Current browse context:
cs.CR
Change to browse by:
References & Citations
Computer Science > Cryptography and Security
Title: A Practical Influence Approximation for Privacy-Preserving Data Filtering in Federated Learning
(Submitted on 23 May 2022 (v1), last revised 26 Jan 2023 (this version, v2))
Abstract: Federated Learning by nature is susceptible to low-quality, corrupted, or even malicious data that can severely degrade the quality of the learned model. Traditional techniques for data valuation cannot be applied as the data is never revealed. We present a novel technique for filtering, and scoring data based on a practical influence approximation (`lazy' influence) that can be implemented in a privacy-preserving manner. Each participant uses his own data to evaluate the influence of another participant's batch, and reports to the center an obfuscated score using differential privacy. Our technique allows for highly effective filtering of corrupted data in a variety of applications. Importantly, we show that most of the corrupted data can be filtered out (recall of $>90\%$, and even up to $100\%$), even under really strong privacy guarantees ($\varepsilon \leq 1$).
Submission history
From: Panayiotis Danassis [view email][v1] Mon, 23 May 2022 13:52:46 GMT (1354kb,D)
[v2] Thu, 26 Jan 2023 01:49:50 GMT (381kb,D)
Link back to: arXiv, form interface, contact.