* External authors




Data Poisoning Attacks on Federated Machine Learning

Gan Sun*

Yang Cong*

Jiahua Dong*

Qiang Wang*

Lingjuan Lyu

Ji Liu*

* External authors

IEEE Internet of Things Journal



Federated machine learning which enables resource-constrained node devices (e.g., Internet of Things (IoT) devices, smartphones) to establish a knowledge-shared model while keeping the raw data local, could provide privacy preservation and economic benefit by designing an effective communication protocol. However, this communication protocol can be adopted by attackers to launch data poisoning attacks for different nodes, which has been shown as a big threat to most machine learning models. Therefore, we in this paper intend to study the model vulnerability of federated machine learning, and even on IoT systems. To be specific, we here attempt to attacking a popular federated multi-task learning framework, which uses a general multi-task learning framework to handle statistical challenges in federated learning setting. The problem of calculating optimal poisoning attacks on federated multi-task learning is formulated as a bilevel program, which is adaptive to arbitrary selection of target nodes and source attacking nodes. We then propose a novel systems-aware optimization method, called as ATTack on Federated Learning (ATFL), to efficiently derive the implicit gradients for poisoned data, and further attain optimal attack strategies in the federated machine learning. This is an earlier work, to our knowledge, that explores attacking federated machine learning via data poisoning. Finally, experiments on several real-world datasets demonstrate that when the attackers directly poison the target nodes or indirectly poison the related nodes via using the communication protocol, federated multi-task learning model is sensitive to both poisoning attacks.

Related Publications

FedMef: Towards Memory-efficient Federated Dynamic Pruning

CVPR, 2024
Hong Huang, Weiming Zhuang, Chen Chen, Lingjuan Lyu

Federated learning (FL) promotes decentralized training while prioritizing data confidentiality. However, its application on resource-constrained devices is challenging due to the high demand for computation and memory resources for training deep learning models. Neural netw…

DIAGNOSIS: Detecting Unauthorized Data Usages in Text-to-image Diffusion Models

ICLR, 2024
Zhenting Wang, Chen Chen, Lingjuan Lyu, Dimitris N. Metaxas*, Shiqing Ma*

Recent text-to-image diffusion models have shown surprising performance in generating high-quality images. However, concerns have arisen regarding the unauthorized data usage during the training or fine-tuning process. One example is when a model trainer collects a set of im…

FedWon: Triumphing Multi-domain Federated Learning Without Normalization

ICLR, 2024
Weiming Zhuang, Lingjuan Lyu

Federated learning (FL) enhances data privacy with collaborative in-situ training on decentralized clients. Nevertheless, FL encounters challenges due to non-independent and identically distributed (non-i.i.d) data, leading to potential performance degradation and hindered c…


Shape the Future of AI with Sony AI

We want to hear from those of you who have a strong desire
to shape the future of AI.