1,010
Views
0
CrossRef citations to date
0
Altmetric
Research Article

FedG2L: a privacy-preserving federated learning scheme base on “G2L” against poisoning attack

ORCID Icon &
Article: 2197173 | Received 28 Nov 2022, Accepted 22 Mar 2023, Published online: 06 Apr 2023

Figures & data

Table 1. Summary of existing poisoning attack defense schemes in FL.

Table 2. Notations.

Figure 1. The PBFT consensus protocol.

Figure 1. The PBFT consensus protocol.

Figure 2. The process of DBSCAN. (a) First step (b) Second step.

Figure 2. The process of DBSCAN. (a) First step (b) Second step.

Figure 3. The architecture of GAN.

Figure 3. The architecture of GAN.

Figure 4. System model.

Figure 4. System model.

Figure 5. The process of FedG2L.

Figure 5. The process of FedG2L.

Figure 6. Comparison of accuracy with different epochs and byzantine percentage. (a) Epochs. (b) Byzantine percentage.

Figure 6. Comparison of accuracy with different epochs and byzantine percentage. (a) Epochs. (b) Byzantine percentage.

Figure 7. The ASR with different Byzantine percentages on 2 datasets. (a) Performance on MNIST dataset. (b) Performance on EMNIST dataset.

Figure 7. The ASR with different Byzantine percentages on 2 datasets. (a) Performance on MNIST dataset. (b) Performance on EMNIST dataset.

Figure 8. Comparison of accuracy with different schemes.

Figure 8. Comparison of accuracy with different schemes.

Figure 9. Comparison of accuracy with different numbers of generated data on different datasets.

Figure 9. Comparison of accuracy with different numbers of generated data on different datasets.