Federated multi-armed bandits under Byzantine attacks
buir.contributor.author | Saday, Artun | |
buir.contributor.author | Demirel, İlker | |
buir.contributor.author | Tekin, Cem | |
buir.contributor.orcid | Demirel, İlker|0000-0003-1035-8500 | |
buir.contributor.orcid | Tekin, Cem|0000-0003-4361-4021 | |
dc.citation.epage | 14 | |
dc.citation.spage | 1 | |
dc.contributor.author | Saday, Artun | |
dc.contributor.author | Demirel, İlker | |
dc.contributor.author | Yıldırım, Yiğit | |
dc.contributor.author | Tekin, Cem | |
dc.date.accessioned | 2025-02-21T12:58:11Z | |
dc.date.available | 2025-02-21T12:58:11Z | |
dc.date.issued | 2025 | |
dc.department | Department of Electrical and Electronics Engineering | |
dc.description.abstract | Multi-armed bandits (MAB) is a sequential decision-making model in which the learner controls the trade-off between exploration and exploitation to maximize its cumulative reward. Federated multi-armed bandits (FMAB) is an emerging framework where a cohort of learners with heterogeneous local models play a MAB game and communicate their aggregated feedback to a server to learn a globally optimal arm. Two key hurdles in FMAB are communication-efficient learning and resilience to adversarial attacks. To address these issues, we study the FMAB problem in the presence of Byzantine clients who can send false model updates threatening the learning process. We analyze the sample complexity and the regret of β-optimal arm identification. We borrow tools from robust statistics and propose a median-of-means (MoM)-based online algorithm, Fed-MoM-UCB, to cope with Byzantine clients. In particular, we show that if the Byzantine clients constitute less than half of the cohort, the cumulative regret with respect to β-optimal arms is bounded over time with high probability, showcasing both communication efficiency and Byzantine resilience. We analyze the interplay between the algorithm parameters, a discernibility margin, regret, communication cost, and the arms’ suboptimality gaps. We demonstrate Fed-MoM-UCB’s effectiveness against the baselines in the presence of Byzantine attacks via experiments. | |
dc.description.provenance | Submitted by İsmail Akdağ (ismail.akdag@bilkent.edu.tr) on 2025-02-21T12:58:11Z No. of bitstreams: 1 Federated_Multi-armed_Bandits_Under_Byzantine_Attacks.pdf: 2646795 bytes, checksum: 10352c3e0056bcbff32e1a7c31d6800b (MD5) | en |
dc.description.provenance | Made available in DSpace on 2025-02-21T12:58:11Z (GMT). No. of bitstreams: 1 Federated_Multi-armed_Bandits_Under_Byzantine_Attacks.pdf: 2646795 bytes, checksum: 10352c3e0056bcbff32e1a7c31d6800b (MD5) Previous issue date: 2025 | en |
dc.identifier.doi | 10.1109/TAI.2024.3524954 | |
dc.identifier.eissn | 2691-4581 | |
dc.identifier.uri | https://hdl.handle.net/11693/116577 | |
dc.language.iso | English | |
dc.publisher | IEEE | |
dc.relation.isversionof | https://dx.doi.org/10.1109/TAI.2024.3524954 | |
dc.rights | CC BY-NC-ND (Attribution-NonCommercial-NoDerivs 4.0 International) | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/deed.en | |
dc.source.title | IEEE Transactions on Artificial Intelligence ( | |
dc.subject | Federated learning | |
dc.subject | Multi-armed bandits | |
dc.subject | Adversarial learning | |
dc.subject | Byzantine attacks | |
dc.title | Federated multi-armed bandits under Byzantine attacks | |
dc.type | Article |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Federated_Multi-armed_Bandits_Under_Byzantine_Attacks.pdf
- Size:
- 2.52 MB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: