Projects per year
Abstract
The identification of malicious users within a large set of participants poses a significant challenge in the domains of cybersecurity, data integrity, user management, and particularly within federated learning (FL) environments. FL, a distributed machine learning approach, necessitates rigorous mechanisms for safeguarding data integrity, model accuracy by effectively managing and identifying malicious participants. Traditional methods require the sequential removal and evaluation of users to determine their impact on the system's overall error rate or loss function, fall short in terms of efficiency and scalability, especially in FL contexts where data is distributed across multiple clients. To address these limitations, we propose the Refine and Identify Algorithm, a two-phased approach that efficiently narrows the search space for identifying malicious users by initially evaluating users in groups rather than individually and iteratively focusing on those groups with the highest potential for containing malicious users. A rigorous mathematical framework, including a proof of convergence and a detailed analysis of iteration necessities, underpins the algorithm's efficacy. The convergence proof and analysis of iteration requirements provide a solid mathematical foundation for the proposed method's effectiveness, paving the way for further optimization and application-specific tuning. Simulation results depict the efficiency of the proposed technique and show a significant reduction in computational resources and time required for identifying malicious users.
Original language | English |
---|---|
Title of host publication | 20th International Wireless Communications and Mobile Computing Conference, IWCMC 2024 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 1767-1772 |
Number of pages | 6 |
ISBN (Electronic) | 9798350361261 |
ISBN (Print) | 979-8-3503-6127-8 |
DOIs | |
Publication status | Published - 31 May 2024 |
Event | 20th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2024 - Hybrid, Ayia Napa, Cyprus Duration: 27 May 2024 → 31 May 2024 |
Publication series
Name | 20th International Wireless Communications and Mobile Computing Conference, IWCMC 2024 |
---|
Conference
Conference | 20th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2024 |
---|---|
Country/Territory | Cyprus |
City | Hybrid, Ayia Napa |
Period | 27/05/24 → 31/05/24 |
Keywords
- Byzantine attack
- FL
- computational complexity
- convergence analysis
- security
Fingerprint
Dive into the research topics of 'Refine and Identify: An Accelerated Iterative Algorithm for Securing Federated Learning'. Together they form a unique fingerprint.Projects
- 1 Finished
-
EX-QNRF-NPRPS-37: Secure Federated Edge Intelligence Framework for AI-driven 6G Applications
Abdallah, M. M. (Lead Principal Investigator), Al Fuqaha, A. (Principal Investigator), Hamood, M. (Graduate Student), Aboueleneen, N. (Graduate Student), Student-1, G. (Graduate Student), Student-2, G. (Graduate Student), Fellow-1, P. D. (Post Doctoral Fellow), Assistant-1, R. (Research Assistant), Mohamed, D. A. (Principal Investigator), Mahmoud, D. M. (Principal Investigator), Al-Dhahir, P. N. (Principal Investigator) & Khattab, P. T. (Principal Investigator)
19/04/21 → 30/08/24
Project: Applied Research