Probabilistic Byzantine Attack on Federated Learning

  • Tsung Hsuan Wang
  • , Po Ning Chen*
  • , Yu Chih Huang
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

In this paper, motivated by the severe effects of black-box evasion attacks on machine learning, we investigate the vulnerability of Byzantine attacks to federated learning (FL) systems. Existing studies predominantly evaluate their defense strategies using monotonous Byzantine attacks in the training stage, which fail to consider the public dataset’s characteristics. This oversight may undermine the confidence in Byzantine defense strategies. In this work, we investigate the issue from the perspective of a Byzantine attacker instead of focusing on mitigate Byzantine attacks as a system designer. Adopting a specific learning task as example, we examine it using an optimal probabilistic Byzantine attack policy, which we extend from the research scope introduced in [12]. Specifically, we determine the minimum Byzantine effort required to manipulate the sample distribution in the testing stage to given Byzantine sample distributions. Then, we derived the optimal and near-optimal Byzantine sample distributions subject to a fixed compromising effort. Additionally, a closed-form expression of optimal weights for FL is obtained, via which a connection between the optimal weights and those obtained from the FL training can be established. Through numerical experiments, we confirm the effectiveness of the proposed probabilistic Byzantine attack, which can serve as a good test to anti-attack defense strategies.

Original languageEnglish
Pages (from-to)1823-1838
Number of pages16
JournalIEEE Transactions on Signal Processing
Volume73
DOIs
StatePublished - 2025

Keywords

  • Byzantine attack
  • deep neural networks
  • distributed learning
  • federated learning.

Fingerprint

Dive into the research topics of 'Probabilistic Byzantine Attack on Federated Learning'. Together they form a unique fingerprint.

Cite this