Relavation Schemes of Malicious Data For Distributed Machine Learning

  • Veda Vidhya
  • , Ajmeera Kiran
  • , Yedavalli Venkata Raghava Rao
  • , A. Naga Kalyani
  • , J. Vamsinath
  • , P. Purushotham

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Distributed machine learning (DML) may train on large datasets even if nodes cannot give accurate results quickly. This exposes more attacker targets than non-distributed. Semi and Basic comprise DML. Central cyberspace sends research activities to distributed computers, which integrate learning. Semi-DML learning records receive centre server resources with Basic DML. For fundamental DML, I included data poisoning detection (4304). It uses cross-learning to find tainted data. To estimate the right number of loops, we must mathematically verify that the co-learning mechanism produces training loops. We upgrade a semi-DML data poisoning detection method to safeguard central resource learning. Resource allocation is optimised to maximise system resources. Simulations suggest that 60% strategic reversion and 20% supporting vector machines can improve the final replica's precision in basic DML. Basic-DML resource waste can be reduced by 20-100% with better resource allocation and data poisoning detection.

Original languageEnglish
Title of host publicationProceedings of 2nd International Conference on Advancements in Smart, Secure and Intelligent Computing, ASSIC 2024
EditorsSushruta Mishra, Hrudaya Kumar Tripathy, Jnyana Ranjan Mohanty, Sambit Mishra, Tarek Gaber, Kshira Sagar Sahoo
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350370188
DOIs
Publication statusPublished - 2024
Event2nd International Conference on Advancements in Smart, Secure and Intelligent Computing, ASSIC 2024 - Bhubaneswar, India
Duration: 27-01-202429-01-2024

Publication series

NameProceedings of 2nd International Conference on Advancements in Smart, Secure and Intelligent Computing, ASSIC 2024

Conference

Conference2nd International Conference on Advancements in Smart, Secure and Intelligent Computing, ASSIC 2024
Country/TerritoryIndia
CityBhubaneswar
Period27-01-2429-01-24

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Computer Vision and Pattern Recognition
  • Safety, Risk, Reliability and Quality
  • Modelling and Simulation

Fingerprint

Dive into the research topics of 'Relavation Schemes of Malicious Data For Distributed Machine Learning'. Together they form a unique fingerprint.

Cite this