FedDRL: A Trustworthy Federated Learning Model Fusion Method Based on Staged Reinforcement Learning
Abstract
Federated learning facilitates collaborative data analysis among multiple participants while preserving user privacy. However, conventional federated learning approaches, typically employing weighted average techniques for model fusion, confront two significant challenges: (1) The inclusion of malicious models in the fusion process can drastically undermine the accuracy of the aggregated global model. (2) Due to the heterogeneity problem of devices and data, the number of client samples does not determine the weight value of the model. To solve those challenge, we propose a trustworthy model fusion method based on reinforcement learning (FedDRL), which includes two stages. In the first stage, we propose a reliable client selection mechanism to exclude malicious models from the fusion process. In the second stage, we propose an adaptive model fusion method that dynamically assigns weights based on model quality to aggregate the best global models. Finally, We validate our approach against five distinct model fusion scenarios, demonstrating that our algorithm significantly enhances reliability without compromising accuracy.
1 Introduction
With the advent of deep learning technologies, various industries have been integrating these technologies into their sectors, promoting the development of intelligent transportation, smart logistics, and healthcare systems. These technologies are crucial in reducing production and management costs, enhancing operational efficiency, and accelerating industry digitization. However, supervised learning remains the primary method for training deep learning models, where the volume and diversity of samples are essential for creating high-quality models. Consequently, acquiring extensive and varied data samples has emerged as the initial step in training deep learning models. This approach has led to sample sources expanding from single industries to collaborations across multiple sectors to develop large-scale datasets. To achieve multi-party joint data analysis under the condition of protecting data security and privacy, Google has proposed federated learning technology for the first time. Although federated learning solves the problem of user privacy protection, the traditional federated learning algorithm assumes that all participants are trustworthy. On the contrary, in the actual scenario, if participants exhibit malicious behavior and intentionally contribute harmful models to the fusion process, it can significantly disrupt the global model’s convergence. Thus, creating adaptive defenses for federated learning systems becomes increasingly crucial [9]. Identifying methods to remove malicious models in federated learning model fusion has become a critical issue. Simultaneously, when a client submits low-quality models for fusion, determining how to adaptively adjust each model’s fusion weights based on their quality is also an urgent problem needing resolution. Some studies have applied reinforcement learning techniques to address these weighting issues. For instance, the Favor [10] method uses the DDPG to assign weights to participant models. Additional research has applied reinforcement learning to address device selection [11] [12], resource optimization [13] [14], and communication optimization in IoT federated learning contexts.
Reinforcement learning (RL) employs a trial-and-error strategy. The essence of this approach is training an intelligent agent that interacts with the external environment through varied actions. The environment then provides feedback in the form of rewards and penalties based on the agent’s actions, guiding the agent toward optimal action selection by maximizing reward value. However, employing reinforcement learning presents certain challenges. Firstly, continuous training is required for sample collection through environmental interaction. When the cost of such interactions is prohibitive or unacceptable (for example, in our scenario, where the server must frequently calculate the global model’s parameters), the efficiency of sample collection significantly impacts the reinforcement learning training duration. Secondly, when the agent’s action space is vast and continuous, it leads to prolonged sampling periods. These issues mean traditional single-agent reinforcement learning training approaches can be exceedingly time-consuming. Applying reinforcement learning in federated learning requires addressing these problems, as increasing participant numbers escalates agent training time. Therefore, optimizing the action space for reinforcement learning to expedite the agent training process is an essential challenge to address.
Why opt for phased reinforcement learning? We take an example to explain this problem. Consider a robot learning to cook through reinforcement learning, with the process divided into washing, chop**, and cooking stages. The robot must master each stage to prepare a successful dish. Traditional reinforcement learning aims to identify the optimal action across all stages simultaneously; however, mastering the initial stage is essential before progressing. By adopting a phased learning approach, the robot sequentially masters each stage, streamlining the learning process and leading to more effective outcomes. Similarly, if malicious models are not initially filtered out, the agent’s trial-and-error costs in weight assignment for these models will increase. To resolve these issues, we propose a staged reinforcement learning algorithm (FedDRL). The contributions of the paper are as follows.
-
•
We design a federated learning framework that employs reinforcement learning for model fusion, designed to select trustworthy clients and optimally assign model weights.
-
•
We propose an adaptive client selection strategy based on the A2C algorithm, dynamically identifying and selecting trustworthy clients while excluding malicious ones from the model fusion process based on situational analysis.
-
•
We propose an adaptive weight assignment method that adaptively adjusts the weights according to the quality of their uploaded models.
-
•
We propose an adaptive weight assignment method that adaptively adjusts the model fusion weights according to the quality of their uploaded models.
-
•
We present five types of model fusion scenarios to validate the performance of each algorithm. We also compare the performance of our algorithm with the baseline algorithm on three public datasets.
2 Related Work
2.1 Federated Learning
Research in federated learning primarily aims to address two challenges: enhancing the generalization of the global model on the server side and personalizing the model on the client side. Consequently, federated learning algorithms are bifurcated into server-side and client-side optimization strategies. Google initially introduced the FedAvg algorithm [2] to address the problem of server-side global model fusion. To improve global model convergence, Karimireddy et al. developed the Scaffold method [3], which mitigates client-side drift by integrating a control variable. Similarly, Li et al. introduced FedProx [4], applying a regularization function to client models to correct deviations. Additionally, Wang et al. unveiled FedNova [5], addressing global model convergence issues by normalizing parameters on both client and server ends. Furthermore, Li et al. have introduced the MOON [6] technique, leveraging model comparison learning to enhance global model convergence. Chen et al. [29]. also proposed a client identification method based on model parameter features to achieve trustworthy federated learning.
While those approaches enhance the global model’s convergence speed, practical federated learning situations reveal variances in the quality of models trained by individual participants. These discrepancies stem from the diversity in computational resources and the calibre of data samples available to each participant. Additionally, variations arise due to the quantity and type of samples possessed by each participant, a phenomenon known as Non-IID (Non-Independent and Identically Distributed). Consequently, these factors complicate the attainment of optimal global model aggregation in the Non-IID environments.
2.2 Challenges of Non-IID Data Distribution
The Non-IID data issue significantly impacts federated learning models’ convergence. Zhao et al. explored various federated learning methods’ performance on non-IID datasets, demonstrating significant accuracy challenges [15]. Accordingly, several studies have addressed the non-IID dilemma in federated learning. For instance, Zhang et al. proposed the FedPD approach [16], optimizing models and communication for non-convex objective functions. Moreover, Gong et al. introduced AutoCFL [17], utilizing a weighted voting client clustering strategy to mitigate non-IID and imbalanced data effects. Huang et al. developed FedAMP [18], which addresses Non-IID data-induced client-side model personalization issues through personalized model updates. Li et al. devised Fedbn [19], incorporating a batch normalization layer into local models to address feature shift challenges due to data heterogeneity. Briggs et al. suggested a hierarchical clustering method (FL+HC) [1], improving Non-IID dataset model performance by grou** clients for independent model training. Additionally, Gao et al. offered the Feddc approach [20], bridging client and global model parameter disparities through a control variable. Lastly, Mu et al. introduced Fedproc [21], directing client model training by integrating a comparative loss between client and global models. Chen [7] et al. proposed a federated learning method based on adaptive knowledge distillation to improve the accuracy of heterogeneous model scenarios.
Although these methodologies advance Non-IID issue mitigation in federated learning, they typically assign uniform fusion weights to all clients, failing to exclude malicious or low-quality model contributions. Consequently, dynamically selecting clients for fusion and adaptively calculating each model’s weight remains critical for successful global model integration.
2.3 Federated Reinforcement Learning
Given the adaptive learning potential of reinforcement learning, its application within federated learning contexts has garnered interest. Some research has concentrated on leveraging reinforcement learning to boost global model performance. For instance, Wang et al. introduced the Favor method [10], which adaptively selects clients for model fusion. Sun et al. developed the PG-FFL framework [22], addressing the challenge of client weight computation during model fusion. Additional studies have applied reinforcement learning for device optimization within federated IoT frameworks. For example, Zhang et al. utilized the DDPG algorithm [11] for optimal device selection. Zhang also formulated the FedMarl strategy [23], employing multi-agent reinforcement learning for node selection. Similarly, Yang et al. proposed a digital twin architecture (DTEI) [12], applying reinforcement learning for device selection issues. Other investigations have addressed resource optimization and scheduling challenges within IoT contexts, such as Zhang et al.’s RoF methodology [13], which leverages multi-intelligent reinforcement learning for optimal resource scheduling. Additionally, Rjoub et al. have developed trusted device selection techniques [24] and the DDQN-Trust method [14], utilizing Q-learning to assess devices’ credit scores for optimal scheduling. To ameliorate federated learning communication issues, Yang et al. introduced a reinforcement learning-based model evaluation method [25], selecting optimal devices for training and fusion. Nevertheless, while these efforts predominantly focus on IoT environment applications—such as device selection, resource optimization, and communication enhancement—they seldom address federated learning’s model weight calculation challenges. Therefore, Zhang et al. proposed the Fed framework [27], employing the DDPG reinforcement learning method for adaptive client weight calculation. Chen et al. [28] designed a task platform for implementing trustworthy federation learning.
Although current research addresses the issue of weight allocation in federated learning, it often neglects the training efficiency of the agents. Therefore, optimizing the training efficiency of agents is a significant challenge that needs attention.
3 Method
3.1 Problem Definition
In this section, we scrutinize the prevailing challenges of the current federated learning approach and subsequently propose a solution. In federated learning, the objective is to get the global model by amalgamating local models from all clients through server-side aggregation. We define n clients as involved in model fusion, and the client is denoted as where . Each client has a network model , where . Each client has its private data , where . The number of samples in each dataset is , where . The total number of samples is . We define the as a model parameter of . where .
Additionally, the server-side model aggregation process per round is defined as shown in equation 1:
(1) |
The is the fusion weight of each model parameter.
Traditional Federated Learning typically employs a weighted average approach for computing model fusion weights, with each model’s weight determined by its corresponding client’s data sample size relative to the total. Thus, clients contributing more data exert a greater influence on the aggregated model. However, this method fails to consider the quality of each client’s model and the potential inclusion of malicious models in real-world scenarios. We illustrate the deficiencies of the traditional federated fusion algorithm through two scenarios:
Scenario 1: A client’s data represents 20% of the total, yet its model’s accuracy is merely 53%. Employing the conventional federated fusion algorithm in this case would detrimentally impact the global model’s accuracy.
Scenario 2: A client engaged in model fusion launches malicious attacks, intentionally skewing its model’s output to reflect a mere 10% accuracy. If such malicious models are incorporated through the standard fusion process, the accuracy of the global model would be severely compromised.
Addressing these challenges necessitates an adaptive weight calculation strategy capable of nullifying malicious models by assigning them a weight of zero, thus excluding them from the fusion process. Concurrently, this approach should dynamically adjust the weights of each client’s model, prioritizing those of higher quality to enhance the global model’s overall accuracy.
Adopting a single-agent reinforcement learning strategy to tackle these issues introduces new challenges. As the number of clients increases, so too does the agent’s action space, prolonging the training duration. Additionally, a single-agent framework is limited to interacting with just one environment, further extending the sampling period. We propose a bifurcated solution inspired by hierarchical reinforcement learning to mitigate these concerns, thereby streamlining the lengthy reinforcement learning training process. This solution comprises two primary stages: the selection of trustworthy clients and the assignment of optimal weights.
![Refer to caption](extracted/5481097/figure/FedDRL.jpg)
Stage 1: During this phase, the objective is to identify K trustworthy models from a pool of N for inclusion in the global model fusion. Identifying clients who have uploaded malicious models is challenging. We address this by employing reinforcement learning to dynamically select and autonomously screen client models, as delineated in equation 2.
(2) |
Stage 2: Building on the first step, we then allocate optimal weights to the verified models to bolster the global model’s accuracy, formalized in equation 3.
(3) |
Here, signifies a method for adaptive weight computation, and represents the optimal computational weight assigned to each client’s output.
3.2 A Trustworthy Federated Learning Approach Based on Staged Reinforcement Learning
To address these challenges, we introduce a trusted federated learning framework anchored in staged reinforcement learning (FedDRL). This framework unfolds across two distinct phases. In the first phase, we propose an adaptive client selection strategy aimed at identifying and selecting trustworthy clients for participation in model fusion. Subsequently, in the second phase, we formulate a model weight assignment algorithm designed to dynamically allocate fusion weight values to models based on the prevailing fusion environment. The process is depicted in Figure 1.
3.2.1 Adaptive client selection method
Once we have defined the base elements of reinforcement learning, We use a distributed A2C approach to train the agent; A2C is an improved method-based A3C algorithm [26]. Figure 1 shows the A2C architecture, which consists of a central node and workers. Each worker contains an Actor and a Critic network, where the actor network generates action, and the Critic network evaluates the action and gives the corresponding reward. Meanwhile, each worker independently interacts with the related environment to achieve sampling and training of the Actor and Critic networks. In addition, the Actor and Critic networks of the central node are used to synchronize the network information of each worker and to achieve the fusion and sharing of network parameters of multiple workers.
Therefore, our main objective is to train Actor and Critic networks. We define the Actor-network parameters as and the Critic network parameters as . The process of the worker and the central node is as follows.
Step 1: Each worker initializes the local network by pulling the global network model parameters from the centre node. Then, each worker trains the Actor and Critic networks by interacting with the environment independently. Finally, the two networks are uploaded to the central node.
Step 2: After the central node collects the network parameters uploaded by all workers, it updates the global model by the weighted averaging method. Then, the server sends the two networks to each worker.
Steps 1 and 2 are repeated according to the total number of times to obtain the final global model.
The training process for the step 1 neutralization network is as follows: The gradient of the primary communication algorithm of the policy network is calculated as equation 4.
(4) |
Where is the advantage function. The k-step sampling strategy is used in the A2C algorithm to calculate the advantage function, so the definition is expressed as equation 5.
(5) |
The Loss function of the actor network is calculated as in equation 6, and The Critic network is calculated as in equation 7.
(6) |
(7) |
We update the Actor and Critic network parameters using the derivative formula as equation 8.
(8) |
Finally, each worker uploads the Actor and Critic network to the server. Then, the network parameters of the server are calculated using the weighted average method. The process is equation 9.
(9) |
When the parameters of the Actor and Critic networks in the central stage are updated, the central node sends down these two networks to all workers, and each worker uses the updated networks to continue interacting with the external environment. The process is repeated for the specified number of rounds until the agent at the central node can obtain a stable reward value. The process is shown in algorithm 1.
3.2.2 Adaptive model weight calculation method
In this phase, our main objective is to achieve the optimal weight assignment for each model. For each communication round, we assume that trustworthy client models were selected. We need to train the agents in each communication round and use the weight output of the agent to achieve the global model fusion. We first describe the process of global model fusion for agent-based actions. We define as the -th client model, and the all client models as . We also define as the number of samples of -th client. The process is as follows:
(1) In this step, the agent needs to output the weight values for each model. We define the -th time, the action adopted by the agent as equation 10.
(10) |
is the -th weight value output by agent for -th model.
(2) We aggregate the global models based on the model weights assigned by the agent, and the process is expressed as equation 11.
(11) |
We aim to train the agent so that it can output the optimal fusion weight values based on the quality of each model. To accomplish this goal, we first describe the basic elements of reinforcement learning as follows:
Environment: The external environment is the server-side global model fusion module, which fuses the global model based on the actions output by the agent and then verifies the accuracy of the global model on the reserved dataset on the server side. Finally, the server side feeds back to the agent the corresponding reward and punishment values based on the accuracy of the global model.
State: We define the agent’s state information to include the number of samples corresponding to each client, the accuracy of each client’s model, and the accuracy of the global model fused using the weights output by the agent. as shown in 12.
(12) |
The is the accuracy of the global model fused using the weights output by the agent.
Action: In each stage, the agent needs to assign each model’s weights based on the model’s quality. The action space is shown as 13. denotes the weight value assigned to the -th client in the state t, while the sum of the corresponding weight values of all clients is 1.
(13) |
Reward: We define the model accuracy aggregated using the average method as , where each model weight is . At the -th time, we define the weight set output by the agent as . Then, we use the weight set to fusion the global model, and we define the accuracy of the global model as . We calculate the reward value by subtracting the difference of from . If the calculated result is greater than zero, this indicates that the weights assigned by the agent improve the accuracy of the global model, and we give a positive reward. Conversely, we give a penalty reward. , denotes the reward and penalty factors, respectively. So, the reward is defined as equation 14.
(14) |
When we have finished defining the basic elements, We implement a distributed reinforcement learning approach based on TD3 [8] to train the agent. The training process is shown in figure 1. This stage includes a central Learner and multiple Worker nodes. Each worker corresponds to a parallel environment. The workflow of each worker is as follows: first, each worker performs global model fusion based on the assigned weights; then verifies the accuracy of the global model by interacting with the parallel environment; and finally receives the reward values from the parallel environment feedback. Finally, each worker stores the corresponding ones in the sampling buffer pool. Multiple workers interact with each environment independently, thus achieving parallel sampling to improve the sampling efficiency. After each worker collects a certain batch of samples, the Learner trains the agent by taking a certain amount of sample data from the experience pool.
The TD3 algorithm consists of six network models, including an Actor network , two Critic networks ,, and a target Actor-network , two target Critic networks . Each network is shown in figure 1. The Learner randomly draws batches of sample data from the buffer pool every certain round to train the model. The training processes are as follows.
(1) First, select the action based on the target Actor-network . The state and action are input to the target Critic network and , respectively. The two target Critic networks will calculate the predicted reward and .
(2) The TD target value is calculated using equation 15, where takes the minimum value of both.
(15) |
(3) Select the action based on the actor network, input the state and action into the critical network separately, and let these two networks output the corresponding prediction reward sum.
(4) Calculate the TD error. The calculation formula is as equation 16.
(16) |
(5) Update the Critic network as equation 17.
(17) |
(6) Update the strategy network every d rounds through the Actor-network output action as equation 18.
(18) |
(7) Update the target Actor and Critic network parameters every d rounds as equation 19.
(19) |
Repeating the above steps for the specified number of rounds, we will get the trained agent. Finally, we output the optimal value of each model through the agent. The process is shown in algorithm 2
4 SYSTEM DESIGN
To establish a reliable federated learning process, we developed a framework for trustworthy federated learning (FedDRL). The framework employs a staged reinforcement learning approach to achieve trustworthy federated learning. In the first stage, we train agents to accomplish the selection of trustworthy clients to participate in global model fusion. Then, in the second stage, we also use the trained agent to dynamically adjust the fusion weights of each model and finally realize the optimal global model fusion. The framework workflow consists of six steps, as shown in Figure 2.
Step 1 (Local Model Training): Each client downloads the global model, initializes its parameters accordingly, and conducts model training using local private data.
Step 2 (Upload Model): After local model training, each client uploads its model parameters to the server.
Step 3 (Select Trustworthy Clients): Upon receiving client model parameters, the server employs the algorithm to train an agent. Subsequently, the trained agent selects trustworthy clients.
![Refer to caption](extracted/5481097/figure/System.jpg)
Step 4 (Assigning Model Weights): The server Utilizes models from trustworthy clients and performs global model fusion. It then employs the algorithm to train an agent, which optimizes weight assignments for each client model.
Step 5 (Fusing Global Model): The server fuses the global model using the calculated weights from the previous step.
Step 6 (Distribute Global Model): The server disseminates the global model to all clients, initiating the subsequent federation task.
The federation task is set to execute a specified number of communication rounds until the final global model is obtained. This process is shown in Algorithm 3.
5 EXPERIMENT
5.1 Experiment setup
5.1.1 Experiment datasets
We evaluated the FedDRL framework using three distinct image classification datasets:
Fashion-MNIST: This dataset includes 60,000 training samples and 10,000 test samples, each a 28x28 grayscale image, classified into one of 10 categories.
CIFAR-10: The CIFAR-10 dataset comprises 60,000 32x32 colour images, evenly distributed across ten classes, each containing 6,000 images.
CIFAR-100: Similar in size to CIFAR-10 but with a broader spectrum, CIFAR-100 features 100 classes with 600 images each, totalling 60,000 colour images.
Data Set Partitioning: For simulating non-IID data distribution among clients. We utilized the Dirichlet function to segregate data across various clients in the open-source dataset. This method can partition the data for each client by adjusting the alpha parameter. As the alpha parameter approaches zero, clients’ data distributions are skewed towards specific classes within the dataset. Conversely, as alpha increases towards infinity. Using the CIFAR-10 dataset as a case study, we set alpha to 1, thereby dividing the three datasets among ten clients. In the figure, Different categories are represented by distinct colours, and the length of each segment within the graphs reflects the sample count within that category. The resulting data distribution is illustrated in Figure 3.
![Refer to caption](extracted/5481097/figure/data-split/data-split-fasion.jpg)
![Refer to caption](extracted/5481097/figure/data-split/data-split-cifar10.jpg)
![Refer to caption](extracted/5481097/figure/data-split/data-split-cifar100.jpg)
5.1.2 Comparison of Methods
We contrasted the FedDRL algorithm with two established federated learning approaches.
FedAvg[2]: Serving as the foundational benchmark in federated learning, the FedAvg method determines the weight of each client model based on the proportion of samples contributed by the client relative to the aggregate sample size.
FedProx[4]: Enhancing the FedAvg approach, FedProx incorporates a regularization term within the client model, thereby refining federated learning performance.
5.1.3 Experimental Metrics
We employed accuracy as the metric to gauge the performance of the global model in multi-classification tasks and across individual clients. Assuming n clients engage in model fusion with m communication rounds, the accuracy of the global model in the t-th round is denoted as . The collective global model accuracies across all rounds are represented as follows:
(20) |
We denote the accuracy of the -th client’s model as . Additionally, we document each client model’s accuracy per round, compiling these as follows:
(21) |
5.1.4 Experimental Configuration
Hardware Configuration: The experiments were conducted on a workstation equipped with an Intel i9-12900k CPU, 64GB RAM, and an NVIDIA RTX3090 GPU.
Software Configuration: We utilized two distinct frameworks for the Federated Learning and Reinforcement Learning experiments. Federated Learning trials were carried out using FedBolt, our custom-built framework, enabling simulation of varied client numbers and data distributions. For reinforcement learning model training, we employed the stablebaseline3 framework, designing two distinct algorithms for trusted client selection and model weight assignment.
Network Setup: We implemented different network architectures tailored to each dataset. For CIFAR-10 and CIFAR-100, a 6-layer CNN was utilized for model training. Conversely, a 4-layer MLP was developed for the Fashion-MNIST dataset.
Agent Network Setup: Implementing a staged reinforcement learning strategy necessitated the training of two distinct agents. The initial phase, adhering to Section 3.2.1, utilizes the A2C algorithm, with each worker and the central node comprising a 6-layer MLP actor and critic network. For the second phase, the TD3 algorithm outlined in Section 3.2.2 was employed for agent training, where each module within the TD3 setup incorporates a 6-layer MLP, with further details available in Section 3.2.2.
5.2 Experimental Results
We evaluate the FedDRL framework through four experiments: client attack scenarios, low-quality model fusion, hybrid scenarios, and multi-agent training efficiency. The client attack experiments assess the efficacy of the trustworthy client selection algorithm (stage 1). The low-quality model fusion experiment examines the adaptive weight calculation method (stage 2). The hybrid experiments, combining client attacks and low-quality model elements, validate the comprehensive performance of FedDRL. The final experiment focuses on the training efficiency of multi-agents.
5.2.1 Malicious Client Attack Experiment
In this experiment, we define three types of client-side attacks in federated learning to evaluate our FedDRL framework under adversarial conditions. The experiment spans different client numbers and attack types across three datasets, detailed in Table 1.
Type 1: The client directly uploads the initialized model or makes the model accuracy less than 10% by modifying the model’s hyperparameters.
Type 2: We use falsified data to perform the attack. We use a certain percentage of forged data to participate in model training (e.g., mix the CIFAR-10 dataset with of CIFAR-100 data and generate these CIFAR-100 data labels as CIFAR-10 corresponding label types). We conduct the attack by faking sample data to train the client’s local model, thus reducing the client model’s accuracy.
Type 3: We select some clients to simulate the attack and divide the training process of these clients into standard and attack rounds. In the standard round, each client does not perform the attack behavior. Instead, each client deliberately uploads the prepared malicious model in the attack round. We also set that these clients alternately initiate the attack behavior.
Number | Attack Type | Malicious ID | Number of samples | Accuracy of models () |
---|---|---|---|---|
Clients=5 | Type 1 | Client1 | 7750 | |
Type 2 | Client1 | 7750 | ||
Type 3 | Client1 | 7750 | Attack round | |
Clients=10 | Type 1 | Client1,Client6 | 4222, 4938 | |
Type 2 | Client1,Client6 | 4222, 4938 | ||
Type 3 | Client1,Client6 | 4222, 4938 | Attack round | |
Clients=15 | Type 1 | Client1,Client6,Client11 | 3670, 3314, 4454 | |
Type 2 | Client1,Client6,Client11 | 3670, 3314, 4453 | ||
Type 3 | Client1,Client6,Client11 | 3670, 3314, 4453 | Attack round |
According to the experimental setup, we compared the FedDRL algorithm with the FedAvg and FedProx. In the attack experiments, we set the total number of communication rounds to 100 rounds, and each client performs local model training with one epoch. To show the attack behavior of each client and the accuracy of different algorithms more detail, we counted the accuracy of each client’s local model and the accuracy of the server-side global model in each communication round. The specific experimental results are shown in table 2.
DataSet | Method | Clients=5 | Clients=10 | Clients=15 | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Type 1 | Type 2 | Type 3 | Type 1 | Type 2 | Type 3 | Type 1 | Type 2 | Type 3 | ||
Fashion -MNIST | FedAvg | 0.862 | 0.875 | 0.863 | 0.792 | 0.881 | 0.821 | 0.776 | 0.878 | 0.812 |
FedProx | 0.873 | 0.884 | 0.864 | 0.791 | 0.882 | 0.824 | 0.764 | 0.879 | 0.811 | |
Ours | 0.885 | 0.878 | 0.883 | 0.877 | 0.886 | 0.887 | 0.881 | 0.886 | 0.882 | |
Cifar10 | FedAvg | 0.596 | 0.691 | 0.751 | 0.335 | 0.681 | 0.314 | 0.139 | 0.664 | 0.197 |
FedProx | 0.586 | 0.732 | 0.775 | 0.331 | 0.716 | 0.363 | 0.122 | 0.719 | 0.202 | |
Ours | 0.731 | 0.701 | 0.747 | 0.694 | 0.711 | 0.727 | 0.679 | 0.702 | 0.689 | |
Cifar100 | FedAvg | 0.376 | 0.412 | 0.298 | 0.273 | 0.416 | 0.287 | 0.162 | 0.398 | 0.176 |
FedProx | 0.398 | 0.442 | 0.321 | 0.223 | 0.436 | 0.208 | 0.172 | 0.426 | 0.183 | |
Ours | 0.412 | 0.438 | 0.431 | 0.426 | 0.432 | 0.421 | 0.423 | 0.412 | 0.422 |
To show the effect of the FedDRL algorithm on global model fusion at each communication round, we conducted experiments using the CIFAR10 dataset on 5, 10, and 15 clients. We compared FedDRL with the FedAvg and FedProx algorithms for global model accuracy.
We analyze the experimental results for different numbers of client models and different client data. In attack type 1, In malicious data attack type 2, our algorithm outperforms the FedAvg algorithm and slightly underperforms the FedProx algorithm alone. In the attack type 3 scenario, our algorithm outperforms the comparison algorithm in most cases, especially when multiple malicious clients are involved in model fusion.
![Refer to caption](extracted/5481097/figure/clientAttack/type1/cifar10-10client-100round-fedAvgAttack_type_1-1epoch-20230520-163039_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type1/cifar10-10client-100round-fedProxAttack_type_1-1epoch-20230520-131902_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type1/cifar10-10client-100round-fedFdrlAttack_type_1-1epoch-20230524-051532_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type1/cifar10-15client-100round-fedAvgAttack_type_1-1epoch-20230520-225139_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type1/cifar10-15client-100round-fedProxAttack_type_1-1epoch-20230521-225829_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type1/cifar10-15client-100round-fedFdrlAttack_type_1-1epoch-20230524-220310_accuracy.jpg)
To show the relationship between the global and client model’s accuracy in each attack scenario. We conducted more detailed experiments on the Cifar10 dataset.
In attack type 1, the global model accuracy plummets with increasing malicious clients under FedAvg and FedProx, drop** below 40% and 20% in 10 and 15 client setups, respectively. Conversely, FedDRL’s dynamic client selection maintains higher reliability. However, Our trained agent can dynamically select trusted clients for model fusion and eliminate malicious models from participating, so our algorithm has higher reliability. The experimental results are shown in Figure 4.
In attack type 2, our algorithm is better than FedAvg but lower than FedProx. The FedProx algorithm uses control parameters to force the models of each client to converge to the global model, which will improve the global model’s accuracy by improving the malicious model’s accuracy to some extent. Our trained agent will filter out low-accuracy models to participate in the fusion after several communication rounds. The experimental results are shown in Figure 5.
![Refer to caption](extracted/5481097/figure/clientAttack/type2/cifar10-10client-100round-fedAvgAttack_type_5-1epoch-20230613-001359_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type2/cifar10-10client-100round-fedProxAttack_type_5-1epoch-20230612-173140_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type2/cifar10-10client-100round-fedFdrlAttack_type_5-1epoch-20230612-231606_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type2/cifar10-15client-100round-fedAvgAttack_type_5-1epoch-20230612-150533_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type2/cifar10-15client-100round-fedProxAttack_type_5-1epoch-20230612-173915_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type2/cifar10-15client-100round-fedFdrlAttack_type_5-1epoch-20230612-232021_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type3/cifar10-10client-100round-fedAvgAttack_type_3-1epoch-20230520-183306_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type3/cifar10-10client-100round-fedProxAttack_type_3-1epoch-20230520-150911_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type3/cifar10-10client-100round-fedFdrlAttack_type_3-1epoch-20230524-024405_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type3/cifar10-15client-100round-fedAvgAttack_type_3-1epoch-20230521-005609_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type3/cifar10-15client-100round-fedProxAttack_type_3-1epoch-20230520-214019_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/clientAttack/type3/cifar10-15client-100round-fedFdrlAttack_type_3-1epoch-20230524-024909_accuracy.jpg)
In attack type 3 scenarios, the FedAvg and FedProx algorithms experience significant fluctuations in global model accuracy due to alternating attack behaviors by malicious clients. Conversely, the agent within the FedDRL framework adaptively selects trusted clients, effectively excluding malicious entities from participating in model fusion, thereby enabling the FedDRL algorithm to operate with stability. The experimental results are shown in Figure 6.
5.2.2 Low-quality Model Fusion Experiments
In evaluating our FedDRL framework, we undertook validation using the Fashion-MNIST, CIFAR-10, and CIFAR-100 datasets. Given their open-source nature, these datasets are of high quality, leading to minimal variance in model accuracy among clients utilizing them directly. Thus, to simulate real-world conditions, we incorporated low-quality models into the global fusion process. We established a model accuracy threshold, ensuring that models uploaded by low-quality clients did not exceed this threshold in any communication round.
Experiments were carried out on the three datasets, with client groups of varying sizes—5, 10, and 15—participating in the global model fusion. We applied a Dirichlet distribution with parameter alpha=1 to achieve dataset segmentation among clients. We set some clients to upload low-quality models; after several communication rounds, we controlled these client models’ accuracy in global fusion, ensuring it remained within the 40% to 55% range.
Details of these low-quality model experiment configurations are specified in Table 3. The FedDRL algorithm was compared against the FedAvg and FedProx methods across 100 communication rounds, with each client executing one epoch of local model training. Results are summarized in Table 4.
Number | Dataset | Low-quality Model ID | Number of samples | Accuracy of models () |
---|---|---|---|---|
Clients=5 | Fashion-MINST | Client1 | 9061 | 53% |
CIFAR-10 | Client1 | 7750 | 52% | |
CIFAR-100 | Client1 | 9278 | 22% | |
Clients=10 | Fashion-MINST | Client1,Client5 | 5071, 7245 | 51%, 52% |
CIFAR-10 | Client1,Client5 | 4222, 6039 | 50%, 54% | |
CIFAR-100 | Client1,Client5 | 4191, 5491 | 22% | |
Clients=15 | Fashion-MINST | Client1,Client5,Client10 | 4405, 3752, 1809 | 52%, 51%, 53% |
CIFAR-10 | Client1,Client5,Client10 | 3670, 3128, 1509 | 49%, 52%, 55% | |
CIFAR-100 | Client1,Client5,Client10 | 3073, 3494, 2910 | 22% 19% 23% |
The FedDRL algorithm was compared against the FedAvg and FedProx methods across 100 communication rounds, with each client executing one epoch of local model training. Results are summarized in Table 4. Details of these low-quality model experiment configurations are specified in Table 3.
Method | Fashion-MINST | CIFAR-10 | CIFAR-100 | ||||||
---|---|---|---|---|---|---|---|---|---|
C=5 | C=10 | C=15 | C=5 | C=10 | C=15 | C=5 | C=10 | C=15 | |
FedAvg | 0.857 | 0.858 | 0.841 | 0.705 | 0.664 | 0.602 | 0.386 | 0.373 | 0.365 |
FedProx | 0.865 | 0.861 | 0.829 | 0.714 | 0.652 | 0.607 | 0.402 | 0.391 | 0.386 |
Ours | 0.885 | 0.887 | 0.884 | 0.725 | 0.706 | 0.698 | 0.422 | 0.418 | 0.407 |
Employing the CIFAR-10 dataset for illustrative purposes, we performed comparative analyses for setups with 10 and 15 clients, respectively; the findings are depicted in Figure 7. The experiments indicate that the accuracy of the FedAvg and FedProx methods deteriorates as the prevalence of low-quality models increases. This decline can be attributed to these algorithms’ reliance on sample count for determining the fusion weight values of the models, where the inclusion of low-quality models adversely impacts the global model’s accuracy. Conversely, FedDRL surpasses both methodologies in terms of global model convergence speed and accuracy. This is because FedDRL adaptively recalibrates the weights assigned to each client’s model based on quality, thereby diminishing the adverse effects of low-quality models on the global model’s accuracy and consequently hastening the global model’s convergence rate.
![Refer to caption](extracted/5481097/figure/LowModel/cifar10-10client-100round-fedAvgAttack_type_2-1epoch-20230520-171519_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/LowModel/cifar10-10client-100round-fedProxAttack_type_2-1epoch-20230520-101017_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/LowModel/cifar10-10client-100round-fedFdrlAttack_type_2-1epoch-20230524-041033_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/LowModel/cifar10-15client-100round-fedAvgAttack_type_2-1epoch-20230520-213819_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/LowModel/cifar10-15client-100round-fedProxAttack_type_2-1epoch-20230520-233516_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/LowModel/cifar10-15client-100round-fedFdrlAttack_type_2-1epoch-20230524-002344_accuracy.jpg)
5.2.3 Hybrid experiment
In this section, we establish a hybrid scenario incorporating two types of attacking clients (type 1 and type 3) alongside clients submitting low-quality models. We assess the effectiveness of the FedDRL algorithm within this mixed scenario and benchmark it against the FedAvg and FedProx approaches.
Employing the CIFAR-10 dataset, we set different numbers of clients (10,15) participating in global model fusion, respectively. Client 1 persistently uploads merely the initial model at each round. Client 6 emulates the submission of low-quality models for fusion, and Client 10 or 11 engages in attack behaviour during odd communication rounds but normally participates during even rounds. The remainder of the nodes contribute routinely to each cycle of the federated learning tasks. The experimental setup specifics are delineated in Table 5.
Number | Client ID | Type | Number of samples | Model Accuracy |
---|---|---|---|---|
Clients=10 | Client1 | Attack Type 1 | 4222 | |
Client6 | Low-quality Model | 4938 | ||
Client10 | Attack Type 3 | 3560 | Attack round | |
Clients=15 | Client1 | Attack Type 1 | 3670 | |
Client6 | Low-quality Model | 3314 | ||
Client11 | Attack Type 3 | 4453 | Attack round |
![Refer to caption](extracted/5481097/figure/hybrid/cifar10-10client-100round-fedAvgAttack_type_4-1epoch-20230610-170706_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/hybrid/cifar10-10client-100round-fedProxAttack_type_4-1epoch-20230610-171716_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/hybrid/cifar10-10client-100round-fedFdrlAttack_type_4-1epoch-20230613-192306_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/hybrid/cifar10-15client-100round-fedAvgAttack_type_4-1epoch-20230525-000128_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/hybrid/cifar10-15client-100round-fedProxAttack_type_4-1epoch-20230520-195539_accuracy.jpg)
![Refer to caption](extracted/5481097/figure/hybrid/cifar10-15client-100round-fedFdrlAttack_type_4-1epoch-20230524-215130_accuracy.jpg)
After completing 100 communication rounds, we present the global model accuracy for each algorithm in Table 6. The comparative global model accuracies and individual client model accuracies per communication round, as determined by these three algorithms, are depicted in Figure 8. The experimental outcomes from the hybrid scenario reveal that the FedAvg and FedProx algorithms falter in properly conducting global model fusion due to the adversarial behavior of certain clients. Incorporating malicious models under traditional algorithmic frameworks significantly degrades the global model’s accuracy.
Method | Fashion-MINST | CIFAR-10 | CIFAR-100 | |||
---|---|---|---|---|---|---|
Clients=10 | Clients=15 | Clients=10 | Clients=15 | Clients=10 | Clients=15 | |
FedAvg | 0.835 | 0.823 | 0.368 | 0.348 | 0.223 | 0.238 |
FedProx | 0.821 | 0.846 | 0.308 | 0.341 | 0.241 | 0.266 |
Ours | 0.876 | 0.883 | 0.701 | 0.698 | 0.426 | 0.418 |
The experimental outcomes show that FedAvg and FedProx’s global model accuracies suffer from malicious attacks due to their weighted average-based fusion, which doesn’t block harmful participants. Conversely, the FedDRL algorithm, through its two-stage approach, initially filters out malicious models from fusion and subsequently applies an adaptive weight strategy to diminish the impact of substandard models. Consequently, our algorithm maintains operational integrity even within this complex scenario.
5.2.4 Agent Training Efficiency in the FedDRL Framework
In this segment, our primary objective is to assess the training efficiency of agents within the FedDRL framework. To expedite the training process, we have implemented optimizations in two key areas. Initially, we adopted a distributed reinforcement learning methodology, enabling multi-agents to interact concurrently with the external environment. Concurrently, we introduced a memory cache module designed to prevent redundant sampling by multiple agents.
Experimental Scenarios: Our investigation encompasses varied attack scenarios across two distinct datasets: Fashion-MNIST and Cifar-10. In each scenario, we involve a total of 10 and 15 clients in the federated task, including 2 and 3 malicious clients accordingly.
Comparison Experiments: To ascertain the efficacy of the FedDRL framework, we initiated experiments featuring 1, 5, 10, and 20 agents. To guarantee the stability of the reward values acquired by the final agents, we designated the number of iterations for each experimental group to be 10,000, 15,000, 20,000, and 25,000, correspondingly.
Experimental metrics: Our evaluation involves counting the iterations necessary for reinforcement learning to reach stable rewards across different agent counts. We employ a sliding window approach to compute the average reward, depicting the progression of rewards attained by the agents. We define the agent’s reward obtains in the -th interaction and the sliding window as . The formula for calculating the average reward is represented as equation 22:
(22) |
Reward Parameter Setting: Our reward function comprises two components: the global model accuracy reward and the reward for the number of credible nodes. For this experiment, these parameters are set to 100 and 10, respectively.
Dataset | Attack Type | The number of agents | |||
---|---|---|---|---|---|
N=1 | N=5 | N=10 | N=20 | ||
Fashion-MNIST | Type-1 | 25000 | 20000 | 16000 | 8000 |
Type-2 | 25000 | 21000 | 15000 | 9000 | |
CIFAR-10 | Type-1 | 25000 | 20000 | 12000 | 10000 |
Type-2 | 25000 | 20000 | 14000 | 9000 |
![Refer to caption](extracted/5481097/figure/Experiment3/fashionmnist-10-LabelFlipAttack2-reward.jpg)
![Refer to caption](extracted/5481097/figure/Experiment3/fashionmnist-10-SignFlipAttack2-reward.jpg)
![Refer to caption](extracted/5481097/figure/Experiment3/cifar10-15-LabelFlipAttack3-reward.jpg)
![Refer to caption](extracted/5481097/figure/Experiment3/cifar10-15-SignFlipAttack3-reward.jpg)
Experimental Results: In accordance with our experimental setup, we recorded the reward values for each iteration of the agents, as detailed in Figure 9. We have systematically arranged this information into Table 7 for enhanced clarity regarding the actual iterations across different experiments.
The data reveals a notable trend: The single agent does not get the optimal reward in some attack scenarios, because the single agent is easy to fall into the local optimal solution. Meanwile, an increase in agents correlates with reducing the iterations required to achieve a stable reward. However, this relationship is not strictly proportional because the multi-agent independently train their respective Actor and Critic networks. Each agent necessitates a distinct number of iterations to ensure the stability of its individual networks. Nevertheless, the simultaneous interaction of multiple agents with the environment markedly decreases the sampling time, demonstrating a clear trade-off between computational resources and time. This strategy underlines the significant computational resources required, highlighting a deliberate exchange of increased computational demand for reduced computational time.
6 CONCLUSION
To realize trustworthy federated learning, We propose a trusted reinforcement learning framework (FedDRL) based on staged reinforcement learning. The framework comprises two phases: selecting trusted clients and adaptive weight assignment. In the first phase, we design a reward strategy to train the agent, which allows the trained agent to exclude malicious client models from participating in model fusion based on the environment, and it also adaptively selects trustworthy clients for model fusion. In the second phase, we design a dynamic model weight calculation method, which can adaptively calculate the corresponding weights based on the model quality of each client. In addition, we propose a distributed reinforcement learning method to accelerate agent training. Finally, we design five model fusion scenarios to validate our approach, and the experiments show that our proposed algorithm can work reliably in various model fusion scenarios while maintaining global model accuracy.
Although a multi-agent distributed reinforcement learning approach can accelerate the agent training process, it sacrifices computational resources for the computational time. In our future work, we will continue to explore more lightweight and trustworthy federated learning methods. We will also investigate more efficient reinforcement learning methods for credible federated learning.
References
- [1] Briggs C, Fan Z, Andras P. Federated learning with hierarchical clustering of local updates to improve training on non-IID data[C]//2020 International Joint Conference on Neural Networks (IJCNN). IEEE, 2020: 1-9.
- [2] McMahan B, Moore E, Ramage D, et al. Communication-efficient learning of deep networks from decentralized data[C]//Artificial intelligence and statistics. PMLR, 2017: 1273-1282.
- [3] Karimireddy S P, Kale S, Mohri M, et al. Scaffold: Stochastic controlled averaging for federated learning[C]//International conference on machine learning. PMLR, 2020: 5132-5143.
- [4] Li T, Sahu A K, Zaheer M, et al. Federated optimization in heterogeneous networks[J]. Proceedings of Machine learning and systems, 2020, 2: 429-450.
- [5] Wang J, Liu Q, Liang H, et al. Tackling the objective inconsistency problem in heterogeneous federated optimization[J]. Advances in neural information processing systems, 2020, 33: 7611-7623.
- [6] Li Q, He B, Song D. Model-contrastive federated learning[C]//Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2021: 10713-10722.
- [7] Chen L, Zhang W, Dong C, et al. FedTKD: A Trustworthy Heterogeneous Federated Learning Based on Adaptive Knowledge Distillation[J]. Entropy, 2024, 26(1): 96.
- [8] Fujimoto S, Hoof H, Meger D. Addressing function approximation error in actor-critic methods[C]//International conference on machine learning. PMLR, 2018: 1587-1596.
- [9] Li H, Sun X, Zheng Z. Learning to attack federated learning: A model-based reinforcement learning attack framework[J]. Advances in Neural Information Processing Systems, 2022, 35: 35007-35020.
- [10] Wang H, Kaplan Z, Niu D, et al. Optimizing federated learning on non-iid data with reinforcement learning[C]//IEEE INFOCOM 2020-IEEE conference on computer communications. IEEE, 2020: 1698-1707.
- [11] Zhang P, Wang C, Jiang C, et al. Deep reinforcement learning assisted federated learning algorithm for data management of IIoT[J]. IEEE Transactions on Industrial Informatics, 2021, 17(12): 8475-8484.
- [12] Yang W, Xiang W, Yang Y, et al. Optimizing federated learning with deep reinforcement learning for digital twin empowered industrial IoT[J]. IEEE Transactions on Industrial Informatics, 2022, 19(2): 1884-1893.
- [13] Zhang W, Yang D, Wu W, et al. Optimizing federated learning in distributed industrial IoT: A multi-agent approach[J]. IEEE Journal on Selected Areas in Communications, 2021, 39(12): 3688-3703.
- [14] Rjoub G, Wahab O A, Bentahar J, et al. Trust-driven reinforcement selection strategy for federated learning on IoT devices[J]. Computing, 2022: 1-23.
- [15] Zhao Y, Li M, Lai L, et al. Federated learning with non-iid data[J]. arXiv preprint arXiv:1806.00582, 2018.
- [16] Zhang X, Hong M, Dhople S, et al. Fedpd: A federated learning framework with adaptivity to non-iid data[J]. IEEE Transactions on Signal Processing, 2021, 69: 6055-6070.
- [17] Gong B, Xing T, Liu Z, et al. Adaptive client clustering for efficient federated learning over non-iid and imbalanced data[J]. IEEE Transactions on Big Data, 2022.
- [18] Huang Y, Chu L, Zhou Z, et al. Personalized cross-silo federated learning on non-iid data[C]//Proceedings of the AAAI conference on artificial intelligence. 2021, 35(9): 7865-7873.
- [19] Li X, Jiang M, Zhang X, et al. Fedbn: Federated learning on non-iid features via local batch normalization[J]. arXiv preprint arXiv:2102.07623, 2021.
- [20] Gao L, Fu H, Li L, et al. Feddc: Federated learning with non-iid data via local drift decoupling and correction[C]//Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2022: 10112-10121.
- [21] Mu X, Shen Y, Cheng K, et al. Fedproc: Prototypical contrastive federated learning on non-iid data[J]. Future Generation Computer Systems, 2023, 143: 93-104.
- [22] Sun Y, Si S, Wang J, et al. A fair federated learning framework with reinforcement learning[C]//2022 International Joint Conference on Neural Networks (IJCNN). IEEE, 2022: 1-8.
- [23] Zhang S Q, Lin J, Zhang Q. A multi-agent reinforcement learning approach for efficient client selection in federated learning[C]//Proceedings of the AAAI Conference on Artificial Intelligence. 2022, 36(8): 9091-9099.
- [24] Rjoub G, Wahab O A, Bentahar J, et al. Trust-augmented deep reinforcement learning for federated learning client selection[J]. Information Systems Frontiers, 2022: 1-18.
- [25] Yang N, Wang S, Chen M, et al. Model-based reinforcement learning for quantized federated learning performance optimization[C]//GLOBECOM 2022-2022 IEEE Global Communications Conference. IEEE, 2022: 5063-5068.
- [26] Mnih V, Badia A P, Mirza M, et al. Asynchronous methods for deep reinforcement learning[C]//International conference on machine learning. PMLR, 2016: 1928-1937.
- [27] Zhang W, Yu F, Wang X, et al. Fed: Resilient Reinforcement Federated Learning for Industrial Applications[J]. IEEE Transactions on Industrial Informatics, 2022.
- [28] Chen L, Zhang W, Xu L, et al. A Federated Parallel Data Platform for Trustworthy AI[C]//2021 IEEE 1st International Conference on Digital Twins and Parallel Intelligence (DTPI). IEEE, 2021: 344-347.
- [29] Chen L, Zhao D, Tao L, et al. A Credible and Fair Federated Learning Framework Based on Blockchain[J]. IEEE Transactions on Artificial Intelligence, 2024.