The hidden vulnerability of distributed learning in byzantium

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

While machine learning is going through an era of celebrated success, concerns have been raised about the vulnerability of its backbone: Stochastic gradient descent (SGD). Recent approaches have been proposed to ensure the robustness, of distributed SGD against adversarial (Byzantine) workers sending poisoned gradients during the training phase. Some of these approaches have been proven Byzantine-resilient: They ensure the convergence of SGD despite the presence of a minority of adversarial workers. We show in this paper that convergence is not enough. In high dimension d 1, an adversary can build on the loss function's non-convexity to make SGD converge to ineffective models. More precisely, we bring to light that existing Byzantine-resilient schemes leave a margin of poisoning of Cl(f(d)), where f(d) increases at least like Vd. Based on this leeway, we build a simple attack, and experimentally show its strong to utmost effectivity on CIFAR-10 and MNIST. We introduce Bulyan, and prove it significantly reduces the attacker's leeway to a narrow C(1/V5") bound. We empirically show that Bulyan does not suffer the fragility of existing aggregation rules and, at a reasonable cost in terms of required batch size, achieves convergence as if only non-Byzantine gradients had been used to update the model.

Original languageEnglish
Title of host publication35th International Conference on Machine Learning, ICML 2018
EditorsJennifer Dy, Andreas Krause
PublisherInternational Machine Learning Society (IMLS)
Pages5674-5686
Number of pages13
ISBN (Electronic)9781510867963
Publication statusPublished - 1 Jan 2018
Externally publishedYes
Event35th International Conference on Machine Learning, ICML 2018 - Stockholm, Sweden
Duration: 10 Jul 201815 Jul 2018

Publication series

Name35th International Conference on Machine Learning, ICML 2018
Volume8

Conference

Conference35th International Conference on Machine Learning, ICML 2018
Country/TerritorySweden
CityStockholm
Period10/07/1815/07/18

Fingerprint

Dive into the research topics of 'The hidden vulnerability of distributed learning in byzantium'. Together they form a unique fingerprint.

Cite this