in the same way, 'Agriculture and Fishery', 'Industry', 'Science and Technology' , these factors are equivalent to 𝑢 1 (2) , 𝑢 2 (2) , and, 𝑢 3 (2) in Figure 1, which describe the attribute 'Economy'. So, we consider 𝑢 1 (2) , 𝑢 2 (2) , and 𝑢 3 (2) to be three child factors of 𝑈 2 , i.e., the parent factor "Economy"; finally, 'Art and Architecture', 'Etiquette', 'Cuisine', these factors are equivalent to 𝑢 1 (3) , 𝑢 2 (3) , and, 𝑢 3 (3) in Figure 1, which describe the attribute 'Culture'; therefore, we consider 𝑢 1 (3) , 𝑢 2 (3) , and 𝑢 3 (3) to be three child factors of 𝑈 3 , i.e., the parent factor "Culture", as shown in the Figure 2.…”
Section: Data Preprocessingmentioning
confidence: 99%
“…When we deal with a data set with a large number of attributes, if the values of these attributes are not specific or clearly defined, the amount of calculation in data training will be large and the classification effect will be poor. At the same time, even though the values of each attribute are accurately defined, due to the large number of attributes, it is inevitable that the weight assigned to some attributes will be very small, and the loss of information will be inevitable [1][2]. In that case, the accuracy of the results would be negatively affected when the random forest method is directly used to train such data sets [3].…”
Section: Introductionmentioning
confidence: 99%
“…Zhang et al [28] developed an artificial neural network to detect abnormal temperatures of WSNs (Wireless Sensors Networks) in intelligent buildings. Li et al [29] proposed an improved defense strategy that emphasizes employing KPCA and K-means clustering to defend against data-poisoning attacks in federated-learning systems. Bettencourt et al [30] identified fault nodes through the spacetime structure of sensors and neighbor measurements.…”
Section: Anomaly Detectionmentioning
confidence: 99%