2021
DOI: 10.48550/arxiv.2111.01221
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Robust Federated Learning via Over-The-Air Computation

Abstract: This paper investigates the robustness of over-theair federated learning to Byzantine attacks. The simple averaging of the model updates via over-the-air computation makes the learning task vulnerable to random or intended modifications of the local model updates of some malicious clients. We propose a robust transmission and aggregation framework to such attacks while preserving the benefits of over-the-air computation for federated learning. For the proposed robust federated learning, the participating clien… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…According to the lower bound λ LB and upper bound λ UB , the optimal Lagrange multiply, λ * , can be solved by using the bisection search method. Furthermore, the optimal wireless bandwidth allocation policy θ t can be derived from (31). Based on the above analysis, we have the following remark.…”
Section: B Optimal Wireless Bandwidth Allocationmentioning
confidence: 96%
See 2 more Smart Citations
“…According to the lower bound λ LB and upper bound λ UB , the optimal Lagrange multiply, λ * , can be solved by using the bisection search method. Furthermore, the optimal wireless bandwidth allocation policy θ t can be derived from (31). Based on the above analysis, we have the following remark.…”
Section: B Optimal Wireless Bandwidth Allocationmentioning
confidence: 96%
“…However, the exact computation of the Lipschitz constant of deep learning architectures is intractable, even for two-layer neural networks [30]. Assumption 2 is widely used in the convergence analysis in FL algorithms, e.g., [14], [24], [31]. To begin with, we first derive a key lemma, proved in Appendix A, to assist our analysis as follows:…”
Section: A Convergence Anaysismentioning
confidence: 99%
See 1 more Smart Citation