2023
DOI: 10.1109/tifs.2023.3249568
|View full text |Cite
|
Sign up to set email alerts
|

Data Quality Detection Mechanism Against Label Flipping Attacks in Federated Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 27 publications
0
1
0
Order By: Relevance
“…MNIST is one of the most popular datasets in the field of machine learning, consisting of 60000 hand-written digital images with a size of 28*28, labeled 0-9; KDDCup is a dataset used to evaluate intrusion detection algorithms, and its training set consists of 23 types of data and the data distribution of different types is imbalanced, which can effectively test the robustness of our proposed method under non-IID data. In the experiment, we make the attack nodes of sybil attacks initiate label flipping attacks [16].…”
Section: Methodsmentioning
confidence: 99%
“…MNIST is one of the most popular datasets in the field of machine learning, consisting of 60000 hand-written digital images with a size of 28*28, labeled 0-9; KDDCup is a dataset used to evaluate intrusion detection algorithms, and its training set consists of 23 types of data and the data distribution of different types is imbalanced, which can effectively test the robustness of our proposed method under non-IID data. In the experiment, we make the attack nodes of sybil attacks initiate label flipping attacks [16].…”
Section: Methodsmentioning
confidence: 99%
“…Ensuring the long-term functionality of the system and guaranteeing data quality and fair payment during cooperation are crucial. Jiang et al [27] proposed a malicious client-detection federated-learning mechanism (MCDFL) facing labelflipping attacks, which, in a 6G environment, more efficiently detects the data quality of each client by recovering the distribution of latent feature spaces. Li et al [28] proposed an incentive mechanism based on contract theory.…”
Section: Data Security Issues Arising In 6g Networkmentioning
confidence: 99%
“…In this paper, we mainly focus on three types of representative poisoning attacks: (1) Label-flipping attack [6](data poisoning). In a data set, each data sample carries a category label.…”
Section: Introductionmentioning
confidence: 99%