Leveraging Spanning Tree to Detect Colluding Attackers in Federated Learning
Abstract
Federated learning distributes model training among multiple clients who, driven by privacy concerns, perform training using their local data and only share model weights for iterative aggregation on the server. In this work, we explore the threat of collusion attacks from multiple malicious clients who pose targeted attacks (e.g., label flipping) in a federated learning configuration. By leveraging client weights and the correlation among them, we develop a graph-based algorithm to detect malicious clients. Finally, we validate the effectiveness of our algorithm in presence of varying number of attackers on a classification task using a well-known Fashion-MNIST dataset.
Recommended Citation
P. Ranjan et al., "Leveraging Spanning Tree to Detect Colluding Attackers in Federated Learning," INFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops, Institute of Electrical and Electronics Engineers (IEEE), Jan 2022.
The definitive version is available at https://doi.org/10.1109/INFOCOMWKSHPS54753.2022.9798077
Department(s)
Computer Science
Keywords and Phrases
Attacker; Correlation; Federated Learning
International Standard Book Number (ISBN)
978-166540926-1
Document Type
Article - Conference proceedings
Document Version
Citation
File Type
text
Language(s)
English
Rights
© 2022 Institute of Electrical and Electronics Engineers, All rights reserved.
Publication Date
01 Jan 2022