bdef70ab389d9f03.tex
1: \begin{abstract}
2:   Distributed learning has become a hot research topic,
3:   due to its wide application in cluster-based large-scale learning,
4:   federated learning, edge computing and so on.
5:   Most distributed learning methods assume no error and attack on the workers.
6:   However, many unexpected cases, such as communication error and even malicious attack,
7:   may happen in real applications.
8:   Hence, Byzantine learning~(BL), which refers to distributed learning with attack or error,
9:   has recently attracted much attention.
10:   Most existing BL methods are synchronous,
11:   which will result in slow convergence when there exist heterogeneous workers.
12:   Furthermore, in some applications like federated learning and edge computing,
13:   synchronization cannot even be performed most of the time due to the offline workers~(clients or edge servers).
14:   Hence, asynchronous BL~(ABL) is more general and practical than synchronous BL~(SBL).
15:   To the best of our knowledge, there exist only two ABL methods.
16:   One of them cannot resist malicious attack.
17:   The other needs to store some training instances on the server,
18:   which has the privacy leak problem.
19:   In this paper, we propose a novel method,
20:   called \underline{b}uffered \underline{a}synchronous \underline{s}tochastic \underline{g}radient \underline{d}escent~(\mbox{BASGD}), for BL.
21:   BASGD is an asynchronous method.
22:   Furthermore, BASGD has no need to store any training instances on the server,
23:   and hence can preserve privacy in ABL.
24:   \mbox{BASGD} is theoretically proved to have the ability of resisting against error and malicous attack.
25:   Moreover, BASGD has a similar theoretical convergence rate to that of vanilla asynchronous SGD~(ASGD),
26:   with an extra constant variance.
27:   Empirical results show that BASGD can significantly outperform vanilla ASGD and other ABL baselines,
28:   when there exists error or attack on workers.
29: \end{abstract}
30: