Skip to main content

Showing 1–3 of 3 results for author: Ebron, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.04409  [pdf, other

    cs.LG cs.AI cs.CR cs.DC

    Towards Fair, Robust and Efficient Client Contribution Evaluation in Federated Learning

    Authors: Meiying Zhang, Huan Zhao, Sheldon Ebron, Kan Yang

    Abstract: The performance of clients in Federated Learning (FL) can vary due to various reasons. Assessing the contributions of each client is crucial for client selection and compensation. It is challenging because clients often have non-independent and identically distributed (non-iid) data, leading to potentially noisy or divergent updates. The risk of malicious clients amplifies the challenge especially… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

  2. arXiv:2312.14941  [pdf, other

    cs.DC cs.LG

    Multi-Criteria Client Selection and Scheduling with Fairness Guarantee for Federated Learning Service

    Authors: Meiying Zhang, Huan Zhao, Sheldon Ebron, Ruitao Xie, Kan Yang

    Abstract: Federated Learning (FL) enables multiple clients to train machine learning models collaboratively without sharing the raw training data. However, for a given FL task, how to select a group of appropriate clients fairly becomes a challenging problem due to budget restrictions and client heterogeneity. In this paper, we propose a multi-criteria client selection and scheduling scheme with a fairness… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

  3. arXiv:2311.10248  [pdf, other

    cs.LG cs.AI cs.CR cs.DC

    Identifying the Truth of Global Model: A Generic Solution to Defend Against Byzantine and Backdoor Attacks in Federated Learning (full version)

    Authors: Sheldon C. Ebron, Meiying Zhang, Kan Yang

    Abstract: Federated Learning (FL) enables multiple parties to train machine learning models collaboratively without sharing the raw training data. However, the federated nature of FL enables malicious clients to influence a trained model by injecting error model updates via Byzantine or backdoor attacks. To detect malicious model updates, a typical approach is to measure the distance between each model upda… ▽ More

    Submitted 10 March, 2025; v1 submitted 16 November, 2023; originally announced November 2023.

    Comments: Accepted to ACISP 2025. This is the full version