Online Optimization Under Randomly Corrupted Attacks

Existing algorithms in online optimization usually rely on trustful information, e.g., reliable knowledge of gradients, which makes them vulnerable to attacks. To take into account the security issue in online optimization, this paper investigates the effect of randomly corrupted attacks, which can...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on signal processing 2024, Vol.72, p.2160-2172
Hauptverfasser: Qu, Zhihai, Li, Xiuxian, Li, Li, Yi, Xinlei
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Existing algorithms in online optimization usually rely on trustful information, e.g., reliable knowledge of gradients, which makes them vulnerable to attacks. To take into account the security issue in online optimization, this paper investigates the effect of randomly corrupted attacks, which can corrupt gradient information arbitrarily. To conquer the randomly corrupted attack, an on L ine mu L tiple norma L ized G radient D escent (L3GD) algorithm is proposed. Under mild conditions, the algorithm is proven to achieve satisfactory expected dynamic regret, i.e, \mathcal{O}(\min\{P_{T}^{*}+T^{\frac{3}{4}},S_{T}^{*}+\sqrt{T}+\sum_{t=1}^{T} \|\nabla f_{t}(x_{t}^{*})\|^{2}\}) and \mathcal{O}(F_{T}+T^{\frac{3}{4}}), without convex assumption, where P_{T}^{*}, S_{T}^{*}, and F_{T} denote the path-length, squared path-length, and the functional variation, respectively. The results are comparable to state-of-the-art algorithms in the absence of randomly corrupted attacks. To our best knowledge, this paper is the first to consider randomly corrupted attacks in online optimization. Simulations conducted on both synthetic examples and real-world datasets, namely MNIST and CIFAR-10, corroborate the resilience of L3GD.
ISSN:1053-587X
1941-0476
DOI:10.1109/TSP.2024.3392361