{"title":"A SURVEY ON CHALLENGES OF FEDERATED LEARNING","authors":"S. Aliyev","doi":"10.32010/26166127.2022.5.2.273.285","DOIUrl":null,"url":null,"abstract":"Federated Learning is a new paradigm of Machine Learning. The main idea behind FL is to provide a decentralized approach to Machine Learning. Traditional ML algorithms are trained in servers with data collected by clients, but data privacy is the primary concern. This is where FL comes into play: all clients train their model locally and then share it with a global model in the server and receive it back. However, FL has problems, such as possible cyberattacks, aggregating most appropriately, scaling the non-IID data, etc. This paper highlights current attacks, defenses, pros and cons of aggregating methods, and types of non-IID data based on publications in this field.","PeriodicalId":275688,"journal":{"name":"Azerbaijan Journal of High Performance Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Azerbaijan Journal of High Performance Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32010/26166127.2022.5.2.273.285","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Federated Learning is a new paradigm of Machine Learning. The main idea behind FL is to provide a decentralized approach to Machine Learning. Traditional ML algorithms are trained in servers with data collected by clients, but data privacy is the primary concern. This is where FL comes into play: all clients train their model locally and then share it with a global model in the server and receive it back. However, FL has problems, such as possible cyberattacks, aggregating most appropriately, scaling the non-IID data, etc. This paper highlights current attacks, defenses, pros and cons of aggregating methods, and types of non-IID data based on publications in this field.