6 research outputs found

    Fair Selection of Edge Nodes to Participate in Clustered Federated Multitask Learning

    Full text link
    Clustered federated Multitask learning is introduced as an efficient technique when data is unbalanced and distributed amongst clients in a non-independent and identically distributed manner. While a similarity metric can provide client groups with specialized models according to their data distribution, this process can be time-consuming because the server needs to capture all data distribution first from all clients to perform the correct clustering. Due to resource and time constraints at the network edge, only a fraction of devices {is} selected every round, necessitating the need for an efficient scheduling technique to address these issues. Thus, this paper introduces a two-phased client selection and scheduling approach to improve the convergence speed while capturing all data distributions. This approach ensures correct clustering and fairness between clients by leveraging bandwidth reuse for participants spent a longer time training their models and exploiting the heterogeneity in the devices to schedule the participants according to their delay. The server then performs the clustering depending on predetermined thresholds and stopping criteria. When a specified cluster approximates a stopping point, the server employs a greedy selection for that cluster by picking the devices with lower delay and better resources. The convergence analysis is provided, showing the relationship between the proposed scheduling approach and the convergence rate of the specialized models to obtain convergence bounds under non-i.i.d. data distribution. We carry out extensive simulations, and the results demonstrate that the proposed algorithms reduce training time and improve the convergence speed while equipping every user with a customized model tailored to its data distribution.Comment: To appear in IEEE Transactions on Network and Service Management, Special issue on Federated Learning for the Management of Networked System

    Fine-Tuned RNN-Based Detector for Electricity Theft Attacks in Smart Grid Generation Domain

    No full text
    In this article, we investigate the problem of electricity theft attacks on smart meters when malicious customers (i.e., adversaries) claim injecting more generated energy into the grid to get more profits from utility companies. These attacks can be applied by accessing the smart meters monitoring renewable-based distributed generation (DG), and manipulating the reading. In this article, we propose approaches that rely on data sources with only a single generator (i.e., solar only) and multifuel type; and address the crucial effects of slight perturbations that the attacker can add, which can deceive the detector. In particular, this article introduces an efficient multitask deep-learning-based detector that offers a higher detection rate, copes with different fuel types, and uses only single data sources. The proposed detector incorporates months and days as two additional features to boost the performance and properly guide the model to successful detection. The proposed method is then extended to consider small perturbations that attackers may use to launch successful attacks. We conduct extensive simulations for two different detectors, one for solar DG and the other for multiple fuel types (i.e., solar and wind). Using a realistic dataset, the results reveal that the proposed recurrent neural network-based detectors identify adversaries at a higher rate than the existing solutions, even with minimal perturbations and different fuel types
    corecore