CN115577360A - A Gradient-Independent Clustering Federated Learning Method and System - Google Patents
A Gradient-Independent Clustering Federated Learning Method and System Download PDFInfo
- Publication number
- CN115577360A CN115577360A CN202211422140.9A CN202211422140A CN115577360A CN 115577360 A CN115577360 A CN 115577360A CN 202211422140 A CN202211422140 A CN 202211422140A CN 115577360 A CN115577360 A CN 115577360A
- Authority
- CN
- China
- Prior art keywords
- client
- cluster
- malicious
- clients
- clustering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 78
- 238000009826 distribution Methods 0.000 claims abstract description 75
- 238000012795 verification Methods 0.000 claims abstract description 27
- 238000012549 training Methods 0.000 claims abstract description 26
- 239000013598 vector Substances 0.000 claims abstract description 20
- 239000011159 matrix material Substances 0.000 claims abstract description 18
- 238000004590 computer program Methods 0.000 claims description 13
- 230000006870 function Effects 0.000 claims description 13
- 238000003860 storage Methods 0.000 claims description 8
- 238000004364 calculation method Methods 0.000 claims description 7
- 230000015654 memory Effects 0.000 claims description 5
- 238000004422 calculation algorithm Methods 0.000 claims description 4
- 230000004931 aggregating effect Effects 0.000 claims description 2
- 125000004432 carbon atom Chemical group C* 0.000 claims 1
- 230000009191 jumping Effects 0.000 claims 1
- 238000010200 validation analysis Methods 0.000 claims 1
- 230000008569 process Effects 0.000 abstract description 13
- 230000002708 enhancing effect Effects 0.000 abstract 1
- 238000012360 testing method Methods 0.000 description 25
- 238000001514 detection method Methods 0.000 description 14
- 238000010586 diagram Methods 0.000 description 8
- 238000004088 simulation Methods 0.000 description 8
- 238000004138 cluster model Methods 0.000 description 5
- 238000011423 initialization method Methods 0.000 description 5
- 230000003247 decreasing effect Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000011161 development Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 208000019622 heart disease Diseases 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 210000003734 kidney Anatomy 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000002574 poison Substances 0.000 description 1
- 231100000614 poison Toxicity 0.000 description 1
- 231100000572 poisoning Toxicity 0.000 description 1
- 230000000607 poisoning effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000010998 test method Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/16—Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Mathematical Analysis (AREA)
- Computer Hardware Design (AREA)
- Computational Mathematics (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Virology (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Algebra (AREA)
- Databases & Information Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
技术领域technical field
本发明涉及人工智能的聚类联邦学习技术领域,具体涉及一种不依赖梯度的聚类联邦学习方法及系统。The invention relates to the technical field of clustering federated learning of artificial intelligence, in particular to a gradient-independent clustering federated learning method and system.
背景技术Background technique
虽然随着信息化的发展,信息越来越丰富,但是信息本质上是以孤岛的形式存在的,因为他们高度敏感。一个很典型的应用领域为医疗领域。医疗行业的数据十分敏感,因为可能涉及病人的重要隐私,这些数据通常由不同的医院保留。而各个医院拥有的数据的侧重点可能是不同的(比如有的医院擅长治疗心脏病,有的医院擅长治疗肾脏等),即存在数据非独立同分布问题。近年来,联邦学习在解决模型训练和数据隐私保护之间的冲突方面引起了人们的关注。而传统的联邦学习并不能很好地解决各客户端之间数据的非独立同分布问题。针对上述问题,现有技术提出了聚类联邦学习,使用梯度来衡量客户端之间数据分布的相似性,并为其分簇,以解决非独立同分布问题。但是,最近的研究表明,客户的隐私信息甚至原始训练数据都可以通过梯度来恢复,且梯度维度往往会随着模型复杂性的增加而爆炸。同时,现有的聚类联邦学习方案无法将具有多样性数据的客户端分组到多个簇中,导致无法充分利用一些客户拥有的多样性数据。此外,与联邦学习相比,聚类联邦学习中的簇结构为恶意客户端提供了合谋聚集在一个簇中并通过在本地发起模型中毒攻击来毒化聚合的簇模型的机会,从而导致模型训练失败。因此,如何在聚类联邦学习中保护客户端的隐私,充分利用客户端数据的多样性和可用性,将对行业的发展有着至关重要的影响。与此同时,如何提高对恶意模型的检测效率,降低检测开销,提高训练过程中的安全性也是需要解决的重要问题。Although with the development of informatization, information is becoming more and more abundant, but information essentially exists in the form of isolated islands because they are highly sensitive. A very typical application field is the medical field. Data in the medical industry is very sensitive because it may involve important privacy of patients, and these data are usually kept by different hospitals. The focus of the data owned by each hospital may be different (for example, some hospitals are good at treating heart disease, and some hospitals are good at treating kidney, etc.), that is, there is a problem of non-independent and identical distribution of data. In recent years, federated learning has attracted attention in resolving the conflict between model training and data privacy protection. However, traditional federated learning cannot well solve the problem of non-independent and identical distribution of data between clients. In response to the above problems, the prior art proposes clustering federated learning, which uses gradients to measure the similarity of data distribution between clients and clusters them to solve the non-IID problem. However, recent studies have shown that customers' private information and even original training data can be recovered through gradients, and the gradient dimension tends to explode with the increase of model complexity. At the same time, existing clustering federated learning schemes cannot group clients with diverse data into multiple clusters, resulting in the inability to fully utilize the diverse data owned by some clients. Moreover, compared with federated learning, the cluster structure in clustering federated learning provides opportunities for malicious clients to conspire to gather in a cluster and poison the aggregated cluster models by initiating model poisoning attacks locally, resulting in failure of model training. . Therefore, how to protect the privacy of clients in clustering federated learning and make full use of the diversity and availability of client data will have a crucial impact on the development of the industry. At the same time, how to improve the detection efficiency of malicious models, reduce the detection overhead, and improve the security of the training process are also important issues that need to be solved.
发明内容Contents of the invention
本发明要解决的技术问题:针对现有技术的上述问题,提供一种不依赖梯度的聚类联邦学习方法及系统,本发明中服务器不需要依靠客户端的梯度信息进行聚类而是根据客户端的数据分布之间的交集相似度来进行聚类,避免了客户端的梯度信息泄露问题,保护了客户端的梯度安全,增强了聚类联邦学习过程中的安全性、可靠性、并且提高了训练精度。The technical problem to be solved by the present invention is to provide a gradient-independent clustering federated learning method and system for the above-mentioned problems in the prior art. In the present invention, the server does not need to rely on the gradient information of the client for clustering but according The intersection similarity between data distributions is used for clustering, which avoids the gradient information leakage problem of the client, protects the gradient security of the client, enhances the security and reliability of the clustering federated learning process, and improves the training accuracy.
为了解决上述技术问题,本发明采用的技术方案为:In order to solve the problems of the technologies described above, the technical solution adopted in the present invention is:
一种不依赖梯度的聚类联邦学习方法,包括:A clustering federated learning method that does not rely on gradients, including:
S1,客户端分别计算自己的标签样本的数据分布信息,获得自己与其他客户端的数据分布信息之间的交集相似度并构造交集相似度向量;S1, the client calculates the data distribution information of its own label samples separately, obtains the intersection similarity between the data distribution information of itself and other clients, and constructs an intersection similarity vector;
S2,服务器收集各个客户端的交集相似度向量并构建相似度矩阵;S2, the server collects the intersection similarity vectors of each client and constructs a similarity matrix;
S3,服务器基于相似度矩阵使用保证多样性的聚类方法对客户端进行聚类,并执行模型训练步骤,且在服务器检测到模型的精度下降时,跳转下一步;S3, the server clusters the clients based on the similarity matrix using a clustering method that guarantees diversity, and executes the model training step, and jumps to the next step when the server detects that the accuracy of the model has decreased;
S4,服务器检测恶意簇,且在确定恶意簇后,选择拥有与恶意簇中的客户端最相似数据分布、且不在恶意簇中的客户端来组成验证委员会;S4, the server detects the malicious cluster, and after determining the malicious cluster, selects the client that has the most similar data distribution to the client in the malicious cluster and is not in the malicious cluster to form a verification committee;
S6,利用验证委员会的成员为恶意簇中成员的模型进行验证并投票决定为良性模型和恶意模型,将恶意模型排除、保留良性模型。S6, use the members of the verification committee to verify the models of the members in the malicious cluster and vote for benign models and malicious models, exclude the malicious models and keep the benign models.
可选地,步骤S1中客户端分别计算自己的标签样本的数据分布信息的函数表达式为:Optionally, in step S1, the function expression for the client to calculate the data distribution information of its own label samples is:
上式中,以及分别表示第1、2以及第i个客户端的单一标签的数据分布信息,且有任意第i个客户端的单一标签的数据分布信息的计算函数表达式为:In the above formula, as well as Represent the data distribution information of the single label of the 1st, 2nd and i-th clients respectively, and the calculation function expression of the data distribution information of a single label of any i-th client is:
其中,表示第i个客户端的第i个索引的数据数量,idxi表示标签i的索引,Qmax表示一个预先定义的任意标签数量的最大值,且任意一个标签的数量都不可以超过这个最大值,Xi表示第i个客户端构建的数据分布信息,j为第i个客户端的第j个索引的序号。in, Indicates the data quantity of the i-th index of the i-th client, idx i indicates the index of label i, Q max indicates a predefined maximum number of any label, and the number of any label cannot exceed this maximum value, X i represents the data distribution information constructed by the i-th client, and j is the serial number of the j-th index of the i-th client.
可选地,步骤S1中构造的交集相似度向量的函数表达式为:Optionally, the functional expression of the intersection similarity vector constructed in step S1 is:
上式中,ISMi为第i个客户端的交集相似度向量,ISMi[1]~ISMi[j]表示第i个客户端对第1~j个客户端的数据分布相似度,|Xi∩Xj|表示第i个客户端与第j个客户端之间的数据分布的交集,Xi表示第i个客户端构建的数据分布信息,Xj表示第j个客户端构建的数据分布信息。In the above formula, ISM i is the intersection similarity vector of the i-th client, ISM i [1]~ISM i [j] represent the data distribution similarity between the i-th client and the 1st-j clients, |X i ∩X j | represents the intersection of the data distribution between the i-th client and the j-th client, X i represents the data distribution information constructed by the i-th client, and X j represents the data distribution constructed by the j-th client information.
可选地,步骤S2中构建的相似度矩阵的函数表达式为:Optionally, the functional expression of the similarity matrix constructed in step S2 is:
上式中,Msim为相似度矩阵,任意第i行表示第i个客户端对第1~n个客户端的数据分布相似度构成的交集相似度向量。In the above formula, M sim is a similarity matrix, and any i-th row represents the intersection similarity vector formed by the data distribution similarity between the i-th client and the 1st to nth clients.
可选地,步骤S3中服务器基于相似度矩阵使用保证多样性的聚类方法对客户端进行聚类包括:将所有交集相似度高于阈值α的客户端聚集成候选簇集合并去重,使得该候选簇集合中包含了所有可能的聚类结果;在该候选簇集合中,计算每一个候选簇的权重,并使用贪心算法,每次选择可使负载最小的候选簇加入到最终簇集合中,直至所有客户端都被分配到最终簇集合中。Optionally, in step S3, the server clustering the clients based on the similarity matrix using a clustering method that guarantees diversity includes: aggregating all clients whose intersection similarity is higher than the threshold α into a candidate cluster set and deduplication, so that The candidate cluster set contains all possible clustering results; in the candidate cluster set, calculate the weight of each candidate cluster, and use the greedy algorithm, each selection can make the candidate cluster with the smallest load be added to the final cluster set , until all clients are assigned to the final cluster set.
可选地,所述计算每一个候选簇的权重的函数表达式为:Optionally, the function expression for calculating the weight of each candidate cluster is:
上式中,Cost(S′i)表示计算候选簇S′i的成本,ID为客户端的编号,Msim[i][ID]为相似度矩阵的第i行第ID列的元素;所述负载的计算函数表达式为:In the above formula, Cost(S' i ) represents the cost of calculating the candidate cluster S' i , ID is the serial number of the client, and M sim [i][ID] is the element of the i-th row ID column of the similarity matrix; The calculation function expression of the load is:
上式中,Payload表示负载,S′\I表示尚未被选入最终簇的候选簇集合,S′表示候选簇集合,I表示已被选入最终簇的客户端的编号。In the above formula, Payload represents the load, S'\I represents the candidate cluster set that has not been selected into the final cluster, S' represents the candidate cluster set, and I represents the number of the client that has been selected into the final cluster.
可选地,步骤S4中服务器检测恶意簇是指服务器根据自己的本地数据检测最终簇集合中每个簇的精度,并选择其中精度最低的簇作为恶意簇。Optionally, the detection of malicious clusters by the server in step S4 means that the server detects the accuracy of each cluster in the final cluster set according to its own local data, and selects the cluster with the lowest accuracy as the malicious cluster.
可选地,步骤S6中利用验证委员会的成员为恶意簇中成员的模型进行验证并投票决定为良性模型和恶意模型包括:利用验证委员会的成员根据自己的本地数据验证恶意簇中每个成员的模型精度,将精度低于平均值的模型成员视为恶意模型并投票,最终将对所有投票结果进行加和,票数高于平均票数的模型将被验证委员会认定为恶意模型,否则被验证委员会认定为良性模型。Optionally, in step S6, using members of the verification committee to verify the models of the members in the malicious cluster and voting for benign models and malicious models includes: using members of the verification committee to verify the model of each member in the malicious cluster according to their own local data. Model accuracy, the model members whose accuracy is lower than the average are regarded as malicious models and voted, and finally all the voting results will be summed up, and the model with the number of votes higher than the average number of votes will be identified as a malicious model by the verification committee, otherwise it will be identified by the verification committee benign model.
此外,本发明还提供一种不依赖梯度的聚类联邦学习系统,包括相互连接的多个客户端,所述客户端包括相互连接的微处理器和存储器,所述微处理器被编程或配置以执行所述不依赖梯度的聚类联邦学习方法。In addition, the present invention also provides a gradient-independent clustering federated learning system, which includes multiple clients connected to each other, the clients include microprocessors and memories connected to each other, and the microprocessors are programmed or configured To implement the gradient-independent clustering federated learning method.
此外,本发明还提供一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机程序,所述计算机程序用于被微处理器编程或配置以执行所述不依赖梯度的聚类联邦学习方法。In addition, the present invention also provides a computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, and the computer program is used to be programmed or configured by a microprocessor to perform the gradient-independent clustering Federated learning methods.
和现有技术相比,本发明主要具有下述优点:Compared with the prior art, the present invention mainly has the following advantages:
1、本发明在聚类的过程中,服务器不需要依靠客户端的梯度信息进行聚类,而是根据客户端的数据分布之间的交集相似度来进行聚类,从而避免了客户端的梯度信息泄露问题,保护了客户端的梯度安全,增强了聚类联邦学习过程中的安全性、可靠性、并且提高了训练精度。1. In the clustering process of the present invention, the server does not need to rely on the gradient information of the client for clustering, but performs clustering according to the intersection similarity between the data distributions of the clients, thus avoiding the leakage of the gradient information of the client , which protects the gradient security of the client, enhances the security and reliability of the clustering federated learning process, and improves the training accuracy.
2、本发明在聚类的过程中,创新性地允许同一个客户端出现在多个聚类中,从而可以为每一个客户端寻找最适合的簇,并且充分地利用客户端数据地多样性,增强模型精度。2. In the process of clustering, the present invention innovatively allows the same client to appear in multiple clusters, so that the most suitable cluster can be found for each client, and the diversity of client data can be fully utilized , to enhance model accuracy.
3、本发明不同于在现有联邦学习中普遍使用的事前检测,创新型地使用一种事后检测机制来检测系统中存在的恶意簇,允许在攻击开始之后进行检测,以节省开销,并且进一步提高系统的安全性。3. The present invention is different from the pre-detection commonly used in the existing federated learning, and innovatively uses a post-event detection mechanism to detect malicious clusters existing in the system, allowing detection after the attack starts to save overhead, and further Improve system security.
附图说明Description of drawings
图1为本发明实施例方法的基本流程示意图。Fig. 1 is a schematic flow diagram of the basic process of the method of the embodiment of the present invention.
图2为本发明实施例的原理示意图。Fig. 2 is a schematic diagram of the principle of an embodiment of the present invention.
图3为本发明实施例在MNIST数据集上的测试精度。Fig. 3 is the test accuracy of the embodiment of the present invention on the MNIST data set.
图4为本发明实施例在FMNIST数据集上的测试精度。Fig. 4 is the test accuracy of the embodiment of the present invention on the FMNIST data set.
图5为本发明实施例在CIFAR10数据集上的测试精度。Fig. 5 is the test accuracy of the embodiment of the present invention on the CIFAR10 data set.
图6为本发明实施例在三种方法上的测试精度对比。Fig. 6 is a comparison of test accuracy of the embodiment of the present invention in three methods.
图7为本发明实施例在计算交集相似度时的主要开销。Fig. 7 shows the main overhead when calculating the intersection similarity according to the embodiment of the present invention.
图8为本发明实施例在有恶意客户端作恶时各簇的测试精度。Fig. 8 shows the test accuracy of each cluster when there is a malicious client doing evil in the embodiment of the present invention.
图9为本发明实施例使用不同的检测方法检测后全局模型的测试精度。FIG. 9 shows the test accuracy of the global model after detection using different detection methods according to the embodiment of the present invention.
图10为本发明实施例在不同的保护噪声中全局模型的准确率。Fig. 10 shows the accuracy rate of the global model in different protection noises according to the embodiment of the present invention.
具体实施方式detailed description
本发明可以应用在医疗行业场景中,各个医院通过本发明作为联邦学习的客户端,高效地利用医院敏感数据的多样性,并且保证敏感数据的可用性,已解决各个医院之间的非独立同分布问题,高效地获得适用于每个医院的若干簇模型。下文将以各个医院作为联邦学习的客户端,针对客户端基于CT图像进行癌变细胞识别的机器学习为例,结合说明书附图和具体优选的实施例对本发明作进一步描述,但并不因此而限制本发明的保护范围。在本实例中,系统中包括一台服务器和若干台客户端,服务器与设备之间通过安全的信道进行通信,实现信息与数据的交互。不限于本实施例中的联邦学习系统,本领域普通人员可以根据实际情况实现联邦学习系统的部署。The present invention can be applied in medical industry scenarios. Each hospital uses the present invention as a client of federated learning to efficiently utilize the diversity of hospital sensitive data and ensure the availability of sensitive data, which has solved the non-independent and identical distribution among hospitals problem to efficiently obtain several cluster models applicable to each hospital. The following will take each hospital as the client of federated learning, and take the machine learning of cancerous cell identification based on CT images on the client as an example, and further describe the present invention in conjunction with the accompanying drawings and specific preferred embodiments, but it is not limited thereby protection scope of the present invention. In this example, the system includes a server and several clients, and the server and the device communicate through a secure channel to realize the interaction of information and data. It is not limited to the federated learning system in this embodiment, and ordinary people in the field can implement the deployment of the federated learning system according to actual conditions.
如图1所示,本实施例不依赖梯度的聚类联邦学习方法包括:As shown in Figure 1, the gradient-independent clustering federated learning method of this embodiment includes:
S1,客户端分别计算自己的标签样本的数据分布信息,获得自己与其他客户端的数据分布信息之间的交集相似度并构造交集相似度向量;S1, the client calculates the data distribution information of its own label samples separately, obtains the intersection similarity between the data distribution information of itself and other clients, and constructs an intersection similarity vector;
S2,服务器收集各个客户端的交集相似度向量并构建相似度矩阵;S2, the server collects the intersection similarity vectors of each client and constructs a similarity matrix;
S3,服务器基于相似度矩阵使用保证多样性的聚类方法对客户端进行聚类,并执行模型训练步骤,且在服务器检测到模型的精度下降时,跳转下一步;S3, the server clusters the clients based on the similarity matrix using a clustering method that guarantees diversity, and executes the model training step, and jumps to the next step when the server detects that the accuracy of the model has decreased;
S4,服务器检测恶意簇,且在确定恶意簇后,选择拥有与恶意簇中的客户端最相似数据分布、且不在恶意簇中的客户端来组成验证委员会;S4, the server detects the malicious cluster, and after determining the malicious cluster, selects the client that has the most similar data distribution to the client in the malicious cluster and is not in the malicious cluster to form a verification committee;
S6,利用验证委员会的成员为恶意簇中成员的模型进行验证并投票决定为良性模型和恶意模型,将恶意模型排除、保留良性模型。S6, use the members of the verification committee to verify the models of the members in the malicious cluster and vote for benign models and malicious models, exclude the malicious models and keep the benign models.
基于本实施例所公开的内容,本领域普通技术人员能够理解,服务器和客户端之间、客户端与客户端之间都通过安全的信道进行实现数据的传输,如发布全局模型、上传本地模型、上传相似度向量、使用RSA-PSI方案计算交集等过程。在本实施例步骤S1中,客户端获取自己与其他客户端之间的数据分布的交集的方法包括:使用RSA-PSI方案来获得自己与其他客户端之间的交集。正如前文所述,现有的聚类联邦学习的方案依赖于使用梯度来进行聚类,这种依赖梯度的方案可能泄露客户的隐私信息甚至原始的训练数据。因此,为了规避这个问题,本实施例中使用RSA-PSI方案让客户端不泄露训练数据的情况下得到与其他客户端数据之间的交集,并根据此交集计算自己与其他客户端之间的交集相似度向量。Based on the content disclosed in this embodiment, those of ordinary skill in the art can understand that data transmission is carried out between the server and the client, and between the client and the client through a secure channel, such as publishing the global model and uploading the local model , Upload similarity vectors, use RSA-PSI scheme to calculate intersection and other processes. In step S1 of this embodiment, the method for the client to obtain the intersection of data distribution between itself and other clients includes: using the RSA-PSI scheme to obtain the intersection between itself and other clients. As mentioned above, the existing clustering federated learning schemes rely on the use of gradients for clustering. This gradient-dependent scheme may leak the customer's private information or even the original training data. Therefore, in order to avoid this problem, the RSA-PSI scheme is used in this embodiment to allow the client to obtain the intersection with other client data without disclosing the training data, and calculate the distance between itself and other clients based on this intersection. Intersection similarity vector.
本实施例各个客户端需要分别统计本地数据中的每个标签的样本的数量,并将该数量信息进行处理以防止泄露自己的真实的数据分布信息,步骤S1中客户端分别计算自己的标签样本的数据分布信息的函数表达式为:In this embodiment, each client needs to separately count the number of samples of each label in the local data, and process the quantity information to prevent leakage of its own real data distribution information. In step S1, the client calculates its own label samples respectively The function expression of the data distribution information of is:
上式中,以及分别表示第1、2以及第i个客户端的单一标签的数据分布信息,且有任意第i个客户端的单一标签的数据分布信息的计算函数表达式为:In the above formula, as well as Represent the data distribution information of the single label of the 1st, 2nd and i-th clients respectively, and the calculation function expression of the data distribution information of a single label of any i-th client is:
其中,表示第i个客户端的第i个索引的数据数量,idxi表示标签i的索引,Qmax表示一个预先定义的任意标签数量的最大值,且任意一个标签的数量都不可以超过这个最大值,Xi表示第i个客户端构建的数据分布信息,j为第i个客户端的第j个索引的序号。经过上述变换之后,客户端可以在不暴露自身真实数据分布信息的情况下获得交集。in, Indicates the data quantity of the i-th index of the i-th client, idx i indicates the index of label i, Q max indicates a predefined maximum number of any label, and the number of any label cannot exceed this maximum value, X i represents the data distribution information constructed by the i-th client, and j is the serial number of the j-th index of the i-th client. After the above transformation, the client can obtain the intersection without exposing its own real data distribution information.
在本实施例中,步骤S1中客户端获得与其他客户端之间数据分布的交集的方法包括:使用RSA-PSI方案(基于RSA的隐私集合求交方案)计算与其他客户端之间的数据分布的交集,并构建相似度向量。作为一种可选的实施方式,本实施例步骤S1中构造的交集相似度向量的函数表达式为:In this embodiment, the method for the client to obtain the intersection of data distribution with other clients in step S1 includes: using the RSA-PSI scheme (RSA-based privacy set intersection scheme) to calculate the data distribution with other clients distributions, and construct a similarity vector. As an optional implementation, the functional expression of the intersection similarity vector constructed in step S1 of this embodiment is:
上式中,ISMi为第i个客户端的交集相似度向量,ISMi[1]~ISMi[j]表示第i个客户端对第1~j个客户端的数据分布相似度,|Xi∩Xj|表示第i个客户端与第j个客户端之间的数据分布的交集,Xi表示第i个客户端构建的数据分布信息,Xj表示第j个客户端构建的数据分布信息。基于本实施例所公开的内容,本领域普通技术人员还可以使用不同的隐私集合求交方案来实现交集的计算,不因本具体实施例而限定本申请所要求保护的技术范围。In the above formula, ISM i is the intersection similarity vector of the i-th client, ISM i [1]~ISM i [j] represent the data distribution similarity between the i-th client and the 1st-j clients, |X i ∩X j | represents the intersection of the data distribution between the i-th client and the j-th client, X i represents the data distribution information constructed by the i-th client, and X j represents the data distribution constructed by the j-th client information. Based on the content disclosed in this embodiment, those skilled in the art can also use different privacy set intersection schemes to realize intersection calculation, and this specific embodiment does not limit the technical scope of protection claimed in this application.
本实施例中,步骤S2中构建的相似度矩阵的函数表达式为:In this embodiment, the functional expression of the similarity matrix constructed in step S2 is:
上式中,Msim为相似度矩阵,任意第i行表示第i个客户端对第1~n个客户端的数据分布相似度构成的交集相似度向量。In the above formula, M sim is a similarity matrix, and any i-th row represents the intersection similarity vector formed by the data distribution similarity between the i-th client and the 1st to nth clients.
本实施例中,步骤S3中服务器基于相似度矩阵使用保证多样性的聚类方法对客户端进行聚类包括:将所有交集相似度高于阈值α的客户端聚集成候选簇集合并去重,使得该候选簇集合中包含了所有可能的聚类结果;在该候选簇集合中,计算每一个候选簇的权重,并使用贪心算法,每次选择可使负载最小的候选簇加入到最终簇集合中,直至所有客户端都被分配到最终簇集合中。In this embodiment, in step S3, the server clusters the clients based on the similarity matrix using a clustering method that guarantees diversity includes: gathering all clients whose intersection similarity is higher than the threshold α into a candidate cluster set and deduplication, Make the candidate cluster set contain all possible clustering results; in the candidate cluster set, calculate the weight of each candidate cluster, and use the greedy algorithm, each selection can make the candidate cluster with the smallest load be added to the final cluster set , until all clients are assigned to the final cluster set.
本实施例中,计算每一个候选簇的权重的函数表达式为:In this embodiment, the function expression for calculating the weight of each candidate cluster is:
上式中,Cost(S′i)表示计算候选簇S′i的成本,ID为客户端的编号,Msim[i][ID]为相似度矩阵的第i行第ID列的元素;负载的计算函数表达式为:In the above formula, Cost(S′ i ) represents the cost of calculating the candidate cluster S′ i , ID is the serial number of the client, M sim [i][ID] is the element of row i and column ID of the similarity matrix; the load The calculation function expression is:
上式中,Payload表示负载,S′\I表示尚未被选入最终簇的候选簇集合,S′表示候选簇集合,I表示已被选入最终簇的客户端的编号。In the above formula, Payload represents the load, S'\I represents the candidate cluster set that has not been selected into the final cluster, S' represents the candidate cluster set, and I represents the number of the client that has been selected into the final cluster.
本实施例中,步骤S4中服务器检测恶意簇是指服务器根据自己的本地数据检测最终簇集合中每个簇的精度,并选择其中精度最低的簇作为恶意簇。In this embodiment, the detection of malicious clusters by the server in step S4 means that the server detects the accuracy of each cluster in the final cluster set according to its own local data, and selects the cluster with the lowest accuracy as the malicious cluster.
在本实施例中,检测是否存在恶意簇的方法包括:服务器检测的全局模型的精度是否明显下降(下降超过设定值)。在本实施例中确定恶意簇的方法包括:服务器根据自己的本地数据检测每个簇的精度,并选择其中精度最低的簇作为恶意簇。当然,本领域普通技术人员还可以根据需要选择不同的方法来检测恶意簇;如,簇的模型是否达到预设标准等。不因本具体实施例而限定本申请所要求保护的技术范围。In this embodiment, the method for detecting whether there is a malicious cluster includes: whether the accuracy of the global model detected by the server is obviously decreased (decreased by more than a set value). The method for determining a malicious cluster in this embodiment includes: the server detects the accuracy of each cluster according to its own local data, and selects the cluster with the lowest accuracy as the malicious cluster. Of course, those skilled in the art can also choose different methods to detect malicious clusters according to needs; for example, whether the cluster model meets the preset standard or not. The technical scope claimed in this application is not limited by this specific embodiment.
本实施例中,步骤S6中利用验证委员会的成员为恶意簇中成员的模型进行验证并投票决定为良性模型和恶意模型包括:利用验证委员会的成员根据自己的本地数据验证恶意簇中每个成员的模型精度,将精度低于平均值的模型成员视为恶意模型并投票,最终将对所有投票结果进行加和,票数高于平均票数的模型将被验证委员会认定为恶意模型,否则被验证委员会认定为良性模型。本实施例步骤S6中选择验证委员会的方法包括:服务器对每一个恶意簇中的客户端,取一个最相似数据分布但不在恶意簇中的客户端。验证委员会投票的方法包括:验证委员会成员根据自己的本地数据验证恶意簇中每个模型的精度,将精度低于平均值的模型将被这个委员会成员视为恶意模型并投一票。验证委员会投票方法还包括:验证委员会的每个成员投票后,对所有投票结果进行加和,票数高于平均票数的模型将被委员会认定为恶意模型。In this embodiment, using the members of the verification committee to verify the models of the members in the malicious cluster in step S6 and voting for the benign model and the malicious model includes: using the members of the verification committee to verify each member in the malicious cluster according to their own local data The model accuracy of the model, the model members whose accuracy is lower than the average are regarded as malicious models and voted, and finally all the voting results will be summed up, and the model with the number of votes higher than the average number of votes will be identified as a malicious model by the verification committee, otherwise it will be recognized as a malicious model by the verification committee identified as a benign model. The method for selecting a verification committee in step S6 of this embodiment includes: for each client in the malicious cluster, the server selects a client that has the most similar data distribution but is not in the malicious cluster. The method of voting by the verification committee includes: the members of the verification committee verify the accuracy of each model in the malicious cluster according to their own local data, and the model whose accuracy is lower than the average will be regarded as a malicious model by this committee member and voted for. The voting method of the verification committee also includes: after each member of the verification committee votes, sum up all the voting results, and the model with a vote higher than the average number of votes will be identified as a malicious model by the committee.
在本实施例中,通过具体的仿真实验对本实施例进行验证,基于Pytorch进行联邦学习的仿真。在仿真实验中,设置1台服务器和100台客户端。服务器使用FederatedAveraging算法对每一个簇中的本地模型进行聚合,每个客户端训练时在本地数据上迭代1次。服务器拥有一部分独立同分布的数据可用于检测恶意簇。且设置了GCFL、FedAvg、GICFL三种不同的训练方法。在GCFL方法中,系统采用基于梯度的聚类方法对客户端进行聚类。在FedAvg方法中,系统不对客户端进行聚类,仅使用最原始的方法进行联邦学习训练。在GICFL中,将使用上文所述的方法对客户端进行聚类。对于每一种训练方法,均分别使用MNIST、FMNIST和CIFAR-10数据集作为基准数据集。对于每一种训练集,均分别使用病态非独立同分布和狄利克雷非独立同分布两种不同的初始化方法对客户端的数据进行初始化。在病态非独立同分布初始化方法中,每个客户端可以获得两个标签的随机数据,即设置病态非独立同分布的参数为k=2。在狄利克雷非独立同分布初始化方法中,每个客户端的数据服从β=0.5的狄利克雷分布。在三种训练方法下模型的测试精度如图3、图4和图5所示。图3中,(a)为在病态初始化分布上的测试精度,(b)为在狄利克雷初始化分布上的测试精度;图4中,(a)为在病态初始化分布上的测试精度,(b)为在狄利克雷初始化分布上的测试精度;图5中,(a)为在病态初始化分布上的测试精度,(b)为在狄利克雷初始化分布上的测试精度。通过图3、图4和图5可以看出,在本实施例的GICFL训练方法下,对于各种数据集以及数据分布,模型的测试精度均优于其他两种训练方法的测试精度。In this embodiment, this embodiment is verified through specific simulation experiments, and the simulation of federated learning is performed based on Pytorch. In the simulation experiment, set up 1 server and 100 clients. The server uses the FederatedAveraging algorithm to aggregate the local models in each cluster, and each client iterates once on the local data during training. The server has a part of independent and identically distributed data that can be used to detect malicious clusters. And set three different training methods of GCFL, FedAvg, GICFL. In the GCFL method, the system uses a gradient-based clustering method to cluster clients. In the FedAvg method, the system does not cluster clients, and only uses the most primitive method for federated learning training. In GICFL, clients will be clustered using the method described above. For each training method, the MNIST, FMNIST, and CIFAR-10 datasets are used as benchmark datasets, respectively. For each training set, two different initialization methods of ill-conditioned non-IID and Dirichlet non-IID are used to initialize the data of the client. In the ill-conditioned non-IID initialization method, each client can obtain random data of two labels, that is, the parameter of the ill-conditioned non-IID is set to k=2. In the Dirichlet non-IID initialization method, the data of each client obeys the Dirichlet distribution of β=0.5. The test accuracy of the model under the three training methods is shown in Fig. 3, Fig. 4 and Fig. 5. In Figure 3, (a) is the test accuracy on the ill-conditioned initialization distribution, (b) is the test accuracy on the Dirichlet initialization distribution; in Figure 4, (a) is the test accuracy on the ill-conditioned initialization distribution, ( b) is the test accuracy on the Dirichlet initialization distribution; in Figure 5, (a) is the test accuracy on the ill-conditioned initialization distribution, and (b) is the test accuracy on the Dirichlet initialization distribution. It can be seen from Fig. 3, Fig. 4 and Fig. 5 that under the GICFL training method of this embodiment, for various data sets and data distributions, the test accuracy of the model is better than that of the other two training methods.
在本实施例的仿真实验中,还通过设置更加极端的数据初始化方式来测试本发明的技术方案的效率。在图6中展示了当狄利克雷初始化方法的参数设置为β=0.1时,在MNIST和FMNIST数据集下三种不同的训练方法收敛后的测试精度,其中(a)为在MNIST数据集上的测试精度,(b)为在FMNIST数据集上的测试精度。通过图6可以看出,在更加极端的数据初始化方式下,本实施例的测试精度仍然表现优秀。In the simulation experiment of this embodiment, the efficiency of the technical solution of the present invention is also tested by setting a more extreme data initialization mode. In Figure 6, when the parameter of the Dirichlet initialization method is set to β=0.1, the test accuracy of three different training methods under the MNIST and FMNIST data sets after convergence, where (a) is on the MNIST data set The test accuracy of , (b) is the test accuracy on the FMNIST dataset. It can be seen from FIG. 6 that, in a more extreme data initialization mode, the test accuracy of this embodiment is still excellent.
在本实施例的仿真实验中,图7展示了使用不同的数据分布初始化方法时,计算客户端之间数据分布的交集所需要的主要开销,其中(a)为在病态初始化分布上的开销,(b)为在狄利克雷初始化分布上的开销。通过图7可以看出,在本实施例中,需要一些时间来计算交集相似度。但由于这个阶段在训练阶段之前,与训练时间相比可以忽略不计。另外,新成员加入时可以不必再次计算原有成员之间的交集。考虑训练所需的时间以及隐私保护的需求,此协议的开销是可以接受的。In the simulation experiment of this embodiment, FIG. 7 shows the main overhead required to calculate the intersection of data distributions between clients when using different data distribution initialization methods, where (a) is the overhead on the ill-conditioned initialization distribution, (b) is the overhead on the Dirichlet initialization distribution. It can be seen from FIG. 7 that in this embodiment, it takes some time to calculate the intersection similarity. But since this phase precedes the training phase, it is negligible compared to the training time. In addition, when a new member joins, it is not necessary to calculate the intersection between the original members again. Considering the time required for training and the need for privacy protection, the overhead of this protocol is acceptable.
在本实施例的仿真实验中,模拟了客户端中有人作恶的情况。恶意的客户端在自己的本地模型中加入方差为1的高斯噪声,即δ=1。恶意客户端作恶之后的各簇模型的测试精度如图8所示,其中(a)为在病态初始化分布上的测试精度,(b)为在狄利克雷初始化分布上的测试精度。通过图8可以看出,在恶意客户端作恶之后,服务器仍可通过其拥有的本地数据进行恶意簇的检测。In the simulation experiment of this embodiment, a situation in which someone does evil in the client is simulated. A malicious client adds Gaussian noise with a variance of 1 to its local model, that is, δ=1. The test accuracy of each cluster model after the malicious client is evil is shown in Figure 8, where (a) is the test accuracy on the ill-conditioned initialization distribution, and (b) is the test accuracy on the Dirichlet initialization distribution. It can be seen from Figure 8 that after the malicious client does evil, the server can still detect malicious clusters through its own local data.
在本实施例的仿真实验中,采用了三种方法组建验证委员会。在第一种方法中,服务器选择恶意簇之外的与该簇中客户端数据分布最相似的客户端组成验证委员会,即本实施例选择的方法。在第二种方法中,服务器选择恶意簇之外的随机的客户端组成验证委员会。在第三种方法中,服务器选择恶意簇之外的与该簇中客户端最不相似的客户端组成验证委员会。在验证委员会投票之后,将被认定为恶意簇的客户端剔除,并将剩余的客户端重新进行聚类。重新聚类后的模型精度如图9所示,其中(a)为在病态初始化分布上的测试精度,(b)为在狄利克雷初始化分布上的测试精度。通过图9可以看出,在本实施例方法的检测之下,可以获得优秀的恶意簇和恶意客户端的检测效果。In the simulation experiment of this embodiment, three methods are used to form the verification committee. In the first method, the server selects clients other than the malicious cluster that are most similar to the client data distribution in the cluster to form the verification committee, which is the method selected in this embodiment. In the second method, the server selects random clients outside the malicious cluster to form the verification committee. In the third method, the server selects the clients outside the malicious cluster that are most dissimilar to the clients in the cluster to form the verification committee. After the verification committee votes, the clients identified as malicious clusters are eliminated, and the remaining clients are re-clustered. The model accuracy after re-clustering is shown in Figure 9, where (a) is the test accuracy on the ill-conditioned initialization distribution, and (b) is the test accuracy on the Dirichlet initialization distribution. It can be seen from FIG. 9 that under the detection of the method of this embodiment, excellent detection effects of malicious clusters and malicious clients can be obtained.
在本实施例的仿真实验中,还通过逐步在客户端的模型上添加不同程度的高斯噪声来验证我们的测试方法的稳健性,如图10所示,其中(a)为在病态初始化分布上的测试精度,(b)为在狄利克雷初始化分布上的测试精度。通过图10可以看出,在狄利克雷初始化分布中,加入方差为0.006的高斯噪声时,还可以准确识别恶意簇中的恶意模型。在病态初始化分布中,甚至可以容忍方差为0.01的高斯噪声。In the simulation experiment of this embodiment, the robustness of our test method is also verified by gradually adding different degrees of Gaussian noise to the model of the client, as shown in Figure 10, where (a) is on the ill-conditioned initialization distribution Test accuracy, (b) is the test accuracy on the Dirichlet initialization distribution. It can be seen from Figure 10 that when Gaussian noise with a variance of 0.006 is added to the Dirichlet initialization distribution, the malicious model in the malicious cluster can also be accurately identified. In an ill-conditioned initialization distribution, even Gaussian noise with a variance of 0.01 can be tolerated.
综上所述,本实施例不依赖梯度的聚类联邦学习方法在聚类的过程中,服务器不需要依靠客户端的梯度信息进行聚类,而是根据客户端的数据分布之间的交集相似度来进行聚类,从而避免了客户端的梯度信息泄露问题,保护了客户端的梯度安全,增强了聚类联邦学习过程中的安全性、可靠性、并且提高了训练精度。本实施例不依赖梯度的聚类联邦学习方法在聚类的过程中,创新性地允许同一个客户端出现在多个聚类中,从而可以为每一个客户端寻找最适合的簇,并且充分地利用客户端数据地多样性,增强模型精度。本实施例不依赖梯度的聚类联邦学习方法不同于在现有联邦学习中普遍使用的事前检测,创新型地使用一种事后检测机制来检测系统中存在的恶意簇,允许在攻击开始之后进行检测,以节省开销,并且进一步提高系统的安全性。本实施例不依赖梯度的聚类联邦学习方法可以应用在医疗行业场景中,各个医院通过本发明作为联邦学习的客户端,高效地利用医院敏感数据的多样性,并且保证敏感数据的可用性,已解决各个医院之间的非独立同分布问题,高效地获得适用于每个医院的若干簇模型。To sum up, the gradient-independent clustering federated learning method of this embodiment does not need to rely on the gradient information of the client to perform clustering during the clustering process, but to perform clustering according to the intersection similarity between data distributions of the client Clustering avoids the gradient information leakage problem of the client, protects the gradient security of the client, enhances the security and reliability of the clustering federated learning process, and improves the training accuracy. The gradient-independent clustering federated learning method of this embodiment innovatively allows the same client to appear in multiple clusters during the clustering process, so that the most suitable cluster can be found for each client, and fully Make full use of the diversity of client data to enhance model accuracy. The gradient-independent clustering federated learning method in this embodiment is different from the pre-detection commonly used in existing federated learning. It innovatively uses a post-event detection mechanism to detect malicious clusters existing in the system, allowing the attack to be carried out after the start of the attack. detection to save overhead and further improve system security. The gradient-independent clustering federated learning method of this embodiment can be applied in medical industry scenarios. Each hospital uses the invention as a federated learning client to efficiently utilize the diversity of hospital sensitive data and ensure the availability of sensitive data. Solve the non-independent and identical distribution problem between hospitals, and efficiently obtain several cluster models suitable for each hospital.
此外,本实施例还提供一种不依赖梯度的聚类联邦学习系统,包括相互连接的多个客户端,该客户端包括相互连接的微处理器和存储器,该微处理器被编程或配置以执行前述不依赖梯度的聚类联邦学习方法。此外,本实施例还提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序,该计算机程序用于被微处理器编程或配置以执行前述不依赖梯度的聚类联邦学习方法。In addition, this embodiment also provides a gradient-independent clustering federated learning system, which includes multiple clients connected to each other, the client includes a microprocessor and a memory connected to each other, and the microprocessor is programmed or configured to Implement the aforementioned gradient-independent clustering federated learning method. In addition, this embodiment also provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and the computer program is used to be programmed or configured by a microprocessor to perform the aforementioned gradient-independent clustering federated learning method.
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可读存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。Those skilled in the art should understand that the embodiments of the present application may be provided as methods, systems, or computer program products. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-readable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein. The present application is described with reference to flowcharts and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the present application. It should be understood that each procedure and/or block in the flowchart and/or block diagram, and a combination of procedures and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions may be provided to a general purpose computer, special purpose computer, embedded processor, or processor of other programmable data processing equipment to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing equipment produce a An apparatus for realizing the functions specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram. These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions The device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram. These computer program instructions can also be loaded onto a computer or other programmable data processing device, causing a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process, thereby The instructions provide steps for implementing the functions specified in the flow chart or blocks of the flowchart and/or the block or blocks of the block diagrams.
以上所述仅是本发明的优选实施方式,本发明的保护范围并不仅局限于上述实施例,凡属于本发明思路下的技术方案均属于本发明的保护范围。应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理前提下的若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。The above descriptions are only preferred implementations of the present invention, and the protection scope of the present invention is not limited to the above-mentioned embodiments, and all technical solutions under the idea of the present invention belong to the protection scope of the present invention. It should be pointed out that for those skilled in the art, some improvements and modifications without departing from the principles of the present invention should also be regarded as the protection scope of the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211422140.9A CN115577360A (en) | 2022-11-14 | 2022-11-14 | A Gradient-Independent Clustering Federated Learning Method and System |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211422140.9A CN115577360A (en) | 2022-11-14 | 2022-11-14 | A Gradient-Independent Clustering Federated Learning Method and System |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115577360A true CN115577360A (en) | 2023-01-06 |
Family
ID=84588580
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211422140.9A Pending CN115577360A (en) | 2022-11-14 | 2022-11-14 | A Gradient-Independent Clustering Federated Learning Method and System |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115577360A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117077817A (en) * | 2023-10-13 | 2023-11-17 | 之江实验室 | A personalized federated learning model training method and device based on label distribution |
CN117094412A (en) * | 2023-08-18 | 2023-11-21 | 之江实验室 | Federal learning method and device aiming at non-independent co-distributed medical scene |
CN117436078A (en) * | 2023-12-18 | 2024-01-23 | 烟台大学 | Bidirectional model poisoning detection method and system in federated learning |
CN117640253A (en) * | 2024-01-25 | 2024-03-01 | 济南大学 | Federal learning privacy protection method and system based on homomorphic encryption |
CN118250098A (en) * | 2024-05-27 | 2024-06-25 | 泉城省实验室 | Method and system for resisting malicious client poisoning attack based on packet aggregation |
-
2022
- 2022-11-14 CN CN202211422140.9A patent/CN115577360A/en active Pending
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117094412A (en) * | 2023-08-18 | 2023-11-21 | 之江实验室 | Federal learning method and device aiming at non-independent co-distributed medical scene |
CN117094412B (en) * | 2023-08-18 | 2024-06-28 | 之江实验室 | Federal learning method and device aiming at non-independent co-distributed medical scene |
CN117077817A (en) * | 2023-10-13 | 2023-11-17 | 之江实验室 | A personalized federated learning model training method and device based on label distribution |
CN117077817B (en) * | 2023-10-13 | 2024-01-30 | 之江实验室 | Personalized federal learning model training method and device based on label distribution |
CN117436078A (en) * | 2023-12-18 | 2024-01-23 | 烟台大学 | Bidirectional model poisoning detection method and system in federated learning |
CN117436078B (en) * | 2023-12-18 | 2024-03-12 | 烟台大学 | Bidirectional model poisoning detection method and system in federal learning |
CN117640253A (en) * | 2024-01-25 | 2024-03-01 | 济南大学 | Federal learning privacy protection method and system based on homomorphic encryption |
CN117640253B (en) * | 2024-01-25 | 2024-04-05 | 济南大学 | Privacy protection method and system for federated learning based on homomorphic encryption |
CN118250098A (en) * | 2024-05-27 | 2024-06-25 | 泉城省实验室 | Method and system for resisting malicious client poisoning attack based on packet aggregation |
CN118250098B (en) * | 2024-05-27 | 2024-08-09 | 泉城省实验室 | Method and system for resisting malicious client poisoning attack based on packet aggregation |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN115577360A (en) | A Gradient-Independent Clustering Federated Learning Method and System | |
WO2022100349A1 (en) | Artificial intelligence-based dual-recording quality inspection method and apparatus, computer device and medium | |
CN111723865B (en) | Method, apparatus and medium for evaluating performance of image recognition model and attack method | |
CN111612041A (en) | Abnormal user identification method and device, storage medium and electronic equipment | |
US11403878B2 (en) | Apparatus and method with user verification | |
US11816223B1 (en) | Apparatus and method for updating cyber security support based on real-time changes | |
CN112799708B (en) | Method and system for jointly updating business model | |
CN117521117A (en) | Medical data application security and privacy protection method and system | |
CN103544429A (en) | Anomaly detection device and method for security information interaction | |
US10546106B2 (en) | Biometric verification | |
CN113111063B (en) | Medical patient main cable initiation method applied to multiple data sources | |
US20240020380A1 (en) | Clustering-based adaptive robust collaborative learning method and apparatus | |
CN110855648A (en) | Early warning control method and device for network attack | |
US20230001916A1 (en) | Methods and systems for controlling usage of parking maps for autonomous vehicles | |
CN105814582A (en) | Method and system for recognizing faces | |
Manoharan et al. | Implementation of internet of things with blockchain using machine learning algorithm: Enhancement of security with blockchain | |
KR102153912B1 (en) | Device and method for insurance unfair claim and unfair pattern detection based on artificial intelligence | |
US20230252051A1 (en) | Apparatuses and methods for the collection and storage of user identifiers | |
CN117035791A (en) | Electronic component transaction recording method and system | |
US20210326475A1 (en) | Systems and method for evaluating identity disclosure risks in synthetic personal data | |
CN114169007A (en) | Recognition method of medical privacy data based on dynamic neural network | |
CN112766320A (en) | Classification model training method and computer equipment | |
US20120063600A1 (en) | Appraising systems with zero knowledge proofs | |
KR101974521B1 (en) | Device and method for insurance unfair claim detection based on artificial intelligence | |
KR102469117B1 (en) | A risk analysis method for real estate sales based on data clustering |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |