2021
DOI: 10.1109/access.2021.3075203
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerabilities in Federated Learning

Abstract: With more regulations tackling the protection of users' privacy-sensitive data in recent years, access to such data has become increasingly restricted. A new decentralized training paradigm, known as Federated Learning (FL), enables multiple clients located at different geographical locations to learn a machine learning model collaboratively without sharing their data. While FL has recently emerged as a promising solution to preserve users' privacy, this new paradigm's potential security implications may hinde… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 113 publications
(48 citation statements)
references
References 66 publications
0
31
0
Order By: Relevance
“…FL [7][8][9][10][11][12][13] is a ML-based framework in which numerous clients cooperate to solve a ML problem, under the supervision and the coordination of a central server usually referred to as FL server. In other words, "it is a distributed ML strategy that generates a global model by learning from multiple decentralized edge clients.…”
Section: Basics Of Federated Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…FL [7][8][9][10][11][12][13] is a ML-based framework in which numerous clients cooperate to solve a ML problem, under the supervision and the coordination of a central server usually referred to as FL server. In other words, "it is a distributed ML strategy that generates a global model by learning from multiple decentralized edge clients.…”
Section: Basics Of Federated Learningmentioning
confidence: 99%
“…However, as secure as the FL seems, it by itself does not give the levels of privacy and security demanded by today's distributed systems requirements [9]. Beyond fundamental and FL-specific restrictions, the security of FL systems themselves are essential for developing networks where users can collaborate, learn, and most importantly trust.…”
Section: Introductionmentioning
confidence: 99%
“…Anomaly detection methods actively identify and stops malicious updates from affecting the system [44,9]. These methods may be also used in FL systems to identify potential threats [17]. One frequent technique for handling untargeted adversaries is to calculate a specific test error rate on updates and reject those disadvantageous or neutral to the global model [9].…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…(2) the vast majority does not include any experimental study [24,25,26,27,28], so it is not possible to compare the strength of the attacks and the robustness of the defences in a common evaluation framework; and (3) by default they only focus on horizontal FL ignoring vertical and federated transfer learning.…”
Section: Introductionmentioning
confidence: 99%