File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Trust Online Over-the-Air Computation for Wireless Federated Learning

TitleTrust Online Over-the-Air Computation for Wireless Federated Learning
Authors
Issue Date1-Jan-2025
PublisherInstitute of Electrical and Electronics Engineers
Citation
IEEE Transactions on Mobile Computing, 2025, v. 24, n. 8, p. 7152-7170 How to Cite?
AbstractUsing the wireless waveform superposition property, over-the-air computation (OAC) enables federated learning (FL) to achieve fast model aggregation. However, this computing paradigm is vulnerable to poisoning attacks due to the openness of a wireless channel over time, where malicious mobile devices can introduce cumulative errors for the global FL model in a time-varying wireless environment for each communication round. This article presents a trust online OAC (TO-OAC) scheme to minimize impacts on the global model introduced by malicious devices adjusting to dynamic attack and wireless channel fluctuations over time. TO-OAC achieves this by utilizing trustworthy security quantification of OAC for each FL training round. To optimize the cumulative training loss at the aggregation node with the long-term power and trust constraints of mobile devices, we propose a joint trust, power, and channel-aware algorithm to flexibly update local and global models in response to the dynamic changes in the wireless and secure environment. We analyze the performance limits for the aggregation of trust models, considering metrics for computation and communication through time. We then propose another trust online regularization over-the-air computation (TOR-OAC) as an improved version of the TO-OAC scheme to decrease convergence time while ensuring long-term trust and power limitation. Experimental results performed on real-life datasets show that the two proposed schemes (TO-OAC and TOR-OAC) outperform prior works, especially in noisy, time-varying wireless channels and malicious attacks.
Persistent Identifierhttp://hdl.handle.net/10722/362009
ISSN
2023 Impact Factor: 7.7
2023 SCImago Journal Rankings: 2.755

 

DC FieldValueLanguage
dc.contributor.authorSun, Mingjie-
dc.contributor.authorZheng, Jie-
dc.contributor.authorDu, Hongyang-
dc.contributor.authorZhang, Haijun-
dc.contributor.authorNiyato, Dusit-
dc.contributor.authorKang, Jiawen-
dc.contributor.authorWang, Jiacheng-
dc.contributor.authorRen, Jie-
dc.contributor.authorGao, Ling-
dc.contributor.authorWang, Zheng-
dc.date.accessioned2025-09-18T00:36:18Z-
dc.date.available2025-09-18T00:36:18Z-
dc.date.issued2025-01-01-
dc.identifier.citationIEEE Transactions on Mobile Computing, 2025, v. 24, n. 8, p. 7152-7170-
dc.identifier.issn1536-1233-
dc.identifier.urihttp://hdl.handle.net/10722/362009-
dc.description.abstractUsing the wireless waveform superposition property, over-the-air computation (OAC) enables federated learning (FL) to achieve fast model aggregation. However, this computing paradigm is vulnerable to poisoning attacks due to the openness of a wireless channel over time, where malicious mobile devices can introduce cumulative errors for the global FL model in a time-varying wireless environment for each communication round. This article presents a trust online OAC (TO-OAC) scheme to minimize impacts on the global model introduced by malicious devices adjusting to dynamic attack and wireless channel fluctuations over time. TO-OAC achieves this by utilizing trustworthy security quantification of OAC for each FL training round. To optimize the cumulative training loss at the aggregation node with the long-term power and trust constraints of mobile devices, we propose a joint trust, power, and channel-aware algorithm to flexibly update local and global models in response to the dynamic changes in the wireless and secure environment. We analyze the performance limits for the aggregation of trust models, considering metrics for computation and communication through time. We then propose another trust online regularization over-the-air computation (TOR-OAC) as an improved version of the TO-OAC scheme to decrease convergence time while ensuring long-term trust and power limitation. Experimental results performed on real-life datasets show that the two proposed schemes (TO-OAC and TOR-OAC) outperform prior works, especially in noisy, time-varying wireless channels and malicious attacks.-
dc.languageeng-
dc.publisherInstitute of Electrical and Electronics Engineers-
dc.relation.ispartofIEEE Transactions on Mobile Computing-
dc.rightsThis work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.-
dc.titleTrust Online Over-the-Air Computation for Wireless Federated Learning-
dc.typeArticle-
dc.identifier.doi10.1109/TMC.2025.3547148-
dc.identifier.scopuseid_2-s2.0-105000186591-
dc.identifier.volume24-
dc.identifier.issue8-
dc.identifier.spage7152-
dc.identifier.epage7170-
dc.identifier.eissn1558-0660-
dc.identifier.issnl1536-1233-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats