Harnessing the Power of Federated Learning in Federated Contextual Bandits
Abstract
Federated learning (FL) has demonstrated great potential in revolutionizing distributed machine learning, and tremendous efforts have been made to extend it beyond the original focus on supervised learning. Among many directions, federated contextual bandits (FCB), a pivotal integration of FL and sequential decision-making, has garnered significant attention in recent years. Despite substantial progress, existing FCB approaches have largely employed their tailored FL components, often deviating from the canonical FL framework. Consequently, even renowned algorithms like FedAvg remain under-utilized in FCB, let alone other FL advancements. Motivated by this disconnection, this work takes one step towards building a tighter relationship between the canonical FL study and the investigations on FCB. In particular, a novel FCB design, termed FedIGW, is proposed to leverage a regression-based CB algorithm, i.e., inverse gap weighting. Compared with existing FCB approaches, the proposed FedIGW design can better harness the entire spectrum of FL innovations, which is concretely reflected as (1) flexible incorporation of (both existing and forthcoming) FL protocols; (2) modularized plug-in of FL analyses in performance guarantees; (3) seamless integration of FL appendages (such as personalization, robustness, and privacy). We substantiate these claims through rigorous theoretical analyses and empirical evaluations.
1 Introduction
Federated learning (FL), initially proposed by McMahan et al. (2017); Konečnỳ et al. (2016), has garnered significant attention for its effectiveness in enabling distributed machine learning with heterogeneous agents (Li et al., 2020a; Kairouz et al., 2021). As FL has gained popularity, numerous endeavors have sought to extend its applicability beyond the original realm of supervised learning, e.g., to unsupervised and semi-supervised learning (Zhang et al., 2020; van Berlo et al., 2020; Zhuang et al., 2022; Lubana et al., 2022). Among these directions, the exploration of federated contextual bandits (FCB) has emerged as a particularly compelling area of research, representing a pivotal fusion of FL and sequential decision-making, which has found various practical applications in cognitive radio and recommendation systems, among others.
Over the past several years, substantial progress has been made in the field of FCB (Wang et al., 2019; Li & Wang, 2022b; Li et al., 2022; 2023; Dai et al., 2023), particularly those involving varying function approximations (e.g., linear models, as discussed in Huang et al. (2021b); Dubey & Pentland (2020); Li & Wang (2022a); He et al. (2022); Amani et al. (2022); Fan et al. (2023)). Despite their different focuses, it can be observed that these existing designs all employ certain FL components to enable the participating agents to collaboratively update their CB parameterization via locally collected interaction data.
However, these FL components adopted in the previous FCB works are often over-simplified. In particular, the canonical FL framework (traced back to the celebrated FedAvg algorithm (McMahan et al., 2017)) typically takes an optimization view of incorporating the local data through multi-round aggregation of model parameters (such as gradients). In contrast, the FL protocol in many existing FCB works is one-shot aggregation of some compressed local data per epoch (e.g., combining local estimates and local covariance matrices in the study of federated linear bandits). Admittedly, for some simple cases, such straightforward aggregation is sufficient and allows problem-specific finetuning for tight performance bounds. However, such a deviation from the canonical FL studies prohibits existing FCB designs from leveraging the vast FL advances, and thus largely limits the connection between FL and FCB.
Motivated by this disconnection between FL and FCB, this work, instead of pursuing tighter performance bounds, aims to utilize the canonical FL framework as the FL component of FCB to harness the full power of FL studies in FCB. We propose FedIGW – an exploring design that demonstrates the ability to leverage a comprehensive array of FL advancements, encompassing canonical algorithmic approaches (like FedAvg (McMahan et al., 2017) and SCAFFOLD (Karimireddy et al., 2020)), rigorous convergence analyses, and critical appendages (such as personalization, robustness, and privacy). To the best of our knowledge, this is the first paper that explicitly focuses on the close connection between FL and FCB, which we hope can inspire a new line of FCB studies. The distinctive contributions of FedIGW can be succinctly summarized as follows:
Flexible incorporation of FL protocols. In the FCB setting with stochastic contexts and a realizable reward function, FedIGW employs the inverse gap weighting (IGW) algorithm for CB while versatile FL protocols can be incorporated (e.g., FedAvg and SCAFFOLD), provided they can solve a standard FL problem. These two parts iterate according to designed epochs: FL, drawing from previously gathered interaction data, supplies estimated reward functions for the forthcoming IGW interactions. A pivotal advantage is that the flexible FL component in FedIGW provides substantial adaptability, meaning that existing and future FL protocols can be seamlessly leveraged. Experimental results using real-world data with several different FL choices corroborate the practicability and flexibility of FedIGW.
Modularized plug-in of FL analyses. A general theoretical analysis of FedIGW is developed to demonstrate its provably efficient performance. The influence of the adopted FL protocol is captured through its optimization error, delineating the excess risk of the learned reward function. Notably, any theoretical breakthroughs in FL convergence rates can be immediately integrated into the obtained analysis framework and supply the corresponding guarantees of FedIGW. Concretized results are further provided through the utilization of FedAvg and SCAFFOLD in FedIGW.
Seamless integration of FL appendages. Beyond its inherent generality and efficiency, FedIGW exhibits exceptional extensibility. Various appendages from FL studies can be flexibly integrated without necessitating alterations to the CB component. We explore the extension of FedIGW to personalized learning and the incorporation of privacy and robustness guarantees. Similar investigations in prior FCB works would entail substantial algorithmic modifications, while FedIGW can effortlessly leverage corresponding FL advancements to obtain these appealing attributes.
Key related works. Most of the previous studies on FCB are discussed in Sec. 2.2, and more comprehensively reviewed in Appendix B. We note that these FCB designs with tailored FL protocols in previous works sometimes can achieve near-optimal performance bounds in specific settings, while our proposed FedIGW is more practical and extendable. We believe these two types of designs are valuable supplements to each other. A high-level comparison between the proposed FedIGW and existing FCB designs is listed in Table 1. Additionally, while this work was being developed, the paper (Agarwal et al., 2023) was posted, which also proposes to have a decoupled FL component in FCB. However, Agarwal et al. (2023) mainly focuses on empirical investigations, while our work offers valuable complementary contributions by conducting thorough theoretical analyses.
2 Federated Contextual Bandits
This section introduces the problem of federated contextual bandits (FCB). A concise formulation is first provided. Then, the existing works are re-visited with a focus on revealing the disconnection between FL and FCB.
2.1 Problem Formulation
Agents. In the FCB setting, a total of agents simultaneously participate in solving a contextual bandit (CB) problem. For generality, we consider an asynchronous system: each of the agents has a clock indicating her time step, which is denoted as for agent . For convenience, we also introduce a global time step . Denote by the agent ’s local time step when the global time is , and the global time step when the agent ’s local time is .
Agent at each of her local time step observes a context , selects an action from an action set , and then receives the associated reward (possibly depends on both and ) as in the standard CB (Lattimore & Szepesvári, 2020). Each agent’s goal is to collect as many rewards as possible given a time horizon.
Federation. While many efficient single-agent (centralized) algorithms have been proposed for CB (Lattimore & Szepesvári, 2020), FCB targets building a federation among agents to perform collaborative learning such that the performance can be improved from learning independently. Especially, common interests shared among agents motivate their collaboration. Thus, FCB studies typically assume that the agents’ environments are either fully (Wang et al., 2019; Huang et al., 2021b; Dubey & Pentland, 2020; He et al., 2022; Amani et al., 2022; Li et al., 2022; Li & Wang, 2022b; Dai et al., 2023) or partially (Li & Wang, 2022a; Agarwal et al., 2020) shared in the global federation.
In federated learning, the following two modes are commonly considered: (1) There exists a central server in the system, and the agents can share information with the server, which can then broadcast aggregated information back to the agents; or (2) There exists a communication graph between agents, who can share information with their neighbors on the graph. In the later discussions, we mainly consider the first scenario, i.e., collaborating through the server, which is also the main focus in FL, while both modes can be effectively encompassed in the proposed FedIGW design.
2.2 The Current Disconnection Between FCB and FL
The exploration of FCB traces its origins to distributed multi-armed bandits (Wang et al., 2019). Since then, FCB research has predominantly focused on enhancing performance in broader problem domains, encompassing various types of reward functions, such as linear (Wang et al., 2019; Huang et al., 2021b; Dubey & Pentland, 2020), kernelized (Li et al., 2022; 2023), generalized linear (Li & Wang, 2022b) and neural (Dai et al., 2023) (see Appendix B for a comprehensive review).
Existing FCB designs | FedIGW | |
FL components | Develop tailored FL protocols | Leverage versatile FL protocols, such as FedAvg and SCAFFOLD |
Theoretical guarantees | Analyse tailored FL protocols for the focused instance | Plugin FL convergence rates in a modularized fashion |
Extensions (e.g., personalization, robustness, privacy) | Require further tailored protocols | Integrate corresponding FL advances directly |
a more comprehensive review is in Appendix B.
Reference | Setting | FL | CB |
Globally Shared Full Model (See Section 3) | |||
Wang et al. (2019) | Tabular | Mean Averaging | AE |
Wang et al. (2019); Huang et al. (2021b) | Linear | Linear Regression | AE |
Li & Wang (2022a); He et al. (2022) | Linear | Ridge Regression | UCB |
Li & Wang (2022b) | Gen. Linear | Distributed AGD | UCB |
Li et al. (2022; 2023) | Kernel | Nyström Approximation | UCB |
Dai et al. (2023) | Neural | NTK Approximation | UCB |
FedIGW (this work) | Realizable | Flexible (e.g., FedAvg) | IGW |
Globally Shared Partial Model (see Section 6.1) | |||
Li & Wang (2022a) | Linear | Alternating Minimization | UCB |
Agarwal et al. (2020) | Realizable | FedRes.SGD | -greedy |
FedIGW (this work) | Realizable | Flexible (e.g., LSGD-PFL) | IGW |
AE: arm elimination; Gen. Linear: generalized linear model; AGD: accelerated gradient descent
![Refer to caption](extracted/5317909/figs/alternating.png)
Upon a holistic review of these works, it becomes apparent that each of them employs a particular FL protocol to update the parameters required by CB. To be more specific, a periodically alternating design between CB and FL is commonly adopted as reflected in Fig. 1: CB (collects one epoch of data in parallel) FL (proceeds with CB data together and outputs CB’s parameterization) updated CB (collects another epoch of data in parallel) . A compact summary, including the components of FL and CB employed in previous FCB works, is presented in Table 2.
However, with a deeper look into the existing works, it is evident that the adopted FL components are not well investigated and even have some mismatches from canonical FL designs (McMahan et al., 2017; Konečnỳ et al., 2016). For example, in federated linear bandits (Wang et al., 2019; Dubey & Pentland, 2020; Li & Wang, 2022a; He et al., 2022; Amani et al., 2022; Fan et al., 2023) and its extensions (Li et al., 2022; 2023; Li & Wang, 2022b; Dai et al., 2023), the adopted FL protocols typically involve the direct transmission of local reward aggregates and covariance matrices, constituting a one-shot aggregation of compressed local data per epoch (albeit with subtle variations, such as synchronous or asynchronous communications); a concrete example is given in Appendix A.2, Due to both efficiency and privacy concerns, such choices are rare (and even undesirable) in canonical FL studies, where agents typically communicate and aggregate their model parameters (e.g., gradients) over multiple rounds, e.g., the renowned FedAvg algorithm (McMahan et al., 2017) (see details in Appendix A.2).
We believe that this disparity represents a significant drawback in current FCB studies, as it limits the connection between FL and FCB to merely philosophical, i.e., benefiting individual learning by collaborating through a federation, while vast FL studies cannot be leveraged to benefit FCB as illustrated in Fig. 2. Driven by this gap, this work aims to take one step towards establishing a closer relationship between FCB and FL through the introduction of an exploring design, FedIGW, that is detailed in the subsequent sections. This approach provides the flexibility to integrate any FL protocol following the standard FL framework, which allows us to effectively harness the progress made in FL studies, encompassing canonical algorithmic designs, convergence analyses, and useful appendages.
![Refer to caption](extracted/5317909/figs/comparison.png)
3 FedIGW: Flexible Incorporation of FL Protocols
In this section, we present FedIGW, a novel FCB algorithm proposed in this work. Before delving into the algorithmic details, a more concrete system model with stochastic contexts and a realizable reward function is introduced. Subsequently, we outline the specifics of FedIGW, emphasizing its principal strength in seamlessly integrating canonical FL protocols.
3.1 System Model
Built on the formulation in Sec. 2, for each agent , denote a context space, and a finite set of actions. At each time step of each agent , the environment samples a context and a context-dependent reward vector according to a fixed but unknown distribution . The agent , as in Sec. 2, then observes the context , picks an action , and receives the reward . The expected reward of playing action given context is denoted as .
With no prior information about the rewards, the agents gradually learn their optimal policies, denoted by for agent with context . Following a standard notation (Wang et al., 2019; Huang et al., 2021b; Dubey & Pentland, 2020; Li & Wang, 2022a; He et al., 2022; Amani et al., 2022; Li & Wang, 2022b; Li et al., 2022; 2023; Dai et al., 2023), the overall regret of agents in this environment is
where is the effective time horizon for agent given a global horizon and the expectation is taken over the randomness in contexts and rewards and the agents’ algorithms. This overall regret can be interpreted as the sum of each agent ’s individual regret with respect to (w.r.t.) her optimal strategy . Hence, it is ideal to be sub-linear w.r.t. the number of agents , which indicates the agents’ learning processes are accelerated on average due to federation.
Realizablilty. Despite not knowing the true expected reward functions, we consider the scenario that they are the same across agents and are within a function class , to which the agents have access. This assumption, rigorously stated in the following, is often referred to as the realizability assumption.
Assumption 3.1 (Realizability).
There exists in such that for all , and .
This assumption is a natural extension from its commonly-adopted single-agent version (Agarwal et al., 2012; Simchi-Levi & Xu, 2022; Xu & Zeevi, 2020; Sen et al., 2021) to a federated one. Note that it does not imply that the agents’ environments are the same since they may face different contexts , arms , and distributions , where is the marginal distribution of the joint distribution on the context space . We study a general FCB setting only with this assumption, which incorporates many previously studied FCB scenarios as special cases. For example, the federated linear bandits (Huang et al., 2021b; Dubey & Pentland, 2020; Li & Wang, 2022a; He et al., 2022; Amani et al., 2022) are with a linear function class .
3.2 Algorithm Design
The FedIGW algorithm proceeds in epochs, which are separated at time slots w.r.t. the global time step , i.e., the -th epoch starts from and ends at . The overall number of epochs is denoted as . In each epoch , we describe the FL and CB components as follows, while emphasizing that the FL component is decoupled and follows the standard FL framework.
CB: inverse gap weighting (IGW). For CB, we use inverse gap weighting (Abe & Long, 1999), which has received growing interest in the single-agent setting recently (Foster & Rakhlin, 2020; Simchi-Levi & Xu, 2022; Krishnamurthy et al., 2021; Ghosh et al., 2021) but has not been fully investigated in the federated setting. At any time step in epoch , when encountering the context , agent first identifies the optimal arm by from an estimated reward function (provided by the to-be-discussed FL component). Then, she randomly selects her action according to the following distribution, which is inversely proportional to each action’s estimated reward gap from the identified optimal action :
where is the learning rate in epoch that controls the exploration-exploitation tradeoff.
Besides being a valuable supplement to the currently dominating UCB-based studies in FCB, the main merit of leveraging IGW as the CB component is that it only requires an estimated reward function instead of other complicated data analytics, e.g., upper confidence bounds.
FL: flexible choices. By IGW, each agent performs local stochastic arm sampling and collects a set of data samples in epoch . To enhance the performance of IGW in the subsequent epoch , an improved estimate based on all agents’ data is desired. This objective aligns precisely with the aim of canonical FL studies, which aggregates local data for better global estimates (McMahan et al., 2017; Konečnỳ et al., 2016). Thus, the agents can target solving the following standard FL problem:
(1) |
where is the number of samples in dataset , is the total number of samples, and is the empirical local loss of agent with as the loss function and as the -th sample in .
As Eqn. (1) exactly follows the standard formulation of FL, the agents and the server can employ any FL protocol to solve this optimization, such as FedAvg (McMahan et al., 2017), SCAFFOLD (Karimireddy et al., 2020) and FedProx (Li et al., 2020a). These wildly-adopted FL protocols typically perform iterative communications of local model parameters (e.g., gradients), instead of one-shot aggregations of compressed local data in previous FCB studies. To highlight the remarkable flexibility, we denote the adopted FL protocol as . With datasets , the output function of this FL process, denoted as , is used as the estimated reward function for IGW sampling in the next epoch .
The FedIGW algorithm for agent is summarized in Alg. 1. The key, as aforementioned, is that the component of FL in FedIGW is highly flexible as it only requires an estimated reward function for later IGW interactions. In particular, any existing or forthcoming FL protocol following the standard FL framework in Eqn. (1) can be leveraged as the in FedIGW.
Remark 3.2.
The main underlying reason for selecting IGW as the CB component is that it is a regression-based CB algorithm, i.e., IGW only requires a learned reward function for the CB interaction in one epoch . The canonical FL framework with an optimization perspective is exactly targeted at learning such a function via collaboratively solving Eqn. (1), which thus can be integrated with IGW. In contrast, previous FCB designs are predominated by UCB-based CB components as reflected in Table 2. However, obtaining the upper confidence bounds (UCBs) estimates for an unknown reward function is not usually the target of the canonical FL framework. Thus, tailored FL components are developed to fulfill this purpose, e.g., sharing covariance matrices to obtain UCBs for linear reward functions.
4 Theoretical Guarantees: Modularized Plug-in of FL Analyses
In this section, we theoretically analyze the performance of the FedIGW algorithm, where the impact of the adopted FL choice is modularized as a plug-in component of its optimization error.
4.1 A General Guarantee
Denoting as the length of epoch for agent , as the epoch length set, , and , the following global regret guarantee can be established.
Theorem 4.1.
Using a learning rate in epoch , denoting , the regret of FedIGW can be bounded as
(2) |
Here (abbreviated from ) denotes the excess risk of the output from the adopted using the datasets , whose formal definition is deferred to Definition C.1.
It can be observed that in Eqn. (2), the first term bounds the regret in the first epoch. The obtained bounds for the regrets incurred within each later epoch (i.e., the term inside the sum over in the second epoch) can be interpreted as the epoch length times the expected per-step suboptimality, which then relates to the estimation quality of and thus as is learned with the interaction data collected from epoch as in the design of FedIGW shown in Alg. 1.
4.2 Some Concretized Discussions
Theorem 4.1 is notably general in the sense that a corresponding regret can be established as long as an upper bound on the excess risk can be obtained for a certain class of reward functions and the adopted FL protocol. In the following, we provide several more concrete illustrations, and especially, a modularized framework to leverage FL convergence analyses. To ease the notation, we discuss synchronous systems with a shared number of arms in the following, i.e., , and , while noting similar results can be easily obtained for general systems. With this simplification, we can unify all as and as .
To initiate the concretized discussions, we start with considering a finite function class , i.e., , which can be extended to a function class with a finite covering number of the metric space . In particular, the following corollary can be established via establishing in the considered case as in Lemma D.2.
Corollary 4.2 (A Finite Function Class).
If and the adopted FL protocol provides an exact minimizer for Eqn. (1) with quadratic losses, with , FedIGW incurs a regret of and a total calls of the adopted FL protocol.
We note that the obtained regret approaches the optimal regret of a single agent playing for rounds (Agarwal et al., 2012) up to logarithmic factors, which demonstrates the statistical efficiency of the proposed FedIGW. Moreover, the total times call of the FL protocol indicates that only a limited number of agents-server information-sharing are required, which further illustrates its communication efficiency.
As the finite function class is not often practically useful, we then focus on the canonical FL setting that each is parameterized by a -dimensional parameter as , e.g., a neural network. To facilitate discussions, we abbreviate while denoting as the empirical optimal parameter given a fixed dataset and as the output of the adopted FL protocol. We further assume is parameterized by the true model parameter , and for a fixed , define as its expected loss w.r.t. the data distribution.
Following standard learning-theoretic analyses, the key task excess risk can be bounded via a combination of errors stemming from optimization and generalization.
Lemma 4.3.
If the loss function is -strongly convex in its first coordinate for all , it holds that , where and .
For the generalization error term , we can utilize standard results in learning theory (e.g., uniform convergence). For the sake of simplicity, we here leverage a distributional-independent upper bound on the Rademacher complexity, denoted as (rigorously defined in Eqn. (4)), which provides that using the classical uniform convergence result (see Lemma D.5). We do not further particularize this upper bound while noting it can be specified following standard procedures (Mohri et al., 2018; Bartlett et al., 2005).
On the other hand, the optimization error term is exactly the standard convergence error in the analysis of FL protocols. Thus, once any theoretical breakthrough on the convergence of one FL protocol is reported, the obtained result can be immediately incorporated into our analysis framework to characterize the performance of FedIGW using that FL protocol. In particular, the following corollary is established to demonstrate the modularized plug-in of analyses of different FL protocols, where FedAvg (McMahan et al., 2017) and SCAFFOLD (Karimireddy et al., 2020) are adopted as further specific instances. To the best of our knowledge, this is the first time that convergence analyses of FL protocols can directly benefit the analysis of FCB designs.
Corollary 4.4 (Modularized Plug-in of FL Analyses; A Simplified Version of Corollary D.6).
Under the condition of Lemma 4.3, the regret of FedIGW can be bounded as
where and using rounds of communications (i.e., global aggregations) and rounds of local updates in epoch , under a few other standard conditions,
-
•
with FedAvg as the adopted , it holds that ;
-
•
with SCAFFOLD as the adopted , it holds that .
From this corollary, we can see that FedIGW enables a general analysis framework to seamlessly leverage theoretical advances in FL, in particular, convergence analyses. Thus, besides FedAvg and SCAFFOLD, when switching the FL component in FedIGW to FedProx (Li et al., 2020a), FedOPT (Reddi et al., 2020), and other existing or forthcoming FL designs, we can effortlessly plug in their optimization errors to obtain corresponding performance guarantees of FedIGW. This convenience highlights the theoretically intimate relationship between FedIGW and canonical FL studies.
Moreover, Corollary 4.4 can also guide how to perform the adopted FL protocol. As the generalization error is an inherent property that cannot be bypassed by better optimization results, there is no need to further proceed with the iterative FL process as long as the optimization error does not dominate the generalization error, which is reflected in a more particularized corollary in Corollary D.7.
Remark 4.5 (A Linear Reward Function Class).
As a more specified instance, we consider linear reward functions as in federated linear bandits, i.e., and , where is a known feature map**. In this case, the FL problem can be formulated as a standard ridge regression with . With a properly chosen regularization parameter , the generalization error can be bounded as (Hsu et al., 2012), while a same-order optimization error can be achieved by many efficient distributed algorithms (Nesterov, 2003) with roughly rounds of communications. Then, with an exponentially growing epoch length, FedIGW can have a regret of with at most rounds of communications as illustrated in Appendix D.3, both of which are efficient with sublinear dependencies on the number of agents and time horizon . It is worth noting that during this process, no raw or compressed data is communicated – only processed model parameters (e.g., gradients) are exchanged. This aligns with FL studies while is distinctive from previous designs for federated linear bandits (Dubey & Pentland, 2020; Li & Wang, 2022a; He et al., 2022; Fan et al., 2023), which often communicate covariance matrices or aggregated rewards.
![Refer to caption](extracted/5317909/figs/main_bibtex_v2.png)
![Refer to caption](extracted/5317909/figs/main_delicious_v2.png)
5 Experimental Results
In this section, we report the empirical performances of FedIGW on two distinct real-world multi-label classification datasets, Bibtex (Katakis et al., 2008) and Delicious (Tsoumakas et al., 2008), which are also used in other practical CB investigations such as Cortes (2018). The aim of CB in these experiments is considered to be recommending one of the correct labels at any given time. Especially, in the experiments, at each time step, a context is randomly sampled from the dataset while the true labels are concealed from the agents. The agents then determine which label to select (i.e., pull one arm) with their CB algorithms; thus the number of arms is the number of possible labels in each dataset. Upon pulling one arm, a reward of is granted if the pulled arm corresponds to one of the true labels, while a reward of is granted otherwise. From Table 3, we can observe that these tasks are challenging given their high-dimensional contexts () and large numbers of arms (). Additional experimental details and results are discussed in Appendix G.
Task | Context dimension | Number of arms |
Bibtex | 1835 | 159 |
Delicious | 500 | 983 |
Varying FL choices. The reported Fig. 3 first compares the averaged rewards collected by each agent with FedIGW using different FL choices, including FedAvg (McMahan et al., 2017), SCAFFOLD (Karimireddy et al., 2020), and FedProx (Li et al., 2020a). This is the first time, to the best of our knowledge, that FedAvg is practically integrated with FCB experiments, let alone other FL protocols, which largely demonstrate the generality and flexibility of FedIGW. It can be observed that using the more developed SCAFFOLD and FedProx provides improved performance (i.e., collects more rewards) compared with the basic FedAvg, which credits to that FedIGW can flexibly leverage algorithmic advances in FL protocols.
Comparison with baselines. To further verify the performance of FedIGW, experiments are conducted to compare its performance with one state-of-the-art federated contextual bandit baseline. Especially, the federated neural-upper confidence bound (FN-UCB) design proposed in Dai et al. (2023) is adopted as the FCB baseline due to its capability of leveraging neural networks to approximate rewards and the previously reported strong performance. In Fig. 3, both FedIGW and FN-UCB leverage the same-size MLPs to approximate reward functions for fair comparisons. It can be observed that after convergence, FedIGW (even with the basic FedAvg) significantly outperforms FN-UCB with about twice the rewards collected by each agent on average, demonstrating its remarkable superiority.
6 Flexible Extensions: Seamless Integration of FL Appendages
Another notable advantage offered by the flexible FL choices is to bring appealing appendages from FL studies to directly benefit FCB. In the following, we discuss how to leverage techniques of personalization, robustness, and privacy from FL in FedIGW while presenting intriguing avenues for future exploration.
6.1 Personalized Learning
In many cases, each agent’s true reward function is not globally realizable as in Assumption 3.1, but instead only locally realizable in her own function class as in the following assumption.
Assumption 6.1 (Local Realizability).
For each , there exists in such that for all and
Following discussions in Sec. 4.2, we consider that each function in is parameterized by a -dimensional parameter , which is denoted as . Correspondingly, the true reward function is parameterized by and denoted as . To still motivate the collaboration and motivated by popular personalized FL studies (Hanzely et al., 2021; Agarwal et al., 2020), we study a middle case where only partial parameters are globally shared among while other parameters are potentially heterogeneous among agents, which can be formulated via the following assumption.
Assumption 6.2.
For all , the true parameter can be decomposed as with and , where and . In other words, there are -dimensional globally shared parameters among .
A similar setting is studied in Li & Wang (2022a) for linear reward functions and in Agarwal et al. (2020) for realizable cases with a naive -greedy design for CB. For FedIGW, we can directly adopt a personalized FL protocol (such as LSGD-PFL in Hanzely et al. (2021)) to solve a standard personalized FL problem:
With outputs and , the corresponding functions (instead of the single one in Sec. 3.2) can be used by the agents, separately, for their CB interactions following the IGW algorithm. Concrete results and more details can be found in Appendix E.1.
6.2 Robustness, Privacy, and Beyond
Another important direction in FCB studies is to improve robustness against malicious attacks and provide privacy guarantees for local agents. A few progresses have been achieved in attaining these desirable attributes for FCB but they typically require substantial modifications to their base FCB designs, such as robustness in Demirel et al. (2022); Jadbabaie et al. (2022); Mitra et al. (2022) and privacy guarantees in Dubey & Pentland (2020); Zhou & Chowdhury (2023); Li & Song (2022); Huang et al. (2023).
With FedIGW, it is more convenient to achieve these attributes as suitable techniques from FL studies can be seamlessly applied. Especially, robustness and privacy protection have been extensively studied for FL in Yin et al. (2018); Pillutla et al. (2022); Fu et al. (2019) and Wei et al. (2020); Yin et al. (2021); Liu et al. (2022), respectively, among other works. As long as such FL protocols can provide an estimated function (which is the default goal of FL), they can be adopted in FedIGW to achieve additional robustness and privacy guarantees in FCB; see more details in Appendix E.2.
Other Possibilities. There have been many studies on fairness guarantees (Mohri et al., 2019; Du et al., 2021), client selections (Balakrishnan et al., 2022; Fraboni et al., 2021), and practical communication designs (Chen et al., 2021; Wei & Shen, 2022; Zheng et al., 2020) in FL among many other directions, which are all conceivably applicable in FedIGW. In addition, Marfoq et al. (2023) studies FL with data streams, i.e., data comes sequentially instead of being static, which is a suitable design for FCB as CB essentially provides data streams. If similar ideas can be leveraged in FCB, the two components of CB and FL can truly be parallel.
7 Conclusions
In this work, we studied the problem of federated contextual bandits (FCB). It is first recognized that existing FCB designs are largely disconnected from canonical FL studies in their adopted FL protocols, which hinders the integration of crucial FL advancements. To bridge this gap, we introduced a novel design, FedIGW, capable of accommodating a wide range of FL protocols, provided they address a standard FL problem. A comprehensive theoretical performance guarantee was provided for FedIGW, highlighting its efficiency and versatility. Notably, we demonstrated the modularized incorporation of convergence analysis from FL by employing examples of the renowned FedAvg (McMahan et al., 2017) and SCAFFOLD (Karimireddy et al., 2020). Empirical validations on real-world datasets further underscored its practicality and flexibility. Moreover, we explored how advancements in FL can seamlessly bestow additional desirable attributes upon FedIGW. Specifically, we delved into the incorporation of personalization, robustness, and privacy, presenting intriguing opportunities for future research.
References
- Abbasi-Yadkori et al. (2011) Yasin Abbasi-Yadkori, Dávid Pál, and Csaba Szepesvári. Improved algorithms for linear stochastic bandits. Advances in neural information processing systems, 24, 2011.
- Abe & Long (1999) Naoki Abe and Philip M Long. Associative reinforcement learning using linear probabilistic concepts. In ICML, pp. 3–11. Citeseer, 1999.
- Agarwal et al. (2012) Alekh Agarwal, Miroslav Dudík, Satyen Kale, John Langford, and Robert Schapire. Contextual bandit learning with predictable rewards. In Artificial Intelligence and Statistics, pp. 19–26. PMLR, 2012.
- Agarwal et al. (2020) Alekh Agarwal, John Langford, and Chen-Yu Wei. Federated residual learning. arXiv preprint arXiv:2003.12880, 2020.
- Agarwal et al. (2023) Alekh Agarwal, H Brendan McMahan, and Zheng Xu. An empirical evaluation of federated contextual bandit algorithms. arXiv preprint arXiv:2303.10218, 2023.
- Amani et al. (2022) Sanae Amani, Tor Lattimore, András György, and Lin F Yang. Distributed contextual linear bandits with minimax optimal communication cost. arXiv preprint arXiv:2205.13170, 2022.
- Auer et al. (2002) Peter Auer, Nicolo Cesa-Bianchi, Yoav Freund, and Robert E Schapire. The nonstochastic multiarmed bandit problem. SIAM journal on computing, 32(1):48–77, 2002.
- Balakrishnan et al. (2022) Ravikumar Balakrishnan, Tian Li, Tianyi Zhou, Nageen Himayat, Virginia Smith, and Jeff Bilmes. Diverse client selection for federated learning via submodular maximization. In International Conference on Learning Representations, 2022.
- Bartlett et al. (2005) Peter Bartlett, Olivier Bousquet, and Shahar Mendelson. Local rademacher complexities. Annals of Statistics, 33(4):1497–1537, 2005.
- Boursier & Perchet (2019) Etienne Boursier and Vianney Perchet. Sic-mmab: synchronisation involves communication in multiplayer multi-armed bandits. In Advances in Neural Information Processing Systems, pp. 12071–12080, 2019.
- Chakrabarti et al. (2008) Deepayan Chakrabarti, Ravi Kumar, Filip Radlinski, and Eli Upfal. Mortal multi-armed bandits. Advances in neural information processing systems, 21, 2008.
- Chan et al. (2021) Jeffrey Chan, Aldo Pacchiano, Nilesh Tripuraneni, Yun S Song, Peter Bartlett, and Michael I Jordan. Parallelizing contextual bandits. arXiv preprint arXiv:2105.10590, 2021.
- Chen et al. (2021) Mingzhe Chen, Deniz Gündüz, Kaibin Huang, Walid Saad, Mehdi Bennis, Aneta Vulgarakis Feljan, and H Vincent Poor. Distributed learning in wireless networks: Recent progress and future challenges. IEEE Journal on Selected Areas in Communications, 39(12):3579–3605, 2021.
- Chen et al. (2022) Zhirui Chen, PN Karthik, Vincent YF Tan, and Yeow Meng Chee. Federated best arm identification with heterogeneous clients. arXiv preprint arXiv:2210.07780, 2022.
- Chou et al. (2020) Chi-Ning Chou, Juspreet Singh Sandhu, Mien Brabeeba Wang, and Tiancheng Yu. A general framework for analyzing stochastic dynamics in learning algorithms. arXiv preprint arXiv:2006.06171, 2020.
- Cisneros-Velarde et al. (2023) Pedro Cisneros-Velarde, Boxiang Lyu, Sanmi Koyejo, and Mladen Kolar. One policy is enough: Parallel exploration with a single policy is near-optimal for reward-free reinforcement learning. In International Conference on Artificial Intelligence and Statistics, pp. 1965–2001. PMLR, 2023.
- Cortes (2018) David Cortes. Adapting multi-armed bandits policies to contextual bandits scenarios. arXiv preprint arXiv:1811.04383, 2018.
- Dai et al. (2023) Zhongxiang Dai, Yao Shu, Arun Verma, Flint Xiaofeng Fan, Bryan Kian Hsiang Low, and Patrick Jaillet. Federated neural bandit. The Eleventh International Conference on Learning Representations, 2023.
- Demirel et al. (2022) Ilker Demirel, Yigit Yildirim, and Cem Tekin. Federated multi-armed bandits under byzantine attacks. arXiv preprint arXiv:2205.04134, 2022.
- Du et al. (2021) Wei Du, Depeng Xu, Xintao Wu, and Hanghang Tong. Fairness-aware agnostic federated learning. In Proceedings of the 2021 SIAM International Conference on Data Mining (SDM), pp. 181–189. SIAM, 2021.
- Dubey & Pentland (2020) Abhimanyu Dubey and Alex Pentland. Differentially-private federated linear bandits. Advances in Neural Information Processing Systems, 33:6003–6014, 2020.
- Dubey & Pentland (2021) Abhimanyu Dubey and Alex Pentland. Provably efficient cooperative multi-agent reinforcement learning with function approximation. arXiv preprint arXiv:2103.04972, 2021.
- Fan et al. (2023) Li Fan, Ruida Zhou, Chao Tian, and Cong Shen. Federated linear bandits with finite adversarial actions. arXiv preprint arXiv:2311.00973, 2023.
- Fan et al. (2021) Xiaofeng Fan, Yining Ma, Zhongxiang Dai, Wei **g, Cheston Tan, and Bryan Kian Hsiang Low. Fault-tolerant federated reinforcement learning with theoretical guarantee. Advances in Neural Information Processing Systems, 34:1007–1021, 2021.
- Foster & Rakhlin (2020) Dylan Foster and Alexander Rakhlin. Beyond ucb: Optimal and efficient contextual bandits with regression oracles. In International Conference on Machine Learning, pp. 3199–3210. PMLR, 2020.
- Foster et al. (2020) Dylan J Foster, Alexander Rakhlin, David Simchi-Levi, and Yunzong Xu. Instance-dependent complexity of contextual bandits and reinforcement learning: A disagreement-based perspective. arXiv preprint arXiv:2010.03104, 2020.
- Fraboni et al. (2021) Yann Fraboni, Richard Vidal, Laetitia Kameni, and Marco Lorenzi. Clustered sampling: Low-variance and improved representativity for clients selection in federated learning. In International Conference on Machine Learning, pp. 3407–3416. PMLR, 2021.
- Fu et al. (2019) Shuhao Fu, Chulin Xie, Bo Li, and Qifeng Chen. Attack-resistant federated learning with residual-based reweighting. arXiv preprint arXiv:1912.11464, 2019.
- Ghosh et al. (2021) Avishek Ghosh, Abishek Sankararaman, and Kannan Ramchandran. Model selection for generic contextual bandits. arXiv preprint arXiv:2107.03455, 2021.
- Girgis et al. (2021) Antonious Girgis, Deepesh Data, Suhas Diggavi, Peter Kairouz, and Ananda Theertha Suresh. Shuffled model of differential privacy in federated learning. In International Conference on Artificial Intelligence and Statistics, pp. 2521–2529. PMLR, 2021.
- Han et al. (2020) Yanjun Han, Zhengqing Zhou, Zhengyuan Zhou, Jose Blanchet, Peter W Glynn, and Yinyu Ye. Sequential batch learning in finite-action linear contextual bandits. arXiv preprint arXiv:2004.06321, 2020.
- Hanzely et al. (2021) Filip Hanzely, Boxin Zhao, and Mladen Kolar. Personalized federated learning: A unified framework and universal optimization techniques. arXiv preprint arXiv:2102.09743, 2021.
- He et al. (2022) Jiafan He, Tianhao Wang, Yifei Min, and Quanquan Gu. A simple and provably efficient algorithm for asynchronous federated contextual linear bandits. Advances in neural information processing systems, 2022.
- Hillel et al. (2013) Eshcar Hillel, Zohar S Karnin, Tomer Koren, Ronny Lempel, and Oren Somekh. Distributed exploration in multi-armed bandits. Advances in Neural Information Processing Systems, 26, 2013.
- Hsu et al. (2012) Daniel Hsu, Sham M Kakade, and Tong Zhang. Random design analysis of ridge regression. In Conference on learning theory, pp. 9–1. JMLR Workshop and Conference Proceedings, 2012.
- Huang et al. (2021a) Baihe Huang, Xiaoxiao Li, Zhao Song, and Xin Yang. Fl-ntk: A neural tangent kernel-based framework for federated learning analysis. In International Conference on Machine Learning, pp. 4423–4434. PMLR, 2021a.
- Huang et al. (2021b) Ruiquan Huang, Weiqiang Wu, **g Yang, and Cong Shen. Federated linear contextual bandits. Advances in neural information processing systems, 34:27057–27068, 2021b.
- Huang et al. (2023) Ruiquan Huang, Huanyu Zhang, Luca Melis, Milan Shen, Meisam Hejazinia, and **g Yang. Federated linear contextual bandits with user-level differential privacy. In International Conference on Machine Learning, pp. 14060–14095. PMLR, 2023.
- Jadbabaie et al. (2022) Ali Jadbabaie, Haochuan Li, Jian Qian, and Yi Tian. Byzantine-robust federated linear bandits. In 2022 IEEE 61st Conference on Decision and Control (CDC), pp. 5206–5213. IEEE, 2022.
- ** et al. (2022) Hao **, Yang Peng, Wenhao Yang, Shusen Wang, and Zhihua Zhang. Federated reinforcement learning with environment heterogeneity. In International Conference on Artificial Intelligence and Statistics, pp. 18–37. PMLR, 2022.
- Kairouz et al. (2021) Peter Kairouz, H Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, et al. Advances and open problems in federated learning. Foundations and Trends® in Machine Learning, 14(1–2):1–210, 2021.
- Karbasi et al. (2021) Amin Karbasi, Vahab Mirrokni, and Mohammad Shadravan. Parallelizing thompson sampling. Advances in Neural Information Processing Systems, 34:10535–10548, 2021.
- Karimireddy et al. (2020) Sai Praneeth Karimireddy, Satyen Kale, Mehryar Mohri, Sashank Reddi, Sebastian Stich, and Ananda Theertha Suresh. Scaffold: Stochastic controlled averaging for federated learning. In International Conference on Machine Learning, pp. 5132–5143. PMLR, 2020.
- Katakis et al. (2008) Ioannis Katakis, Grigorios Tsoumakas, and Ioannis Vlahavas. Multilabel text classification for automated tag suggestion. ECML PKDD discovery challenge, 75:2008, 2008.
- Konečnỳ et al. (2016) Jakub Konečnỳ, H Brendan McMahan, Daniel Ramage, and Peter Richtárik. Federated optimization: Distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527, 2016.
- Krishnamurthy et al. (2021) Sanath Kumar Krishnamurthy, Vitor Hadad, and Susan Athey. Adapting to misspecification in contextual bandits with offline regression oracles. In International Conference on Machine Learning, pp. 5805–5814. PMLR, 2021.
- Landgren et al. (2016) Peter Landgren, Vaibhav Srivastava, and Naomi Ehrich Leonard. On distributed cooperative decision-making in multiarmed bandits. In 2016 European Control Conference (ECC), pp. 243–248. IEEE, 2016.
- Lattimore & Szepesvári (2020) Tor Lattimore and Csaba Szepesvári. Bandit algorithms. Cambridge University Press, 2020.
- Li & Wang (2022a) Chuanhao Li and Hongning Wang. Asynchronous upper confidence bound algorithms for federated linear bandits. In International Conference on Artificial Intelligence and Statistics, pp. 6529–6553. PMLR, 2022a.
- Li & Wang (2022b) Chuanhao Li and Hongning Wang. Communication efficient federated learning for generalized linear bandits. Advances in Neural Information Processing Systems, 2022b.
- Li et al. (2022) Chuanhao Li, Huazheng Wang, Mengdi Wang, and Hongning Wang. Communication efficient distributed learning for kernelized contextual bandits. Advances in Neural Information Processing Systems, 2022.
- Li et al. (2023) Chuanhao Li, Huazheng Wang, Mengdi Wang, and Hongning Wang. Learning kernelized contextual bandits in a distributed and asynchronous environment. The Eleventh International Conference on Learning Representations, 2023.
- Li & Song (2022) Tan Li and Linqi Song. Privacy-preserving communication-efficient federated multi-armed bandits. IEEE Journal on Selected Areas in Communications, 40(3):773–787, 2022.
- Li et al. (2020a) Tian Li, Anit Kumar Sahu, Ameet Talwalkar, and Virginia Smith. Federated learning: Challenges, methods, and future directions. IEEE signal processing magazine, 37(3):50–60, 2020a.
- Li et al. (2021) Tian Li, Shengyuan Hu, Ahmad Beirami, and Virginia Smith. Ditto: Fair and robust federated learning through personalization. In International Conference on Machine Learning, pp. 6357–6368. PMLR, 2021.
- Li et al. (2020b) Xiang Li, Kaixuan Huang, Wenhao Yang, Shusen Wang, and Zhihua Zhang. On the convergence of fedavg on non-iid data. In International Conference on Learning Representations, 2020b.
- Lin & Moothedath (2023) Jiabin Lin and Shana Moothedath. Federated stochastic bandit learning with unobserved context. arXiv preprint arXiv:2303.17043, 2023.
- Liu & Zhao (2010) Keqin Liu and Qing Zhao. Distributed learning in multi-armed bandit with multiple players. IEEE Transactions on Signal Processing, 58(11):5667–5681, 2010.
- Liu et al. (2022) Ziyao Liu, Jiale Guo, Wenzhuo Yang, Jiani Fan, Kwok-Yan Lam, and Jun Zhao. Privacy-preserving aggregation in federated learning: A survey. IEEE Transactions on Big Data, 2022.
- Lubana et al. (2022) Ekdeep Lubana, Chi Ian Tang, Fahim Kawsar, Robert Dick, and Akhil Mathur. Orchestra: Unsupervised federated learning via globally consistent clustering. In International Conference on Machine Learning, pp. 14461–14484. PMLR, 2022.
- Marfoq et al. (2023) Othmane Marfoq, Giovanni Neglia, Laetitia Kameni, and Richard Vidal. Federated learning for data streams. arXiv preprint arXiv:2301.01542, 2023.
- Martínez-Rubio et al. (2019) David Martínez-Rubio, Varun Kanade, and Patrick Rebeschini. Decentralized cooperative stochastic bandits. Advances in Neural Information Processing Systems, 32, 2019.
- McMahan et al. (2017) Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics, pp. 1273–1282. PMLR, 2017.
- Min et al. (2023) Yifei Min, Jiafan He, Tianhao Wang, and Quanquan Gu. Multi-agent reinforcement learning: Asynchronous communication and linear function approximation. arXiv preprint arXiv:2305.06446, 2023.
- Mitra et al. (2022) Aritra Mitra, Arman Adibi, George J Pappas, and Hamed Hassani. Collaborative linear bandits with adversarial agents: Near-optimal regret bounds. Advances in neural information processing systems, 2022.
- Mohri et al. (2018) Mehryar Mohri, Afshin Rostamizadeh, and Ameet Talwalkar. Foundations of machine learning. MIT press, 2018.
- Mohri et al. (2019) Mehryar Mohri, Gary Sivek, and Ananda Theertha Suresh. Agnostic federated learning. In International Conference on Machine Learning, pp. 4615–4625. PMLR, 2019.
- Nesterov (2003) Yurii Nesterov. Introductory lectures on convex optimization: A basic course, volume 87. Springer Science & Business Media, 2003.
- Neu & Olkhovskaya (2020) Gergely Neu and Julia Olkhovskaya. Efficient and robust algorithms for adversarial linear contextual bandits. In Conference on Learning Theory, pp. 3049–3068. PMLR, 2020.
- Pillutla et al. (2022) Krishna Pillutla, Sham M Kakade, and Zaid Harchaoui. Robust aggregation for federated learning. IEEE Transactions on Signal Processing, 70:1142–1154, 2022.
- Réda et al. (2022) Clémence Réda, Sattar Vakili, and Emilie Kaufmann. Near-optimal collaborative learning in bandits. In NeurIPS 2022-36th Conference on Neural Information Processing System, 2022.
- Reddi et al. (2020) Sashank Reddi, Zachary Charles, Manzil Zaheer, Zachary Garrett, Keith Rush, Jakub Konečnỳ, Sanjiv Kumar, and H Brendan McMahan. Adaptive federated optimization. arXiv preprint arXiv:2003.00295, 2020.
- Salgia & Zhao (2022) Sudeep Salgia and Qing Zhao. Distributed linear bandits under communication constraints. arXiv preprint arXiv:2211.02212, 2022.
- Sen et al. (2021) Rajat Sen, Alexander Rakhlin, Lexing Ying, Rahul Kidambi, Dean Foster, Daniel N Hill, and Inderjit S Dhillon. Top-k extreme contextual bandits with arm hierarchy. In International Conference on Machine Learning, pp. 9422–9433. PMLR, 2021.
- Shi & Shen (2021) Chengshuai Shi and Cong Shen. Federated multi-armed bandits. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 35, pp. 9603–9611, 2021.
- Shi et al. (2021) Chengshuai Shi, Cong Shen, and **g Yang. Federated multi-armed bandits with personalization. In International Conference on Artificial Intelligence and Statistics, pp. 2917–2925. PMLR, 2021.
- Simchi-Levi & Xu (2022) David Simchi-Levi and Yunzong Xu. Bypassing the monster: A faster and simpler optimal algorithm for contextual bandits under realizability. Mathematics of Operations Research, 47(3):1904–1931, 2022.
- Szorenyi et al. (2013) Balazs Szorenyi, Róbert Busa-Fekete, István Hegedus, Róbert Ormándi, Márk Jelasity, and Balázs Kégl. Gossip-based distributed stochastic bandit algorithms. In International conference on machine learning, pp. 19–27. PMLR, 2013.
- Tsoumakas et al. (2008) Grigorios Tsoumakas, Ioannis Katakis, and Ioannis Vlahavas. Effective and efficient multilabel classification in domains with large number of labels. In Proc. ECML/PKDD 2008 Workshop on Mining Multidimensional Data (MMD’08), volume 21, pp. 53–59, 2008.
- van Berlo et al. (2020) Bram van Berlo, Aaqib Saeed, and Tanir Ozcelebi. Towards federated unsupervised representation learning. In Proceedings of the third ACM international workshop on edge systems, analytics and networking, pp. 31–36, 2020.
- Wang et al. (2019) Yuanhao Wang, Jiachen Hu, Xiaoyu Chen, and Liwei Wang. Distributed bandit learning: Near-optimal regret with efficient communication. arXiv preprint arXiv:1904.06309, 2019.
- Wei & Luo (2021) Chen-Yu Wei and Haipeng Luo. Non-stationary reinforcement learning without prior knowledge: An optimal black-box approach. In Conference on Learning Theory, pp. 4300–4354. PMLR, 2021.
- Wei et al. (2020) Kang Wei, Jun Li, Ming Ding, Chuan Ma, Howard H Yang, Farhad Farokhi, Shi **, Tony QS Quek, and H Vincent Poor. Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Information Forensics and Security, 15:3454–3469, 2020.
- Wei et al. (2021) Kang Wei, Jun Li, Ming Ding, Chuan Ma, Hang Su, Bo Zhang, and H Vincent Poor. User-level privacy-preserving federated learning: Analysis and performance optimization. IEEE Transactions on Mobile Computing, 21(9):3388–3401, 2021.
- Wei & Shen (2022) Xizixiang Wei and Cong Shen. Federated learning over noisy channels: Convergence analysis and design examples. IEEE Transactions on Cognitive Communications and Networking, 8(2):1253–1268, 2022.
- Xin et al. (2020) Ran Xin, Usman A Khan, and Soummya Kar. Variance-reduced decentralized stochastic optimization with accelerated convergence. IEEE Transactions on Signal Processing, 68:6255–6271, 2020.
- Xu & Zeevi (2020) Yunbei Xu and Assaf Zeevi. Upper counterfactual confidence bounds: a new optimism principle for contextual bandits. arXiv preprint arXiv:2007.07876, 2020.
- Ye et al. (2020) Haishan Ye, Wei Xiong, and Tong Zhang. Pmgt-vr: A decentralized proximal-gradient algorithmic framework with variance reduction. arXiv preprint arXiv:2012.15010, 2020.
- Yi & Vojnović (2023) Jialin Yi and Milan Vojnović. Doubly adversarial federated bandits. arXiv preprint arXiv:2301.09223, 2023.
- Yin et al. (2018) Dong Yin, Yudong Chen, Ramchandran Kannan, and Peter Bartlett. Byzantine-robust distributed learning: Towards optimal statistical rates. In International Conference on Machine Learning, pp. 5650–5659. PMLR, 2018.
- Yin et al. (2021) Xuefei Yin, Yanming Zhu, and Jiankun Hu. A comprehensive survey of privacy-preserving federated learning: A taxonomy, review, and future directions. ACM Computing Surveys (CSUR), 54(6):1–36, 2021.
- Zhang et al. (2020) Fengda Zhang, Kun Kuang, Zhaoyang You, Tao Shen, Jun Xiao, Yin Zhang, Chao Wu, Yueting Zhuang, and Xiaolin Li. Federated unsupervised representation learning. arXiv preprint arXiv:2010.08982, 2020.
- Zhang (2023) Tong Zhang. Mathematical Analysis of Machine Learning Algorithms. Cambridge University Press, 2023.
- Zheng et al. (2020) Sihui Zheng, Cong Shen, and Xiang Chen. Design and analysis of uplink and downlink communications for federated learning. IEEE Journal on Selected Areas in Communications, 39(7):2150–2167, 2020.
- Zhou et al. (2020) Dongruo Zhou, Lihong Li, and Quanquan Gu. Neural contextual bandits with ucb-based exploration. In International Conference on Machine Learning, pp. 11492–11502. PMLR, 2020.
- Zhou & Chowdhury (2023) Xingyu Zhou and Sayak Ray Chowdhury. On differentially private federated linear contextual bandits. arXiv preprint arXiv:2302.13945, 2023.
- Zhu et al. (2023) Banghua Zhu, Lun Wang, Qi Pang, Shuai Wang, Jiantao Jiao, Dawn Song, and Michael I Jordan. Byzantine-robust federated learning with optimal statistical rates. In International Conference on Artificial Intelligence and Statistics, pp. 3151–3178. PMLR, 2023.
- Zhu et al. (2022) Yinglun Zhu, Dylan J Foster, John Langford, and Paul Mineiro. Contextual bandits with large action spaces: Made practical. In International Conference on Machine Learning, pp. 27428–27453. PMLR, 2022.
- Zhu et al. (2021) Zhaowei Zhu, **gxuan Zhu, Ji Liu, and Yang Liu. Federated bandit: A gossi** approach. In Abstract Proceedings of the 2021 ACM SIGMETRICS/International Conference on Measurement and Modeling of Computer Systems, pp. 3–4, 2021.
- Zhuang et al. (2022) Weiming Zhuang, Yonggang Wen, and Shuai Zhang. Divergence-aware federated self-supervised learning. arXiv preprint arXiv:2204.04385, 2022.
- Zierahn et al. (2023) Lukas Zierahn, Dirk van der Hoeven, Nicolo Cesa-Bianchi, and Gergely Neu. Nonstochastic contextual combinatorial bandits. In International Conference on Artificial Intelligence and Statistics, pp. 8771–8813. PMLR, 2023.
Appendix A Additional Discussions
A.1 Societal Impacts
This work focuses on providing a new design for federated contextual bandits (FCB), which establishes a close relationship between FCB and FL. We do not foresee major negative societal impacts as FCB is a well-established research domain and this work largely investigates its theoretical aspects. Moreover, as discussed in Section 6.2, FedIGW can conveniently incorporate appendages from FL studies to obtain appealing properties of privacy, robustness, fairness, and beyond, which we believe can contribute to a positive societal impact.
A.2 Examples of FL Components in FCB Studies
An example of the FL components adopted in previous FCB studies is provided in the following, together with the renowned FedAvg protocol for comparison. Specifically, as in Remark 4.5, we consider the study of federated linear bandits with a known -dimensional feature map** . Then, Alg. 2 illustrates the FL component commonly adopted in Wang et al. (2019); Li & Wang (2022a); Dubey & Pentland (2020); He et al. (2022): the agents share compressed local data (e.g., covariance matrices) to the server for aggregation, which happens in a one-shot fashion. A simplified version of FedAvg (McMahan et al., 2017) is presented in Alg. 3, with client ’s local loss function denoted as following Sec. 3. It can be observed that FedAvg takes an optimization perspective to perform multi-rounds of gradient descent distributively.
A.3 Limitations and Future Works
While this work proposes a novel, broadly applicable FCB design, i.e., FedIGW, there are still many interesting directions that are worth further exploring.
Paralleling CB and FL. As mentioned in Section 2.2, the current FL studies largely focus on learning from batched and static datasets. To accommodate such protocols, FCB designs typically follow a periodically alternating scheme as shown in Fig. 1, which is thus the focus of this work. While such alternating designs are capable of achieving statistical and communication efficiency, there is still room for improvement: (1) the CB interactions need to wait for the completeness of a full FL process, which may be slow when computation resources are limited and communication delays are large; (2) it is desirable to use the CB data in a more timely fashion instead of accumulating to the end of an epoch.
As one variant of periodically alternating, we can have FedIGW interleave CB and FL as shown in Fig. 4(a). This approach provides some buffer to perform FL without agents waiting for its completeness. Especially, in epoch , on one hand, the agents perform FL with datasets from epoch ; on the other hand, they perform CB interactions following IGW with an estimated function learned during epoch via datasets from epoch . In other words, there will be one epoch delay compared with the basic form of FedIGW, while this delay is used for the FL process.
Furthermore, a better approach is to have FL and CB fully paralleled as shown in Fig. 4(b). Then, neither of them needs to wait for the other part, while CB data can be processed more timely. As mentioned in Section 6.2, we believe that the framework of FL with data streams proposed in a recent work of Marfoq et al. (2023) could be a suitable tool, as the sequential CB interactions essentially provide data steams. We believe this direction is not only worth further exploring in FCB but perhaps more importantly, calls for more investigation in FL with data streams, where FCB can also serve as an important motivation application.
![Refer to caption](extracted/5317909/figs/interleaving.png)
![Refer to caption](extracted/5317909/figs/parallel.png)
Incorporating other FL advances. Given the flexible FL choice in FedIGW, although this work has provided detailed discussions on incorporating many aspects of FL advancements (including canonical algorithmic designs, convergence analysis, and useful appendages), there are still many directions worth further exploration. For example, as mentioned in Section 2.1, this work and most FCB investigations are focused on collaborating through a central server, while the case of communicating via a connected graph is less explored, where certain consensus errors commonly appear (Xin et al., 2020; Ye et al., 2020). It is worth noting that the design and analysis framework of FedIGW are both applicable in the later setting. Especially, the consensus error can be modeled as one part of the optimization error in Lemma 4.3. This further validates the value of the proposed FedIGW design and the general analysis framework while further specifications are left for future works.
Also, it would be great to leverage extra tools to save computations in the adopted FL protocol. Using local updates as in Chou et al. (2020) is one promising direction. These approaches are all feasible in FedIGW as long as the agents can obtain a learned reward function to perform IGW interactions. Their specific impacts can be captured via the established analysis framework through their own optimization errors.
Leveraging other CB designs. With previous FCB studies largely focused on the CB component, this work is motivated to incorporate more advances from FL. Thus, we propose the FedIGW design which can leverage canonical protocols, convergence analyses, and flexible appendages from FL.
However, we also note that there are still many CB algorithms that remain under-explored in FCB, where UCB-based designs are dominating. For example, the simple greedy algorithm is shown to be efficient when the context generation contains certain exploration capabilities in (Han et al., 2020). Moreover, varying attempts have been made in Xu & Zeevi (2020); Foster & Rakhlin (2020); Foster et al. (2020); Zhu et al. (2022) to design generally applicable CB algorithms with tight performance guarantees, e.g., handling infinite arms. It would be interesting to investigate how to bring these designs to the federated setting and whether such connections provide new opportunities and insights.
Complex environments. This work is focused on a stationary environment with stochastic rewards, which is well motivated by practical applications and commonly adopted in FCB studies. To further broaden the applicability of FCB, we believe that it is also important to study adversarial or non-stationary environments. Many advances have been made in standard single-agent bandits, e.g., Auer et al. (2002); Neu & Olkhovskaya (2020); Zierahn et al. (2023); Wei & Luo (2021). A recent work (Yi & Vojnović, 2023) investigates the federated adversarial environment in the tabular setting and further investigations are desired to provide further concrete designs and analyses.
Extension to RL. It would also be meaningful to extend the current study of FCB to federated reinforcement learning (RL) as a further step in understanding the combination of FL and sequential decision-making. Some results have been reported in Dubey & Pentland (2021); Min et al. (2023); ** et al. (2022); Fan et al. (2021); Cisneros-Velarde et al. (2023). We hope this work can serve as a starting point for more principled and generally applicable studies in federated RL.
Appendix B Additional Related Works
The studies on federated multi-armed bandits (FMAB) and federated contextual bandits (FCB) can be viewed as a version of the general multi-agent bandits (Liu & Zhao, 2010; Boursier & Perchet, 2019) and parallelizing bandits (Chan et al., 2021; Karbasi et al., 2021) that is more suitable for modern applications. We provide a more detailed review in the following.
Tabular. There have been many studies on cooperative designs in multi-armed bandits (i.e., the tabular setting), e.g., Hillel et al. (2013); Szorenyi et al. (2013); Landgren et al. (2016); Martínez-Rubio et al. (2019), focusing on different learning targets and different communication protocols (e.g., through a communication graph or with some randomly selected peers). Notably, in Wang et al. (2019), communication-efficient designs are proposed via periodically aggregating local estimates and performing arm elimination globally. We here also discuss another line of works on FMAB (Shi & Shen, 2021; Shi et al., 2021; Réda et al., 2022; Zhu et al., 2021; Chen et al., 2022). In their considered setting, the global rewards are (weighted) averages of local observations; however the former is not directly observable. With maximizing global rewards as the learning target, the agents need to collaboratively perform explorations and aggregate local information. Despite the model differences, the design principle of FedIGW may still be beneficial for studying this setting. Especially, it is worth considering replacing the UCB-based explorations commonly adopted in Shi & Shen (2021); Shi et al. (2021); Réda et al. (2022); Zhu et al. (2021); Chen et al. (2022) with regression-based ones as in FedIGW to facilitate incorporation of FL studies.
Linear. The most commonly studied FCB setting is federated linear bandits. There have been many investigations in this direction. Especially, different environments have been tackled in different works, e.g., the finite-armed fixed-context setting (Wang et al., 2019; Huang et al., 2021b), the finite-armed stochastic-context setting (Amani et al., 2022), the finite-armed adversarial context setting (Fan et al., 2023), the infinite-armed fixed-context setting (Salgia & Zhao, 2022), and the infinite-armed adversarial-context setting (Wang et al., 2019; Dubey & Pentland, 2020; Li & Wang, 2022a; He et al., 2022). Furthermore, many other settings, e.g., unobserved context (Lin & Moothedath, 2023), and additional properties, e.g., privacy (Dubey & Pentland, 2020; Zhou & Chowdhury, 2023), robustness (Jadbabaie et al., 2022), have been investigated. As summarized in the main paper, these works mainly select arm elimination (AE) (Lattimore & Szepesvári, 2020) or LinUCB (Abbasi-Yadkori et al., 2011) as their CB designs, which require both model estimates and confidence bounds. Thus, in their designed FL protocols, compressed local data (e.g., aggregated local rewards and covariance matrices) are often directly shared to solve a global ridge regression and to construct tighter confidence bounds. Compared with these studies, FedIGW can effectively solve the finite-armed stochastic-context setting without sharing any raw or compressed local data but only communicate processed model parameters (e.g., gradients). More detailed discussions and concrete results are provided in Appendix D.3.
A detailed comparison of the obtained regrets and the amounts of communicated real numbers is provided in Table 4. It can be observed that adapting FedIGW to the specific case of linear bandits does not provide the same near-optimal performance as in previous works. This is not a surprise as (single-agent) IGW itself has not yet been shown to achieve the lower-bound performance of linear bandits, while the previous works are largely built upon the nearly optimal LinUCB design (Abbasi-Yadkori et al., 2011). However, as noted in Remark 3.2, IGW only requires a learned reward function, instead of complicated data analytics such as UCB, which grants it great flexibility to better incorporate FL advancements and handle more general scenarios beyond the linear setting.
Generalized Linear and Kernelized. As extensions of the linear reward functions, Li & Wang (2022b) considers the generalized-linear class, and Li et al. (2022; 2023) study the kernelized one. The adopted basic techniques are similar to the aforementioned ones in federated linear bandits, while efforts are focused on fine-tuning communications (e.g., via Nyström approximation (Li et al., 2022; 2023)). It is worth noting that Li & Wang (2022b) invokes the distributed accelerated gradient descent algorithm to solve their considered distributed optimization with a generalized linear function class, which can be viewed as a preliminary attempt of involving FL or distributed optimization designs in FCB. However, the motivation there is the lack of a closed-form solution as in the linear case, while Li & Wang (2022b) additionally needs to share the local covariance matrices to construct better confidence bounds. This work, instead, formally proposed FedIGW which can rely only on canonical FL framework and accommodate flexible FL choices.
Neural. A recent work of Dai et al. (2023) extends the advances on single-agent neural bandits (Zhou et al., 2020) to the federated setting, where the neural tangent kernel (NTK) analyses are incorporated. With NTK to “linearize” the considered over-parameterized neural network, Dai et al. (2023) still largely follows the designs in the aforementioned federated linear bandits while some additional attempts have been made, e.g., an extra one-round averaging of model parameters besides aggregating NTK. This work, instead, takes a step further to fully leverage FL protocols, which often perform multiple (instead of one) rounds of model aggregations that are often necessary to guarantee convergence. Also, the optimization and generalization errors of a FedAvg variant with overparameterized neural networks are provided in Huang et al. (2021a), which is conceivably compatible with FedIGW for the corresponding analyses. Moreover, as shown by the additional experimental results in Sec. 5, FedIGW empirically outperforms FN-UCB (Dai et al., 2023) on different tasks and is more computationally efficient.
Reference | Arms | Context | Regret | # of Numbers Communicated |
Wang et al. (2019) | Infinite | Fixed | ||
He et al. (2022) | Infinite | Adversarial | ||
Huang et al. (2021b) | Finite | Fixed | ||
Amani et al. (2022) | Finite | Stochastic | ||
FedIGW | Finite | Stochastic | ||
FedIGW | Finite | Stochastic |
: assuming a homogeneous and known context distribution for all agents;
: solving the global ridge regression via directly sharing aggregated local rewards and covariance matrices as in the other listed works;
: solving the global ridge regression via distributed accelerated gradient descent;
Appendix C Proofs for Section 4.1
C.1 Notations
We first introduce notations that are repeatedly used. For the output function from the adopted FL protocol, we characterize its performance via the following definition of its excess risk, which is commonly adopted in the analysis of IGW-type CB algorithms (Simchi-Levi & Xu, 2022; Sen et al., 2021; Ghosh et al., 2021).
Definition C.1.
Let be a set of arbitrary independent arm selection distributions. Given an overall dataset where each dataset consists of training samples of the form independently and identically drawn according to , , the federated protocol returns a predictor , and its excess risk is defined as
where and denotes the random source in the potentially stochastic FL algorithm. We often abbreviate as to simplify notations.
This definition measures in expectation (w.r.t. the random data generation and the stochastic FL process) how far the output of the adopted FL protocol is from the true reward function on the weighted data distribution of all agents. Note that the excess risk bound would typically rely on some other parameters in the adopted FL protocol (e.g., the step size and the number of iterations in gradient-based approaches), which are currently not specified for generality.
Then, let denote the sigma-algebra generated by the history up to epoch , i.e., , and the randomness in the adopted FL protocol up to epoch , i.e., , where denotes the random source in epoch . Then, we denote as the epoch that agent ’s belongs to. Also, let denote the set of deterministic functions from to for agent and the Cartesian product of . Furthermore, for any action selection kernel , where is the probability of selecting action given context , and any policy , we define
where for a given (determined by ).
The following proofs are largely inspired by the single-agent contextual bandits work (Simchi-Levi & Xu, 2022), while major changes have been made to accommodate the more complex federated system considered in this work.
C.2 Proofs of Theorem 4.1
First, the following lemma characterizes the relation between the excess errors and the selected learning rates.
Lemma C.2.
For all , it holds that
Proof.
Then, the following lemma bounds the estimated rewards and true rewards .
Lemma C.3.
For any epoch , for any , conditioned on , it holds that
where .
Proof.
For simplicity, we abbreviate as , and for any policy , and any epoch , we define
which indicates that
and
Furthermore, conditioned on , we can obtain that
As a result, it holds that
where the last step we use the definition that
This concludes the proof. ∎
Furthermore, the following lemma provides a characterization of the relation between the virtual loss and the true loss .
Lemma C.4.
For any epochs , for any policies , it holds that
with
Proof.
First, we note that for , it holds that
which means the lemma holds for the first epoch.
We then perform an inductive proof and start by assuming that for epoch and any policies , it holds that
Then, it can be observed that
where inequality (a) is from Lemma C.3 and inequality (b) is from Lemma C.10.
Then, summing over all agents, we can obtain that
where inequality (d) is from the definition . Inequality (e) is from the induction assumption that
Inequality (f) is based on the definition , and , also the assumption that and Lemma C.2, which indicates that
Thus, we can obtain that
Also, it similarly holds that
Then, summing over agents, we can obtain that
where inequality (g) is from the previous derivation that
Thus, it holds that
With these two parts, the lemma can be obtained by induction. ∎
Furthermore, the following lemma provides a characterization of the per-epoch loss of the federation.
Lemma C.5.
For every epoch , conditioned on , it holds that
where is a probability measure on defined in Lemma C.7
Proof.
With the previous lemmas, we can obtain the final Theorem 4.1, which is restated in the following.
Theorem C.6 (Restatement of Theorem 4.1).
Using a learning rate
in epoch , denoting , the regret of FedIGW can be bounded as
C.3 Supporting Lemmas
The following supporting lemmas can be similarly obtained by the corresponding proofs in Simchi-Levi & Xu (2022).
Lemma C.7 (Lemma 3, Simchi-Levi & Xu (2022)).
For any epoch , conditioned on , there exists a probability measure on such that
Lemma C.8 (Lemma 4, Simchi-Levi & Xu (2022)).
Fix any epoch , we have
Lemma C.9 (Lemma 5, Simchi-Levi & Xu (2022)).
Fix any epoch , conditioned on , we have
Lemma C.10 (Lemma 6, Simchi-Levi & Xu (2022)).
Fix any epoch , for any policy , we have
Appendix D Proofs for Section 4.2
D.1 Proofs of Corollary 4.2
First, with realizability, i.e., Assumption 3.1, the following characterization can be obtained.
Lemma D.1 (Lemma 4.2, Agarwal et al. (2012)).
Fix a function . Suppose we sample from the data distribution , and an action from an arbitrary distribution such that and are conditionally independent given . Define the random variable
Then, we have
and
where denotes the variance of a random variable.
Then, we establish an upper bound for the excess risk bound required in Definition C.1 via the following lemma
Lemma D.2.
Proof.
For simplicity, we abbreviate the quadratic loss associated with a fixed function as
Then, with a probability at least , for a fixed , it holds that
where inequality (a) leverages Bernstein’s inequality and inequality (b) is based on Lemma D.1.
With
applying a union bound to the above inequality indicates that with probability , for all , it holds that
Since satisfies that , we can obtain that
In other words, with probability , it holds that
where the equality is from the realizability in Assumption 3.1. The first half of the lemma is then proved.
With , the second half can be obtained as
which concludes the proof. ∎
Based on the established excess risk bound, Corollary 4.2 can be obtained as follows.
D.2 Proofs of Corollary 4.4 and Additional Results
In the following, we first prove Lemma 4.3 while also noting that this result is general and does not rely on the specific parameterization of , although we presented it with the -dimensional parameterization considered in Section 4.2.
Lemma D.4 (Complete Version of Lemma 4.3).
If the loss function is -strongly convex in its first coordinate for all , i.e.,
and
(3) |
for all , , Definition C.1 holds with
where
Proof.
First, for any , it holds that
where the inequality is due to the strong convexity of w.r.t. its first coordinate and the optimality of assumed in Eqn. (3). Thus, we obtain that
Furthermore, it holds that
where the last inequality is due to
The proof is then concluded. ∎
Then, for the generalization error analyses, the following lemma can be obtained via standard proofs (e.g., Theorem 6.4 in Zhang (2023); Theorem 3.3 in Mohri et al. (2018)).
Lemma D.5.
It holds that
Here, the distributional-independent upper bound on the Rademacher complexity is defined as
(4) |
where the outside supremum is over possible distributions of dataset defined in Definition C.1 and the expectation is w.r.t. the generation of dataset following a fixed distribution and independent Rademacher random variables .
The optimization error of FedAvg (McMahan et al., 2017) and SCAFFOLD (Karimireddy et al., 2020) are presented in Appendices F.1 and F.2. Combining the generalization error and optimization error via Lemma 4.3 into Theorem 4.1, Corollary 4.4 can be obtained, which is restated in the following.
Corollary D.6 (Restatement of Corollary 4.4).
Under the condition of Lemma 4.3, the regret of FedIGW can be bounded as
where and using rounds of agents-server communications (i.e., global aggregations) and rounds of local updates in epoch , under certain assumptions,
-
•
with FedAvg as , if is -strongly convex and -smooth w.r.t. for all while the gradients are unbiased, have a -bounded variance and have a -bounded dissimilarity, the output satisfies that , when (see Lemma F.1 for the full statement);
-
•
with SCAFFOLD as , if is -strongly convex and -smooth w.r.t. for all while the gradients are unbiased and have a -bounded variance, the output satisfies that , when (see Lemma F.6 for the full statement);.
By further setting a suitable number of global aggregations for each epoch such that the optimization error is on the same order as the generalization error, the following more specific corollary can obtained for FedAvg and SCAFFOLD, which can be easily extended for other FL designs.
Corollary D.7.
Proof.
From Corollary D.6, when using FedAvg as the adopted FL protocol in FedIGW, the optimization error in epoch of form
when . Thus, if the communication rounds
we are guaranteed to have the optimization error on the order of .
Then, the regret in Corollary 4.4 is of order
while the overall communication rounds can be bounded as
which concludes the proof for FedAvg. The result of using SCAFFOLD can be similarly obtained. ∎
D.3 A Linear Reward Function Class
We here provide a detailed discussion on the linear reward function class considered in Remark 4.5 at the end of Section 4.2. Especially, following standard assumptions in linear bandits (Abbasi-Yadkori et al., 2011) and federated linear bandits (Li & Wang, 2022a; He et al., 2022; Amani et al., 2022), we consider , where is a known -dimensional map** and is an unknown -dimensional system parameter. Then, it is sufficient to consider a linear function class , where and . Moreover, for convenience, we assume that and .
As mentioned in Remark 4.5, the FL problem can be formulated as a standard ridge regression with
In other words, Eqn. (1) can be restated as
(5) |
which has an exact minimizer as
(6) |
We provide an excess risk bound required in Definition C.1 through the following decomposition:
where
and denotes the maximum eigenvalue of . With , it can be verified that . In the above decomposition, term (A) can be interpreted as the optimization error, while term (B) is the generalization error.
We can then plug in the aforementioned explicit formula of into term (B) and demonstrate that with under the assumption that and (e.g., following Theorem 9.35 in Zhang (2023)).
For the ridge regression problem in Eqn. (5), previous designs on federated linear bandits typically (Wang et al., 2019; Dubey & Pentland, 2020; Li & Wang, 2022a; He et al., 2022; Amani et al., 2022) have agents collaboratively provide the exact minimizer in Eqn. (6) via directly communicating their local rewards aggregates, i.e., , and local covariance matrices, i.e., . Thus, one round of agent-server communication is sufficient, where real numbers are shared. However, directly sharing such compressed data is often undesired in FL studies due to privacy concerns. We refer to this protocol as the “direct method” for simplicity in the following discussions.
With the flexible FL choice in FedIGW, it can accommodate many other efficient optimization algorithms. In particular, a distributed version of accelerated gradient descent (AGD) (Nesterov, 2003) takes only rounds of communications of gradients to have an optimization error of , where is the condition number (i.e., the ratio between the smooth and strongly convex parameter in the considered problem). With , it holds that ; thus rounds of communications of gradients are sufficient to obtain an optimization error of order , where each agents’ gradients are intuitively -dimensional.
With the above illustration, the following corollary regarding the performance FedIGW with a linear reward function class is then a straightforward extension from Theorem 4.1.
Corollary D.8.
In the considered linear reward function class with shared true parameters, using the direct method or distributed AGD as the adopted FL protocol to solve the FL problem in Eqn. (5) and , FedIGW obtains a regret of
and the amount of real numbers communicated can be bounded as
Appendix E Details of Section 6
E.1 Personalized Learning: Details of Section 6.1
Additional details for the personalized learning setting in Section 6.1 are discussed here. In particular, the overall algorithm structure still follows Algorithm 1, while the major difference is that a personalized FL problem is considered:
where
Furthermore, to bound the generalization error, similar to the Rademacher complexity in Eqn. (4), a slightly different Rademacher complexity is introduced as
which is suitable for the considered personalized setting with parameters involved. A similar notation is also adopted in Mohri et al. (2019).
The following corollary can then be established for the personalized version of FedIGW with the LSGD-PFL algorithm (Hanzely et al., 2021) adopted to solve the personalized FL task.
Corollary E.1.
The proof largely follows that of Corollary D.7: decomposing excess risk to generalization and optimization errors; using Rademacher complexity to characterize the generalization error; using FL convergence analyses to characterize the optimization error; and combining them together such that the optimization error does not dominate the generalization error. As the LSGD-PFL protocol (Hanzely et al., 2021) is adopted to solve the personalized FL task as an illustration, its corresponding convergence analyses should be incorporated, which is presented in Lemma F.7.
E.1.1 A Linear Reward Function Class
As an extension of the linear reward function in Appendix D.3, we consider that
and the true model parameters follow Assumption 6.2, i.e., with shared among all agents.
It can be further realized that the above problem setting is identical to a -dimensional linear system, where : the overall true model parameter is
and a correspondingly feature map** is
i.e., an expanded version of the original feature, where denotes the sub-vector containing -th elements in and an -dimensional null vector.
With this reformulated problem, discussions from Appendix D.3 can be directly leveraged. Especially, Corollary D.8 indicates the following result.
Corollary E.2.
In the considered linear reward function class with partially true parameters, using distributed AGD as the adopted FL protocol to solve the FL problem in Eqn. (5) with reformulated feature map** and , FedIGW incurs a regret of
and the amount of real numbers communicated can be bounded as .
E.2 Robustness, Privacy, and Beyond: Details of Section 6.2
We here provide some additional discussions on incorporating appendages in FL studies to provide robustness and privacy guarantees for FedIGW among some other directions, e.g., fairness guarantees (Mohri et al., 2019; Du et al., 2021), client selections (Balakrishnan et al., 2022; Fraboni et al., 2021), and practical communication designs (Chen et al., 2021; Wei & Shen, 2022; Zheng et al., 2020). The key is that as long as one FL protocol can provide an estimated function (which is used in IGW interactions), it can be adopted in FedIGW; thus the desirable properties of the selected FL protocol are naturally inherited to FedIGW.
For example, Yin et al. (2018); Pillutla et al. (2022); Fu et al. (2019); Li et al. (2021); Zhu et al. (2023) studied how to handle malicious agents, who can deviate arbitrarily from the FL protocol and tamper with their updates, during learning. The commonly adopted approach is to invoke certain robust estimators (e.g., median and trimmed mean). Under suitable assumptions, existing approaches have shown that as long as the proportion of malicious agents does not exceed a threshold (typically, ), the estimators calculated by federation can still converge within certain amounts of error due to the malicious agents. A recent work (Zhu et al., 2023) provides a summary of convergence rates with different robust estimators, which can be leveraged to establish theoretical understandings of FedIGW with robustness.
On the privacy side, many mechanisms have also been studied in FL (Wei et al., 2020; Yin et al., 2021; Liu et al., 2022), to guarantee differential privacy (DP), where the most common approach is to insert noises of suitable scales. Convergence rates have also been established under suitable assumptions, e.g., in Wei et al. (2020); Girgis et al. (2021); Wei et al. (2021). With those analyses, the theoretical behavior of FedIGW with DP can also be similarly established as Corollaries D.7 and E.1.
Appendix F Algorithm Sketches and Convergence Analyses of FL Designs
F.1 FedAvg
The FedAvg algorithm (McMahan et al., 2017) is one of the most standard and well-adopted FL protocol. Following it, agents perform local stochastic gradient descents (SGD) with their local objective functions for certain steps and then communicate the updated local models to the server; the server aggregates local models to a global one via a weighted average, which is then communicated to the agents to perform further local SGDs.
Many theoretical analyses have been provided for FedAvg (e.g., Li et al. (2020b)). We adopt the one from Karimireddy et al. (2020) in the following.
Lemma F.1 (Theorem V in Karimireddy et al. (2020) without client sampling).
For any dataset , if
-
•
is -strongly convex w.r.t. (see Definition F.2) for all ;
-
•
is -smooth w.r.t. (see Definition F.3) for all ;
-
•
the stochastic gradients are unbiased and have a -bounded variance (see Definition F.4);
-
•
the gradients have -bounded dissimilarity (see Definition F.5),
with FedAvg as the adopted FL protocol, the output satisfies that
when , where denotes the round of communications (i.e., number of global aggregations), is the number of local updates (i.e., SGD) between each communication, and is the initialization. Note that the last term which decays exponentially w.r.t. is omitted in Corollary D.6 and the following derivations for simplicity.
A few definitions used above are made precise in the following, which are inherited from Karimireddy et al. (2020) and presented here for completeness:
Definition F.2 (Strongly Convex).
is -strongly convex w.r.t. for if
Definition F.3 (Smooth).
is -smooth w.r.t. for if
Definition F.4 (Stochastic Gradients with Bounded Variances).
The stochastic gradients have a -bounded variance if
Definition F.5 (Gradients with Bounded Dissimilarity).
The gradients have a -bounded dissimilarity if
F.2 SCAFFOLD
The SCAFFOLD algorithm is proposed in Karimireddy et al. (2020), which enhances FedAvg via leveraging variance reduction to correct drifts in heterogenous agents’ local updates. The following result is established in Karimireddy et al. (2020) to characterize the convergence of the SCAFFOLD protocol.
Lemma F.6 (Theorem VII in Karimireddy et al. (2020) without client sampling).
For any dataset , if
-
•
is -strongly convex w.r.t. (see Definition F.2) for all ;
-
•
is -smooth w.r.t. (see Definition F.3) for all ;
-
•
the stochastic gradients are unbiased and have a -bounded variance (see Definition F.4),
with SCAFFOLD as the adopted FL protocol, the output satisfies that
when , where denotes the round of communications (i.e., number of global aggregations), is the number of local updates (i.e., SGD) between each communication, is a distant measure w.r.t. the initialization defined in Karimireddy et al. (2020). Note that the last term which decays exponentially w.r.t. is omitted in Corollary D.6 and the following derivations for simplicity.
F.3 LSGD-PFL
The LSGD-PFL protocol is summarized in Hanzely et al. (2021), which is a general design for personalized federated learning problems. It largely follows FedAvg (McMahan et al., 2017), while only the globally shared parameters are communicated and aggregated. The following lemma is provided in Hanzely et al. (2021) to characterize the convergence of LSGD-PFL.
Lemma F.7 (Theorem 1 in Hanzely et al. (2021)).
For any dataset , if
-
•
is -strongly convex w.r.t. (see Definition F.2) for all ;
-
•
is -smooth w.r.t. and -smooth w.r.t. (see Definition F.3) for all ;
-
•
the stochastic gradients w.r.t. is unbiased and have a -bounded variance (see Definition F.4);
-
•
the stochastic gradients w.r.t. is unbiased and have a -bounded variance (see Definition F.4);
-
•
the gradients w.r.t. have bounded dissimilarity (see Definition F.5),
with LSGD-PFL as the adopted FL protocol, the output has after
rounds of communications, where is the number of local updates.
Appendix G Experiment Details
This section first provides a comprehensive description of the experimental settings and procedures. The codes and detailed instructions have been uploaded in the supplementary materials so as to execute the experiments and reproduce the results.
Experimental details. In the experiments, the system is designed as a synchronous one, i.e., , and for both tasks, two-layer multi-layer perceptrons (MLPs) with a hidden layer having a constant width are used to approximate the reward functions.
For practical conveniences, instead of selecting a theoretically sound but sophisticated choice of for FedIGW as in Theorem 4.1, we set it as a constant hyper-parameter and perform some preliminary manual selections with the final adopted values reported in Table 5. We believe this approach is more practically appealing as it does not need to scale consistently; a similar choice of using constant ’s is also adopted in Agarwal et al. (2023).
Task | Learning Rate | Batch Size | Communications | Parameter |
Bibtex | 0.1 | 64 | 100 | 7000 |
Delicious | 0.2 | 64 | 100 | 7000 |
Multiple standard FL protocols including FedAvg (McMahan et al., 2017), SCAFFOLD (Karimireddy et al., 2020) and FedProx (Li et al., 2020a) are adopted as the FL component in FedIGW. During each FL process, the local batch size, the number of communications, and the local learning rate are specified in Table 5. Moreover, the epoch length is designed to be growing exponentially as in Corollaries 4.2, D.8 and E.2, i.e., , while culminating at an upper limit of to maintain timely updates.
Additional comparisons with single-agent baselines. In Fig. 3, comparisons between FedIGW and the state-of-the-art FN-UCB are provided, demonstrating the superiority of FedIGW. Here we further report Fig. 5, containing comparisons between FedIGW and two single-agent baselines:
-
•
AGR. The adaptive greedy (AGR) algorithm (Chakrabarti et al., 2008) is selected as one of the single-agent baselines due to its strong empirical performance on Bibtex and Delicious reported in Cortes (2018). The algorithmic details can be found in Cortes (2018), and we also leveraged the code provided in Cortes (2018) to build this baseline.
-
•
FALCON. The other single-agent baseline, FALCON, is proposed in Simchi-Levi & Xu (2022), which is essentially the single-agent version of FedIGW. We still adopt the same algorithmic configurations as FedIGW (i.e., epoch length, parameter , local batch size, and local learning rate) except that the MLP is optimized locally instead of in a federation, i.e., there are no communications.
It can be observed that FedIGW (with participating agents and the basic FedAvg) can outperform the two single-agent baselines on both tasks, demonstrating the benefit of learning in a federation.
![Refer to caption](extracted/5317909/figs/single_bibtex_v2.png)
![Refer to caption](extracted/5317909/figs/single_delicious_v2.png)