IEEE Computational Intelligence Magazine - August 2022 - 30

The decentralized accountability enables all miners
to verify the quality of up-loaded models that are
recorded on the blockchain.
volume can be proportional to the size of the training data.
It
is noted that
the reward mechanism can be further
amended by combining consideration of the data size and
the quality of data samples. In this case, clients are responsible
for verifying the trustworthiness of local updates after
aggregation to address the situation that untruthful UEs
may exaggerate their sample sizes with abnormal local
model updates. Specifically, when clients calculate the
rewards for each training node, they can give scores/reputations
to the training nodes based on the model qualities. In
the next aggregation, nodes with low scores will be given
less weight, and they will be identified and gradually
ignored during learning. In practice, this can be guaranteed
by Intel's software guard extensions, allowing applications
to be operated within a protected environment, which has
already been used in blockchain technologies [14]. In addition,
miners can also obtain rewards from mining and
aggregating models, which can be treated as a gas tax in the
traditional blockchain.
A task publisher first broadcasts an FL task through an SC
to all of the clients. Consider that N clients dynamically bid for
this task and use PoW as the consensus mechanism in the
ALGORITHM 1 BLADE-FL algorithm.
Data: Number of communication rounds T, initial model
w0
, and proximal term μ in local learning.
1 Task publishing and client selection.
2 Initialization: t = 1 and wwi
=
3 while tT# do
4
5
6
7 ww ww() ||=+ -
Model broadcasting and aggregating:
Update aggregated model w()t
i
t
8
9
N
10 wwp
t
i
11
12
13
14
15
= / N .
i=1
i
t
Block mining and verification:
Each client starts mining its block that includes the
aggregated model and verifies the generated block.
Global model downloading:
Each client downloads the aggregated model from the
verified block and updates.
Reward allocation for learning and mining.
16 tt 1! +
Result: w
N
(T)
30 IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | AUGUST 2022
argmin Fii
w `
i
n
2
as
i
Local training:
while i {1,2,, }Nf!
do
Update local model w()
t
i
as
t 1
-
||
2 j.
0 6 i
,
verification process. Thus, the pseudo-code of
the proposed BLADE-FL framework is outlined
in Algorithm 1.
III. Unique Issues and
Potential Solutions
In this section, three critical issues that the
proposed framework may be confronted with, namely, privacy,
resource allocation, and lazy clients, are described.
A. Privacy
In BLADE-FL, the roles of each client include mining and
training. To aggregate the global model, the trained local model
will be published among clients, which raises privacy issues.
Previous works [5]-[11] usually artificially assign the training
and mining tasks to two disjoint sets of clients, and they widely
adopt that the miners are always trustful. However, if an eavesdropper
exists in the wireless environment, the published information
of local models can cause privacy leakage. To address
this, a differentially private mechanism can be implemented at
the client side. In detail, the key steps are as follows.
❏ Each client sets up a self-required privacy level for itself
before training. For example, the ith client may have a local
privacy budget ie . Note that a small value of ie represents a
high local privacy level, and it will induce more additive
noises on the parameters.
❏ To achieve local differential privacy (LDP), each client will
add a random noise that follows a certain distribution on the
uploaded models. For example, a random Gaussian noise
N (, )0 2
v or a Laplace noise La ()p m will be added. Note that
a large noise power implies a high privacy level.
❏ Upon receiving the perturbed models, all of the clients can
aggregate the global model locally and store it in the generated
block. Because of the injected noise, the learning convergence
as well as the system performance will be
negatively affected. A trade-off between the privacy requirement
and learning performance needs further investigation.
In addition, a non-uniform allocation of additive noise over
communication rounds may improve learning performance;
for example, a decay rate for the noise power can be applied
when the learning accuracy between two adjacent communication
rounds stops improving [15].
B. Computing Resource Allocation
Since the computation resource is limited at each client, each
participant must appropriately allocate the resources for local
training and mining to complete the task. Specifically, more
computing resources can be devoted either to accelerate model
updating or block generation. To meet the specific task requirements,
such as learning difficulty, accuracy, and delay, each node
optimizes its allocation strategy to maximize its reward under
constraints of local capability.
According to the constraints, the computing resource allocation
can be formulated as an optimization problem under the
accurate mathematical model, as follows, in detail.

IEEE Computational Intelligence Magazine - August 2022

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - August 2022

Contents
IEEE Computational Intelligence Magazine - August 2022 - Cover1
IEEE Computational Intelligence Magazine - August 2022 - Cover2
IEEE Computational Intelligence Magazine - August 2022 - Contents
IEEE Computational Intelligence Magazine - August 2022 - 2
IEEE Computational Intelligence Magazine - August 2022 - 3
IEEE Computational Intelligence Magazine - August 2022 - 4
IEEE Computational Intelligence Magazine - August 2022 - 5
IEEE Computational Intelligence Magazine - August 2022 - 6
IEEE Computational Intelligence Magazine - August 2022 - 7
IEEE Computational Intelligence Magazine - August 2022 - 8
IEEE Computational Intelligence Magazine - August 2022 - 9
IEEE Computational Intelligence Magazine - August 2022 - 10
IEEE Computational Intelligence Magazine - August 2022 - 11
IEEE Computational Intelligence Magazine - August 2022 - 12
IEEE Computational Intelligence Magazine - August 2022 - 13
IEEE Computational Intelligence Magazine - August 2022 - 14
IEEE Computational Intelligence Magazine - August 2022 - 15
IEEE Computational Intelligence Magazine - August 2022 - 16
IEEE Computational Intelligence Magazine - August 2022 - 17
IEEE Computational Intelligence Magazine - August 2022 - 18
IEEE Computational Intelligence Magazine - August 2022 - 19
IEEE Computational Intelligence Magazine - August 2022 - 20
IEEE Computational Intelligence Magazine - August 2022 - 21
IEEE Computational Intelligence Magazine - August 2022 - 22
IEEE Computational Intelligence Magazine - August 2022 - 23
IEEE Computational Intelligence Magazine - August 2022 - 24
IEEE Computational Intelligence Magazine - August 2022 - 25
IEEE Computational Intelligence Magazine - August 2022 - 26
IEEE Computational Intelligence Magazine - August 2022 - 27
IEEE Computational Intelligence Magazine - August 2022 - 28
IEEE Computational Intelligence Magazine - August 2022 - 29
IEEE Computational Intelligence Magazine - August 2022 - 30
IEEE Computational Intelligence Magazine - August 2022 - 31
IEEE Computational Intelligence Magazine - August 2022 - 32
IEEE Computational Intelligence Magazine - August 2022 - 33
IEEE Computational Intelligence Magazine - August 2022 - 34
IEEE Computational Intelligence Magazine - August 2022 - 35
IEEE Computational Intelligence Magazine - August 2022 - 36
IEEE Computational Intelligence Magazine - August 2022 - 37
IEEE Computational Intelligence Magazine - August 2022 - 38
IEEE Computational Intelligence Magazine - August 2022 - 39
IEEE Computational Intelligence Magazine - August 2022 - 40
IEEE Computational Intelligence Magazine - August 2022 - 41
IEEE Computational Intelligence Magazine - August 2022 - 42
IEEE Computational Intelligence Magazine - August 2022 - 43
IEEE Computational Intelligence Magazine - August 2022 - 44
IEEE Computational Intelligence Magazine - August 2022 - 45
IEEE Computational Intelligence Magazine - August 2022 - 46
IEEE Computational Intelligence Magazine - August 2022 - 47
IEEE Computational Intelligence Magazine - August 2022 - 48
IEEE Computational Intelligence Magazine - August 2022 - 49
IEEE Computational Intelligence Magazine - August 2022 - 50
IEEE Computational Intelligence Magazine - August 2022 - 51
IEEE Computational Intelligence Magazine - August 2022 - 52
IEEE Computational Intelligence Magazine - August 2022 - 53
IEEE Computational Intelligence Magazine - August 2022 - 54
IEEE Computational Intelligence Magazine - August 2022 - 55
IEEE Computational Intelligence Magazine - August 2022 - 56
IEEE Computational Intelligence Magazine - August 2022 - 57
IEEE Computational Intelligence Magazine - August 2022 - 58
IEEE Computational Intelligence Magazine - August 2022 - 59
IEEE Computational Intelligence Magazine - August 2022 - 60
IEEE Computational Intelligence Magazine - August 2022 - 61
IEEE Computational Intelligence Magazine - August 2022 - 62
IEEE Computational Intelligence Magazine - August 2022 - 63
IEEE Computational Intelligence Magazine - August 2022 - 64
IEEE Computational Intelligence Magazine - August 2022 - 65
IEEE Computational Intelligence Magazine - August 2022 - 66
IEEE Computational Intelligence Magazine - August 2022 - 67
IEEE Computational Intelligence Magazine - August 2022 - 68
IEEE Computational Intelligence Magazine - August 2022 - Cover3
IEEE Computational Intelligence Magazine - August 2022 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com