Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2021
DOI: 10.1145/3448300.3467827
|View full text |Cite
|
Sign up to set email alerts
|

Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection

Abstract: The increase of the computational power in edge devices has enabled the penetration of distributed machine learning technologies such as federated learning, which allows to build collaborative models performing the training locally in the edge devices, im-

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…A modified version of SMOTE is the kSMOTE method proposed by [14]. kSMOTE takes only k number of samples in the minority class instead of all data samples to reduce computational complexity (Algorithm 1 line 9 − 13).…”
Section: B Fl-m-smote Re-balancing Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…A modified version of SMOTE is the kSMOTE method proposed by [14]. kSMOTE takes only k number of samples in the minority class instead of all data samples to reduce computational complexity (Algorithm 1 line 9 − 13).…”
Section: B Fl-m-smote Re-balancing Methodsmentioning
confidence: 99%
“…FedProx [12] adds regularization terms to the loss function to reduce the distance between the global and local models when the clients' data are non-IID, and this makes the averaging of the local models not far from the global optima. Wand et al [14] proposed a decentralized framework for re-balance the local data on each participating client using P2PK-SMOTE. The presented P2PK-KSMOTE method artificially generates synthetic points for the minority class based on random k points.…”
Section: A Federated Learning and Non-iidmentioning
confidence: 99%
“…The new global model is sent to all clients, which return the F1 scores [f c 1 ] c∈C obtained on their local validation sets with the new global model (line 12). The server computes mean F1 score value f µ 1 , which is used to evaluate the progress of the federated training (lines [13][14][15][16][17][18][19]. If f µ 1 > F 1 , the new global model is saved and the stopping counter sc is set to 0.…”
Section: Methodsmentioning
confidence: 99%
“…Although the proposed solutions show high detection accuracy scores, the use of the vanilla FEDAVG algorithm make them prone to the drawbacks presented in Section II. Finally, an interesting work by Wang et al [16] presents a peer-topeer variation of FL to train a model for anomaly detection in IoT without the need of a central server. To improve convergence and accuracy on non-i.i.d.…”
Section: A Fl In Cybersecuritymentioning
confidence: 99%
“…Jeong et al [33] propose to generate new samples using a globally trained conditional generative adversarial network (CGAN) to build unskewed local datasets. Similarly, Wang et al generate synthetic data in the minority class based on linear interpolation to re-balance local datasets on edge devices [15]. These approaches avoid the leakage of FL clients' private data.…”
Section: Introductionmentioning
confidence: 99%