Author
Listed:
- K. M. Sameera
(Cochin University of Science and Technology, Department of Computer Applications)
- Dincy R. Arikkat
(Cochin University of Science and Technology, Department of Computer Applications)
- P. Vinod
(Cochin University of Science and Technology, Department of Computer Applications
University of Padua, Department of Mathematics)
- Rehiman K. A. Rafidha
(Cochin University of Science and Technology, Department of Computer Applications)
- Azin Aneez
(University of Texas, School of Behavioral and Brain Sciences)
- Mauro Conti
(University of Padua, Department of Mathematics)
Abstract
Federated Learning (FL) has achieved extensive adoption, especially in applications like healthcare and cyber-physical systems, serving as a protective measure for data while ensuring participant privacy. In FL, adversarial attacks present a considerable risk to both the integrity of the learning model and the privacy of the distributed data. The decentralized structure of FL exacerbates this vulnerability, as the data stays local and is not accessible to the central server, complicating efforts to protect against adversarial attacks. This challenge underscores the necessity for further research on robust defense approaches to guarantee that FL can effectively safeguard data privacy and become a viable solution in real-world applications. This article provides an extensive review, including potential attacks and mitigation strategies. This survey presents a taxonomy of adversarial attacks and defense mechanisms, offering a comprehensive overview of the vulnerabilities in FL and the strategies available to mitigate them. Besides, we introduce a unified adversary-resilient FL framework that integrates Blockchain to enhance security. Finally, we present open research challenges in the field of FL.
Suggested Citation
K. M. Sameera & Dincy R. Arikkat & P. Vinod & Rehiman K. A. Rafidha & Azin Aneez & Mauro Conti, 2025.
"Federated Learning: An Overview of Attacks and Defense Methods,"
Springer Books, in: Mark Stamp & Martin Jureček (ed.), Machine Learning, Deep Learning and AI for Cybersecurity, pages 393-431,
Springer.
Handle:
RePEc:spr:sprchp:978-3-031-83157-7_14
DOI: 10.1007/978-3-031-83157-7_14
Download full text from publisher
To our knowledge, this item is not available for
download. To find whether it is available, there are three
options:
1. Check below whether another version of this item is available online.
2. Check on the provider's
web page
whether it is in fact available.
3. Perform a
for a similarly titled item that would be
available.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:sprchp:978-3-031-83157-7_14. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.