Tang, Peng, Zhu, Xiaoyu, Qiu, Weidong, Huang, Zheng, Mu, Zhenyu, Li, Shujun (2025) FLAD: Byzantine-Robust Federated Learning Based on Gradient Feature Anomaly Detection. IEEE Transactions on Dependable and Secure Computing, 22 (4). pp. 3993-4009. ISSN 1545-5971. (doi:10.1109/TDSC.2025.3542437) (KAR id:115395)
|
PDF
Updated Version
Language: English
This work is licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
Download this file (PDF/4MB) |
Preview |
| Request a format suitable for use with assistive technology e.g. a screenreader | |
| Official URL: https://doi.org/10.1109/TDSC.2025.3542437 |
|
| Additional URLs: |
|
Abstract
Federated Learning (FL) has gained significant attention due to its ability to jointly train global models by exchanging local gradients instead of raw local datasets. However, poisoning attacks have emerged as a severe threat to FL security, where malicious clients submit crafted gradients to compromise the integrity and availability of the model. Although researchers have worked on countering these attacks to achieve Byzantine-robust FL, it remains challenging to balance high accuracy, robustness, and efficiency simultaneously. We propose FLAD, a novel Byzantine-robust FL approach based on gradient feature anomaly detection, which is the first approach that uses neural networks to adaptively learn gradient features and measure feature similarity to counteract various types of poisoning attacks. Specifically, FLAD employs a small clean dataset to bootstrap trust and trains Feature Extraction Models (FEM). With FEM and DBSCAN clustering, abnormal gradients from malicious clients are detected and eliminated. Extensive experiments on both Non-IID and IID datasets demonstrate that FLAD achieves superior accuracy, robustness, efficiency, and generalizability compared to state-of-the-art approaches. Additionally, we implement privacy-preserving FLAD (PFLAD) using CKKS and Random Permutation techniques to ensure transmitted gradient privacy.
| Item Type: | Article |
|---|---|
| DOI/Identification number: | 10.1109/TDSC.2025.3542437 |
| Uncontrolled keywords: | Servers, Feature extraction, Adaptation models, Training, Data models, Accuracy, Robustness, Finite element analysis, Computational modeling, Anomaly detection |
| Subjects: |
Q Science > QA Mathematics (inc Computing science) T Technology > TK Electrical engineering. Electronics. Nuclear engineering > TK5101 Telecommunications |
| Institutional Unit: |
Schools > School of Computing Institutes > Institute of Cyber Security for Society |
| Former Institutional Unit: |
There are no former institutional units.
|
| Depositing User: | Shujun Li |
| Date Deposited: | 21 May 2026 15:09 UTC |
| Last Modified: | 21 May 2026 15:15 UTC |
| Resource URI: | https://kar.kent.ac.uk/id/eprint/115395 (The current URI for this page, for reference purposes) |
- Link to SensusAccess
- Export to:
- RefWorks
- EPrints3 XML
- BibTeX
- CSV
- Depositors only (login required):

https://orcid.org/0000-0001-5628-7328
Altmetric
Altmetric