SlideShare a Scribd company logo
1 of 22
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
2020-2024
FEDERATED LEARNING
PRESENTED BY
PUNYAPU HARSHITHA
20NG1A0548
CSE-A
Under the Guidance of
Dr. K P N V SATYA SREE
Professor
19-04-2024 URCET-CSE dept 1
CONTENTS
Introduction
Why Federated learning?
How Federated Learning Works?
Model Aggregation techniques
Benefits And Challenges
Use Cases
Implementation
Future Trends And Conclusion
19-04-2024 URCET-CSE dept 2
Introduction
What is Federated Learning?
• Federated Learning trains AI models using data from different devices without
moving that data to a central server.
• Each device learns on its own data and shares only what it learns, keeping
personal data safe.
19-04-2024 URCET-CSE dept 3
• This approach protects
user privacy and allows
for training on sensitive
or distributed data.
19-04-2024 URCET-CSE dept 4
How Does It Works?
• Start: A central server creates a
basic model.
• Selection: It picks some devices
from a network.
• Sharing: The model is sent to these
devices.
• Local Learning: Each device
improves the model using its own
data, without sharing the data itself.
19-04-2024 URCET-CSE dept 5
• Updates: Devices send their improvements back to the server.
• Combining: The server merges these improvements into a new model.
• Repetition: Steps 3 to 6 are repeated for several rounds.
• Improvement: With each round, the model gets better by learning from more
devices.
• Final Model: Eventually, a final improved model is achieved.
• Use: This model can be used for making predictions or classifications without
exposing individual data.
19-04-2024 URCET-CSE dept 6
Importance of Federated Learning in
Privacy-Preserving AI
• Federated Learning is crucial for keeping personal data safe in AI.
• It prevents big data breaches by spreading training process across devices.
• It helps companies follow privacy rules by training AI models directly on
users' devices.
19-04-2024 URCET-CSE dept 7
Why Federated Learning?
Challenges with Centralized Learning Models
1.Privacy Worries: Centralized models gather all data in one place, raising
privacy concerns.
2.Limited Data Access: Centralized models struggle to access diverse
datasets from different sources.
3.Network Issues: Transmitting large data volumes strains networks and
slows down processes.
19-04-2024 URCET-CSE dept 8
Evolution towards Decentralized Approaches
• People want more control over their data.
• More processing is happening on device such as smartphones, IoT
devices, and edge servers , making Federated Learning a better fit.
• Federated Learning allows multiple parties to train models together without
sharing their raw data.
19-04-2024 URCET-CSE dept 9
Standard Approach VS Federated Learning
19-04-2024 URCET-CSE dept 10
How Federated Learning Works?
19-04-2024 URCET-CSE dept 11
Model Aggregation Techniques
1. Federated Averaging:
• Each device sends its model updates.
• The updates are averaged to create a better global model.
2.Federated Stochastic Gradient Descent (FedSGD):
• Devices send gradients (directions to improve the model).
• The global model adjusts based on these gradients.
3.Secure Aggregation:
• Ensures updates are combined securely.
• Protects individual data while improving the global model.
19-04-2024 URCET-CSE dept 12
Benefits
• Enhanced Privacy
Federated Learning keeps your data safe on your device, reducing the risk
of privacy breaches.
• Faster Processing
By training models directly on devices, Federated Learning speeds up data
processing, especially for real-time tasks.
19-04-2024 URCET-CSE dept 13
Challenges
Communication Overhead: Federated
Learning can sometimes slow down due to
communication between devices and
servers.
Data Differences: Devices may have
different types or amounts of data, making
it tricky to combine their updates
seamlessly.
19-04-2024 URCET-CSE dept 14
Use Cases
• Healthcare
• Telecommunications
• Finance
• Smart Grid Optimization
• Manufacturing and Industry 4.0
• Autonomous Vehicles
• Agriculture and Precision Farming
19-04-2024 URCET-CSE dept 15
Example
Healthcare: Predictive Models without Sharing Sensitive Data
Scenario:
Healthcare institutions collaborate to predict diseases or patient outcomes.
Challenge:
Patient data must stay private due to regulations.
Solution:
Use Federated Learning to train models on local data. Only share model
updates.
19-04-2024 URCET-CSE dept 16
Benefits:
Keeps patient data private, aids collaboration, and builds accurate models
securely.
19-04-2024 URCET-CSE dept 17
Implementation
Choosing Frameworks
• Select frameworks like TensorFlow Federated or PySyft for
implementing Federated Learning.
TensorFlow Federated (TFF)
Developed by Google helps define Federated Learning tasks and manage
communication.
PySyft
Built on PyTorch, it ensures privacy in computations using techniques
like differential privacy
19-04-2024 URCET-CSE dept 18
• These tools provide the necessary resources to manage training across
devices.
Scaling Up:
1.Ensure scalability by optimizing communication and aggregation
processes.
2.Balancing loads, managing resources, and maintaining reliability are
vital for efficient operation.
19-04-2024 URCET-CSE dept 19
Future Trends
1.Advanced Algorithms: Expect smarter ways to train models.
2.Edge Computing Integration: Devices will help process data faster.
3.Expanded Applications: More places will use Federated Learning for
different tasks.
4.Privacy Improvements: More ways to protect your data.
19-04-2024 URCET-CSE dept 20
Conclusion
• Federated Learning makes machine learning collaborative and secure.
• With better algorithms and privacy protection, it's set for growth.
• Businesses should adopt it for efficient AI while protecting privacy.
• As it becomes standard, Federated Learning will transform many areas with
personalized solutions.
19-04-2024 URCET-CSE dept 21
THANK YOU
19-04-2024 URCET-CSE dept 22

More Related Content

Similar to federated learning method of machine learning

Federated learning and its role in the privacy preservation of IoT devices
Federated learning and its role in the privacy preservation of IoT devicesFederated learning and its role in the privacy preservation of IoT devices
Federated learning and its role in the privacy preservation of IoT devices
AlAtfat
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorial
Anna Liu
 
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
ijseajournal
 

Similar to federated learning method of machine learning (20)

Federated learning and its role in the privacy preservation of IoT devices
Federated learning and its role in the privacy preservation of IoT devicesFederated learning and its role in the privacy preservation of IoT devices
Federated learning and its role in the privacy preservation of IoT devices
 
Role and Service of Cloud Computing for Higher Education System
Role and Service of Cloud Computing for Higher Education SystemRole and Service of Cloud Computing for Higher Education System
Role and Service of Cloud Computing for Higher Education System
 
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
 
An_Efficient_Privacy-Enhancing_Cross-Silo_Federated_Learning_and_Applications...
An_Efficient_Privacy-Enhancing_Cross-Silo_Federated_Learning_and_Applications...An_Efficient_Privacy-Enhancing_Cross-Silo_Federated_Learning_and_Applications...
An_Efficient_Privacy-Enhancing_Cross-Silo_Federated_Learning_and_Applications...
 
Practical Challenges ML Workflows
Practical Challenges ML WorkflowsPractical Challenges ML Workflows
Practical Challenges ML Workflows
 
Ensemble Methods for Collective Intelligence: Combining Ubiquitous ML Models ...
Ensemble Methods for Collective Intelligence: Combining Ubiquitous ML Models ...Ensemble Methods for Collective Intelligence: Combining Ubiquitous ML Models ...
Ensemble Methods for Collective Intelligence: Combining Ubiquitous ML Models ...
 
Lesson 2: Cloud data storage and retrieval
Lesson 2: Cloud data storage and retrievalLesson 2: Cloud data storage and retrieval
Lesson 2: Cloud data storage and retrieval
 
I266468
I266468I266468
I266468
 
IRJET- Cloud Computing Review
IRJET-  	  Cloud Computing ReviewIRJET-  	  Cloud Computing Review
IRJET- Cloud Computing Review
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
FAIR data_ Superior data visibility and reuse without warehousing.pdf
FAIR data_ Superior data visibility and reuse without warehousing.pdfFAIR data_ Superior data visibility and reuse without warehousing.pdf
FAIR data_ Superior data visibility and reuse without warehousing.pdf
 
Enabling on-device learning at scale
Enabling on-device learning at scaleEnabling on-device learning at scale
Enabling on-device learning at scale
 
RECAP at ETSI Experiential Network Intelligence (ENI) Meeting
RECAP at ETSI Experiential Network Intelligence (ENI) MeetingRECAP at ETSI Experiential Network Intelligence (ENI) Meeting
RECAP at ETSI Experiential Network Intelligence (ENI) Meeting
 
Data management plans – EUDAT Best practices and case study | www.eudat.eu
Data management plans – EUDAT Best practices and case study | www.eudat.euData management plans – EUDAT Best practices and case study | www.eudat.eu
Data management plans – EUDAT Best practices and case study | www.eudat.eu
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorial
 
IoT - module 4
IoT - module 4IoT - module 4
IoT - module 4
 
Test-Driven Machine Learning
Test-Driven Machine LearningTest-Driven Machine Learning
Test-Driven Machine Learning
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
 
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
 
Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Recently uploaded (20)

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 

federated learning method of machine learning

  • 1. BACHELOR OF TECHNOLOGY IN COMPUTER SCIENCE AND ENGINEERING 2020-2024 FEDERATED LEARNING PRESENTED BY PUNYAPU HARSHITHA 20NG1A0548 CSE-A Under the Guidance of Dr. K P N V SATYA SREE Professor 19-04-2024 URCET-CSE dept 1
  • 2. CONTENTS Introduction Why Federated learning? How Federated Learning Works? Model Aggregation techniques Benefits And Challenges Use Cases Implementation Future Trends And Conclusion 19-04-2024 URCET-CSE dept 2
  • 3. Introduction What is Federated Learning? • Federated Learning trains AI models using data from different devices without moving that data to a central server. • Each device learns on its own data and shares only what it learns, keeping personal data safe. 19-04-2024 URCET-CSE dept 3
  • 4. • This approach protects user privacy and allows for training on sensitive or distributed data. 19-04-2024 URCET-CSE dept 4
  • 5. How Does It Works? • Start: A central server creates a basic model. • Selection: It picks some devices from a network. • Sharing: The model is sent to these devices. • Local Learning: Each device improves the model using its own data, without sharing the data itself. 19-04-2024 URCET-CSE dept 5
  • 6. • Updates: Devices send their improvements back to the server. • Combining: The server merges these improvements into a new model. • Repetition: Steps 3 to 6 are repeated for several rounds. • Improvement: With each round, the model gets better by learning from more devices. • Final Model: Eventually, a final improved model is achieved. • Use: This model can be used for making predictions or classifications without exposing individual data. 19-04-2024 URCET-CSE dept 6
  • 7. Importance of Federated Learning in Privacy-Preserving AI • Federated Learning is crucial for keeping personal data safe in AI. • It prevents big data breaches by spreading training process across devices. • It helps companies follow privacy rules by training AI models directly on users' devices. 19-04-2024 URCET-CSE dept 7
  • 8. Why Federated Learning? Challenges with Centralized Learning Models 1.Privacy Worries: Centralized models gather all data in one place, raising privacy concerns. 2.Limited Data Access: Centralized models struggle to access diverse datasets from different sources. 3.Network Issues: Transmitting large data volumes strains networks and slows down processes. 19-04-2024 URCET-CSE dept 8
  • 9. Evolution towards Decentralized Approaches • People want more control over their data. • More processing is happening on device such as smartphones, IoT devices, and edge servers , making Federated Learning a better fit. • Federated Learning allows multiple parties to train models together without sharing their raw data. 19-04-2024 URCET-CSE dept 9
  • 10. Standard Approach VS Federated Learning 19-04-2024 URCET-CSE dept 10
  • 11. How Federated Learning Works? 19-04-2024 URCET-CSE dept 11
  • 12. Model Aggregation Techniques 1. Federated Averaging: • Each device sends its model updates. • The updates are averaged to create a better global model. 2.Federated Stochastic Gradient Descent (FedSGD): • Devices send gradients (directions to improve the model). • The global model adjusts based on these gradients. 3.Secure Aggregation: • Ensures updates are combined securely. • Protects individual data while improving the global model. 19-04-2024 URCET-CSE dept 12
  • 13. Benefits • Enhanced Privacy Federated Learning keeps your data safe on your device, reducing the risk of privacy breaches. • Faster Processing By training models directly on devices, Federated Learning speeds up data processing, especially for real-time tasks. 19-04-2024 URCET-CSE dept 13
  • 14. Challenges Communication Overhead: Federated Learning can sometimes slow down due to communication between devices and servers. Data Differences: Devices may have different types or amounts of data, making it tricky to combine their updates seamlessly. 19-04-2024 URCET-CSE dept 14
  • 15. Use Cases • Healthcare • Telecommunications • Finance • Smart Grid Optimization • Manufacturing and Industry 4.0 • Autonomous Vehicles • Agriculture and Precision Farming 19-04-2024 URCET-CSE dept 15
  • 16. Example Healthcare: Predictive Models without Sharing Sensitive Data Scenario: Healthcare institutions collaborate to predict diseases or patient outcomes. Challenge: Patient data must stay private due to regulations. Solution: Use Federated Learning to train models on local data. Only share model updates. 19-04-2024 URCET-CSE dept 16
  • 17. Benefits: Keeps patient data private, aids collaboration, and builds accurate models securely. 19-04-2024 URCET-CSE dept 17
  • 18. Implementation Choosing Frameworks • Select frameworks like TensorFlow Federated or PySyft for implementing Federated Learning. TensorFlow Federated (TFF) Developed by Google helps define Federated Learning tasks and manage communication. PySyft Built on PyTorch, it ensures privacy in computations using techniques like differential privacy 19-04-2024 URCET-CSE dept 18
  • 19. • These tools provide the necessary resources to manage training across devices. Scaling Up: 1.Ensure scalability by optimizing communication and aggregation processes. 2.Balancing loads, managing resources, and maintaining reliability are vital for efficient operation. 19-04-2024 URCET-CSE dept 19
  • 20. Future Trends 1.Advanced Algorithms: Expect smarter ways to train models. 2.Edge Computing Integration: Devices will help process data faster. 3.Expanded Applications: More places will use Federated Learning for different tasks. 4.Privacy Improvements: More ways to protect your data. 19-04-2024 URCET-CSE dept 20
  • 21. Conclusion • Federated Learning makes machine learning collaborative and secure. • With better algorithms and privacy protection, it's set for growth. • Businesses should adopt it for efficient AI while protecting privacy. • As it becomes standard, Federated Learning will transform many areas with personalized solutions. 19-04-2024 URCET-CSE dept 21