1: \begin{abstract}
2: %Adversarial attacks include data poisoning, evasion and model stealing.
3: Developing large-scale distributed methods that are robust to the presence of adversarial or corrupted workers is an important part of making such methods practical for real-world problems.
4: %Defending against adversaries protects machine learning algorithms from malfunction. In this work, we focus on anti-adversary learning in the distributed setting and the adversary source comes from the workers in the system.
5: Here, we propose an iterative approach that is adversary-tolerant for least-squares problems. The algorithm utilizes simple statistics to guarantee convergence and is capable of learning the adversarial distributions. Additionally, the efficiency of the proposed method is shown in simulations in the presence of adversaries. The results demonstrate the great capability of such methods to tolerate different levels of adversary rates and to identify the erroneous workers with high accuracy.
6: \end{abstract}
7: