2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems (MASS) 2021
DOI: 10.1109/mass52906.2021.00032
|View full text |Cite
|
Sign up to set email alerts
|

Certifiably-Robust Federated Adversarial Learning via Randomized Smoothing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…In particular, the works of Zizzo et al [14] and Shah et al [45] studied the incorporation of adversarial training [23], arguably the most effective empirical defense against adversarial attacks, into the FL setup. Closest to our study, is the recent work of Chen et al [31] that explored certification via RS in FL. In contrast to [31], instead of pixel-level perturbations, we study realistic (e.g.…”
Section: Related Workmentioning
confidence: 91%
See 2 more Smart Citations
“…In particular, the works of Zizzo et al [14] and Shah et al [45] studied the incorporation of adversarial training [23], arguably the most effective empirical defense against adversarial attacks, into the FL setup. Closest to our study, is the recent work of Chen et al [31] that explored certification via RS in FL. In contrast to [31], instead of pixel-level perturbations, we study realistic (e.g.…”
Section: Related Workmentioning
confidence: 91%
“…Closest to our study, is the recent work of Chen et al [31] that explored certification via RS in FL. In contrast to [31], instead of pixel-level perturbations, we study realistic (e.g. rotation and translation) perturbations.…”
Section: Related Workmentioning
confidence: 91%
See 1 more Smart Citation
“…Inspired by the idea that trigger regions contribute the most to prediction, Doan et al [60] proposed the use of GANs to process parts of images that may have triggers, and they designed a two-stage image preprocessing method (i.e., Februs). In the first stage, February uses GradCAM [61] to identify regions of influence, generating heatmaps to illustrate important regions in the input that contribute significantly to the learned features. In the second stage, a GAN-based inpainting method is employed to reconstruct the masked regions.Based on this idea, Udeshi et al [62] also designed a square trigger interceptor using the dominant color in the image to locate and remove backdoor triggers.…”
Section: A Dataset-based Defense Strategiesmentioning
confidence: 99%
“…In addition to adversarial training, we conducted experiments on robust models obtained through randomized smoothing [81], which is widely recognized as one of the leading techniques for achieving certified robustness. When attacking such a defensive model with a ResNet-50 architecture, we observe a substantial improvement compared to [1] (26.76%→85.04%).…”
Section: Attacking Defensive Modelsmentioning
confidence: 99%