FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations
dc.contributor.author | Wang, Ning | en |
dc.contributor.author | Xiao, Yang | en |
dc.contributor.author | Chen, Yimin | en |
dc.contributor.author | Hu, Yang | en |
dc.contributor.author | Lou, Wenjing | en |
dc.contributor.author | Hou, Y. Thomas | en |
dc.date.accessioned | 2022-10-19T16:55:58Z | en |
dc.date.available | 2022-10-19T16:55:58Z | en |
dc.date.issued | 2022-05-30 | en |
dc.date.updated | 2022-10-19T15:08:06Z | en |
dc.description.abstract | Federated learning (FL) has been shown vulnerable to a new class of adversarial attacks, known as model poisoning attacks (MPA), where one or more malicious clients try to poison the global model by sending carefully crafted local model updates to the central parameter server. Existing defenses that have been fixated on analyzing model parameters show limited effectiveness in detecting such carefully crafted poisonous models. In this work, we propose FLARE, a robust model aggregation mechanism for FL, which is resilient against state-of-the-art MPAs. Instead of solely depending on model parameters, FLARE leverages the penultimate layer representations (PLRs) of the model for characterizing the adversarial influence on each local model update. PLRs demonstrate a better capability to differentiate malicious models from benign ones than model parameter-based solutions. We further propose a trust evaluation method that estimates a trust score for each model update based on pairwise PLR discrepancies among all model updates. Under the assumption that honest clients make up the majority, FLARE assigns a trust score to each model update in a way that those far from the benign cluster are assigned low scores. FLARE then aggregates the model updates weighted by their trust scores and finally updates the global model. Extensive experimental results demonstrate the effectiveness of FLARE in defending FL against various MPAs, including semantic backdoor attacks, trojan backdoor attacks, and untargeted attacks, and safeguarding the accuracy of FL. | en |
dc.description.version | Published version | en |
dc.format.mimetype | application/pdf | en |
dc.identifier.doi | https://doi.org/10.1145/3488932.3517395 | en |
dc.identifier.uri | http://hdl.handle.net/10919/112214 | en |
dc.language.iso | en | en |
dc.publisher | ACM | en |
dc.rights | Creative Commons Attribution 4.0 International | en |
dc.rights.holder | The author(s) | en |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | en |
dc.title | FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations | en |
dc.type | Article - Refereed | en |
dc.type.dcmitype | Text | en |