IEEE Computational Intelligence Magazine - August 2022 - 31

❏ The block generation rate is determined by
the computational complexity of the hash
function and the total computing power of
the blockchain network (i.e., total CPU
cycles). The average CPU cycles required to
generate a block can be defined as kcB
where k denotes the mining difficulty and cB
,
is the average
number of total CPU cycles required to generate a block.
Thus, the average generation time of a block (tB
expressed as kc /NfB
) can be
, where N is the number of clients and f
denotes the CPU cycles per second of each client.
❏ The training time consumed by each training iteration, tT
can be expressed as (| |/ )Dc fT
number of samples of each client and cT
CPU cycles required to train one sample.
,
, where ||D denotes the
is the number of
❏ Considering that a typical FL learning task is required to
be accomplished within a fixed duration of TSum
Kt tTSumTBx +
#
, the total
learning and mining times should be satisfied that
()
, where K denotes the number of total
communication rounds and x the number of local training
epochs. Thus, to achieve required learning performance,
the number of communication rounds K should
be optimized under a certain ratio between the training
and mining time.
C. Lazy Clients
As the verification is processed locally, a lazy client may not
perform local learning and directly copy uploaded parameters
from other clients to save its computing resources. As a result,
the client can devote more mining resources to reaping more
mining rewards with a higher probability. However, this action
degrades learning performance. To investigate the effect of lazy
nodes on the system performance, related experimental results
are provided in Sec. V-D.
To address the lazy client issue, a signature process can be
implemented at each client, which is based on the pseudo-noise
(PN) sequence. The signature in BLADE-FL is resilient to noise
perturbation because the lazy clients are likely to perturb the
plagiarized local models to hide their misbehavior. This process
can improve detection accuracy of lazy clients at the cost of
negligible overhead to the system. The details of the process are
the following.
❏ Before broadcasting the local updates, each client will
produce a PN sequence of length L, where L is usually a
very large number (larger than the number of model
parameters), and a same length with model parameters is
selected and added to the local updates. This PN
sequence has a high self-correlation coefficient and is
difficult to detect or re-produce by other clients. Minimally,
the complexity of detecting the PN sequence
should be much larger than that of training the neural
network so as to deter the attempt to discover the used
PN sequence.
❏ Upon receiving local updates from the other clients, each
client will use its own PN sequence to check the correlaIV.
Experimental Results and Potential Solutions
In this section, several related experimental results are provided
to show the issues in the multi-functional miner in the proposed
BLADE-FL system.
A. System Setup
For each experiment, the original training data is divided into
non-iid training sets, and locally computes a stochastic gradient
descent (SGD) updated on each dataset, and then the
server aggregates updates to train a globally shared classifier.
The prototype is evaluated on the Fashion-MNIST and
Cifar-10 datasets.
ALGORITHM 2 PN Sequence Detection Algorithm.
Data: Number of communication rounds T, number of clients N,
detection threshold m, and amplitude of PN sequence a.
1 Initialize: w0
, t = 1
2 while tT1= do
3
4
if t = 1 then
i-th client adds an additive PN sequence to the
learned model as ww S
X =+a .
i
t
5
6
7
8
9
10
11
12
i
t
i
t
Calculates the cross-correlation value between model
parameters and its own PN sequence as
C Sw Sw S()
ij,
t
== +
X
i
t
)) a
j
t
i
t
j
t
Performs peak detection.
$ m then
wj
t
else
wj
t
is honest.
13 Performs a global update as wwi|| /| |,DDt=RR m
N
Discards models that are detected as lazy clients
X j c
N
i==
`
where Nt is number of honest clients after discarding
lazy clients.
j
14 tt 1=+
Result: wT
i
t
11
tt
j
is copied;
if Cj
t
j
t
.
Sums the cross-correlation value as CC,
,
j
t
= /
1
ii j
N
= !
ij
t
.
tion coefficient with the updates. If high peaks in terms of
the cross-correlation coefficient exist, then the lazy clients
will be detected.
❏ Once a lazy client is recognized by a local client, this client
can publish the previously used PN sequence to others and
invite other honest clients to verify this process. Then, any
future updates from the lazy client might be discarded as
punishments.
The pseudo-code of the PN sequence detection is shown
in Algorithm 2.
To achieve local differential privacy, each client
will add a random noise that follows a certain
distribution on the uploaded models.
AUGUST 2022 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE 31

IEEE Computational Intelligence Magazine - August 2022

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - August 2022

Contents
IEEE Computational Intelligence Magazine - August 2022 - Cover1
IEEE Computational Intelligence Magazine - August 2022 - Cover2
IEEE Computational Intelligence Magazine - August 2022 - Contents
IEEE Computational Intelligence Magazine - August 2022 - 2
IEEE Computational Intelligence Magazine - August 2022 - 3
IEEE Computational Intelligence Magazine - August 2022 - 4
IEEE Computational Intelligence Magazine - August 2022 - 5
IEEE Computational Intelligence Magazine - August 2022 - 6
IEEE Computational Intelligence Magazine - August 2022 - 7
IEEE Computational Intelligence Magazine - August 2022 - 8
IEEE Computational Intelligence Magazine - August 2022 - 9
IEEE Computational Intelligence Magazine - August 2022 - 10
IEEE Computational Intelligence Magazine - August 2022 - 11
IEEE Computational Intelligence Magazine - August 2022 - 12
IEEE Computational Intelligence Magazine - August 2022 - 13
IEEE Computational Intelligence Magazine - August 2022 - 14
IEEE Computational Intelligence Magazine - August 2022 - 15
IEEE Computational Intelligence Magazine - August 2022 - 16
IEEE Computational Intelligence Magazine - August 2022 - 17
IEEE Computational Intelligence Magazine - August 2022 - 18
IEEE Computational Intelligence Magazine - August 2022 - 19
IEEE Computational Intelligence Magazine - August 2022 - 20
IEEE Computational Intelligence Magazine - August 2022 - 21
IEEE Computational Intelligence Magazine - August 2022 - 22
IEEE Computational Intelligence Magazine - August 2022 - 23
IEEE Computational Intelligence Magazine - August 2022 - 24
IEEE Computational Intelligence Magazine - August 2022 - 25
IEEE Computational Intelligence Magazine - August 2022 - 26
IEEE Computational Intelligence Magazine - August 2022 - 27
IEEE Computational Intelligence Magazine - August 2022 - 28
IEEE Computational Intelligence Magazine - August 2022 - 29
IEEE Computational Intelligence Magazine - August 2022 - 30
IEEE Computational Intelligence Magazine - August 2022 - 31
IEEE Computational Intelligence Magazine - August 2022 - 32
IEEE Computational Intelligence Magazine - August 2022 - 33
IEEE Computational Intelligence Magazine - August 2022 - 34
IEEE Computational Intelligence Magazine - August 2022 - 35
IEEE Computational Intelligence Magazine - August 2022 - 36
IEEE Computational Intelligence Magazine - August 2022 - 37
IEEE Computational Intelligence Magazine - August 2022 - 38
IEEE Computational Intelligence Magazine - August 2022 - 39
IEEE Computational Intelligence Magazine - August 2022 - 40
IEEE Computational Intelligence Magazine - August 2022 - 41
IEEE Computational Intelligence Magazine - August 2022 - 42
IEEE Computational Intelligence Magazine - August 2022 - 43
IEEE Computational Intelligence Magazine - August 2022 - 44
IEEE Computational Intelligence Magazine - August 2022 - 45
IEEE Computational Intelligence Magazine - August 2022 - 46
IEEE Computational Intelligence Magazine - August 2022 - 47
IEEE Computational Intelligence Magazine - August 2022 - 48
IEEE Computational Intelligence Magazine - August 2022 - 49
IEEE Computational Intelligence Magazine - August 2022 - 50
IEEE Computational Intelligence Magazine - August 2022 - 51
IEEE Computational Intelligence Magazine - August 2022 - 52
IEEE Computational Intelligence Magazine - August 2022 - 53
IEEE Computational Intelligence Magazine - August 2022 - 54
IEEE Computational Intelligence Magazine - August 2022 - 55
IEEE Computational Intelligence Magazine - August 2022 - 56
IEEE Computational Intelligence Magazine - August 2022 - 57
IEEE Computational Intelligence Magazine - August 2022 - 58
IEEE Computational Intelligence Magazine - August 2022 - 59
IEEE Computational Intelligence Magazine - August 2022 - 60
IEEE Computational Intelligence Magazine - August 2022 - 61
IEEE Computational Intelligence Magazine - August 2022 - 62
IEEE Computational Intelligence Magazine - August 2022 - 63
IEEE Computational Intelligence Magazine - August 2022 - 64
IEEE Computational Intelligence Magazine - August 2022 - 65
IEEE Computational Intelligence Magazine - August 2022 - 66
IEEE Computational Intelligence Magazine - August 2022 - 67
IEEE Computational Intelligence Magazine - August 2022 - 68
IEEE Computational Intelligence Magazine - August 2022 - Cover3
IEEE Computational Intelligence Magazine - August 2022 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com