Computer Science ›› 2021, Vol. 48 ›› Issue (8): 32-40.doi: 10.11896/jsjkx.201000093

• Database & Big Data & Data Science • Previous Articles     Next Articles

Improved Federated Average Algorithm Based on Tomographic Analysis

LUO Chang-yin1,2,3, CHEN Xue-bin1,2,3, MA Chun-di1, ZHANG Shu-fen1,2,3   

  1. 1 College of Science,North China University of Science and Technology,Tangshan,Hebei 063210,China;
    2 Hebei Province Key Laboratory of Data Science and Application,North China University of Science and Technology,Tangshan,Hebei 063210,China;
    3 Tangshan Data Science Key Laboratory,North China University of Science and Technology,Tangshan,Hebei 063210,China
  • Received:2020-08-14 Revised:2021-01-03 Published:2021-08-10
  • About author:LUO Chang-yin,born in 1994,master,is a member of China Computer Federation.His main research interest include data security and so on.(1394301218@qq.com)CHEN Xue-bin,born in 1970,professor,Ph.D,is a distinguished member of China Computer Federation.His main research interest include data security,Internet of things security and network security.
  • Supported by:
    National Natural Science Foundation of China(61572170,61170254) and Tangshan Science and Technology Project(18120203A).

Abstract: In the federated average algorithm,the weight update is used to update the global model.The algorithm only considers the size of the data volume of each client when the weight is updated,and does not consider the impact of data quality on the mo-del.An improvement based on analytic hierarchy is proposed.The federated averaging algorithm is the first to process multi-source data from the perspective of data quality.First,the entropy method is used to calculate the importance of each attribute in the data,and it is used as the value of the criterion layer in the level analysis to calculate the data of each client quality.Then,combined with the amount of data on the client,the weight update method is recalculated in the global model.The simulation results show that for small and medium data sets,the model trained with support vector machines has the highest accuracy,rea-ching 85.7152%.For large data sets,the model trained with random forest has the highest accuracy,reaching 91.9321%.Compared with the traditional federal average method,the accuracy rate is increased by 3.5% on small and medium data sets and 1.3% on large data sets,which can improve the accuracy of the model while improving the security of the data and model.

Key words: Entropy weight method, Federated average(Fedavg), Tomographic analysis, Weight update

CLC Number: 

  • TP391
[1]MCMAHAN H B,MOORE E,RAMAG E,et al.Communi-cation-efficient learning of deep networks from decentralized data[C]//Proceedings of the 20th International Conference on Artificial Intelligence and Statistics.Fort Lauderdale:JMLR,2017:1-11.
[2]KONECNY J,MCMAHAN H B,YU F X,et al.Federatedlearning:Strategies for improving communicaton efficiency[C]//Proceedings of the 30th Annual Conference on Neural Information Processing Systems.Cambridge,MA:MIT Press,2016:1-10.
[3]YANG Q.Challengs of GDPR to AI and countermeasures based on federal transfer learning[J].Communications of Chinese Association of Artificial Intelligence,2018,8:1-8.
[4]YANG Q,LIU Y,CHEN T,et al.Federated Machine Learning:Concept and Applications[J].ACM Transactions on Intelligent Systems and Technology,2019,10(2):1-19.
[5]WANG S,TUOR T,SALONIDIS T,et al.Adaptive federated learning in resource constrained edge computing systems[J].IEEE Journal on Selected Areas in Communications,2019,37(6):1205-1221.
[6]LIU Y,LIU Y T,LIU Z J,et al.Federated Forest[EB/OL].[2019-05-24].https://arxiv.org/pdf/1905.10053v1.pdf.
[7]SHARMA S,CHEN K.Poster:Privacy-Preserving Boostingwith Random Linear Classifiers[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2018:1-13.
[8]SUN C,SHRIVASTAVA A,SINGH S,et al.Revisiting Unreasonable Effectiveness of Data in Deep Learning Era[EB/OL].[2017-08-04].https://arxiv.org/abs/1707.02968v2.pdf.
[9]KIM H,PARK J,BENNIS M,et al.On-Device Federated Lear-ning via Blockchain and its Latency Analysis[EB/OL].[2018-07-01].https://arxiv.org/pdf/1808.03949.pdf.
[10]LI S Y,CHENG Y,LIU Y,et al.Abnormal Client Behavior Detection in Federated Learning[EB/OL].[2019-12-06].https://arxiv.org /pdf/1910.09933.pdf.
[11]ZHU L G,LIU Z J,HAN S,et al.Deep Leakage from Gradients[EB/OL].[2019-12-19].https://arxiv.org/pdf/1906.08935.
[12]CHEN Y S,YANG Y H,YANG Y H,et al.Nuclear Power Plant Fault Diagnosis Technology Based on Deep Learning Neural Network [J].Journal of Shanghai Jiaotong University,2018,52(S1):58-61.
[13]GAO H H,HUANG W Q,YANG X X.Applying Probabilistic Model Checking to Path Planning in an Intelligent Transportation System Using Mobility Trajectories and Their Statistical Data[J].Intelligent Automation and Soft Computing(Autosoft),2019,25(3):547-559.
[14]GAO H H,HUANG W Q,DUAN Y C,et al.Research on Cost-Driven Services Composition in an Uncertain Environment[J].Journal of Internet Technology (JIT).2019,20(3):755-769.
[15]PREUVENEERS D,RIMMER V,TSINGENOPOULOS I,et al.Chained Anomaly Detection Models for Federated Lear-ning:An Intrusion Detection Case Study[J].Applied Sciences,2018,8(12):2663.
[16]BRISIMI T S,CHEN R,MELA T,et al.Federated learning of predictive models from federated Electronic Health Records[J].International Journal of Medical Informatics,2018,112:59-67.
[17]ZHANG W S,ZHANG Y J,ZHAI J,et al.Multi-source data fu-sion using deep learning for smart refrigerators[J].Computers in Industry,2018,95:15-21.
[18]LEE J,WANG F,SUN J M,et al.Privacy-Preserving Patient Similarity Learning in a Federated Environment:Development and Analysis[J].JMIR Medical Informatics,2018,6(2):e20.
[19]SHEN G J,HAN X,ZHOU J J,et al.Research on IntelligentAnalysis and Depth Fusion of Multi-Source Traffic Data[J].IEEE Access,2018(6):59329-59335.
[20]LIU J,LI T R,XIE P,et al.Urban big data fusion based on deep learning:An overview[J].Information Fusion,2020(53):123-133.
[21]WANG X D,XIONG Y L.Evaluation of the effect of rurale-commerce support policies-a text analysis based on the entropy method[J].Technology Management Research,2020,40(14):218-226.
[22]CHEN M Q.Heilongjiang Province Producer Service Industry Development Heterogeneity Analysis-Based on the Application of Entropy Method[J].Business Economy,2020(7):9-10,44.
[23]LIU B J,ZHANG S,LUO X Y,et al.Application of Aircraft Battle Damage Evaluation Based on Extension Entropy Method[J].Ordnance Industry Automation,2020,39(7):42-44.
[24]ZENG Y J.Application of improved entropy weight model in risk assessment of flood discharge and storage area[J].Yangtze River Technology and Economy,2020,4(S1):22-23.
[25]LI X,LI J C,ZHENG X F,et al.A Quantitative EvaluationMethod of Information System Vulnerabilities Based on Analytic Hierarchy Process[J].Computer Science,2012,39(7):58-63.
[26]WANG L,YE J,ZHANG H L.A method of supplier selection based on rough set and analytic hierarchy process[J].Computer Science,2014,41(3):80-84.
[1] YU Ben-gong, ZHANG Zi-wei, WANG Hui-ling. TS-AC-EWM Online Product Ranking Method Based on Multi-level Emotion and Topic Information [J]. Computer Science, 2022, 49(6A): 165-171.
[2] SHI Chao-wei, MENG Xiang-ru, MA Zhi-qiang, HAN Xiao-yang. Virtual Network Embedding Algorithm Based on Topology Comprehensive Evaluation and Weight Adaptation [J]. Computer Science, 2020, 47(7): 236-242.
[3] YE Jun and ZHANG Zheng-jun. Face Detection Based on DS-Adaboost Algorithm [J]. Computer Science, 2013, 40(Z11): 318-319.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!