Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/31240
Full metadata record
DC FieldValueLanguage
dc.contributor.authorYan, N-
dc.contributor.authorWang, K-
dc.contributor.authorZhi, K-
dc.contributor.authorPan, C-
dc.contributor.authorChai, KK-
dc.contributor.authorPoor, HV-
dc.date.accessioned2025-05-14T15:58:37Z-
dc.date.available2025-05-14T15:58:37Z-
dc.date.issued2025-03-18-
dc.identifier.citationYan, N. et al. (2025) 'Secure and Private Over-the-air Federated Learning: Biased and Unbiased Aggregation Design', IEEE Transactions on Wireless Communications, 0 (early access), pp. 1 - 16. doi: 10.1109/TWC.2025.3550159.en_US
dc.identifier.issn1536-1276-
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/31240-
dc.description.abstractOver-the-air federated learning (OTA-FL) presents a promising paradigm that improves the efficiency of local update aggregation by leveraging the superposition property of wireless multiple access channels (MACs). However, it faces significant security and privacy concerns that demand careful consideration. To address these threats associated with OTA-FL, we develop a secure and private over-the-air federated learning (SP-OTA-FL) framework, which can realize the secure and private aggregation for both OTA-FL with unbiased aggregation (UB-OTA-FL) and OTA-FL with biased aggregation (B-OTA-FL). In this framework, a subset of devices participate in training, while another subset functions as jammers, emitting jamming signals to enhance the security and privacy of the OTA-FL process. In particular, we measure the privacy leakage of users’ data using differential privacy (DP) and introduce an innovative application of mean squared error security (MSE-security) to evaluate the security of the OTA-FL system. We conduct convergence analyses for both convex and non-convex loss functions. Building on these analytical results, we separately formulate optimization problems for UB-OTA-FL and B-OTA-FL to enhance the learning performance of SP-OTA-FL by strategically optimizing the scheduling of training participants and jammers. The effectiveness of the proposed schemes is verified through simulations.en_US
dc.description.sponsorship10.13039/100000001-National Science Foundation (Grant Number: ECCS-2335876).en_US
dc.format.extent1 - 16-
dc.format.mediumPrint-Electronic-
dc.language.isoen_USen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE).en_US
dc.rightsCopyright © 2025 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works ( https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/ ).-
dc.rights.urihttps://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/-
dc.subjectfederated learning (FL)en_US
dc.subjectdifferential privacy (DP)en_US
dc.subjectmean square error security (MSE-security)en_US
dc.titleSecure and Private Over-the-air Federated Learning: Biased and Unbiased Aggregation Designen_US
dc.typeArticleen_US
dc.relation.isPartOfIEEE Transactions on Wireless Communications-
pubs.publication-statusPublished online-
pubs.volume0-
dc.identifier.eissn1558-2248-
dc.rights.holderInstitute of Electrical and Electronics Engineers (IEEE).-
Appears in Collections:Dept of Computer Science Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfCopyright © 2025 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works ( https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/ ).1.72 MBAdobe PDFView/Open


Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.