Nothing Wasted: Full Contribution Enforcement in Federated Edge Learning

نویسندگان

چکیده

The explosive amount of data generated at the network edge makes mobile computing an essential technology to support real-time applications, calling for powerful processing and analysis provided by machine learning (ML) techniques. In particular, federated (FEL) becomes prominent in securing privacy owners keeping locally used train ML models. Existing studies on FEL either utilize in-process optimization or remove unqualified participants advance. this paper, we enhance collaboration from all devices guarantee that model is trained using available local accelerate process. To aim, propose a collective extortion (CE) strategy under imperfect-information multi-player game, which proved be effective helping server efficiently elicit full contribution without worrying about suffering any economic loss. Technically, our proposed CE extends classical controlling proportionate share expected utilities single opponent swiftly homogeneous control over group players, further presents attractive trait being impartial participants. Moreover, enriches game theory hierarchy, facilitating wider application scope strategy. Both theoretical experimental evaluations validate effectiveness fairness scheme.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Enforcement in the DOK Federated Database System

The Distributed Object Kernel (DOK) is a federated database system currently under development at the Royal Melbourne Institute of Technology. One of the issues currently under study is the development of a federated access control, as well a secure logical architecture allowing the DOK system to enforce federated security policies in the context of autonomous, distributed and heterogeneous dat...

متن کامل

Federated Access Control and Workflow Enforcement in Systems Configuration

Every organization with more than a few system administrators has policies in place. These policies define who is allowed to change what aspects of the configuration of a computer infrastructure. Althoughmany system configuration tools are available for automating configuration changes in an infrastructure, very little work has been done to enforce the policies dealing with access control and w...

متن کامل

Federated Multi-Task Learning

Federated learning poses new statistical and systems challenges in training machinelearning models over distributed networks of devices. In this work, we show thatmulti-task learning is naturally suited to handle the statistical challenges of thissetting, and propose a novel systems-aware optimization method, MOCHA, that isrobust to practical systems issues. Our method and theor...

متن کامل

Entity Resolution and Federated Learning get a Federated Resolution

Consider two data providers, each maintaining records of different feature sets about common entities. They aim to learn a linear model over the whole set of features. This problem of federated learning over vertically partitioned data includes a crucial upstream issue: entity resolution, i.e. finding the correspondence between the rows of the datasets. It is well known that entity resolution, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Mobile Computing

سال: 2023

ISSN: ['2161-9875', '1536-1233', '1558-0660']

DOI: https://doi.org/10.1109/tmc.2021.3123195