Survey on Federated Learning Threats: concepts, taxonomy on attacks and defences, experimental study and challenges
Identificadores
URI: https://hdl.handle.net/10481/78598Metadata
Show full item recordAuthor
Rodríguez Barroso, Nuria; Jiménez López, Daniel; Luzón García, María Victoria; Herrera Triguero, Francisco; Martínez Cámara, EugenioEditorial
Elsevier
Materia
Federated learning Adversarial attacks Privacy attacks Defences
Date
2022-01-20Referencia bibliográfica
Published version: Nuria Rodríguez-Barroso... [et al.]. Survey on federated learning threats: Concepts, taxonomy on attacks and defences, experimental study and challenges, Information Fusion, Volume 90, 2023, Pages 148-173, ISSN 1566-2535, [https://doi.org/10.1016/j.inffus.2022.09.011]
Sponsorship
R&D&I, Spain - MCIN/AEI PID2020-119478GB-I00 PID2020-116118GA-I00 EQC2018-005084-P; MCIN/AEI FPU18/04475Abstract
Federated learning is a machine learning paradigm that emerges as a solution to the
privacy-preservation demands in artificial intelligence. As machine learning, federated
learning is threatened by adversarial attacks against the integrity of the learning model
and the privacy of data via a distributed approach to tackle local and global learning.
This weak point is exacerbated by the inaccessibility of data in federated learning, which
makes harder the protection against adversarial attacks and evidences the need to furtherance
the research on defence methods to make federated learning a real solution for
safeguarding data privacy. In this paper, we present an extensive review of the threats
of federated learning, as well as as their corresponding countermeasures, attacks versus
defences. This survey provides a taxonomy of adversarial attacks and a taxonomy of defence
methods that depict a general picture of this vulnerability of federated learning and
how to overcome it. Likewise, we expound guidelines for selecting the most adequate
defence method according to the category of the adversarial attack. Besides, we carry
out an extensive experimental study from which we draw further conclusions about the
behaviour of attacks and defences and the guidelines for selecting the most adequate defence
method according to the category of the adversarial attack. This study is finished
leading to meditated learned lessons and challenges.