A showcase of ÉTS researchers’ publications and other contributions

Towards reliable participation in UAV-enabled federated edge learning on non-IID data


Downloads per month over past year

Cheriguene, Youssra, Jaafar, Wael, Yanikomeroglu, Halim and Kerrache, Chaker Abdelaziz. 2024. « Towards reliable participation in UAV-enabled federated edge learning on non-IID data ». IEEE Open Journal of Vehicular Technology, vol. 5. pp. 125-141.

[thumbnail of Jaafar-W-2024-28237.pdf]
Jaafar-W-2024-28237.pdf - Published Version
Use licence: Creative Commons CC BY-NC-ND.

Download (3MB) | Preview


Federated Learning (FL) is a decentralized machine learning (ML) technique that allows a number of participants to train an ML model collaboratively without having to share their private local datasets with others. When participants are unmanned aerial vehicles (UAVs), UAV-enabled FL would experience heterogeneity due to the majorly skewed (non-independent and identically distributed -IID) collected data. In addition, UAVs may demonstrate unintentional misbehavior in which the latter may fail to send updates to the FL server due, for instance, to UAVs’ disconnectivity from the FL system caused by high mobility, unavailability, or battery depletion. Such challenges may significantly affect the convergence of the FL model. A recent way to tackle these challenges is client selection, based on customized criteria that consider UAV computing power and energy consumption. However, most existing client selection schemes neglected the participants’ reliability. Indeed, FL can be targeted by poisoning attacks, in which malicious UAVs upload poisonous local models to the FL server, by either providing targeted false predictions for specifically chosen inputs or by compromising the global model’s accuracy through tampering with the local model. Hence, we propose in this article a novel client selection scheme that enhances convergence by prioritizing fast UAVs with high-reliability scores, while eliminating malicious UAVs from training. Through experiments, we assess the effectiveness of our scheme in resisting different attack scenarios, in terms of convergence and achieved model accuracy. Finally, we demonstrate the performance superiority of the proposed approach compared to baseline methods.

Item Type: Peer reviewed article published in a journal
Jaafar, Waël
Affiliation: Génie logiciel et des technologies de l'information
Date Deposited: 04 Jan 2024 20:40
Last Modified: 08 Jan 2024 20:21

Actions (login required)

View Item View Item