Federated multi-armed bandits under Byzantine attacks

buir.contributor.authorSaday, Artun
buir.contributor.authorDemirel, İlker
buir.contributor.authorTekin, Cem
buir.contributor.orcidDemirel, İlker|0000-0003-1035-8500
buir.contributor.orcidTekin, Cem|0000-0003-4361-4021
dc.citation.epage14
dc.citation.spage1
dc.contributor.authorSaday, Artun
dc.contributor.authorDemirel, İlker
dc.contributor.authorYıldırım, Yiğit
dc.contributor.authorTekin, Cem
dc.date.accessioned2025-02-21T12:58:11Z
dc.date.available2025-02-21T12:58:11Z
dc.date.issued2025
dc.departmentDepartment of Electrical and Electronics Engineering
dc.description.abstractMulti-armed bandits (MAB) is a sequential decision-making model in which the learner controls the trade-off between exploration and exploitation to maximize its cumulative reward. Federated multi-armed bandits (FMAB) is an emerging framework where a cohort of learners with heterogeneous local models play a MAB game and communicate their aggregated feedback to a server to learn a globally optimal arm. Two key hurdles in FMAB are communication-efficient learning and resilience to adversarial attacks. To address these issues, we study the FMAB problem in the presence of Byzantine clients who can send false model updates threatening the learning process. We analyze the sample complexity and the regret of β-optimal arm identification. We borrow tools from robust statistics and propose a median-of-means (MoM)-based online algorithm, Fed-MoM-UCB, to cope with Byzantine clients. In particular, we show that if the Byzantine clients constitute less than half of the cohort, the cumulative regret with respect to β-optimal arms is bounded over time with high probability, showcasing both communication efficiency and Byzantine resilience. We analyze the interplay between the algorithm parameters, a discernibility margin, regret, communication cost, and the arms’ suboptimality gaps. We demonstrate Fed-MoM-UCB’s effectiveness against the baselines in the presence of Byzantine attacks via experiments.
dc.description.provenanceSubmitted by İsmail Akdağ (ismail.akdag@bilkent.edu.tr) on 2025-02-21T12:58:11Z No. of bitstreams: 1 Federated_Multi-armed_Bandits_Under_Byzantine_Attacks.pdf: 2646795 bytes, checksum: 10352c3e0056bcbff32e1a7c31d6800b (MD5)en
dc.description.provenanceMade available in DSpace on 2025-02-21T12:58:11Z (GMT). No. of bitstreams: 1 Federated_Multi-armed_Bandits_Under_Byzantine_Attacks.pdf: 2646795 bytes, checksum: 10352c3e0056bcbff32e1a7c31d6800b (MD5) Previous issue date: 2025en
dc.identifier.doi10.1109/TAI.2024.3524954
dc.identifier.eissn2691-4581
dc.identifier.urihttps://hdl.handle.net/11693/116577
dc.language.isoEnglish
dc.publisherIEEE
dc.relation.isversionofhttps://dx.doi.org/10.1109/TAI.2024.3524954
dc.rightsCC BY-NC-ND (Attribution-NonCommercial-NoDerivs 4.0 International)
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/deed.en
dc.source.titleIEEE Transactions on Artificial Intelligence (
dc.subjectFederated learning
dc.subjectMulti-armed bandits
dc.subjectAdversarial learning
dc.subjectByzantine attacks
dc.titleFederated multi-armed bandits under Byzantine attacks
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Federated_Multi-armed_Bandits_Under_Byzantine_Attacks.pdf
Size:
2.52 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: