Consensus-based distributed optimization with malicious nodes

S Sundaram, B Gharesifard - 2015 53rd Annual Allerton …, 2015 - ieeexplore.ieee.org
2015 53rd Annual Allerton Conference on Communication, Control …, 2015ieeexplore.ieee.org
We investigate the vulnerabilities of consensus-based distributed optimization protocols to
nodes that deviate from the prescribed update rule (eg, due to failures or adversarial
attacks). After characterizing certain fundamental limitations on the performance of any
distributed optimization algorithm in the presence of adversaries, we propose a robust
consensus-based distributed optimization algorithm that is guaranteed to converge to the
convex hull of the set of minimizers of the non-adversarial nodes' functions. We also study …
We investigate the vulnerabilities of consensus-based distributed optimization protocols to nodes that deviate from the prescribed update rule (e.g., due to failures or adversarial attacks). After characterizing certain fundamental limitations on the performance of any distributed optimization algorithm in the presence of adversaries, we propose a robust consensus-based distributed optimization algorithm that is guaranteed to converge to the convex hull of the set of minimizers of the non-adversarial nodes' functions. We also study the distance-to-optimality properties of our proposed robust algorithm in terms of F-local sets of the graph. We show that finding the largest size of such sets is NP-hard.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果