4.7 Article

When Federated Learning Meets Blockchain: A New Distributed Learning Paradigm

Journal

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE
Volume 17, Issue 3, Pages 26-33

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MCI.2022.3180932

Keywords

-

Funding

  1. National Natural Science Foundation of China [62002170, 61872184]
  2. Fundamental Research Funds for the Central Universities [30919011274]
  3. Natural Science Foundation of Jiangsu Province [BK20210331]
  4. Jiangsu Specially-Appointed Professor Program in 2021
  5. Natural Science Fund of Guangdong Province [2020A1515010708]
  6. Natural Science Fund of Shenzhen [JCYJ20210324094609027]
  7. U.S. National Science Foundation [ECCS-2039716, CNS-2107216, CNS-2128368]

Ask authors/readers for more resources

Motivated by end-user computing capabilities and privacy concerns, a blockchain-assisted decentralized FL framework is proposed to address the single point of failure in conventional FL frameworks and prevent malicious clients. The framework integrates model aggregation and blockchain mining tasks, and explores privacy and resource allocation issues. A critical issue, lazy clients, is also identified and solutions involving local differential privacy and pseudo-noise sequences are discussed.
Motivated by the increasingly powerful computing capabilities of end-user equipment, and by the growing privacy concerns over sharing sensitive raw data, a distributed machine learning paradigm known as federated learning (FL) has emerged. By training models locally at each client and aggregating learning models at a central server, FL has the capability to avoid sharing data directly, thereby reducing privacy leakage. However, the conventional FL framework relies heavily on a single central server, and it may fail if such a server behaves maliciously. To address this single point of failure, in this work, a blockchain-assisted decentralized FL framework is investigated, which can prevent malicious clients from poisoning the learning process, and thus provides a self-motivated and reliable learning environment for clients. In this framework, the model aggregation process is fully decentralized and the tasks of training for FL and mining for blockchain are integrated into each participant. Privacy and resource-allocation issues are further investigated in the proposed framework, and a critical and unique issue inherent in the proposed framework is disclosed. In particular, a lazy client can simply duplicate models shared by other clients to reap benefits without contributing its resources to FL. To address these issues, analytical and experimental results are provided to shed light on possible solutions, i.e., adding noise to achieve local differential privacy and using pseudo-noise (PN) sequences as watermarks to detect lazy clients.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Management

A novel multiple objective whale optimization for time-cost-quality tradeoff in non-unit repetitive projects

Dang-Trinh Nguyen, Dinh-Thien-Vuong Doan, Nguyen-Ngoc Cuong Tran, Duc-Hoc Tran

Summary: Project managers aim to complete projects with the shortest time, lowest cost, and highest quality. This study proposes a free-parameter multiple objective optimization method to tradeoff time, cost, and quality in non-unit repetitive projects.

INTERNATIONAL JOURNAL OF CONSTRUCTION MANAGEMENT (2023)

Article Computer Science, Information Systems

Blockchain-Aided Edge Computing Market: Smart Contract and Consensus Mechanisms

Yu Du, Zhe Wang, Jun Li, Long Shi, Dushantha Nalin K. Jayakody, Quan Chen, Wen Chen, Zhu Han

Summary: In this study, a blockchain-aided distributed edge computing market is proposed, which provides decentralized and verified transaction management. A trustworthiness model is introduced to evaluate the quality of each network entity and a two-level trading mechanism over smart contract is developed for efficient transactions. Additionally, a trustworthiness-driven Proof-of-Stake (PoS) consensus mechanism is put forth to enable verified transactions and fair allocation of block generation reward.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Engineering, Electrical & Electronic

Throughput Maximization for UAV-Enabled Integrated Periodic Sensing and Communication

Kaitao Meng, Qingqing Wu, Shaodan Ma, Wen Chen, Kunlun Wang, Jun Li

Summary: Driven by UAV's advantages, the existing ISAC system is expected to be revolutionized, but the focus on exploring both functionalities at the same time may ignore practical requirements. Therefore, we propose a new IPSAC mechanism to provide a more flexible trade-off between sensing and communication. By optimizing the UAV trajectory, user association, target sensing selection, and transmit beamforming, while meeting the requirements, we maximize the system achievable rate. Our proposed designs are validated to be effective and unveil a more flexible trade-off over benchmark schemes.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2023)

Article Computer Science, Information Systems

Antenna Coding and Rate Optimization for Covert Wireless Communications

Yuwen Qian, Wei Li, Yan Lin, Long Shi, Xiangwei Zhou, Jun Li, Feng Shu

Summary: This article proposes a wireless covert communication system where transmit antennas are selected and coded to generate a covert codebook. Covert quadrature amplitude modulation (QAM) and precoding methods are used to modulate and deviate the constellations of covert messages. Optimization techniques are applied to maximize the covert data rate and reduce information leakage.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Engineering, Multidisciplinary

Dynamic Optimization of Random Access in Deadline-Constrained Broadcasting

Aoyu Gong, Yijin Zhang, Lei Deng, Fang Liu, Jun Li, Feng Shu

Summary: This paper addresses the dynamic optimization problem of random access in deadline-constrained broadcasting with frame-synchronized traffic. It proposes a dynamic control scheme that allows each active node to determine the transmission probability based on local knowledge. The study develops both a Markov Decision Process (MDP) framework and a Partially Observable MDP (POMDP) framework to obtain optimal or near-optimal schemes in different scenarios. Numerical results validate the proposed approaches.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Physics, Multidisciplinary

Channel Modeling and Quantization Design for 3D NAND Flash Memory

Cheng Wang, Zhen Mei, Jun Li, Feng Shu, Xuan He, Lingjun Kong

Summary: In this paper, the channel probability density function of 3D NAND flash memory is derived for the first time, considering major sources of errors. The mutual information (MI) is used as a metric to design the quantization, and a dynamic programming algorithm is proposed to jointly optimize read-voltage thresholds for all layers by maximizing the MI (MMI). Furthermore, an MI derivative (MID)-based method is developed to obtain read-voltage thresholds for hard-decision decoding (HDD) of error correction codes (ECCs), reducing complexity.

ENTROPY (2023)

Article Telecommunications

Quadrature Spatial Scattering Modulation for mmWave Transmission

Xusheng Zhu, Wen Chen, Zhendong Li, Qingqing Wu, Jun Li

Summary: In this study, a novel quadrature spatial scattering modulation (QSSM) transmission technique based on millimeter wave systems is investigated. The transmitter generates two orthogonal beams to target candidate scatterers in the channel and carry the real and imaginary parts of the conventional signal. The maximum likelihood (ML) detector is used at the receiver to recover the received beams and signals. The closed-form average bit error probability (ABEP) expression and asymptotic ABEP expression of the QSSM scheme are derived and verified through Monte Carlo simulations, demonstrating its improved performance compared to traditional spatial scattering modulation.

IEEE COMMUNICATIONS LETTERS (2023)

Article Telecommunications

Energy efficiency analysis and optimization for reconfigurable intelligent surface aided DF relay cooperation with minimum-rate guarantee

Shunwai Zhang, Lulu Song, Jun Li, Tho Le-Ngoc

Summary: This paper investigates an energy-efficient decode-and-forward relay cooperation scheme aided by a reconfigurable intelligent surface (RIS) with minimum-rate guarantee. The RIS plays a similar role to traditional relays but has complementary characteristics. Upper bounds on the energy efficiency (EE) are derived for the scheme over Rayleigh fading channels with given transmit powers. The paper addresses the EE optimization problem with minimum-rate guarantee in two scenarios: fixed power and upper-bounded power. Convex optimization techniques are used to solve the equivalent optimal power allocation problem in the fixed power scenario, while fractional programming and generalized Dinkelbach's algorithm are proposed for solving the non-convex EE optimization problem in the upper-bounded power scenario. Simulation results demonstrate the advantages of the considered scheme over benchmark schemes and its robustness against imperfect CSI and discrete phase shifts of RIS.

TELECOMMUNICATION SYSTEMS (2023)

Article Computer Science, Information Systems

Robust Sum-Rate Maximization in Transmissive RMS Transceiver-Enabled SWIPT Networks

Zhendong Li, Wen Chen, Ziheng Zhang, Qingqing Wu, Huanqing Cao, Jun Li

Summary: In this article, a state-of-the-art downlink communication transceiver design is proposed for transmissive reconfigurable metasurface (RMS)-enabled simultaneous wireless information and power transfer (SWIPT) networks. The design includes a feed antenna for beamforming and builds spatial propagation models for plane and spherical waves. A robust system sum-rate maximization problem is formulated considering imperfect channel state information (CSI), and the nonconvex optimization problem is solved using an alternating optimization (AO) framework with successive convex approximation (SCA), penalty function method, and difference-of-convex (DC) programming. Numerical results show the proposed algorithm has convergence and outperforms other benchmark algorithms.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Engineering, Electrical & Electronic

Semi-Data-Aided Channel Estimation for MIMO Systems via Reinforcement Learning

Tae-Kyoung Kim, Yo-Seb Jeon, Jun Li, Nima Tavangaran, H. Vincent Poor

Summary: This paper proposes a semi-data-aided channel estimator that improves channel estimation accuracy by utilizing data symbols as pilot signals. The method leverages reinforcement learning to select reliable detected symbols and updates the channel estimate using the selected symbols as additional pilot signals. It defines a Markov decision process (MDP) to determine whether to use each detected symbol and develops a RL algorithm based on Monte Carlo tree search to find an effective policy. The proposed channel estimator requires less computational complexity compared to conventional iterative data-aided channel estimators and effectively mitigates channel estimation error and detection performance loss caused by insufficient pilot signals.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2023)

Proceedings Paper Computer Science, Artificial Intelligence

Proactive Deepfake Defence via Identity Watermarking

Yuan Zhao, Bo Liu, Ming Ding, Baoping Liu, Tianqing Zhu, Xin Yu

Summary: The explosive progress of Deepfake techniques poses unprecedented privacy and security risks to our society by creating real-looking but fake visual content. The current Deepfake detection studies are still in their infancy because they mainly rely on capturing artifacts left by a Deepfake synthesis process as detection clues, which can be easily removed by various distortions (e.g. blurring) or advanced Deepfake techniques.

2023 IEEE/CVF WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV) (2023)

Proceedings Paper Computer Science, Artificial Intelligence

TI2Net: Temporal Identity Inconsistency Network for Deepfake Detection

Baoping Liu, Bo Liu, Ming Ding, Tianqing Zhu, Xin Yu

Summary: In this paper, the Temporal Identity Inconsistency Network (TI(2)Net) is proposed as a Deepfake detector that focuses on temporal identity inconsistency. It recognizes fake videos by capturing the dissimilarities of human faces among video frames of the same identity. TI(2)Net is a reference-agnostic detector and can be used on unseen datasets.

2023 IEEE/CVF WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV) (2023)

Proceedings Paper Computer Science, Software Engineering

A Selection Model of Privacy Patterns

Su Yen Chia, Xiwei Xu, Ming Ding, David Smith, Hye-Young Paik, Liming Zhu

Summary: Privacy is a crucial consideration in software systems, and it should be taken into account from the early stages of design to prevent unintended information leakage. Researchers and industry practitioners have explored privacy patterns to address various privacy issues. These patterns serve as reusable design solutions but also pose a challenge in choosing the appropriate ones.

2023 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE, ICSA (2023)

Article Computer Science, Theory & Methods

Amplitude-Varying Perturbation for Balancing Privacy and Utility in Federated Learning

Xin Yuan, Wei Ni, Ming Ding, Kang Wei, Jun Li, H. Vincent Poor

Summary: This paper proposes a new differential privacy perturbation mechanism with a time-varying noise amplitude to protect the privacy of federated learning and retain the capability of adjusting the learning performance. Extensive experiments confirm the contribution of this mechanism to the convergence and accuracy of privacy-preserving federated learning compared to the state-of-the-art Gaussian noise mechanism with a persistent noise amplitude.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Engineering, Electrical & Electronic

Decentralized Federated Reinforcement Learning for User-Centric Dynamic TFDD Control

Ziyan Yin, Zhe Wang, Jun Li, Ming Ding, Wen Chen, Shi Jin

Summary: To address the challenges posed by dynamic and heterogeneous data traffic in 5G and beyond mobile networks, we proposed a learning-based dynamic time-frequency division duplexing (D-TFDD) scheme. By formulating the problem as a decentralized partially observable Markov decision process (Dec-POMDP), we optimized the uplink and downlink time-frequency resource allocation of base stations (BSs) to meet the asymmetric and heterogeneous traffic demands while reducing inter-cell interference. The proposed federated reinforcement learning (RL) algorithm, FWDDPG, enables decentralized global optimization of resource allocation through the exchange of local RL models among neighboring BSs within a federated learning framework. Simulation results demonstrate the superiority of our algorithm in terms of system sum rate compared to benchmark algorithms.

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2023)

No Data Available