Covert Model Poisoning Against Federated Learning: Algorithm Design and
Optimization
- URL: http://arxiv.org/abs/2101.11799v1
- Date: Thu, 28 Jan 2021 03:28:18 GMT
- Title: Covert Model Poisoning Against Federated Learning: Algorithm Design and
Optimization
- Authors: Kang Wei, Jun Li, Ming Ding, Chuan Ma, Yo-Seb Jeon and H. Vincent Poor
- Abstract summary: Federated learning (FL) is vulnerable to external attacks on FL models during parameters transmissions.
In this paper, we propose effective MP algorithms to combat state-of-the-art defensive aggregation mechanisms.
Our experimental results demonstrate that the proposed CMP algorithms are effective and substantially outperform existing attack mechanisms.
- Score: 76.51980153902774
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Federated learning (FL), as a type of distributed machine learning
frameworks, is vulnerable to external attacks on FL models during parameters
transmissions. An attacker in FL may control a number of participant clients,
and purposely craft the uploaded model parameters to manipulate system outputs,
namely, model poisoning (MP). In this paper, we aim to propose effective MP
algorithms to combat state-of-the-art defensive aggregation mechanisms (e.g.,
Krum and Trimmed mean) implemented at the server without being noticed, i.e.,
covert MP (CMP). Specifically, we first formulate the MP as an optimization
problem by minimizing the Euclidean distance between the manipulated model and
designated one, constrained by a defensive aggregation rule. Then, we develop
CMP algorithms against different defensive mechanisms based on the solutions of
their corresponding optimization problems. Furthermore, to reduce the
optimization complexity, we propose low complexity CMP algorithms with a slight
performance degradation. In the case that the attacker does not know the
defensive aggregation mechanism, we design a blind CMP algorithm, in which the
manipulated model will be adjusted properly according to the aggregated model
generated by the unknown defensive aggregation. Our experimental results
demonstrate that the proposed CMP algorithms are effective and substantially
outperform existing attack mechanisms.
Related papers
- Deep learning enhanced mixed integer optimization: Learning to reduce model dimensionality [0.0]
This work introduces a framework to address the computational complexity inherent in Mixed-Integer Programming.
By employing deep learning, we construct problem-specific models that identify and exploit common structures across MIP instances.
We present an algorithm for generating synthetic data enhancing the robustness and generalizability of our models.
arXiv Detail & Related papers (2024-01-17T19:15:13Z) - Non-stationary Reinforcement Learning under General Function
Approximation [60.430936031067006]
We first propose a new complexity metric called dynamic Bellman Eluder (DBE) dimension for non-stationary MDPs.
Based on the proposed complexity metric, we propose a novel confidence-set based model-free algorithm called SW-OPEA.
We show that SW-OPEA is provably efficient as long as the variation budget is not significantly large.
arXiv Detail & Related papers (2023-06-01T16:19:37Z) - When to Update Your Model: Constrained Model-based Reinforcement
Learning [50.74369835934703]
We propose a novel and general theoretical scheme for a non-decreasing performance guarantee of model-based RL (MBRL)
Our follow-up derived bounds reveal the relationship between model shifts and performance improvement.
A further example demonstrates that learning models from a dynamically-varying number of explorations benefit the eventual returns.
arXiv Detail & Related papers (2022-10-15T17:57:43Z) - Efficient Model-Based Multi-Agent Mean-Field Reinforcement Learning [89.31889875864599]
We propose an efficient model-based reinforcement learning algorithm for learning in multi-agent systems.
Our main theoretical contributions are the first general regret bounds for model-based reinforcement learning for MFC.
We provide a practical parametrization of the core optimization problem.
arXiv Detail & Related papers (2021-07-08T18:01:02Z) - Efficient Micro-Structured Weight Unification and Pruning for Neural
Network Compression [56.83861738731913]
Deep Neural Network (DNN) models are essential for practical applications, especially for resource limited devices.
Previous unstructured or structured weight pruning methods can hardly truly accelerate inference.
We propose a generalized weight unification framework at a hardware compatible micro-structured level to achieve high amount of compression and acceleration.
arXiv Detail & Related papers (2021-06-15T17:22:59Z) - Enabling Lightweight Fine-tuning for Pre-trained Language Model
Compression based on Matrix Product Operators [31.461762905053426]
We present a novel pre-trained language models (PLM) compression approach based on the matrix product operator (short as MPO) from quantum many-body physics.
Our approach can be applied to the original or the compressed PLMs in a general way, which derives a lighter network and significantly reduces the parameters to be fine-tuned.
arXiv Detail & Related papers (2021-06-04T01:50:15Z) - Preserved central model for faster bidirectional compression in
distributed settings [12.323007278097249]
We develop a new approach to tackle communication constraints in a distributed learning problem with a central server.
We propose and analyze a new algorithm that performs bidirectional compression and achieves the same convergence rate as algorithms using only uplink (from the local workers to the central server) compression.
arXiv Detail & Related papers (2021-02-24T19:48:20Z) - A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack
and Learning [122.49765136434353]
We present an effective method, called Hamiltonian Monte Carlo with Accumulated Momentum (HMCAM), aiming to generate a sequence of adversarial examples.
We also propose a new generative method called Contrastive Adversarial Training (CAT), which approaches equilibrium distribution of adversarial examples.
Both quantitative and qualitative analysis on several natural image datasets and practical systems have confirmed the superiority of the proposed algorithm.
arXiv Detail & Related papers (2020-10-15T16:07:26Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.