SABRE: Robust Bayesian Peer-to-Peer Federated Learning

08/04/2023
by   Nasimeh Heydaribeni, et al.
0

We introduce SABRE, a novel framework for robust variational Bayesian peer-to-peer federated learning. We analyze the robustness of the known variational Bayesian peer-to-peer federated learning framework (BayP2PFL) against poisoning attacks and subsequently show that BayP2PFL is not robust against those attacks. The new SABRE aggregation methodology is then devised to overcome the limitations of the existing frameworks. SABRE works well in non-IID settings, does not require the majority of the benign nodes over the compromised ones, and even outperforms the baseline algorithm in benign settings. We theoretically prove the robustness of our algorithm against data / model poisoning attacks in a decentralized linear regression setting. Proof-of-Concept evaluations on benchmark data from image classification demonstrate the superiority of SABRE over the existing frameworks under various poisoning attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/23/2023

Backdoor Attacks in Peer-to-Peer Federated Learning

We study backdoor attacks in peer-to-peer federated learning systems on ...
research
03/07/2023

Can Decentralized Learning be more robust than Federated Learning?

Decentralized Learning (DL) is a peer–to–peer learning approach that all...
research
01/18/2021

Detection of Insider Attacks in Distributed Projected Subgradient Algorithms

The gossip-based distributed algorithms are widely used to solve decentr...
research
12/16/2021

BitTorrent is Apt for Geophysical Data Collection and Distribution

This article covers a nouveau idea of how to collect and handle geophysi...
research
03/10/2023

Papaya: Federated Learning, but Fully Decentralized

Federated Learning systems use a centralized server to aggregate model u...
research
05/24/2019

Decentralized Bayesian Learning over Graphs

We propose a decentralized learning algorithm over a general social netw...
research
01/27/2022

On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies

Cryptocurrency systems can be subject to deanonymization attacks by expl...

Please sign up or login with your details

Forgot password? Click here to reset