Nothing Wasted: Full Contribution Enforcement in Federated Edge Learning

Date
2021-10
Language
American English
Embargo Lift Date
Committee Members
Degree
Degree Year
Department
Grantor
Journal Title
Journal ISSN
Volume Title
Found At
IEEE Xplore
Abstract

The explosive amount of data generated at the network edge makes mobile edge computing an essential technology to support real-time applications, calling for powerful data processing and analysis provided by machine learning (ML) techniques. In particular, federated edge learning (FEL) becomes prominent in securing the privacy of data owners by keeping the data locally used to train ML models. Existing studies on FEL either utilize in-process optimization or remove unqualified participants in advance. In this paper, we enhance the collaboration from all edge devices in FEL to guarantee that the ML model is trained using all available local data to accelerate the learning process. To that aim, we propose a collective extortion (CE) strategy under the imperfect-information multi-player FEL game, which is proved to be effective in helping the server efficiently elicit the full contribution of all devices without worrying about suffering from any economic loss. Technically, our proposed CE strategy extends the classical extortion strategy in controlling the proportionate share of expected utilities for a single opponent to the swiftly homogeneous control over a group of players, which further presents an attractive trait of being impartial for all participants. Both theoretical analysis and experimental evaluations validate the effectiveness and fairness of our proposed scheme.

Description
item.page.description.tableofcontents
item.page.relation.haspart
Cite As
Hu, Q., Wang, S., Xiong, Z., & Cheng, X. (2021). Nothing Wasted: Full Contribution Enforcement in Federated Edge Learning. IEEE Transactions on Mobile Computing, 22(5), 2850–2861. https://doi.org/10.1109/TMC.2021.3123195
ISSN
1536-1233, 1558-0660, 2161-9875
Publisher
Series/Report
Sponsorship
Major
Extent
Identifier
Relation
Journal
IEEE Transactions on Mobile Computing
Rights
Publisher Policy
Source
Author
Alternative Title
Type
Article
Number
Volume
Conference Dates
Conference Host
Conference Location
Conference Name
Conference Panel
Conference Secretariat Location
Version
Author's manuscript
Full Text Available at
This item is under embargo {{howLong}}