2022
DOI: 10.1109/jiot.2022.3172113
|View full text |Cite
|
Sign up to set email alerts
|

Stochastic Client Selection for Federated Learning With Volatile Clients

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 64 publications
(29 citation statements)
references
References 13 publications
0
25
0
Order By: Relevance
“…"> K‐Center 29 : K‐Center clustering is performed on the set of clients before each training round to select the clients in each class that is closest to the center of clustering. E3CS 11 : Considering that clients cannot meet the deadline for training and the aggregation fails, E3CS generates the client's state (success or failure) using Bernoulli distribution, which is selected based on the expectation of the client's state.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…"> K‐Center 29 : K‐Center clustering is performed on the set of clients before each training round to select the clients in each class that is closest to the center of clustering. E3CS 11 : Considering that clients cannot meet the deadline for training and the aggregation fails, E3CS generates the client's state (success or failure) using Bernoulli distribution, which is selected based on the expectation of the client's state.…”
Section: Methodsmentioning
confidence: 99%
“…However, during the footprint comparison process, FedProf requires uploading data feature information, which runs the risk of leaking the client's local data. Our team discovered in previous research 10,11 that low priority clients are denied participation in training during the client selection process for FL. Because of the inequity in the selection, the global model may be unable to effectively use data from some clients, and thus cannot guarantee data diversity on the global model aggregation, and lower global model performance.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, we propose two approaches to identify malicious updates from different attacks (i.e., sybil and non-sybil), based on which rewards can be easily computed. Note that MAB methods have been applied in FL in other works, but they focus on reducing communication overheads [Cho et al, 2020] or constructing high-quality models [Huang et al, 2020], it is still unclear how to apply MAB algorithms to detect Byzantine attacks.…”
Section: Introductionmentioning
confidence: 99%