TY - JOUR
T1 - PerVK
T2 - A Robust Personalized Federated Framework to Defend Against Backdoor Attacks for IoT Applications
AU - Wang, Yongkang
AU - Zhai, Di Hua
AU - Xia, Yuanqing
AU - Liu, Danyang
N1 - Publisher Copyright:
© 2005-2012 IEEE.
PY - 2024/3/1
Y1 - 2024/3/1
N2 - Robustness and attacks have become prominent concerns in federated learning (FL)-based Internet of Things (IoT). Our focus primarily lies on robustness, as existing robust algorithms are limited by the data distribution and attacker quantity. Personalized FL has emerged as a paradigm to address data heterogeneity, providing personalized local models for participating clients. In this work, we aim to produce personalized models for clients and defend against backdoor attacks on IoT applications by harnessing personalized FL. We propose PerVK, a personalized FL framework that utilizes virtual learning, personalized learning, and knowledge distillation. PerVK effectively reduces data heterogeneity and overcomes the limitations imposed by the number of malicious clients and data distributions. Empirical experiments are conducted on CIFAR-10 and GTSRB datasets, considering various attack scenarios, as well as compared the performance of PerVK with state-of-the-art baselines. The experimental results demonstrate that PerVK successfully defends against backdoor attacks and outperforms existing baselines.
AB - Robustness and attacks have become prominent concerns in federated learning (FL)-based Internet of Things (IoT). Our focus primarily lies on robustness, as existing robust algorithms are limited by the data distribution and attacker quantity. Personalized FL has emerged as a paradigm to address data heterogeneity, providing personalized local models for participating clients. In this work, we aim to produce personalized models for clients and defend against backdoor attacks on IoT applications by harnessing personalized FL. We propose PerVK, a personalized FL framework that utilizes virtual learning, personalized learning, and knowledge distillation. PerVK effectively reduces data heterogeneity and overcomes the limitations imposed by the number of malicious clients and data distributions. Empirical experiments are conducted on CIFAR-10 and GTSRB datasets, considering various attack scenarios, as well as compared the performance of PerVK with state-of-the-art baselines. The experimental results demonstrate that PerVK successfully defends against backdoor attacks and outperforms existing baselines.
KW - Backdoor attack
KW - defense
KW - federated learning (FL)
KW - knowledge distillation (KD)
KW - personalized learning
KW - virtual learning
UR - http://www.scopus.com/inward/record.url?scp=85178015315&partnerID=8YFLogxK
U2 - 10.1109/TII.2023.3329688
DO - 10.1109/TII.2023.3329688
M3 - Article
AN - SCOPUS:85178015315
SN - 1551-3203
VL - 20
SP - 4930
EP - 4939
JO - IEEE Transactions on Industrial Informatics
JF - IEEE Transactions on Industrial Informatics
IS - 3
ER -