Fig. 2 | Scientific Reports

Fig. 2

From: Identifying alternately poisoning attacks in federated learning online using trajectory anomaly detection method

Fig. 2

Comparison of singular value trajectories and difference trajectories for client parameters. (a) The singular value trajectories of malicious and normal client parameters are nearly identical, making them difficult to distinguish. (b) Singular Value Difference Trajectory Plot, difference trajectory effectively highlights the differences between the two types of clients compare to (a).

Back to article page