期刊首页 优先出版 当期阅读 过刊浏览 作者中心 关于期刊 English

《工程(英文)》 >> 2024年 第34卷 第3期 doi: 10.1016/j.eng.2023.10.006

可信联邦学习进化优化算法综述

a School of Engineering, Westlake University, Hangzhou 310030, China
b Faculty of Informatics, Department of Computer Algebra, Eötvös Loránd University, Budapest 1053, Hungary
c Faculty of Technology, Bielefeld University, Bielefeld 33619, Germany
d Institute of Intelligent Manufacturing, Nanjing Tech University, Nanjing 211816, China
e School of Information Science and Technology, Guangdong University of Foreign Studies, Guangzhou 510006, China

收稿日期: 2023-04-15 修回日期: 2023-08-19 录用日期: 2023-10-12 发布日期: 2023-12-07

下一篇 上一篇

摘要

With the development of edge devices and cloud computing, the question of how to accomplish machine learning and optimization tasks in a privacy-preserving and secure way has attracted increased attention over the past decade. As a privacy-preserving distributed machine learning method, federated learning (FL) has become popular in the last few years. However, the data privacy issue also occurs when solving optimization problems, which has received little attention so far. This survey paper is concerned with privacy-preserving optimization, with a focus on privacy-preserving data-driven evolutionary optimization. It aims to provide a roadmap from secure privacy-preserving learning to secure privacy-preserving optimization by summarizing security mechanisms and privacy-preserving approaches that can be employed in machine learning and optimization. We provide a formal definition of security and privacy in learning, followed by a comprehensive review of FL schemes and cryptographic privacy-preserving techniques. Then, we present ideas on the emerging area of privacy-preserving optimization, ranging from privacy-preserving distributed optimization to privacy-preserving evolutionary optimization and privacy-preserving Bayesian optimization (BO). We further provide a thorough security analysis of BO and evolutionary optimization methods from the perspective of inferring attacks and active attacks. On the basis of the above, an in-depth discussion is given to analyze what FL and distributed optimization strategies can be used for the design of federated optimization and what additional requirements are needed for achieving these strategies. Finally, we conclude the survey by outlining open questions and remaining challenges in federated data-driven optimization. We hope this survey can provide insights into the relationship between FL and federated optimization and will promote research interest in secure federated optimization.

相关研究