Secure Distributed Optimization Under Gradient Attacks.
Shuhua YuSoummya KarPublished in: CoRR (2022)
Keyphrases
- security protocols
- cryptographic protocols
- distributed environment
- distributed systems
- optimization algorithm
- security mechanisms
- secure routing
- lightweight
- group communication
- cooperative
- stream cipher
- countermeasures
- optimization problems
- steepest descent method
- security flaws
- chosen plaintext
- security vulnerabilities
- unauthorized access
- edge detection
- data security
- security management
- security issues
- computing environments
- information leakage
- fault tolerant
- cryptographic algorithms
- optimization method
- access control
- peer to peer