2021 IEEE Global Communications Conference (GLOBECOM) 2021
DOI: 10.1109/globecom46510.2021.9685154
|View full text |Cite
|
Sign up to set email alerts
|

Augmented Dual-Shuffle-based Moving Target Defense to Ensure CIA-triad in Federated Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…As such, the added dynamics consequently reduce the likelihood of successful attacks and increase the system resiliency while limiting the disclosure of system vulnerabilities and opportunities for attacks [40]. Zhou et al [59] introduced ADS-MTD, a double-shuffle system comprising model and client-shuffling components. Specifically, MTD takes place in the second phase as a hierarchical multi-shuffler structure to dynamically and efficiently assess and eliminate malicious FL participants to enhance the aggregated model's integrity and availability.…”
Section: Moving Target Defensementioning
confidence: 99%
See 1 more Smart Citation
“…As such, the added dynamics consequently reduce the likelihood of successful attacks and increase the system resiliency while limiting the disclosure of system vulnerabilities and opportunities for attacks [40]. Zhou et al [59] introduced ADS-MTD, a double-shuffle system comprising model and client-shuffling components. Specifically, MTD takes place in the second phase as a hierarchical multi-shuffler structure to dynamically and efficiently assess and eliminate malicious FL participants to enhance the aggregated model's integrity and availability.…”
Section: Moving Target Defensementioning
confidence: 99%
“…United and Non-orthogonal Defense techniques All defensive methods are not mutually exclusive; a single defense technique can thwart multiple attacks. Nevertheless, existing countermeasures are mostly studied separately and orthogonal [59]. For example, some encryption-based methods come at a high communication cost, causing communication bottlenecks, and perturbation-based methods sacrifice performance.…”
Section: Future Research Directionmentioning
confidence: 99%