Byzantine machine learning: A primer

R Guerraoui, N Gupta, R Pinot - ACM Computing Surveys, 2024 - dl.acm.org
The problem of Byzantine resilience in distributed machine learning, aka Byzantine machine
learning, consists of designing distributed algorithms that can train an accurate model …

Distributed optimization under adversarial nodes

S Sundaram, B Gharesifard - IEEE Transactions on Automatic …, 2018 - ieeexplore.ieee.org
We investigate the vulnerabilities of consensus-based distributed optimization protocols to
nodes that deviate from the prescribed update rule (eg, due to failures or adversarial …

Resilient and robust synchronization of multiagent systems under attacks on sensors and actuators

H Modares, B Kiumarsi, FL Lewis… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Resilient and robust distributed control protocols for multiagent systems under attacks on
sensors and actuators are designed. A distributed H∞ control protocol is designed to …

Fault-tolerant multi-agent optimization: optimal iterative distributed algorithms

L Su, NH Vaidya - Proceedings of the 2016 ACM symposium on …, 2016 - dl.acm.org
This paper addresses the problem of distributed multi-agent optimization in which each
agent i has a local cost function hi (x), and the goal is to optimize a global cost function that …

An event-driven resilient control strategy for DC microgrids

S Sahoo, T Dragičević… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Though recent advancements in dc microgrids are largely based on distributed control
strategies to enhance reliability, their susceptibility to cyber attacks still remains a …

Resilient distributed optimization algorithm against adversarial attacks

C Zhao, J He, QG Wang - IEEE Transactions on Automatic …, 2019 - ieeexplore.ieee.org
As the cyber-attack is becoming one of the most challenging threats faced by cyber-physical
systems, investigating the effect of cyber-attacks on distributed optimization and designing …

The internet of things: Secure distributed inference

Y Chen, S Kar, JMF Moura - IEEE Signal Processing Magazine, 2018 - ieeexplore.ieee.org
The growth in the number of devices connected to the Internet of Things (IoT) poses major
challenges in security. The integrity and trustworthiness of data and data analytics are …

Attack analysis and resilient control design for discrete-time distributed multi-agent systems

A Mustafa, H Modares - IEEE Robotics and Automation Letters, 2019 - ieeexplore.ieee.org
This work analyzes the adverse effects of cyberphysical attacks on discrete-time distributed
multi-agent systems, and proposes a mitigation approach for attacks on sensors and …

Resilient distributed state estimation with mobile agents: overcoming Byzantine adversaries, communication losses, and intermittent measurements

A Mitra, JA Richards, S Bagchi, S Sundaram - Autonomous Robots, 2019 - Springer
Applications in environmental monitoring, surveillance and patrolling typically require a
network of mobile agents to collectively gain information regarding the state of a static or …

Secure distributed observers for a class of linear time invariant systems in the presence of byzantine adversaries

A Mitra, S Sundaram - 2016 IEEE 55th Conference on Decision …, 2016 - ieeexplore.ieee.org
We study the problem of distributed state estimation of a linear time-invariant system by a
network of nodes, some of which are subject to adversarial attacks. We develop a secure …