Skip to main content

Research Repository

Advanced Search

A survey on vulnerability of federated learning: A learning algorithm perspective

Xie, Xianghua; Hu, Chen; Ren, Hanchi; Deng, Jingjing

A survey on vulnerability of federated learning: A learning algorithm perspective Thumbnail


Authors

Xianghua Xie

Chen Hu

Hanchi Ren



Abstract

Federated Learning (FL) has emerged as a powerful paradigm for training Machine Learning (ML), particularly Deep Learning (DL) models on multiple devices or servers while maintaining data localized at owners’ sites. Without centralizing data, FL holds promise for scenarios where data integrity, privacy and security and are critical. However, this decentralized training process also opens up new avenues for opponents to launch unique attacks, where it has been becoming an urgent need to understand the vulnerabilities and corresponding defense mechanisms from a learning algorithm perspective. This review paper takes a comprehensive look at malicious attacks against FL, categorizing them from new perspectives on attack origins and targets, and providing insights into their methodology and impact. In this survey, we focus on threat models targeting the learning process of FL systems. Based on the source and target of the attack, we categorize existing threat models into four types, Data to Model (D2M), Model to Data (M2D), Model to Model (M2M) and composite attacks. For each attack type, we discuss the defense strategies proposed, highlighting their effectiveness, assumptions and potential areas for improvement. Defense strategies have evolved from using a singular metric to excluding malicious clients, to employing a multifaceted approach examining client models at various phases. In this survey paper, our research indicates that the to-learn data, the learning gradients, and the learned model at different stages all can be manipulated to initiate malicious attacks that range from undermining model performance, reconstructing private local data, and to inserting backdoors. We have also seen these threat are becoming more insidious. While earlier studies typically amplified malicious gradients, recent endeavors subtly alter the least significant weights in local models to bypass defense measures. This literature review provides a holistic understanding of the current FL threat landscape and highlights the importance of developing robust, efficient, and privacy-preserving defenses to ensure the safe and trusted adoption of FL in real-world applications. The categorized bibliography can be found at: https://github.com/Rand2AI/Awesome-Vulnerability-of-Federated-Learning.

Citation

Xie, X., Hu, C., Ren, H., & Deng, J. (2024). A survey on vulnerability of federated learning: A learning algorithm perspective. Neurocomputing, 573, Article 127225. https://doi.org/10.1016/j.neucom.2023.127225

Journal Article Type Article
Acceptance Date Dec 30, 2023
Online Publication Date Jan 8, 2024
Publication Date Mar 7, 2024
Deposit Date Jan 9, 2024
Publicly Available Date Jan 9, 2024
Journal Neurocomputing
Print ISSN 0925-2312
Publisher Elsevier
Peer Reviewed Peer Reviewed
Volume 573
Article Number 127225
DOI https://doi.org/10.1016/j.neucom.2023.127225
Keywords Artificial Intelligence; Cognitive Neuroscience; Computer Science Applications
Public URL https://durham-repository.worktribe.com/output/2116959

Files




You might also like



Downloadable Citations