Attacking Distance-aware Attack: Semi-targeted Model Poisoning on Federated Learning
نویسندگان
چکیده
Existing model poisoning attacks on federated learning (FL) assume that an adversary has access to the full data distribution. In reality, usually limited prior knowledge about clients' data. A poorly chosen target class renders attack less effective. This work considers a semi-targeted situation where source is predetermined but not. The goal cause misclassification of global classifier from class. Approaches such as label flipping have been used inject malicious parameters into FL. Nevertheless, it shown their performances are class-sensitive, varying with different classes. Typically, becomes effective when shifting To overcome this challenge, we propose Attacking Distance-aware Attack (ADA) enhances in FL by finding optimized feature space. ADA deduces pair-wise attacking distances using Fast LAyer gradient MEthod (FLAME). Extensive evaluations were performed five benchmark image classification tasks and three architectures frequencies. Furthermore, ADA's robustness conventional defenses Byzantine-robust aggregation differential privacy was validated. results showed succeeded increasing performance 2.8 times most challenging case frequency 0.01 bypassed existing defenses, defense still could not reduce below 50%.
منابع مشابه
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Deep learning models have achieved high performance on many tasks, and thus have been applied to many security-critical scenarios. For example, deep learning-based face recognition systems have been used to authenticate users to access many security-sensitive applications like payment apps. Such usages of deep learning systems provide the adversaries with sufficient incentives to perform attack...
متن کاملAttacking AES Using Bernstein's Attack on Modern Processors
The Advanced Encryption Standard (AES) was selected by NIST due to its heavy resistance against classical cryptanalysis like differential and linear cryptanalysis. Even after the appearance of the modern side-channel attacks like timing and power consumption side-channel attacks, NIST claimed that AES is not vulnerable to timing attacks. In 2005, Bernstein [6] has successfully attacked the Open...
متن کاملSemi-Supervised Learning on Graphs through Reach and Distance Diffusion
Semi-supervised learning algorithms are an indispensable tool when labeled examples are scarce and there are many unlabeled examples [Blum and Chawla 2001, Zhu et. al. 2003]. With graph-based methods, entities (examples) correspond to nodes in a graph and edges correspond to related entities. The graph structure is used to infer implicit pairwise affinity values (kernel) which are used to compu...
متن کاملAttack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack
Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...
متن کاملTargeted Therapy: Attacking Cancer with Molecular and Immunological Targeted Agents
Today, personalized cancer therapy with targeted agents has taken center stage, and offers individualized treatment to many. As the mysteries of the genes in a cell's DNA and their specific proteins are defined, advances in the understanding of cancer gene mutations and how cancer evades the immune system have been made. This article provides a basic and simplified understanding of the availabl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE transactions on artificial intelligence
سال: 2023
ISSN: ['2691-4581']
DOI: https://doi.org/10.1109/tai.2023.3280155