ترغب بنشر مسار تعليمي؟ اضغط هنا

Basil: A Fast and Byzantine-Resilient Approach for Decentralized Training

395   0   0.0 ( 0 )
 نشر من قبل Ahmed Elkordy
 تاريخ النشر 2021
والبحث باللغة English




اسأل ChatGPT حول البحث

Detection and mitigation of Byzantine behaviors in a decentralized learning setting is a daunting task, especially when the data distribution at the users is heterogeneous. As our main contribution, we propose Basil, a fast and computationally efficient Byzantine robust algorithm for decentralized training systems, which leverages a novel sequential, memory assisted and performance-based criteria for training over a logical ring while filtering the Byzantine users. In the IID dataset distribution setting, we provide the theoretical convergence guarantees of Basil, demonstrating its linear convergence rate. Furthermore, for the IID setting, we experimentally demonstrate that Basil is robust to various Byzantine attacks, including the strong Hidden attack, while providing up to ${sim}16 %$ higher test accuracy over the state-of-the-art Byzantine-resilient decentralized learning approach. Additionally, we generalize Basil to the non-IID dataset distribution setting by proposing Anonymous Cyclic Data Sharing (ACDS), a technique that allows each node to anonymously share a random fraction of its local non-sensitive dataset (e.g., landmarks images) with all other nodes. We demonstrate that Basil alongside ACDS with only $5%$ data sharing provides effective toleration of Byzantine nodes, unlike the state-of-the-art Byzantine robust algorithm that completely fails in the heterogeneous data setting. Finally, to reduce the overall latency of Basil resulting from its sequential implementation over the logical ring, we propose Basil+. In particular, Basil+ provides scalability by enabling Byzantine-robust parallel training across groups of logical rings, and at the same time, it retains the performance gains of Basil due to sequential training within each group. Furthermore, we experimentally demonstrate the scalability gains of Basil+ through different sets of experiments.


قيم البحث

اقرأ أيضاً

Decentralized optimization techniques are increasingly being used to learn machine learning models from data distributed over multiple locations without gathering the data at any one location. Unfortunately, methods that are designed for faultless ne tworks typically fail in the presence of node failures. In particular, Byzantine failures---corresponding to the scenario in which faulty/compromised nodes are allowed to arbitrarily deviate from an agreed-upon protocol---are the hardest to safeguard against in decentralized settings. This paper introduces a Byzantine-resilient decentralized gradient descent (BRIDGE) method for decentralized learning that, when compared to existing works, is more efficient and scalable in higher-dimensional settings and that is deployable in networks having topologies that go beyond the star topology. The main contributions of this work include theoretical analysis of BRIDGE for strongly convex learning objectives and numerical experiments demonstrating the efficacy of BRIDGE for both convex and nonconvex learning tasks.
This paper presents a practical approach to utilizing emergency response resources (ERRs) and post-disaster available distributed energy resources (PDA-DERs) to improve the resilience of power distribution systems against natural disasters. The propo sed approach consists of two sequential steps: first, the minimum amount of ERRs is determined in a pre-disaster planning model; second, a post-disaster restoration model is proposed to co-optimize the dispatch of pre-planned ERRs and PDA-DERs to minimize the impact of disasters on customers, i.e., unserved energy for the entire restoration window. Compared with existing restoration strategies using ERRs, the proposed approach is more tractable since 1) in the pre-disaster stage, the needed EERs are determined based on the prediction of energy shortage and disaster-induced damages using machine learning-based algorithms (i.e., cost-sensitive-RFQRF for prediction of outage customers, random forest for prediction of outage duration, and CART for prediction of disaster-induced damages); 2) in the post-disaster stage, the super-node approximation (SNA) and the convex hull relaxation (CHR) of distribution networks are introduced to achieve the best trade-off between computational burden and accuracy. Tests of the proposed approach on IEEE test feeders demonstrated that a combination of SNA and CHR remarkably reduces the solution time of the post-disaster restoration model.
In this paper, we investigate the feasibility and physical consequences of cyber attacks against energy management systems (EMS). Within this framework, we have designed a complete simulation platform to emulate realistic EMS operations: it includes state estimation (SE), real-time contingency analysis (RTCA), and security constrained economic dispatch (SCED). This software platform allowed us to achieve two main objectives: 1) to study the cyber vulnerabilities of an EMS and understand their consequences on the system, and 2) to formulate and implement countermeasures against cyber-attacks exploiting these vulnerabilities. Our results show that the false data injection attacks against state estimation described in the literature do not easily cause base-case overflows because of the conservatism introduced by RTCA. For a successful attack, a more sophisticated model that includes all of the EMS blocks is needed; even in this scenario, only post-contingency violations can be achieved. Nonetheless, we propose several countermeasures that can detect changes due to cyber-attacks and limit their impact on the system.
The proliferation of plug-in electric vehicles (PEVs) advocates a distributed paradigm for the coordination of PEV charging. Distinct from existing primal-dual decomposition or consensus methods, this paper proposes a cutting-plane based distributed algorithm, which enables an asynchronous coordination while well preserving individuals private information. To this end, an equivalent surrogate model is first constructed by exploiting the duality of the original optimization problem, which masks the private information of individual users by a transformation. Then, a cutting-plane based algorithm is derived to solve the surrogate problem in a distributed manner with intrinsic superiority to cope with various asynchrony. Critical implementation issues, such as the distributed initialization, cutting-plane generation and localized stopping criteria, are discussed in detail. Numerical tests on IEEE 37- and 123-node feeders with real data show that the proposed method is resilient to a variety of asynchrony and admits the plug-and-play operation mode. It is expected the proposed methodology provides an alternative path toward a more practical protocol for PEV charging.
This paper proposes decentralized resource-aware coordination schemes for solving network optimization problems defined by objective functions which combine locally evaluable costs with network-wide coupling components. These methods are well suited for a group of supervised agents trying to solve an optimization problem under mild coordination requirements. Each agent has information on its local cost and coordinates with the network supervisor for information about the coupling term of the cost. The proposed approach is feedback-based and asynchronous by design, guarantees anytime feasibility, and ensures the asymptotic convergence of the network state to the desired optimizer. Numerical simulations on a power system example illustrate our results.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا