Prox-DBRO-VR: A Unified Analysis on Decentralized Byzantine-Resilient Composite Stochastic Optimization with Variance Reduction
Abstract
Decentralized stochastic gradient algorithms efficiently solve large-scale finite-sum optimization problems when all agents in the network are reliable. However, most of these algorithms are not resilient to adverse conditions, for instance, Byzantine issues. This paper aims to handle a class of general composite finite-sum optimization problems over multi-agent systems (MASs) in the presence of an unknown number of Byzantine agents. Based on the proximal mapping method, variance-reduced (VR) techniques, and a norm-penalized approximation strategy, we propose a decentralized Byzantine-resilient and proximal-gradient algorithmic framework, dubbed Prox-DBRO-VR, which achieves an optimization and control goal via local updates. To remove asymptotically the variance generated by evaluating the local noisy stochastic gradients, we incorporate two localized VR techniques (SAGA and LSVRG) into Prox-DBRO-VR to design Prox-DBRO-SAGA and Prox-DBRO-LSVRG. By analyzing the contraction relationships among the gradient-learning error, resilient consensus condition, and convergence error in a unified theoretical framework, it is demonstrated that both Prox-DBRO-SAGA and Prox-DBRO-LSVRG, with a well-designed constant (resp., decaying) step-size, converge linearly (resp., sub-linearly) inside an error ball around the optimal solution to the original problem under standard assumptions. A trade-off between the convergence accuracy and Byzantine resilience in both linear and sub-linear cases is also characterized. In numerical experiments, the effectiveness and practicability of the proposed algorithms are manifested via resolving a decentralized sparse machine-learning problem over MASs under various Byzantine attacks.
Index Terms:
Decentralized stochastic optimization, system security, cyber attacks, Byzantine-resilient algorithms, composite optimization problems, variance-reduced stochastic gradients.Decentralized optimization has received extensive research and achieved notable progress in the field of machine learning [1, 2, 3], smart grids [4], cooperative control [5], and uncooperative games [6]. Decentralized algorithms have advantages of high-efficiency for massive-scale optimization problems, good scalability over large-scale MASs, and a lower communication burden for the master/central agent in contrast to the parameter-server structure.
With the rapid advancement of MASs, there are unavoidable security issues in the process of optimization and control, such as poisoning data, software bugs, malfunctioning devices, cyber attacks, and privacy leakage. Many endeavors have been devoted to developing various privacy-preserving methods in decentralized optimization, for instance, differential privacy [7, 8]. Nevertheless, privacy issues are beyond the scope of this paper, as they do not directly cause compromised agents or disrupt the normal iteration of algorithms. Other issues, however, may lead to node-level failures during multi-agent optimization and control, which is known as Byzantine problems [9], where the malfunctioning or compromised agents are referred to as Byzantine agents. Byzantine agents colluding with each other are able to impede some notable Byzantine-free decentralized optimization algorithms [10, 11, 2, 5, 12, 13, 14, 6, 15, 4, 1, 16] from achieving the optimal solution to the optimization problem, or even cause disagreement and divergence [17]. For example, if a reliable agent is attacked and controlled by adversaries, the attacker can manipulate the agent to send misleadingly falsified information to its different reliable neighboring agents at each iteration. This can significantly hinder reliable agents from achieving convergence, and even impede consensus if a Byzantine agent deliberately sends misleading messages to their different reliable neighbors [18]. Therefore, researchers have been concentrating on designing decentralized resilient algorithms [19, 20, 21, 22, 23, 24, 25, 26, 27] to alleviate or counteract the negative impact caused by Byzantine agents. In fact, there are various approaches to guarantee decentralized Byzantine resilience. One popular line is to combine various (iterative) screening or filtration techniques with decentralized algorithms. To name a few, a pioneering work [17] achieves Byzantine resilience via adopting the trimmed mean (TM) method, i.e., discarding a subset of the largest and smallest messages in the aggregation step. However, [17] focuses on a class of scalar-valued problems for decentralized optimization. A follow-up work ByRDiE [28] combines decentralized coordinate gradient descent step with the TM method to tackle the vector-valued problem in decentralized learning. One imperfection of ByRDiE is its expensive computational overhead and low efficiency in dealing with large-scale finite-sum optimization problems due to the implementation of one-coordinate-at-one-iteration update. Hence, BRIDGE [22] combines respectively four screening techniques including coordinate-wise trimmed-mean, coordinate-wise median, Krum function, and a combination of Krum and coordinate-wise trimmed mean, with decentralized gradient descent (DGD) [29] to devise a Byzantine-resilient algorithmic framework. However, these four screening mechanisms either suffer from a high computational complexity or introduce extra restrictions on the number of neighbors and the network topology. Literature [30] extends a centered clipping technique [31] to a self-centered clipping version for a decentralized implementation, which not only realizes Byzantine resilience, but resolves a category of decentralized non-convex optimization problems. One imperfection of [30] lies in the fact that the localized clipping radius parameter depends on global information. This may impede its decentralized running over a large-scale MAS. Another work [32] designs a two-stage technique to filter out the Byzantine attacks, which can work in the presence of an arbitrary quantity of Byzantine agents while any clairvoyant knowledge of the identities of Byzantine agents is not required. Recent work [25] systematically analyzes the relationship between two critical points, i.e., doubly-stochastic weight matrix and consensus, in the development of decentralized Byzantine-resilient methods. On top of that, an iterative screening-based resilient aggregation rule, dubbed (IOS), is designed in [25], which achieves Byzantine resilience and a controllable (asymptotic) convergence error relied on the assumptions of bounded inner (node-level noisy stochastic gradients) and outer (network-level aggregated gradients) variations.
Decentralized algorithms [28, 32, 22, 25, 24] achieve Byzantine resilience via adopting various screening or filtering techniques. Nevertheless, the screening- or filtration-based methods may not only place a restriction on the number of neighboring agents, but incur an additional cost of (, , and denote an upper bound on the growth rate of the complexity, the total number of agents including both reliable and Byzantine agents in the network and the dimension of the decision variable, respectively), to each reliable agent at each iteration (see [22, TABLE II]). This could be prohibitively expensive when the MAS is large-scale and the decision variable is high-dimensional. RSA [27] is designed to achieve simultaneously decentralized Byzantine resilience and avoid introducing an additional cost, which combines an -norm () penalized approximation method with the stochastic sub-gradient descent method to realize resilient aggregation in a distributed fashion. [26] is a decentralized extension of RSA [27]. Via integrating with a noise-shuffle strategy, [33] extends [27] to distributed federated learning, which enhances users’ differential privacy. However, both RSA [27] and [26, 33] establish only sub-linear convergence rates of the proposed algorithms, which are rather slow and have huge potential to be accelerated. A recent decentralized Byzantine-resilient algorithm DECEMBER [34] accelerates the convergence rate via incorporating two VR techniques. Although DECEMBER realizes simultaneously Byzantine resilience and linear convergence, it is still confined to resolving finite-sum optimization problems with only a single smooth111A smooth function implies that it has Lipschitz continuous gradients. objective function.
-A Motivations
On the one hand, decentralized Byzantine-resilient methods [35, 27, 26, 31, 32, 22, 24, 25, 23, 34, 30, 33] are not available to handling optimization problems with a non-smooth objective function, which is indispensable in many practical applications, such as sparse machine learning [36, 37], model predictive control [5], and signal processing [38]. On the other hand, despite the fact that there are various decentralized algorithms [38, 39, 36, 37, 12, 40, 3] providing many insights to resolve the composite finite-sum optimization problem, they all fail to consider any possible security issues over MASs. This renders the reliable agents under the algorithmic framework of [38, 39, 36, 40, 37, 12, 3] vulnerable to Byzantine attacks or failures. Therefore, to bridge this gap, this paper studies a category of composite finite-sum optimization problems in the presence of Byzantine agents, where the local objective function associated with each agent consists of both smooth and non-smooth parts. In a nutshell, the study on decentralized Byzantine-resilient composite stochastic optimization is non-trivial, which features the main motivation of this paper. The integration of VR techniques to reduce the per-iteration computational cost when evaluating the batch gradients [38, 28, 17, 39, 37, 40, 22, 24, 19] and remove asymptotically the variance incurred by estimating noisy stochastic gradients [27, 31, 32, 26, 14, 30, 25, 23] serves as a side motivation. In contrast to a recent notable algorithm (event-triggered) MW-MSR [18, 41], which proposes an alternative approach to achieving Byzantine-resilient consensus with asynchronous multi-hop communication through detection and filtration, this paper focuses on decentralized optimization problems. In such problems, the heterogeneity in local gradient evaluations can lead to greater variance among reliable agents’ states [30], which may cause false filtration when the reliable information is mistakenly identified as Byzantine information. This observation motivates the design of a screening- and filtration-free decentralized Byzantine-resilient algorithm tailored to handle the worst-case scenario222The worst case indicates that the number of Byzantine agents is unknown and they can be omniscient to send any misleadingly falsified messages to their reliable neighbors. of Byzantine problems in decentralized optimization.
-B Contributions
-
1.
This paper develops a decentralized Byzantine-resilient and proximal-gradient algorithmic framework, dubbed Prox-DBRO-VR, to resolve a class of composite (smooth + non-smooth) finite-sum optimization problems over MASs under the worst case. The challenge of studying the non-smooth objective function in the presence of Byzantine agents stems from incurring additional error terms consisting of coupled Byzantine and reliable information in contrast to Byzantine-free composite optimization [38, 39, 36, 37, 12, 40, 3] and Byzantine-resilient smooth optimization [35, 27, 26, 31, 32, 22, 24, 25, 23, 34, 30, 33]. To handle these introduced error terms, we explore and seek the upper bounds on the sub-differentials related with Byzantine agents after applying the non-expansiveness of the proximal operator in the linear convergence case and bounded-gradient condition in the sub-linear convergence case.
-
2.
Inspired by [36, 11], we incorporate localized versions of two VR techniques SAGA [42] and LSVRG [43], into Prox-DBRO-VR, to propose two decentralized Byzantine-resilient stochastic gradient algorithms, namely Prox-DBRO-SAGA and Prox-DBRO-LSVRG, both of which trim the per-iteration computational cost in evaluating batch gradients [38, 28, 17, 39, 37, 40, 22, 24, 19] and eliminate the bounded-variance assumption required by estimating local noisy stochastic gradients [27, 31, 32, 26, 14, 30, 25, 23, 33]. The challenge of studying VR techniques in the presence of Byzantine agents lies in seeking an appropriate (Lyapunov) candidate function with respect to the gradient-learning sequences and errors, we address this challenge by exploiting the Bregman divergence, choosing a proper constant or decaying step-size, and utilizing appropriate intermediate constants (see the proofs of Theorems 2-3).
-
3.
The proposed algorithm framework Prox-DBRO-VR achieves Byzantine resilience without incurring any additional costs in contrast to decentralized Byzantine-resilient methods [17, 28, 22, 24, 32, 25, 23, 18] bringing (at least) an extra computational cost of for screening or filtration processes. The theoretical analysis of Prox-DBRO-SAGA and Prox-DBRO-LSVRG introduces no assumption or restrictions on the number or proportion of Byzantine agents in the network, but only assumes one potential connected network among reliable agents, which is less restrictive than the topology condition of many related works, such as [17, 28, 22, 24, 25]. Under this assumption, theoretical results reveal an explicit trade-off between convergence accuracy and Byzantine resilience in both cases (see Theorems 2-3 for details), providing directions to optimize performance of the proposed algorithms in practice.
-C Organization
We provide the remainder of the paper in this part. Section I presents the basic notation, problem statement, problem reformulation, and setup of its robust variant. The connection of the proposed algorithms with existing methods and the algorithm development are elaborated in Section II. Section III details the convergence results of the proposed algorithms. Case studies on decentralized learning problems with various Byzantine attacks to illustrate the effectiveness and performance of the proposed algorithms are carried out in Section IV. Section V concludes the paper and states our future direction. Some detailed derivations are placed to Appendix for coherence.
I Preliminaries
I-A Basic Notation
Throughout the paper, we assume all vectors are column vectors if there is no other specified.
| Symbols | Definitions |
| , , | the set of real numbers, -dimensional column real vectors, real matrices, respectively |
| the identity matrix | |
| an -dimensional column vector with all-zero elements | |
| an -dimensional column vector with all-one elements | |
| transpose of any matrices or vectors | |
| a diagonal matrix with all the elements of vector laying on its main diagonal | |
| each element in is nonnegative, where and are two vectors or matrices with same dimensions | |
| the Kronecker product of vectors and | |
| the operator to represent the absolute value of a constant or the cardinality of a set | |
| either the -norm of equivalent to , , or its induced matrix norm. | |
| the minimum nonzero singular value of any matrix | |
| the maximum singular value of any matrix |
For arbitrary three vectors , a positive scalar and a closed, proper, convex function, , the proximal operator is defined as: ; let denote the sub-differential of the proper, closed and convex function at , such that
let denote the sub-gradient of non-smooth convex function at . The remaining basic notations of this paper are summarized in Table I.
I-B Problem Statement
A network of agents connect with each other over an undirected network , where () and indicate the sets of reliable and Byzantine agents, respectively, and represents the set of undirected communication edges among all agents. The mutual target of all reliable agents is to minimize (min) a general decentralized composite finite-sum optimization problem as follows:
| (1) |
where is the decision variable, and and , , are two different objective functions. The local objective function can be further decomposed as , while the function serves as a shared non-smooth objective among all reliable agents similar to literature [37, 36, 40]. We assume that the optimal solution to (1) exists, denoted by , and the local sample set associated with agent as , . This paper aims to resolve the general composite finite-sum optimization problem (1) under Byzantine attacks or failures, including but not limited to the zero-sum attack [30], Gaussian attack [25], and same-value attack [26], which will be testified in numerical experiments. In fact, failures, such as agent breakdown and possible disconnection of communication links, can be deemed as a category of not malicious Byzantine problems. We next specify the studied problem via the following standard assumptions.
Assumption 1
(Convexity and smoothness).
a) For , the local objective function is assumed to be -strongly convex, and the local component objective function is -smooth, , i.e., ,
| (2a) | |||
| (2b) | |||
where and are the strongly-convex and smooth parameters, respectively.
b) The objective function is convex and not necessarily smooth.
For convenience, we define and with . It can be verified that the global objective function is -smooth and -strongly convex, with a condition number denoted by .
Remark 1
Assumption 1-a) is standard in recent literature [15, 13, 12, 14, 10]. According to [44, Chapter 3], we know that , which indicates . Moreover, in view of (2b), it can be verified that the local objective functions , , are -smooth as well. Under Assumption 1, the optimal solution to (1) exists uniquely. The consideration of the possibly non-smooth term is meaningful, which finds substantial applications in various fields, such as the standard 1-norm regularization term in sparse machine learning [38, 36, 37], a non-smooth indicator function in model predictive control [5] to handle equality and set constraints, and a non-smooth indicator function in energy resource coordination [12] to handle inequality and set constraints.
Assumption 2
(Network connectivity) All reliable agents form a static network, denoted as , which is bidirectionally connected.
Remark 2
Assumption 2 is standard in recent literature [45, 33, 30, 19], which implies that each reliable agent must have at least one reliable neighbor and an arbitrary number of Byzantine neighbors to enable the communication with any other reliable agents in the network. There are many examples satisfying Assumption 2 and a straightforward instance is the full-connected network among all agents. From another perspective, there must be two reliable agents that fail to exchange messages if is disconnected. In this scenario, the disconnected agent is also judged as a Byzantine agent subject to possible failures. Assumption 2 imposes few restrictions on the reliable network than the pioneering literature [17], which requires at least paths between any two reliable agents when there are Byzantine agents in the network. In view of this, there are some network examples, for instance the Dumbbell network [31] satisfying Assumption 2 but violating the resilient network assumption made in [17].
I-C Problem Reformulation
To guarantee all reliable agents reach a consensus at the optimal solution, we need to reformulate (1) into an equivalent consensus problem. To achieve this goal, a global decision vector containing local copies of the decision variable , is introduced, subject to (s.t.) the consensus constraint . Therefore, it is natural to rewrite (2) as
| (3) | ||||
where and .
I-D Resilient Consensus Problem Setup
To enhance the resilience of the consensual aggregation process, we consider a norm-penalized approximation variant, originally proposed in [35], of the consensus problem (3) as follows:
| (4) |
where , is the penalty parameter associated with each reliable agent , and denotes the set of reliable neighbors of agent , . The norm penalty provides a resilient replacement of the consensus constraint, i.e., the controllable distance between and . The distance is controlled by the penalty parameter , which means that a larger can bring a small gap between and , . To a certain extent, (4) can be considered as a relaxation of (1), because the former tolerates the dissimilarity among neighboring agents, for instance, the disagreement between reliable agents and their Byzantine neighbors. We call (4) as a soft approximation of (3), which is friendly to the data heterogeneity commonly found in decentralized optimization tasks. The equivalence between the soft approximation problem (4) and the consensus problem (3) with respect to the original problem (1) is proved in Theorem 1.
II Algorithm Development
II-A Connection with Existing Works
Lian et al. in [46] design a decentralized stochastic gradient descent algorithm, namely D-PSGD, to resolve efficiently the transformed problem (3), in an ideal situation. The ideal situation fails to consider the presence of any malfunctioning or malicious agents, which may not be avoided in practical applications [23, 22, 47, 25, 21, 9, 20]. We next find out the reason why D-PSGD cannot be applied directly to solving (3) when there are Byzantine agents in the network, and then seek out a feasible improvement, based on D-PSGD, to maintain Byzantine resilience. We first recap the updates of the generalized D-PSGD as follows:
| (5a) | |||
| (5b) | |||
where denotes the set of Byzantine neighbors of agent , . with defined as an untrue or misleading information sent by Byzantine agent , , denotes a constant or decaying step-size, is the local batch gradient, is the -th row and -th column element of a doubly stochastic weight matrix with . Note that both and exclude agent (itself). If there is a Byzantine agent with one reliable neighbor , could be an untrue or misleading information (depending on whether agent is out of action or manipulated by adversaries), to its reliable neighboring agents at -th iteration. If agent is a Byzantine malicious agent, could arbitrarily deviate from its true model, since any Byzantine malicious agent is assumed to be omniscient and can learn from update rules such that they may send an elaborately falsified message to their reliable neighbors. For instance, Byzantine agent , , can blow up to infinity through transmitting continually a vector with infinite elements to its reliable neighbor . Another example is that Byzantine agent can deter all reliable agents from achieving consensus at iteration , via sending various values to its different reliable neighboring agents . The main reason for the above mentioned issues comes from the fact that the aggregation step (5b) is rather vulnerable to Byzantine problems. In fact, similar security threats also prevail in decentralized work [12, 10, 1, 13, 14, 15, 11, 2]. Therefore, the SGD family contains two important extensions, RSA [27] and [26], both of which achieve Byzantine resilience based on a resilient consensus method [35]. [26] is a decentralized extension of RSA [27]. The theoretical analysis of both RSA [27] and [26] is based on a bounded-variance assumption on the local stochastic gradient. With this assumption and the other standard assumptions (see [26] for details), the sequence generated by the decentralized algorithm proposed in [26] takes a convergent form of
| (6) | ||||
where is a positive constant satisfying , ( is the bounded variance yielded by the biased evaluation of the local batch gradients) and . Based on (6), one can establish either a sub-linear convergence rate with a smaller convergence error determined by the number of Byzantine agents, or a faster linear convergence rate with a larger convergence error determined jointly by the number of Byzantine agents and the bounded variance. In fact, this bounded variance () exists commonly in recent literature, such as [31, 32, 26, 14, 30, 25, 23]. Therefore, this paper aims to remove asymptotically this bounded variance in the linear convergence case and eliminate the bounded-variance assumption as well. Inspired by the recent exploration of decentralized VR stochastic gradient algorithms diffusion-AVRG [2], S-DIGing [15], GT-SAGA/GT-SVRG [11], and GT-SARAH [1] that seek the solution to a finite-sum optimization problem under an ideal Byzantine-free situation, we introduce two popular localized variance-reduction techniques SAGA [42] and LSVRG [43] to remove asymptotically the variance arising in the course of evaluating the local noisy stochastic gradients. These two VR techniques allow us to derive an unified theoretical result on decentralized Byzantine-resilient and proximal-gradient stochastic optimization, which will be given later.
II-B A General Algorithmic Framework
Based on the above analysis, we propose a decentralized Byzantine-resilient stochastic-gradient algorithmic framework in Algorithm 1 to resolve (4) in the presence of Byzantine agents. Note that we denote temporarily the local stochastic gradient by , which will be specified in Step 3 of Algorithms 2-3.
Remark 3
The Byzantine resilience of Prox-DBRO-VR is attained by adopting the resilient consensus aggregation based on total variation, which is initially studied in [35]. The literature [27, 33] extends this strategy to handling distributed federated learning problems, and [26] studies it in a decentralized manner. However, all these works [27, 26, 33] not only rely on a bounded-variance assumption in theoretical analysis, but establish slower sub-linear convergence rates. Thus, the motivation of designing Prox-DBRO-VR is to achieve linear convergence independent of the bounded-variance assumption, which can be attained with the aid of VR techniques.
II-C Prox-DBRO-SAGA and Prox-DBRO-LSVRG
We introduce the localized version of two popular centralized VR techniques SAGA [42] and LSVRG [43], into Prox-DBRO-VR, to develop Prox-DBRO-SAGA and Prox-DBRO-LSVRG. The detailed updates of Prox-DBRO-SAGA and Prox-DBRO-LSVRG are presented in Algorithms 2-3, respectively.
Remark 4
All steps in Algorithms 1-3 are executed in parallel among all reliable agents since they are honest and hence comply with these update rules. It is also worthwhile to mention that the expected cost in evaluating the local stochastic gradient under Prox-DBRO-LSVRG is at least double that of Prox-DBRO-SAGA at every iteration. However, this computational advantage of Prox-DBRO-SAGA is at the expense of an expensive storage cost of for each agent owing to the employment of the gradient table, while Prox-DBRO-LSVRG does not incur extra storage to save the local batch gradients. Therefore, adopting either Prox-DBRO-SAGA or Prox-DBRO-LSVRG in practice involves a trade-off between per-iteration computational cost and storage. Users may improve and implement Prox-DBRO-VR via incorporating other categories of VR techniques [48] based on their customized needs.
III Convergence Analysis
For the simplicity of notation, we denote as the filter of the history with respect to the dynamical system generated by the sequence , and the conditional expectation is shortly denoted by in the sequel analysis. Let and . To facilitate the subsequent analysis, we define
Based on these definitions, we next provide briefly a compact form of Prox-DBRO-VR for the subsequent convergence analysis as follows:
| (7a) | ||||
| (7b) | ||||
III-A Auxiliary Results
Inspired by the unified analysis framework for centralized stochastic gradient descent methods in [48], we introduce the following two lemmas. To begin with, we define respectively two sequences for Prox-DBRO-SAGA and Prox-DBRO-LSVRG in the following. For Prox-DBRO-SAGA, we define
For Prox-DBRO-LSVRG, we define
Note that both sequences and are non-negative according to the convexity of the local component function , . For the sequel analysis, we define respectively the gradient-learning quantities and for Prox-DBRO-SAGA and Prox-DBRO-LSVRG, the largest and smallest number of local samples and , the minimum and maximum triggering probabilities and , while .
Lemma 1
(Gradient-learning sequences) Since and are non-negative according to the convexity of the local component function , under Assumption 1, , we have for Prox-DBRO-SAGA,
| (8) |
and for Prox-DBRO-LSVRG,
| (9) |
where is known as the Bregman divergence with respect to the convex cost function .
Proof 1
See Appendix -A.
We next seek the upper bound of the distance between the local stochastic gradient estimator and gradient at the optimal solution for both Prox-DBRO-SAGA and Prox-DBRO-LSVRG.
Lemma 2
(Gradient-learning errors) Suppose that Assumptions 1-2 hold. For , we have for Prox-DBRO-SAGA,
| (10) |
and for Prox-DBRO-LSVRG,
| (11) |
where and .
Proof 2
See Appendix -B.
The following proposition is an important result for the analysis of arbitrary norm approximation.
Proposition 1
Consider two constants and , such that . For an arbitrary vector , we denote the sub-differential .
Proposition 2
Recalling the definition of , we know that , , and
| (12) |
where and .
Proof 4
See Appendix -C.
III-B Main Results
We next derive a feasible range for the penalty parameter to enable the equivalence between the decentralized consensus optimization problem (3) and norm-penalized approximation problem (4) as follows, which further guarantees the equivalence between the original optimization problem (1) and norm-penalized approximation problem (4).
Theorem 1
(Resilient consensus condition) Suppose that Assumptions 1 and 2 hold. Given , if the penalty parameter satisfy , the optimal solution to the original optimization problem (1) is equivalent to the globally optimal solution to norm-penalized approximation problem (4), i.e., .
Proof 5
See Appendix -D.
Remark 5
Theorem 1 demonstrates that a selection of a sufficiently large penalty parameter guarantees the equivalence between the original optimization problem (1) and norm-penalized approximation problem (4). However, the sequel convergence results manifest that a larger causes a bigger convergence error. Therefore, the notion of a sufficiently large penalty parameter is tailored for theoretical results, and one can hand-tune this parameter to obtain better algorithm performances in practice.
For simplicity, we fix the minimum and maximum heterogenous triggering probabilities as and , respectively. The following analysis considers and , such that the theoretical results for both Prox-DBRO-SAGA (Algorithm 2) and Prox-DBRO-LSVRG (Algorithm 3) can be unified in a general framework. Before deriving a linear convergence rate for Algorithms 2-3, we first define the sequel parameters: , , , and .
Theorem 2
(Linear convergence). Suppose that Assumptions 1-2 hold. Under the condition of Theorem 1, if the constant step-size meets , then the sequence generated by Algorithms 2-3, converges linearly to an error ball around the optimal solution to the original optimization problem (1) at a linear rate of , i.e.,
| (13) | ||||
where , and the radius of the error ball is no more than .
Proof 6
See Appendix -E.
We continue to establish the sub-linear convergence rate of Algorithms 2-3 with the aid of the following bounded-gradient assumption on the non-smooth objective function , which is standard in literature [49, 50, 51].
Assumption 3
(Bounded gradients). The sub-gradient at any point is -bounded, i.e., , where can be an arbitrarily large but finite positive constant.
To proceed, we define , , , and .
Theorem 3
(Sub-linear Convergence). Suppose that Assumptions 1-3 hold. Under the condition of Theorem 1, if the decaying step-size is chosen as , then the sequence generated by Algorithms 2-3 converges to an error ball around the optimal solution to the original optimization problem (1), at a sub-linear rate of , i.e.,
| (14) |
where the radius of the error ball is .
Proof 7
See Appendix -F.
Remark 6
The convergence results established in Theorems 2-3 assert that the proposed algorithms achieve linear convergence at the expense of a larger convergence error than that of in the sub-linear convergence case. We note that a smaller constant step-size in the linear convergence case may simultaneously lead to a smaller convergence error and a slower convergence rate according to Theorem 2. It is also clear from Theorem 3 that the convergence error of Prox-DBRO-SAGA and Prox-DBRO-LSVRG for the sub-linear convergence case is determined by the number of Byzantine agents. That is to say, the sub-linear exact convergence of Prox-DBRO-SAGA and Prox-DBRO-LSVRG can be recovered, when the number of Byzantine agents equals to zero. Therefore, the theoretical results derived in Theorems 2-3 demonstrate a trade-off between the convergence error and convergence rate, which has been revealed by the theoretical results.
Remark 7
This paper does not make any assumption or restrictions on the number/proportion of Byzantine agents in the network and only assumes a connected network among all reliable agents (see Assumption 2). However, this does not imply that the number of Byzantine agents can be unbounded since an increase in the number of Byzantine agents lead to larger convergence errors in both cases and an unbounded number of Byzantine agents causes eventually divergence of the proposed algorithms according to Eqs. (13) and (14) in Theorems 2-3. According to Theorems 2-3, the resilience of Algorithms 2-3 is characterized by the consensus and controllable convergence errors of all reliable agents.
IV Numerical Experiments
In this section, we perform a case study on decentralized soft-max regression with sparsity to verify the theoretical results and show the convergence performance of the proposed algorithms, where four kinds of Byzantine attacks (zero-sum attacks, Gaussian attacks, same-value attacks, and sign-flipping attacks) are considered. The communication networks are randomly generated by the Erdős-Rényi method, where Byzantine agents are also selected in a random way. Most existing literature adopts only testing accuracy and the consensus error to validate the convergence performance of their proposed algorithms. However, neither higher testing accuracy nor a smaller consensus error can comprehensively reflect the convergence of the tested algorithms. This is because these two metrics fail to precisely measure the iterative distance between the optimized function value and the optimal value of optimization problems, which, however, serves as a primary goal of theoretical analysis. Therefore, there is a gap between the theoretical result and practical performance. To bridge the gap, we introduce the (averaged) optimal gap in the form of function values, i.e., , as the third metric, which could precisely captures transient behaviors (convergence or divergence) of algorithms when training a machine- or deep-learning model. A network of agents consisting of reliable agents and Byzantine agents, minimize a regularized soft-max regression problem for a multi-class classification task via specifying the problem formulation (1) as and , where with is the model parameter, represents the number of sample classes, denotes a vector that contains -th to -th elements of , and are the -th label and image allocated to agent , respectively, is the indicator function with if and otherwise, and are positive parameters of regularized terms for avoiding over-fitting and obtaining a sparse solution, respectively. We denote the total number of training samples by and the regularized parameters are set as in the following numerical experiments.
Since the algorithmic framework BRIDGE [22] and decentralized algorithm (denoted by Peng) [26] are only available to handling a class of smooth single-objective optimization problems, we equip them with the proximal-gradient mapping method [38, 39, 40, 37, 12] to obtain Prox-BRIDGE-T, Prox-BRIDGE-M, Prox-BRIDGE-K, and Prox-Peng for the non-smooth composite finite-sum optimization problem, which is also applied to GeoMed [52] to get Prox-GeoMed. The initial state of decision variables of all tested algorithms are the same and generated from a standard normal distribution. Note that the parameters of all tested algorithms are optimized manually to obtain their best performance, and the parameters associated with the problem model keep the same to ensure fairness. A total number of training samples from the MNIST [53] data set are evenly allocated to each agent (including both reliable agents and Byzantine agents in the network) to train the discriminator, while the rest samples are used for testing. Fig. 1 presents 100 samples randomly selected from the data set. Recall the theoretical results regarding the decaying and constant step-sizes and penalty parameter such that the experimental setting gives the following feasible selection ranges: , , and .
| NIDS | PMGT-LSVRG | PMGT-SAGA | Prox-BRIDGE-T | Prox-BRIDGE-M | Prox-BRIDGE-K | Prox-GeoMed | Prox-Peng | Prox-DBRO-LSVRG | Prox-DBRO-SAGA | |
| Step-size | [0.01, 0.015] | 0.001 | 0.01 | 0.35 | 0.3 | 0.35 | 0.35 | 0.5 | 0.05 | 0.005 |
| Triggered probability | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
| Penalty parameter | N/A | N/A | N/A | N/A | N/A | N/A | N/A | 0.1 | [0.2, 0.25] | [0.2, 0.25] |
| Consensus error | 0 | 1.4163e-11 | 1.4159e-09 | 1.2492e-03 | 1.2116e-03 | 1.9340e-03 | 3.8010e-03 | 92.9523 | 4.4680 | 4.2898e-02 |
| Testing accuracy | 0.098 | 0.6812 | 0.6812 | 0.8965 | 0.8918 | 0.8653 | 0.8999 | 0.8789 | 0.9137 | 0.9155 |
| Optimal gap | 2.0245 | 1.9230 | 1.9228 | 1.4940e-01 | 1.5751e-01 | 2.1701e-01 | 1.2435e-01 | 2.7077e-01 | 5.0790e-02 | 3.7756e-02 |
| PS&PI is the abbreviation of parameter settings and performance metrics. | ||||||||||
Zero-sum attacks: As depicted in Fig. 2: LABEL:sub@Fig-1-1, an network consists of reliable agents (yellow nodes) and Byzantine agents (red nodes), where each Byzantine agent , , sends a well-designed malicious message to its reliable neighbor , , to drive the states of the reliable agent at each iteration. For NIDS [39], the algorithm parameter is fixed as for , where , , and are the modified mixing matrix, weight matrix, and uncoordinated step-size, respectively. This means if is sufficiently small, NIDS runs without any communication happening among all agents (both reliable agents and Byzantine agents) in the network. For PMGT-SAGA/PMGT-LSVRG [36], we hand-tune the parameter associated with multi-step communications to obtain the best performance. It is clear from Fig. 2: LABEL:sub@Fig-1-2-LABEL:sub@Fig-1-4 and Table II that the proposed algorithms achieve a smaller optimal gap and higher testing accuracy than the other tested algorithms in a same amount of computational costs (epochs). This demonstrates that the proposed algorithms approximate faster to the optimal solution than the other tested algorithms. It is worthwhile to mention that zero-sum attacks launched by Byzantine agents aim to drive the states of all reliable agents to zero at each iteration. Therefore, a much smaller consensus error of NIDS and PMGT-SAGA/PMGT-LSVRG than the other decentralized Byzantine-resilient algorithms, may indicate that they are less resilient or more susceptible to the zero-sum attacks. This can be testified by their bigger optimal gaps and lower testing accuracy shown in Fig. 2: LABEL:sub@Fig-1-2-LABEL:sub@Fig-1-3 and Table II.
Gaussian attacks: It is shown in Fig. 3: LABEL:sub@Fig-2-1 that an network consists of reliable agents (yellow nodes) and Byzantine agents (red nodes), where each Byzantine agent , , sends a message subject to a Gaussian distribution with mean and standard
| NIDS | PMGT-LSVRG | PMGT-SAGA | Prox-BRIDGE-T | Prox-BRIDGE-M | Prox-BRIDGE-K | Prox-GeoMed | Prox-Peng | Prox-DBRO-LSVRG | Prox-DBRO-SAGA | |
| Step-size | [0.3, 0.35] | 0.3 | 0.3 | 0.4 | 0.3 | 0.3 | 0.4 | 0.05 | 0.0015 | 0.0025 |
| Triggered probability | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
| Penalty parameter | N/A | N/A | N/A | N/A | N/A | N/A | N/A | 0.001 | [0.001, 0.0015] | [0.001, 0.0015] |
| Consensus error | 3.0396e+04 | 3.2041e+04 | 3.1770e+04 | 1.8532e-03 | 1.0682e-03 | 1.9835e-03 | 1.6716e-03 | 8.3993e-02 | 1.1938e-03 | 5.1252e-06 |
| Testing accuracy | 0.0742 | 0.4985 | 0.5765 | 0.9001 | 0.8952 | 0.8522 | 0.9002 | 0.8856 | 0.9165 | 0.9197 |
| Optimal gap | Inf | 4.2709e+01 | 3.7046e+01 | 1.2136e-01 | 1.4870e-01 | 2.4074e-01 | 1.1507e-01 | 1.4480e-01 | 3.2053e-02 | 5.7316e-03 |
| PS&PI is the abbreviation of parameter settings and performance metrics. | ||||||||||
deviation 30, to its reliable neighbor , at each iteration. This attack serves as a Gaussian noise, which can easily inflict fluctuation on the state of reliable agents and deviate the states from their true values. Even though the testing accuracy index can still fluctuate around 0.6, we can see from Fig. 3: LABEL:sub@Fig-2-2 and Table III that NIDS and PMGT-SAGA/PMGT-LSVRG show divergence from the optimal solution under Gaussian attacks. It is shown by Figs. 3: LABEL:sub@Fig-2-2-LABEL:sub@Fig-2-4 that the proposed algorithms can still achieve a smaller optimal gap and higher testing accuracy in the same epochs, alternatively faster convergence, than the other tested algorithms. Moreover, one can clearly see from Table III that Prox-DBRO-SAGA takes the superiority on all three performance metrics (optimal gap, testing accuracy, and consensus error) at 150 epochs, while Prox-DBRO-LSVRG ranks second on these three performance metrics.
| NIDS | PMGT-LSVRG | PMGT-SAGA | Prox-BRIDGE-T | Prox-BRIDGE-M | Prox-BRIDGE-K | Prox-GeoMed | Prox-Peng | Prox-DBRO-LSVRG | Prox-DBRO-SAGA | |
| Step-size | [0.5, 0.55] | 0.5 | 0.5 | 0.35 | 0.3 | 0.4 | 0.4 | |||
| Triggered probability | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
| Penalty parameter | N/A | N/A | N/A | N/A | N/A | N/A | N/A | 0.0005 | [0.0004, 0.00045] | [0.0005, 0.00055] |
| Consensus error | 4.1710e-02 | 1.1216e+06 | 1.1216e+06 | 2.0447e-03 | 1.7397e-03 | 1.9091e+08 | 2.6619e-03 | 6.0639e-01 | 1.4196e-03 | 7.0507e-04 |
| Testing accuracy | 0.098 | 0.8227 | 0.8162 | 0.8972 | 0.8942 | 0.8649 | 0.9006 | 0.8915 | 0.9072 | 0.9067 |
| Optimal gap | 6.5336e+04 | 2.2783e+04 | 2.2783e+04 | 1.6548e-01 | 1.6724e-01 | 1.6336e+03 | 1.5303e-01 | 1.9619e-01 | 1.4623e-01 | 1.5938e-01 |
| PS&PI is the abbreviation of parameter settings and performance metrics. | ||||||||||
Same-value attacks: As depicted in Fig. 4: LABEL:sub@Fig-3-1, an network consists of reliable agents (yellow nodes) and Byzantine agents (red nodes), where each Byzantine agent , , keeps sending to its reliable neighbor , , at each iteration. Under this attack, the states of reliable agents can be easily blown up to sufficiently large values, which prevents the tested algorithms from convergence. Figs. 4: LABEL:sub@Fig-3-2-LABEL:sub@Fig-3-3 manifest that the proposed algorithms achieve faster convergence than the other tested algorithms on the performance metrics of the optimal gap and testing accuracy, while Prox-DBRO-LSVRG is slightly faster than Prox-DBRO-SAGA in this case. It can be found in Table IV that the proposed algorithms attain also a smaller consensus error than the other tested algorithms at 150 epochs. Note that the consensus error of Prox-BRIDGE-B goes to a very large value since it adopts a vector-valued operation for screening at each reliable agent, which results in a single surviving vector totally from one neighboring agent and thus easily leads to a large state variance between any two reliable agents. The performance comparison takes no account of BRIDGE-B [22] due to its strict requirement on the number of neighboring agents and high computational overhead. In a nutshell, the above numerical experiments demonstrate that while the proposed algorithms do not achieve the smallest consensus error only under zero-sum attacks, they achieve the best performance in all other cases.
Sign-flipping attacks: In this case, we aim to verify the trade-off between the convergence accuracy and Byzantine resilience of the propose algorithms. The total number of agents including both reliable and Byzantine agents is , where each Byzantine agent , , sends the falsified model to their reliable neighbors , , where is the hyperparameter controlling the deviation of the attack. From Fig. 5, we can see that if the proportion or number of Byzantine agents increases, then the convergence accuracy regarding all three performance metrics becomes worse. This verifies the trade-off established in the theoretical result (see Theorems 2-3).
V Conclusion
In this paper, we proposed two decentralized Byzantine-resilient and VR stochastic gradient algorithms, namely Prox-DBRO-LSVRG and Prox-DBRO-SAGA, to resolve a category of non-smooth composite finite-sum optimization problems over MASs in the presence of Byzantine agents. Theoretical analysis established both linear and sub-linear convergence rates for the proposed algorithms under different conditions. In the numerical experiments, the proposed algorithms were applied to resolving a decentralized sparse soft-max regression task over MASs under different Byzantine attacks, which verifies the theoretical findings and demonstrates the better convergence performance of the proposed algorithms than the other notable decentralized algorithms. However, both Prox-DBRO-LSVRG and Prox-DBRO-SAGA are not perfect, since they can only achieve exact sub-linear convergence in the absence of Byzantine agents. Future work will further investigate privacy issues and intermittent communication, which are also prevalent in MASs.
-A Proof of Lemma 1
According to Step 4 in Algorithm 3, at iteration , , the auxiliary variables , , take value or , associated with probabilities and , respectively. This observation is owing to the fact that selection of the random sample for Prox-DBRO-SAGA, at each iteration , is uniformly and independently executed. Hence, we have
| (15) | ||||
Similarly, it holds that
| (16) |
Via summing (16) over index for all , we can further obtain
| (17) | ||||
Recalling the definition of and combining Eqs. (15) and (17) give
| (18) | ||||
Summing Eq. (18) over yields
| (19) | ||||
where the second inequality uses , and the last equality is according to and the definition of . Substituting the definition of obtains the relation (8). In view of Step 4 in Algorithm 2, we know that at iteration , , the auxiliary variables , , take value with probability , or keep the most recent update with probability . Therefore, it can be verified that
| (20) | ||||
Likewise, we have
| (21) |
Recalling the definition of and combining Eq. (20) with (21) give
| (22) | ||||
where we apply in the last equality. The relation (9) is reached through summing Eq. (22) over and substituting the definitions of and .
-B Proof of Lemma 2
According to Step 3 in Algorithm 2, it holds that
| (23) | ||||
where the equality is due to the standard variance decomposition , with . We continue to handle the first term in the right-hand-side of Eq. (23) as follows:
| (24) | ||||
where the second inequality utilizes , with , and the last equality applies the standard variance decomposition again. We proceed with substituting (24) into (23) to obtain
| (25) | ||||
Summing Eq. (25) over generates
| (26) | ||||
Since the local component objective function , and , is -smooth according to Assumption 1, we have
| (27) | ||||
Summing the both sides of (27) over from to becomes
| (28) |
Since the local component function , has a uniform distribution over the set , it is natural to obtain
| (29) | ||||
Combining Eq. (29) and (28) and then summing over yield
| (30) |
Summarizing (26) and (30) obtains
| (31) | ||||
where we simplify as . Via applying the Lipschitz continuity of again, we have
| (32) |
where we use the fact that and . Plugging (32) into (31) generates
| (33) | ||||
Considering the -strong convexity of the local objective function , , we have
| (34) |
Finally, one can obtain (10) via plugging the relation (34) into (33). For Prox-DBRO-LSVRG, we replace with to obtain (11), which completes the proof.
-C Proof of Proposition 2
According to the definition of , we have
| (35) | ||||
which indicates . Based on this equality, it is straightforward to verify (12) with the help of the non-expansiveness of the proximal operator , which completes the proof.
-D Proof of Theorem 1
The optimal solution to (4) satisfies the optimality condition
| (36) |
According to the definition of the sub-differential , there exist and , such that for
| (37) |
Under Assumption 1, the globally optimal solution exists uniquely. We next need to prove that the optimal solution satisfies (37), such that
| (38) |
where . Since (38) can be decomposed into element-wise, without loss of generality, the rest proof assumes , i.e., the scalar case. Via denoting , the task to prove (38) reduces to solving for a vector with , such that the following relation holds
| (39) |
where is the collected form of according to the order of edges in . We need to solve for at least one solution meeting with , such that (39) holds true. To proceed, we decompose the task into two parts.
Part I: We first manifest that (39) has at least one solution. In view of the rank of the node-edge incidence matrix is and the null space of the columns is spanned by the all-one vector . Recalling the definition of , the optimality condition of (1) is . Therefore, we know that the columns of and those of share the same null space, which indicates the same rank of and . The existence of solutions to (39) can be demonstrated according to the property of non-homogeneous linear equations.
Part II: In this part, a solution with the -norm of its elements no larger than is sought. Suppose that is a solution to (39), such that .
We consider the least-squares solution , where is the Moore-Penrose pseudo-inverse of . Then, it suffices to prove that . Since , we know that . Therefore, we derive
| (40) | ||||
where the second inequality uses the vector-matrix norm compatibility, and the last inequality applies the facts that and . Consider and as the maximum and minimum singular values of matrices and , respectively. Based on (40), we further obtain
| (41) | ||||
Since , we further have
| (42) |
If we consider , i.e, the arbitrary dimension case, (42) becomes
| (43) |
The proof is completed by choosing an appropriate to meet
-E Proof of Theorem 2
Based on the optimality condition (36), we know that
| (44) |
In view of the compact form (7), it holds
| (45) | ||||
where the inequality applies (12). We continue to seek an upper bound for as follows:
| (46) | ||||
where the first inequality applies twice, and the second equality employs Lemma 2. To proceed, we bound as follows:
| (47) | ||||
where the inequality holds true, since the -norm () of , , is no larger than owing to Proposition 1, i.e.,
| (48) |
Following the same technical line of (47)-(48), it is not difficult to verify
| (49) | ||||
Combining (46), (47), and (49) obtains
| (50) | ||||
Since the local objective function , , can be -strongly convex and -smooth according to Assumption 1, we have
| (51) | ||||
Recalling the definition of , we know that it is a convex function. Therefore, it is straightforward to obtain
| (52) |
Applying the Young’s inequality and relation (47) to the term yields
| (53) |
where the constant . Plugging the results (50)-(53) into (45) gives
| (54) | ||||
Via setting , we can rewrite (54) as follows:
| (55) | ||||
According to (8), we have for any ,
| (56) |
Recall the definitions of and . Combining (55) and (56) yields
| (57) | ||||
where the last inequality employs -smoothness of the local objective function , . We proceed by choosing and setting with , such that (57) becomes
| (58) | ||||
To proceed, via fixing and , it is equivalent to write (58) as
| (59) | ||||
We continue to define , which is non-negative due to . Based on this definition, if we select the constant step-size , then it is natural to convert (59) into
| (60) | ||||
Summarizing all the upper bounds on the constant step-size generates a feasible selection range as follows:
| (61) |
Under the condition of (61), taking the full expectation on the both sides of (60) obtains
| (62) |
Applying telescopic cancellation to (62) for obtains
| (63) | ||||
where . It is worthwhile to mention that by specifying and as and (resp., and ), the linear convergence rate is established for Prox-DBRO-SAGA (resp., Prox-DBRO-LSVRG).
-F Proof of Theorem 3
In view of the compact form (7) associated with the proposed algorithms, we make a transformation as follows:
which gives
This implies that if is the minimizer of the next update of the proposed algorithm, we are guaranteed to obtain a vector , such that
which can be further rearranged as
| (64) |
We next proceed with the convergence analysis based on the transformed version (64) of the compact form (7).
| (65) | ||||
Considering and the optimality condition , we continue to seek an upper bound for as follows:
| (66) | ||||
where the second inequality uses the results (47) and (49), and the last inequality is owing to Lemma 2 and Assumption 3. To proceed, recalling the definition of , it is not difficult to verify
| (67) |
which is owing to the convexity of , . Based on the relations (52) and (67), we know that
| (68) | ||||
where the last inequality follows (51). Plugging the results (53), (66), and (68) into (65) reduces to
| (69) | ||||
According to Lemma 1, we introduce an iteration-shifting variable , such that
| (70) |
Combining (69) and (70) obtains
| (71) |
where the last inequality uses -smoothness of the local objective function , . Via setting and , we have
| (72) | ||||
We define , which is non-negative, since is non-negative. We further set and take the full expectation on the both sides of (72) to obtain
| (73) | ||||
where the first inequality is due to the fact that the step-size is decaying. In view of all the required upper bounds on the constant step-size, it suffices to consider a feasible range as follows:
| (74) |
According to (74), we set , , with and . We next prove
| (75) |
by induction. Firstly, for , we know that
| (76) |
Therefore, for a bounded and positive constant , if , we have
| (77) |
with . We assume that for , , it satisfies that
| (78) | ||||
Then, we will prove that for ,
| (79) |
holds true. Define and set and with . We have
| (80) | ||||
which means the relation (75) holds true. Via replacing with its lower bound , it is straightforward to verify
| (81) |
owing to . Through specifying and as and (resp., and ), the sub-linear convergence rate is established for Prox-DBRO-SAGA (resp., Prox-DBRO-LSVRG).
References
- [1] R. Xin, U. A. Khan, and S. Kar, “Fast decentralized nonconvex finite-sum optimization with recursive variance reduction,” SIAM Journal on Optimization, vol. 32, no. 1, pp. 1–28, 2022.
- [2] K. Yuan, B. Ying, J. Liu, and A. H. Sayed, “Variance-reduced stochastic learning under random reshuffling,” IEEE Transactions on Signal Processing, vol. 68, no. 2, pp. 1390–1408, 2020.
- [3] R. Xin, S. Das, U. A. Khan, and S. Kar, “A stochastic proximal gradient framework for decentralized non-convex composite optimization: Topology-independent sample complexity and communication efficiency,” arXiv preprint arXiv:2110.01594, 2021.
- [4] J. Zhai, Y. Jiang, Y. Shi, C. N. Jones, and X. P. Zhang, “Distributionally robust joint chance-constrained dispatch for integrated transmission-distribution systems via distributed optimization,” IEEE Transactions on Smart Grid, vol. 13, no. 3, pp. 2132–2147, 2022.
- [5] H. Li, L. Zheng, Z. Wang, Y. Li, and L. Ji, “Asynchronous distributed model predictive control for optimal output consensus of high-order multi-agent systems,” IEEE Transactions on Signal and Information Processing over Networks, vol. 7, pp. 689–698, 2021.
- [6] S. Huang, J. Lei, and Y. Hong, “A linearly convergent distributed Nash equilibrium seeking algorithm for aggregative games,” IEEE Transactions on Automatic Control, vol. 68, no. 3, pp. 1753–1759, 2022.
- [7] Y. Wang and A. Nedić, “Robust constrained consensus and inequality-constrained distributed optimization with guaranteed differential privacy and accurate convergence,” IEEE Transactions on Automatic Control, vol. 69, no. 11, pp. 7463–7478, 2024.
- [8] M. Xing, D. Ma, J. Zhao, and P. K. Wong, “Differentially private dynamic average consensus-based Newton method for distributed optimization over general networks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 55, no. 2, pp. 1348–1361, 2024.
- [9] L. Lamport, R. Shostak, and M. Pease, “The Byzantine generals problem,” in Concurrency: the Works of Leslie Lamport, 2019, pp. 203–226.
- [10] F. Saadatniaki, R. Xin, and U. A. Khan, “Decentralized optimization over time-varying directed graphs with row and column-stochastic matrices,” IEEE Transactions on Automatic Control, vol. 65, no. 11, pp. 4769–4780, 2020.
- [11] R. Xin, U. A. Khan, and S. Kar, “Variance-reduced decentralized stochastic optimization with accelerated convergence,” IEEE Transactions on Signal Processing, vol. 68, pp. 6255–6271, 2020.
- [12] H. Li, J. Hu, L. Ran, Z. Wang, Q. Lü, Z. Du, and T. Huang, “Decentralized dual proximal gradient algorithms for non-smooth constrained composite optimization problems,” IEEE Transactions on Parallel and Distributed Systems, vol. 32, no. 10, pp. 2594–2605, 2021.
- [13] S. Pu, W. Shi, J. Xu, and A. Nedic, “Push-Pull gradient methods for distributed optimization in networks,” IEEE Transactions on Automatic Control, vol. 66, no. 1, pp. 1–16, 2021.
- [14] M. I. Qureshi, R. Xin, S. Kar, and U. A. Khan, “S-ADDOPT: Decentralized stochastic first-order optimization over directed graphs,” IEEE Control Systems Letters, vol. 5, no. 3, pp. 953–958, 2021.
- [15] H. Li, L. Zheng, Z. Wang, Y. Yan, L. Feng, and J. Guo, “S-DIGing : A stochastic gradient tracking algorithm for distributed optimization,” IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 6, no. 1, pp. 53–65, 2022.
- [16] C. Wang, S. Xu, D. Yuan, B. Zhang, and Z. Zhang, “Push-sum distributed dual averaging for convex optimization in multiagent systems with communication delays,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 53, no. 1, pp. 1420–1430, 2023.
- [17] S. Sundaram and B. Gharesifard, “Distributed optimization under adversarial nodes,” IEEE Transactions on Automatic Control, vol. 64, no. 3, pp. 1063–1076, 2019.
- [18] L. Yuan and H. Ishii, “Resilient average consensus with adversaries via distributed detection and recovery,” Automatica, vol. 171, p. 111908, 2025.
- [19] M. Yemini, A. Nedic, A. Goldsmith, and S. Gil, “Characterizing trust and resilience in distributed consensus for cyberphysical systems,” IEEE Transactions on Robotics, vol. 38, no. 1, pp. 71–91, 2022.
- [20] Z. Zuo, X. Cao, Y. Wang, and W. Zhang, “Resilient consensus of multiagent systems against denial-of-service attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 4, pp. 2664–2675, 2022.
- [21] E. M. El-Mhamdi, R. Guerraoui, A. Guirguis, L. N. Hoang, and S. Rouault, “Genuinely distributed Byzantine machine learning,” Distributed Computing, vol. 35, no. 4, pp. 305–331, 2022.
- [22] C. Fang, Z. Yang, and W. U. Bajwa, “BRIDGE: Byzantine-resilient decentralized gradient descent,” IEEE Transactions on Signal and Information Processing over Networks, vol. 8, pp. 610–626, 2022.
- [23] J. Li, W. Abbas, M. Shabbir, and X. Koutsoukos, “Byzantine resilient distributed learning in multirobot systems,” IEEE Transactions on Robotics, vol. 38, no. 6, pp. 3550–3563, 2022.
- [24] R. Wang, Y. Liu, and Q. Ling, “Byzantine-resilient decentralized resource allocation,” IEEE Transactions on Signal Processing, vol. 70, pp. 4711–4726, 2022.
- [25] Z. Wu, T. Chen, and Q. Ling, “Byzantine-resilient decentralized stochastic optimization with robust aggregation rules,” IEEE Transactions on Signal Processing, vol. 71, pp. 3179–3195, 2023.
- [26] J. Peng, W. Li, and Q. Ling, “Byzantine-robust decentralized stochastic optimization over static and time-varying networks,” Signal Processing, vol. 183, p. 108020, 2021.
- [27] L. Li, W. Xu, T. Chen, G. B. Giannakis, and Q. Ling, “RSA: Byzantine-robust stochastic aggregation methods for distributed learning from heterogeneous datasets,” in AAAI Conference on Artificial Intelligence (AAAI), 2019, pp. 1544–1551.
- [28] Z. Yang and W. U. Bajwa, “ByRDiE: Byzantine-resilient distributed coordinate descent for decentralized learning,” IEEE Transactions on Signal and Information Processing over Networks, vol. 5, no. 4, pp. 611–627, 2019.
- [29] A. Nedic, “Distributed subgradient methods for multi-agent optimization,” IEEE Transactions on Automatic Control, vol. 54, no. 1, pp. 48–61, 2009.
- [30] L. He, S. P. Karimireddy, and M. Jaggi, “Byzantine-robust decentralized learning via self-centered clipping,” arXiv preprint arXiv:2202.01545, 2022.
- [31] S. P. Karimireddy, L. He, and M. Jaggi, “Learning from history for Byzantine robust optimization,” in International Conference on Machine Learning (ICML), 2021, pp. 5311–5319.
- [32] S. Guo, T. Zhang, H. Yu, X. Xie, T. Xiang, and Y. Liu, “Byzantine-resilient decentralized stochastic gradient descent,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 6, pp. 4096–4106, 2021.
- [33] X. Ma, X. Sun, Y. Wu, Z. Liu, X. Chen, and C. Dong, “Differentially private Byzantine-robust federated learning,” IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 12, pp. 3690–3701, 2022.
- [34] J. Peng, W. Li, and Q. Ling, “Variance reduction-boosted Byzantine robustness in decentralized stochastic optimization,” in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022, pp. 4283–4287.
- [35] W. Ben-ameur, P. Bianchi, and J. Jakubowicz, “Robust distributed consensus using total variation,” IEEE Transactions on Automatic Control, vol. 61, no. 6, pp. 1550–1564, 2016.
- [36] H. Ye, W. Xiong, and T. Zhang, “PMGT-VR: A decentralized proximal-gradient algorithmic framework with variance reduction,” arXiv preprint arXiv:2012.15010, 2020.
- [37] S. A. Alghunaim, E. K. Ryu, K. Yuan, and A. H. Sayed, “Decentralized proximal gradient algorithms with linear convergence rates,” IEEE Transactions on Automatic Control, vol. 66, no. 6, pp. 2787–2794, 2021.
- [38] I. Notarnicola and G. Notarstefano, “Asynchronous distributed optimization via randomized dual proximal gradient,” IEEE Transactions on Automatic Control, vol. 62, no. 5, pp. 2095–2106, 2017.
- [39] Z. Li, W. Shi, and M. Yan, “A decentralized proximal-gradient method with network independent step-sizes and separated convergence rates,” IEEE Transactions on Signal Processing, vol. 67, no. 17, pp. 4494–4506, 2019.
- [40] J. Xu, Y. Tian, Y. Sun, and G. Scutari, “Distributed algorithms for composite optimization: Unified framework and convergence analysis,” IEEE Transactions on Signal Processing, vol. 69, pp. 3555–3570, 2021.
- [41] L. Yuan and H. Ishii, “Event-triggered approximate Byzantine consensus with multi-hop communication,” IEEE Transactions on Signal Processing, vol. 71, pp. 1742–1754, 2023.
- [42] A. Defazio, F. Bach, and S. Lacoste-Julien, “SAGA: A fast incremental gradient method with support for non-strongly convex composite objectives,” in Advances in Neural Information Processing Systems (NeurIPS), 2014, pp. 1646–1654.
- [43] D. Kovalev, S. Horvath, and P. Richtarik, “Don’t jump through hoops and remove those loops: SVRG and Katyusha are better without the outer loop,” in Algorithmic Learning Theory, 2020, pp. 451–467.
- [44] S. Bubeck, “Convex optimization: Algorithms and complexity,” Foundations and Trends® in Machine Learning, vol. 8, no. 3-4, pp. 231–357, 2015.
- [45] H. Ye, H. Zhu, and Q. Ling, “On the tradeoff between privacy preservation and Byzantine-robustness in decentralized learning,” in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2024, pp. 9336–9340.
- [46] X. Lian, C. Zhang, H. Zhang, C. J. Hsieh, W. Zhang, and J. Liu, “Can decentralized algorithms outperform centralized algorithms? A case study for decentralized parallel stochastic gradient descent,” in Advances in Neural Information Processing Systems (NeurIPS), 2017, pp. 5331–5341.
- [47] P. Ramanan, D. Li, and N. Gebraeel, “Blockchain-based decentralized replay attack detection for large-scale power systems,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 8, pp. 4727–4739, 2022.
- [48] E. Gorbunov, F. Hanzely, and P. Richtárik, “A unified theory of SGD: Variance reduction, sampling, quantization and coordinate descent,” in International Conference on Artificial Intelligence and Statistics (AISTATS), 2019, pp. 680–690.
- [49] C. Xi and U. A. Khan, “Distributed subgradient projection algorithm over directed graphs,” IEEE Transactions on Automatic Control, vol. 62, no. 8, pp. 3986–3992, 2017.
- [50] J. Zeng and W. Yin, “On nonconvex decentralized gradient descent,” IEEE Transactions on Signal Processing, vol. 66, no. 11, pp. 2834–2848, 2018.
- [51] X. Li, S. Chen, Z. Deng, Q. Qu, Z. Zhu, and A. M.-C. So, “Weakly convex optimization over Stiefel manifold using Riemannian subgradient-type methods,” SIAM Journal on Optimization, vol. 31, no. 3, pp. 1605–1634, 2021.
- [52] Y. Chen, L. Su, and J. Xu, “Distributed statistical machine learning in adversarial settings: Byzantine gradient descent,” Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), vol. 1, no. 2, pp. 1–25, 2018.
- [53] Y. LeCun, C. Cortes, and C. Burges, “MNIST handwritten digit database. [Online]. Available: http://yann. lecun.com/exdb/m,” in AT&T Labs, Florham Park, NJ, USA., 2020.