File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TMC.2025.3547148
- Scopus: eid_2-s2.0-105000186591
- Find via

Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: Trust Online Over-the-Air Computation for Wireless Federated Learning
| Title | Trust Online Over-the-Air Computation for Wireless Federated Learning |
|---|---|
| Authors | |
| Issue Date | 1-Jan-2025 |
| Publisher | Institute of Electrical and Electronics Engineers |
| Citation | IEEE Transactions on Mobile Computing, 2025, v. 24, n. 8, p. 7152-7170 How to Cite? |
| Abstract | Using the wireless waveform superposition property, over-the-air computation (OAC) enables federated learning (FL) to achieve fast model aggregation. However, this computing paradigm is vulnerable to poisoning attacks due to the openness of a wireless channel over time, where malicious mobile devices can introduce cumulative errors for the global FL model in a time-varying wireless environment for each communication round. This article presents a trust online OAC (TO-OAC) scheme to minimize impacts on the global model introduced by malicious devices adjusting to dynamic attack and wireless channel fluctuations over time. TO-OAC achieves this by utilizing trustworthy security quantification of OAC for each FL training round. To optimize the cumulative training loss at the aggregation node with the long-term power and trust constraints of mobile devices, we propose a joint trust, power, and channel-aware algorithm to flexibly update local and global models in response to the dynamic changes in the wireless and secure environment. We analyze the performance limits for the aggregation of trust models, considering metrics for computation and communication through time. We then propose another trust online regularization over-the-air computation (TOR-OAC) as an improved version of the TO-OAC scheme to decrease convergence time while ensuring long-term trust and power limitation. Experimental results performed on real-life datasets show that the two proposed schemes (TO-OAC and TOR-OAC) outperform prior works, especially in noisy, time-varying wireless channels and malicious attacks. |
| Persistent Identifier | http://hdl.handle.net/10722/362009 |
| ISSN | 2023 Impact Factor: 7.7 2023 SCImago Journal Rankings: 2.755 |
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Sun, Mingjie | - |
| dc.contributor.author | Zheng, Jie | - |
| dc.contributor.author | Du, Hongyang | - |
| dc.contributor.author | Zhang, Haijun | - |
| dc.contributor.author | Niyato, Dusit | - |
| dc.contributor.author | Kang, Jiawen | - |
| dc.contributor.author | Wang, Jiacheng | - |
| dc.contributor.author | Ren, Jie | - |
| dc.contributor.author | Gao, Ling | - |
| dc.contributor.author | Wang, Zheng | - |
| dc.date.accessioned | 2025-09-18T00:36:18Z | - |
| dc.date.available | 2025-09-18T00:36:18Z | - |
| dc.date.issued | 2025-01-01 | - |
| dc.identifier.citation | IEEE Transactions on Mobile Computing, 2025, v. 24, n. 8, p. 7152-7170 | - |
| dc.identifier.issn | 1536-1233 | - |
| dc.identifier.uri | http://hdl.handle.net/10722/362009 | - |
| dc.description.abstract | Using the wireless waveform superposition property, over-the-air computation (OAC) enables federated learning (FL) to achieve fast model aggregation. However, this computing paradigm is vulnerable to poisoning attacks due to the openness of a wireless channel over time, where malicious mobile devices can introduce cumulative errors for the global FL model in a time-varying wireless environment for each communication round. This article presents a trust online OAC (TO-OAC) scheme to minimize impacts on the global model introduced by malicious devices adjusting to dynamic attack and wireless channel fluctuations over time. TO-OAC achieves this by utilizing trustworthy security quantification of OAC for each FL training round. To optimize the cumulative training loss at the aggregation node with the long-term power and trust constraints of mobile devices, we propose a joint trust, power, and channel-aware algorithm to flexibly update local and global models in response to the dynamic changes in the wireless and secure environment. We analyze the performance limits for the aggregation of trust models, considering metrics for computation and communication through time. We then propose another trust online regularization over-the-air computation (TOR-OAC) as an improved version of the TO-OAC scheme to decrease convergence time while ensuring long-term trust and power limitation. Experimental results performed on real-life datasets show that the two proposed schemes (TO-OAC and TOR-OAC) outperform prior works, especially in noisy, time-varying wireless channels and malicious attacks. | - |
| dc.language | eng | - |
| dc.publisher | Institute of Electrical and Electronics Engineers | - |
| dc.relation.ispartof | IEEE Transactions on Mobile Computing | - |
| dc.rights | This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. | - |
| dc.title | Trust Online Over-the-Air Computation for Wireless Federated Learning | - |
| dc.type | Article | - |
| dc.identifier.doi | 10.1109/TMC.2025.3547148 | - |
| dc.identifier.scopus | eid_2-s2.0-105000186591 | - |
| dc.identifier.volume | 24 | - |
| dc.identifier.issue | 8 | - |
| dc.identifier.spage | 7152 | - |
| dc.identifier.epage | 7170 | - |
| dc.identifier.eissn | 1558-0660 | - |
| dc.identifier.issnl | 1536-1233 | - |
