Incentivized Truthful Communication for Federated Bandits
Abstract
To enhance the efficiency and practicality of federated bandit learning, recent advances have introduced incentives to motivate communication among clients, where a client participates only when the incentive offered by the server outweighs its participation cost. However, existing incentive mechanisms naively assume the clients are truthful: they all report their true cost and thus the higher cost one participating client claims, the more the server has to pay. Therefore, such mechanisms are vulnerable to strategic clients aiming to optimize their own utility by misreporting. To address this issue, we propose an incentive compatible (i.e., truthful) communication protocol, named Truth-FedBan, where the incentive for each participant is independent of its self-reported cost, and reporting the true cost is the only way to achieve the best utility. More importantly, Truth-FedBan still guarantees the sub-linear regret and communication cost without any overheads. In other words, the core conceptual contribution of this paper is, for the first time, demonstrating the possibility of simultaneously achieving incentive compatibility and nearly optimal regret in federated bandit learning. Extensive numerical studies further validate the effectiveness of our proposed solution.
1 Introduction
Bandit learning (Lattimore & Szepesvári, 2020) addresses the exploration-exploitation dilemma in interactive environments, where the learner repeatedly chooses actions and observes the corresponding rewards from the environment. Subject to different goals of the learner, e.g., maximizing cumulative rewards (Abbasi-Yadkori et al., 2011; Auer et al., 2002) vs., identifying the best arm (Audibert et al., 2010; Garivier & Kaufmann, 2016), bandit algorithms have been widely applied in various real-world applications, such as model selection (Maron & Moore, 1993), recommender systems (Li et al., 2010a; b), and clinical trials (Durand et al., 2018). Most recently, propelled by the increasing scales of data across various sources and public concerns about data privacy, there has been growing research effort devoted to federated bandit learning, which enables collective bandit learning among distributed learners while preserving the data privacy of each learner. Recent advances in this line of research mainly focus on addressing the communication bottleneck in the federated network, which leads to communication-efficient protocols for both non-contextual (Landgren et al., 2016; Martínez-Rubio et al., 2019; Shi et al., 2020; Zhu et al., 2021) and contextual bandits (Wang et al., 2020; Huang et al., 2021; Li et al., 2022; 2023) under various environment settings.
However, almost all previous works assume clients are altruistic in sharing their local data with the server whenever communication is triggered (Wang et al., 2020; Li & Wang, 2022a; He et al., 2022). This limits their practical deployment in real-world scenarios involving individual rational clients who share data only if provided with clear benefits. The only notable exception is Wei et al. (2023), where incentive is provided to motivate client’s participation in federated learning. Nevertheless, their protocol naively assumes the clients are truthful in reporting their participation cost; and thus, they simply calculate incentives by each client’s claimed cost, leaving it as a design flaw for strategic clients to exploit. Therefore, how to design an incentive compatible mechanism for federated bandits that ensures truthful reporting while still preserving the near-optimal regret and communication cost still remains an open research problem.
Following Wei et al. (2023)’s setting for learning contextual linear bandits in a federated environment, we develop the first incentive compatible communication protocol Truth-FedBan, which ensures the clients can only achieve their best utility by reporting the true participation costs. Specifically, instead of simply paying a client by its claimed cost, we decouple the calculation of incentive from the target client’s reported cost, while preserving individual rationality through a critical-value based payment design that depends on all other clients’ report cost. Besides the theoretical guarantee on truthfulness, we also empirically demonstrate that misreporting cost brings no benefit to the client’s utility. More encouragingly, we prove that this can be achieved without any compromise in maintaining the near-optimal performance in regret and communication cost.
On the other hand, in addition to the above desiderata, maintaining a minimal social cost is also an important objective in the incentivized communication problem, especially in practical applications. Following classical economic literature (Procaccia & Tennenholtz, 2013), social cost is defined as the sum of true participation costs among all participating clients. While incentivizing all clients’ participation ensures nearly optimal performance (Wang et al., 2020), it can be scientifically trivial (e.g., paying everyone to have all of them participate) and practically undesirable — it not only brings unnecessary burden for the server, but can also expose unnecessary clients to potential downsides of participation (e.g., privacy breaches, added resource consumption, etc.), resulting in worse social cost. Minimizing social cost while ensuring sufficient client participation is non-trivial, as it in nature is NP-hard (see Eq. (1)). Though the method proposed by Wei et al. (2023) achieves sub-linear regret and communication cost (albeit assuming truthfulness), it provides no guarantee on the social cost. In contrast, our proposed Truth-FedBan guarantees both sub-linear regret and near-optimal social cost, with only a constant-factor approximation ratio. To better illustrate our contribution, we compare the proposed Truth-FedBan with the most related works in Table 1.
Method | Regret | Communication Cost | IR | IC | SC |
---|---|---|---|---|---|
DisLinUCB | ✘ | ✘ | ✘ | ||
(Wang et al., 2020) | |||||
Inc-FedUCB | ✓ | ✘ | ✘ | ||
(Wei et al., 2023) | |||||
Truth-FedBan | ✓ | ✓ | ✓ | ||
(Our Algorithm 1) |
2 Related Work
2.1 Federated Bandit Learning
Federated bandit learning has been well investigated for sequential decision making in distributed environments. These studies mainly differ in how they model the clients’ and environment characteristics, which can be categorized into 1) bandit-wise: problem profile (e.g., context-free (Martínez-Rubio et al., 2019; Shi & Shen, 2021; Shi et al., 2020) vs. contextual (Wang et al., 2020)) and decision set (e.g., fixed (Huang et al., 2021) vs. time-varying (Li & Wang, 2022b)), and 2) system-wise: client type (e.g., homogeneous (He et al., 2022) vs. heterogeneous (Li & Wang, 2022a)), network type (e.g., peer-to-peer (P2P) (Dubey & Pentland, 2020) vs. star-shaped (Wang et al., 2020)), and communication type (e.g., synchronous (Li et al., 2022) vs. asynchronous (Li et al., 2023)).
Most recently, Wei et al. (2023) expand this spectrum by introducing the notion of incentivized communication, where the server has to pay the clients for their participation. Despite being free from the long-standing assumption about the client’s willingness of participation in literature, they still assume truthfulness of clients in cost reporting. Specifically, their incentive calculation is based on the client’s self-reported cost, which leads to serious vulnerability in adversarial scenarios as clients can exploit this flaw, ultimately paralyzing the federated learning system. This is particularly concerning in real-world applications where self-interested clients are motivated to strategically game the system for increased utilities, i.e., increase the difference between incentives offered by the server and actual participation costs. Our work aims to address this issue by introducing a truthful incentive mechanism under which clients reporting true costs is in their best interest, while ensuring near-optimal learning performance.
2.2 Mechanism Design
Mechanism design (Nisan & Ronen, 1999) has been playing a crucial role in the fields of economics, computer science and operation research, with fruitful auction-like real-world applications such as matching markets (Roth, 1986), resource allocation (Procaccia, 2013), online advertisement pricing (Aggarwal et al., 2006). Typically, the auctioneer (server) aims to sell/purchase one or more entries of a collection to/from multiple bidders (clients), with the objective of maximizing social welfare or minimizing social cost. The goal of mechanism design is to incentivize clients to truthfully report the values of the entries (i.e., truthfulness), while ensuring non-negative utilities if they participate in the mechanism (i.e., individual rationality).
The Vickrey-Clarke-Groves (VCG) mechanism (Vickrey, 1961; Clarke, 1971; Groves, 1973) is probably the most well-known truthful mechanism. Despite having been well explored in many theoretical studies, VCG is rarely applied in practical applications due to its computational inefficiency. This is because VCG requires finding an optimal solution to the concerned problems, which is often NP-hard (Archer & Tardos, 2001). Otherwise, truthfulness cannot be guaranteed when VCG mechanisms are applied to sub-optimal solutions (Lehmann et al., 2002). To facilitate study on this issue, Mu’Alem & Nisan (2008) identified the key character of a truthful mechanism and reduced the problem to designing a monotone algorithm (see Section 4.1). One notable recent related work is (Kandasamy et al., 2023), where the authors model repeated auctions as a bandit learning problem for the server, with clients being unaware of their values but able to provide bandit feedback based on the server’s allocation. The server’s goal is to find allocations that maximize social welfare, while ensuring the clients’ truthfulness in their feedback. In contrast, in our work, clients know their participation costs and are concerned to solve the bandit problem collectively. The server’s goal is to incentivize clients’ participation for regret minimization, while ensuring the clients’ truthfulness in cost reporting and minimizing social cost.
In terms of problem formulation, our work is closest to the hiring-a-team task in procurement auctions (Talwar, 2003; Archer & Tardos, 2007), where the server aims to incentivize a set of self-interested clients to jointly perform a task. One standard assumption in this task is that the environment is monopoly-free, i.e., no single client exists in all feasible sets (Iwasaki et al., 2007). The reason is that if a client is essential, it has the bargaining power to ask for infinite incentive. In this paper, we do not assume a monopoly-free environment, otherwise additional environment assumptions will be needed (e.g., how the context or arms should distribute across clients). Instead, we are intrigued in studying the origin and impact of the monopoly issue from both theoretical and empirical perspectives. And we also rigorously prove that we can eliminate the issue via hyper-parameter control in our mechanism (see Lemma 7).
2.3 Mechanism Design in Federated Learning
On the other hand, there have been growing efforts in investigating mechanism design in the context of federated learning (Pei, 2020; Tu et al., 2022). For example, Karimireddy et al. (2022) introduced a contract-theory based incentive mechanism to maximize data sharing while avoiding free-riding clients. In their design, every client gets different snapshots of the global model with different levels of accuracy as incentive, and truthfully reporting their data sharing costs is the best response under the proposed incentive mechanism. Therefore, there is no overall performance guarantee and their focus is on investigating the level of accuracy the system can achieve under this truthful incentive mechanism. Le et al. (2021) also investigated truthful mechanism design in the application scenario of wireless communication, where server’s goal is to maximize the system’s social welfare, with respect to a knapsack upper bound constraint. In contrast, in our problem the server is obligated to improve the overall performance of the learning system, i.e., obtaining near-optimal regret among all clients. Furthermore, our optimization problem (defined in Eq. (3)) aims at minimizing the social cost, with respect to a submodular lower bound constraint. Therefore, despite we share a similar idea of using the monotone participant selection rule and critical-value based payment design to guarantee truthfulness, the underlying fundamental optimization problems are completely different, and consequently their solution cannot be used to solve our problem. Besides pursuing the truthfulness guarantee in mechanism design under the collaborative/federated setting, the other related line of research focuses on designing incentive mechanisms that ensures fairness among distributed clients (Blum et al., 2021; Xu et al., 2021; Sim et al., 2020; Donahue & Kleinberg, 2023), which is also an important direction, despite being beyond the scope of our work. To our best knowledge, our work is the first attempt that studies truthful mechanism design for federated bandit learning.
3 Preliminary: Incentivized Federated Bandits
In this section, we present the incentivized communication problem for federated bandits in general and the existing solution framework under the linear reward assumption (Wang et al., 2020). More precisely, we focus our discussions on the learning objectives, including minimizing regret, communication cost, social cost, and ensuring truthfulness.
Consider a learning system with 1) distributed strategic and individual rational clients that repeatedly interact with the environment by taking actions to receive rewards, and 2) a central server responsible for motivating the clients to participate in federated learning via incentives. As in line with Wei et al. (2023), we assume the clients can only communicate with the server, forming a star-shaped communication network. Specifically, at each time step , an arbitrary client chooses an arm from its given arm set . Then, client receives a reward , where is the unknown parameter shared by all clients and denotes zero-mean sub-Gaussian noise. Typically, in the centralized setting of bandit learning, a ridge regression estimator is constructed for arm selection based on the sufficient statistics from all clients at time step , where and . In contrast, since communication does not occur at every time step in the federated setting, each client only has a delayed copy of and , denoted as , where are the aggregated statistics shared by the server in the last communication, and are the accumulated local updates that client has collected from the environment since .
Regret and Communication Cost
One key objective of the learning system is to minimize the (pseudo) regret for all clients across the entire time horizon , i.e., , where is the instantaneous regret of client at time step . Meanwhile, a low communication cost is also desired to keep the efficiency of federated learning, which is measured by the total number of scalars transferred throughout the system up to time . Intuitively, more frequent communication leads to lower regret. For example, communicating at every time step recovers the centralized setting, leading to the lowest regret, but with an undesirably high communication cost. Efficient communication protocol design becomes the key to balance regret and communication cost. And using determinant ratio to measure the outdatedness of the sufficient statistics stored on the server side against those on the client side has become the reference solution to control communication in federated linear bandits (Wang et al., 2020; Li & Wang, 2022a).
Incentivized Communication
When dealing with individual rational clients, additional treatment is needed to facilitate communication, as it becomes possible that no client participates unless properly incentivized thus leading to terrible regret. In other words, client only participates if its utility is non-negative, where is the server-provided incentive, and is the client’s participation cost. To address this challenge and maintain near-optimal learning outcome, Wei et al. (2023) pinpointed the core optimization problem in incentivized communication as follows:
(1) |
where is client ’s reported participation cost, is the set of clients selected to participate at time step , is the set of all clients, is specified as an input to the algorithm, and . In particular, they assume the clients’ reported cost is simply the true cost, i.e., . A heuristic search algorithm is executed to solve the optimization problem whenever the standard communication event (Wang et al., 2020) is triggered. A detailed description of this communication protocol is provided in Appendix F.
Note that Wei et al. (2023)’s work is limited to a constant cost setting of , which restricts the actual cost of client to be independent of time and its local updates . In our work, we relax it to , where can be any reasonable data valuation function, and even time-varying111In fact, our proposed Truth-FedBan works with any realization of the valuation function, as all that matters is that client has a value for its data at time step .. Moreover, their proposed solution for Eq. (1) fails to provide any approximation guarantee on the objective, thus having no guarantee on the social cost. Below, we provide a formal definition of truthfulness and social cost employed in this paper.
Definition 1 (Truthfulness)
An incentive mechanism is truthful (i.e., incentive compatible) if at any time the utility of any client is maximized when it reports its true participation cost, i.e., , regardless of the reported costs of the other clients’ .
Definition 2 (Social Cost)
The social cost of the learning system is defined as the total actual costs incurred by all participating clients in the incentivized client set , i.e., .
Note that the social cost defined above is different from the incentive cost studied in Wei et al. (2023), which is the total payment the server made to all clients. As truthfulness is assumed in their setting, the payment that the server needs to make to incentivize a client is trivially upper bounded by the client’s true cost. However, in order to ensure truthfulness in our setting, the server needs to overpay the selected clients (compared with their true cost). In the case where there exists monopoly client as introduced in Section 2.2, an infinite incentive cost is required.
4 Methodology
4.1 Characterization of Truthful Incentive Mechanisms
Our idea stems from the seminal result of Mu’Alem & Nisan (2008), who provided a characterization of a truthful incentive mechanism as a combination of a monotone selection rule and a critical value payment scheme, which reduces the problem of designing a truthful mechanism to that of designing a monotone selection rule. Though it is originally intended for combinatorial auctions in economics, we are the first to extend it to the incentivized communication problem in federated bandit learning, laying the foundations for future work.
Definition 3 (Monotonicity)
The selection rule for the set is monotone if for any client and any reported costs of the other clients , client will remain selected whenever it reports , provided it is incentivized when reporting .
Furthermore, according to Mu’Alem & Nisan (2008), any monotone selection rule of the incentive mechanism has an associated critical payment scheme, with its definition given below.
Definition 4 (Critical Payment)
Let be a monotone selection rule of the incentive mechanism and be the set of selected clients, then for any client and any reported costs of the other clients , there exists a critical value such that , , and , .
In this way, we can decouple the incentive for client from its reported participation cost , and calculate the critical value based only on the other clients’ reported costs . Formally,
(2) |
which is fundamentally different from the incentive design in (Wei et al., 2023) where , as our payment method leaves no room for strategic clients to manipulate the incentive and benefit from misreporting.
4.2 Truth-FedBan: A Truthful Mechanism for Incentivized Communication
To balance regret and communication cost, while ensuring truthfulness and minimizing social cost, our proposed incentive mechanism Truth-FedBan inherits the incentivized communication protocol by Wei et al. (2023), with the distinction in implementing a truthful incentive search. As stated above, the truthfulness of clients is ensured once we devise a monotone algorithm for client selection, combined with a critical payment scheme. But straightforward monotone algorithms (e.g., a greedy algorithm ranking clients by their claimed costs) offer no guarantee on social cost. To address this challenge, we rewrite the original optimization problem in Eq. (1) into the following equivalent submodular set cover (SSC) problem, where is a submodular set function (see Definition 11).
(3) |
Inspired by Iyer & Bilmes (2013), we propose Algorithm 1 that achieves a constant-factor bi-criteria approximation for both the objective and constraint in the problem defined by Eq. (3). As outlined above, we first initialize a minimal budget (Line 2) for social cost and repeatedly increase the budget (Line 4) until the resulting client set found by Algorithm 2 satisfies the specified condition (Line 3).
In Algorithm 2, for a given budget , we iteratively find the best set of clients from the complete client set until the budget cannot afford more clients. At each iteration, all the remaining non-selected clients are ranked based on their contribution-to-cost ratio (and hence being greedy). The algorithm then chooses the client with the highest ratio while ensuring the total cost of all selected clients is within the budget (Line 3 of Algorithm 2). The correctness of our method hinges on the following crucial monotonicity property that we prove. Interestingly, despite the wide use of greedy algorithms in submodular maximization, this monotonicity result is unknown in previous literature to the best of our knowledge. We thus present it as a proposition in case it is of independent interest.
Proposition 5 (Monotonicity)
Algorithm 1 is monotone.
It is not difficult to show that Algorithm 2 is monotone for a fixed input budget — that is, if client is selected under by Algorithm 2, it remains selected when it reports any . But it is highly non-trivial to prove monotonicity for Algorithm 1. This is because decreasing a client’s reported cost can cause a different output by Algorithm 2 and, consequently, terminate the search process in Algorithm 1 at a different budget with a potentially different selection of participant set . We prove Proposition 5 by showing the resulting objective value from Algorithm 2’s selection of clients is non-decreasing with respect to its input budget . The proof is a bit involving since Algorithm 2 is an approximate algorithm and generally outputs sub-optimal solutions. We will have to show that the quality of these sub-optimal solutions — which can be close to or far away from the exact optimality — will not degenerate as the budget increases. The proof of the above property, together with the formal proof of Proposition 5, can be found in Appendix A.
Lemma 6
If the selection rule of a truthful mechanism is computable in polynomial time, so is the critical payment scheme (Mu’Alem & Nisan, 2008).
Note that in the star-shaped communication network, only the server has the necessary information to calculate the critical value of each client, and we assume the server is committed not to tricking the clients. Due to space limit, we leave the detailed critical payment calculation to Appendix G. In particular, as we do not assume a monopoly-free environment, a client’s critical value could be infinite at a certain point, as introduced in Section 2.2. Nonetheless, Lemma 7 shows that this infinite payment issue can be essentially eliminated by hyper-parameter control. The time complexity analysis of Algorithm 1 can be found in Appendix H.
Lemma 7 (Elimination of Infinite Critical Value)
With parameter in Algorithm 1, no client will be essential in any communication round at time step .
A detailed proof is provided in Appendix D. Building upon the properties above, we are now ready to state the main incentive guarantee of our Truth-FedBan protocol.
Theorem 8
The incentive mechanism induced by Algorithm 1 is (a) truthful in the sense that every client achieves the highest utility by reporting its true participation cost; and (b) individually rational in the sense that every client’s utility of participating in the mechanism is non-negative.
Proof The truthfulness guarantee directly follows Lemma 5. Below, we further elaborate on the impact of misreporting. Denote and as the participant sets when client truthfully reports and misreports its data sharing cost as and , respectively. Let be the critical value of client , and and be its utilities in the above two conditions respectively. According to Definition 4, we have whenever , and whenever . Moreover, if , then . For simplicity, the subscript is omitted in the following discussion. Specifically, there are four possible cases: 1) and , as critical payment is independent from the client’s reported cost and , therefore ; 2) and , in this case, . Therefore, ; 3) and , in this case, . Therefore, ; 4) and , in this case, both utilizes are zero, therefore . To conclude, there is no benefit to misreport under our truthful mechanism design in all cases, and only reporting the true data sharing cost can lead to the client’s best utility.
We now prove the individual rationality. Given the truthfulness guarantee, each client reports its true cost , and only gets incentivized if .
Therefore, the utility of client is if client gets incentivized; otherwise, .
In either case, client is ensured to have a non-negative utility, which completes the proof.
4.3 Learning Performance of Truth-FedBan Protocol
The truthfulness property above helps the system induce desirable clients participation behaviors. In this subsection, we demonstrate the learning performance of Truth-FedBan under these client behaviors. Our main results are the following guarantees regarding total social cost that the Truth-FedBan protocol has to suffer and the resultant regret guarantee it induces.
Theorem 9 (Social Cost)
For any , using Algorithm 2 to search for participants in Algorithm 1 provides a bi-criteria approximation solution for the problem defined in Eq. (3). In other words, to maintain a social cost that is within a factor of the optimal value, it necessitates a relaxation of the constraint by a factor of . Formally,
where is the output of Algorithm 1, and is the ground-truth optimizer of Eq. (3).
Proof Denote the optimal objective value of Eq. (3) as OPT. For the solution , we have and . To simplify out discussions, we omit the subscript and let and be the output set and terminating budget of Algorithm 1 for solving the problem in Eq. (3), and and be the set and budget at the previous iteration before termination, then we have
(4) | |||||
(5) |
Denote as the optimal solution for the subroutine search problem with budget (denote the problem solved by Algorithm 2 in Line 5 of Algorithm 1 as SubProblem). According to Sviridenko (2004), the approximation ratio of Algorithm 2 for this SubProblem is , i.e.,
(6) |
Combining Eq. (4) and Eq. (6), we have . Furthermore, we can show that by contradiction. Assuming , then is a feasible solution for the SubProblem, and thus . However, this contradicts the fact that , so . Hence, we can show that the objective value of solution satisfies the following inequality:
(7) |
This, combined with Eq. (5), concludes the proof.
Since is guaranteed (see Theorem 8), Theorem 9 directly bounds the social cost as defined in Definition 2.
Note that as indicated by Theorem 9, we can flexibly choose any desired level of social cost by adjusting the parameter , which allows us to accommodate various computation resources in practical scenarios.
For example, in the case where computation is not a limiting factor and the core objective is to minimize the social cost, we can set the factor to be almost 1, approaching the optimal social cost.
Moreover, though this bi-criteria approximation slightly deviates from the constraint of the original problem in Eq. (3), it only incurs a constant-factor gap of , and Theorem 10 shows that we still attain near-optimal regret and communication cost, despite this deviation (see proof in Appendix E).
Theorem 10 (Regret and Communication Cost)
Under threshold , with high probability the communication cost of Truth-FedBan satisfies , where is the total number of communication rounds, under the communication threshold in Algorithm 6, where . Furthermore, by setting , the cumulative regret is .
5 Experiments
To validate our method, we create a simulated federated bandit learning environment with context feature dimension and clients sequentially interacting with the environment for a fixed time horizon . Due to space limit, more implementation details can be found in Appendix G. The results, averaged over 5 runs, are presented alongside the standard deviation.
5.1 Comparison between different truthful incentive mechanisms
We compare Truth-FedBan with a vanilla greedy algorithm (Algorithm 3). Despite Algorithm 3 also induces a monotone mechanism (and thus truthful), it does not admit any constant-factor approximation guarantee, hence is less theoretically exciting compared to Truth-FedBan. A comprehensive analysis regrading this baseline method can be found in Appendix B. As reported in Figure 1(a) and Figure 1(b), Truth-FedBan achieved competitive sub-linear regret and communication cost compared to DisLinUCB (Wang et al., 2020), with lower incentive and social costs compared to the baseline greedy method, validating our theoretical analysis.
5.2 Impact on Misreporting
Micro-level Study. In this experiment, we study how misreporting affects an individual, in terms of the client’s regret, incentive and utility. To do so, we randomly designate a client to keep misreporting throughout the entire time horizon while keeping the others being truthful, and compare the corresponding outcome for this client. We take truth-report as the benchmark and plot the individual’s total regret, incentive, and utility on the same chart using the normalized score (the respective value divided by that under truth-report), along with the actual value on top of each bar. As presented in Figure 1(c) and Figure 1(d), both Truth-FedBan and the greedy method demonstrate the ability to prevent client from benefiting via misreporting. It is important that the incentive payment (i.e., critical value) for the client is subject to the incentive mechanism and independent of its claimed cost. Therefore, though under-reporting may encourage the client to be selected by the incentive mechanism, its net utility essentially becomes negative. Meanwhile, despite over-reporting cost only undertakes the risk of being ruled out and losing incentives, it is surprising that this behavior leads to a slightly higher utility under the vanilla greedy incentive mechanism. We attribute this to the reduced participation cost incurred by the client — the less it participates, the less it suffers.
Macro-level Study. As presented in Figure 2, we also empirically investigate how different levels of misreporting across the set of clients affect the entire federated learning system. Specifically, we vary the number of misreporting clients from 0% to 100% to investigate the impact on overall system performance, including regret, communication cost, incentive cost, and social cost. Generally, as guaranteed by our communication protocol, the overall regret under different degrees of misreporting remains virtually identical to the situation when no client misreports. Meanwhile, the communication cost tends to increase when clients under report and decrease when they over report. This aligns with our algorithm’s design, which selects clients based on their value-to-cost ratio (Line 3 in Algorithm 2). For example, when a client under reports, its ratio increases, which increases its chance to be selected in communication, hence leading to an increased communication cost.
An interesting finding that might seem contradictory to our discovery in the previous micro-level study is the overall impact of over reporting on incentive costs, which implies that the more clients over report, the higher the incentives they will receive. But our finding in the micro-level study suggests that over reporting brings no benefit to the client’s individual utility under Truth-FedBan. We note that the observation in our macro-level study is due to collusion among clients — once a sufficient group of clients colludes, the server has to increase the critical value or even pay infinity. This actually rationalizes individual client’s commitment to be truthful, as they are unaware of others clients’ decision on truthfulness. Meanwhile, this finding reveals the vulnerability of the incentivized truthful communication to collusion, leaving an interesting avenue for future work to explore. On the other hand, it can be observed that both overreporting and underreporting hurt the social cost until the misreporting ratio reaches approximately 50%. This is interesting from the perspective of societal divisions — when the society is equally divided into two parts, the social cost is at its largest. And as division decreases, the cost becomes lower. For example, when the misreporting ratio reaches 100%, meaning that everyone in the system is misreporting, the social cost resets the scenario where no one misreports, marking the establishment of a new stability in the system.
6 Conclusion
In this work, we introduce the first truthful incentivized communication protocol Truth-FedBan for federated bandit learning, where a set of strategic and individual rational clients are incentivized to truthfully report their cost to participate distributed learning. Our key contribution is to design a monotone client selection rule and its corresponding critical value based payment scheme. We establish the theoretical foundations for incentivized truthful communication, under which not only the social cost but also the regret and communication cost obtain their near-optimal performance. Numerical simulations verify our theoretical results, especially the truthfulness guarantee, i.e., individual clients’ utility can only be maximized when reporting their true cost.
Our work opens a broad new direction for future exploration. First of all, our truthful incentivized communication protocol is not only limited to federated bandit learning, but can be applied to general distributed learning environments where self-interested clients need to be incentivized for collaborative learning. Second, our truthful guarantee is proved for every round of communication, but it is unclear whether a client can do long-term planning to game the system. For example, keep over reporting until it becomes monopoly, ultimately leading to an infinite incentive for its participation. Last but not least, although we no longer assume clients are truthful, we still assume they are not malicious, i.e., they only want to maximize their own utility. In practice, it is necessary to investigate the problem under an adversarial context, e.g., malicious clients intentionally misreport their costs to hurt other clients’ utilities or system’s learning outcome.
References
- Abbasi-Yadkori et al. (2011) Yasin Abbasi-Yadkori, Dávid Pál, and Csaba Szepesvári. Improved algorithms for linear stochastic bandits. In NIPS, volume 11, pp. 2312–2320, 2011.
- Aggarwal et al. (2006) Gagan Aggarwal, Ashish Goel, and Rajeev Motwani. Truthful auctions for pricing search keywords. In Proceedings of the 7th ACM Conference on Electronic Commerce, pp. 1–7, 2006.
- Archer & Tardos (2001) Aaron Archer and Éva Tardos. Truthful mechanisms for one-parameter agents. In Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pp. 482–491. IEEE, 2001.
- Archer & Tardos (2007) Aaron Archer and Éva Tardos. Frugal path mechanisms. ACM Transactions on Algorithms (TALG), 3(1):1–22, 2007.
- Audibert et al. (2010) Jean-Yves Audibert, Sébastien Bubeck, and Rémi Munos. Best arm identification in multi-armed bandits. In COLT, pp. 41–53, 2010.
- Auer et al. (2002) Peter Auer, Nicolo Cesa-Bianchi, and Paul Fischer. Finite-time analysis of the multiarmed bandit problem. Machine learning, 47(2):235–256, 2002.
- Blum et al. (2021) Avrim Blum, Nika Haghtalab, Richard Lanas Phillips, and Han Shao. One for one, or all for all: Equilibria and optimality of collaboration in federated learning. In International Conference on Machine Learning, pp. 1005–1014. PMLR, 2021.
- Burden et al. (2015) Richard L Burden, J Douglas Faires, and Annette M Burden. Numerical analysis. Cengage learning, 2015.
- Clarke (1971) Edward H Clarke. Multipart pricing of public goods. Public choice, pp. 17–33, 1971.
- Donahue & Kleinberg (2023) Kate Donahue and Jon Kleinberg. Fairness in model-sharing games. In Proceedings of the ACM Web Conference 2023, pp. 3775–3783, 2023.
- Dubey & Pentland (2020) Abhimanyu Dubey and AlexSandy’ Pentland. Differentially-private federated linear bandits. Advances in Neural Information Processing Systems, 33:6003–6014, 2020.
- Durand et al. (2018) Audrey Durand, Charis Achilleos, Demetris Iacovides, Katerina Strati, Georgios D Mitsis, and Joelle Pineau. Contextual bandits for adapting treatment in a mouse model of de novo carcinogenesis. In Machine learning for healthcare conference, pp. 67–82. PMLR, 2018.
- Garivier & Kaufmann (2016) Aurélien Garivier and Emilie Kaufmann. Optimal best arm identification with fixed confidence. In Conference on Learning Theory, pp. 998–1027. PMLR, 2016.
- Groves (1973) Theodore Groves. Incentives in teams. Econometrica: Journal of the Econometric Society, pp. 617–631, 1973.
- Harville (2008) David A Harville. Matrix Algebra From a Statistician’s Perspective. Springer Science & Business Media, 2008.
- He et al. (2022) Jiafan He, Tianhao Wang, Yifei Min, and Quanquan Gu. A simple and provably efficient algorithm for asynchronous federated contextual linear bandits. In S. Koyejo, S. Mohamed, A. Agarwal, D. Belgrave, K. Cho, and A. Oh (eds.), Advances in Neural Information Processing Systems, volume 35, pp. 4762–4775. Curran Associates, Inc., 2022.
- Huang et al. (2021) Ruiquan Huang, Weiqiang Wu, Jing Yang, and Cong Shen. Federated linear contextual bandits. In M. Ranzato, A. Beygelzimer, Y. Dauphin, P.S. Liang, and J. Wortman Vaughan (eds.), Advances in Neural Information Processing Systems, volume 34, pp. 27057–27068. Curran Associates, Inc., 2021.
- Iwasaki et al. (2007) Atsushi Iwasaki, David Kempe, Yasumasa Saito, Mahyar Salek, and Makoto Yokoo. False-name-proof mechanisms for hiring a team. In Internet and Network Economics: Third International Workshop, WINE 2007, San Diego, CA, USA, December 12-14, 2007. Proceedings 3, pp. 245–256. Springer, 2007.
- Iyer & Bilmes (2013) Rishabh K Iyer and Jeff A Bilmes. Submodular optimization with submodular cover and submodular knapsack constraints. Advances in neural information processing systems, 26, 2013.
- Kandasamy et al. (2023) Kirthevasan Kandasamy, Joseph E Gonzalez, Michael I Jordan, and Ion Stoica. Vcg mechanism design with unknown agent values under stochastic bandit feedback. Journal of Machine Learning Research, 24(53):1–45, 2023.
- Karimireddy et al. (2022) Sai Praneeth Karimireddy, Wenshuo Guo, and Michael I Jordan. Mechanisms that incentivize data sharing in federated learning. arXiv preprint arXiv:2207.04557, 2022.
- Landgren et al. (2016) Peter Landgren, Vaibhav Srivastava, and Naomi Ehrich Leonard. On distributed cooperative decision-making in multiarmed bandits. In 2016 European Control Conference (ECC), pp. 243–248. IEEE, 2016.
- Lattimore & Szepesvári (2020) Tor Lattimore and Csaba Szepesvári. Bandit algorithms. Cambridge University Press, 2020.
- Le et al. (2021) Tra Huong Thi Le, Nguyen H Tran, Yan Kyaw Tun, Minh NH Nguyen, Shashi Raj Pandey, Zhu Han, and Choong Seon Hong. An incentive mechanism for federated learning in wireless cellular networks: An auction approach. IEEE Transactions on Wireless Communications, 20(8):4874–4887, 2021.
- Lehmann et al. (2002) Daniel Lehmann, Liadan Ita Oćallaghan, and Yoav Shoham. Truth revelation in approximately efficient combinatorial auctions. Journal of the ACM (JACM), 49(5):577–602, 2002.
- Li & Wang (2022a) Chuanhao Li and Hongning Wang. Asynchronous upper confidence bound algorithms for federated linear bandits. In International Conference on Artificial Intelligence and Statistics, pp. 6529–6553. PMLR, 2022a.
- Li & Wang (2022b) Chuanhao Li and Hongning Wang. Communication efficient federated learning for generalized linear bandits. In Alice H. Oh, Alekh Agarwal, Danielle Belgrave, and Kyunghyun Cho (eds.), Advances in Neural Information Processing Systems, 2022b.
- Li et al. (2022) Chuanhao Li, Huazheng Wang, Mengdi Wang, and Hongning Wang. Communication efficient distributed learning for kernelized contextual bandits. In Alice H. Oh, Alekh Agarwal, Danielle Belgrave, and Kyunghyun Cho (eds.), Advances in Neural Information Processing Systems, 2022.
- Li et al. (2023) Chuanhao Li, Huazheng Wang, Mengdi Wang, and Hongning Wang. Learning kernelized contextual bandits in a distributed and asynchronous environment. In The Eleventh International Conference on Learning Representations, 2023.
- Li et al. (2010a) Lihong Li, Wei Chu, John Langford, and Robert E Schapire. A contextual-bandit approach to personalized news article recommendation. In Proceedings of the 19th international conference on World wide web, pp. 661–670, 2010a.
- Li et al. (2010b) Wei Li, Xuerui Wang, Ruofei Zhang, Ying Cui, Jianchang Mao, and Rong Jin. Exploitation and exploration in a performance based contextual advertising system. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 27–36, 2010b.
- Maron & Moore (1993) Oded Maron and Andrew Moore. Hoeffding races: Accelerating model selection search for classification and function approximation. Advances in neural information processing systems, 6, 1993.
- Martínez-Rubio et al. (2019) David Martínez-Rubio, Varun Kanade, and Patrick Rebeschini. Decentralized cooperative stochastic bandits. Advances in Neural Information Processing Systems, 32, 2019.
- Mu’Alem & Nisan (2008) Ahuva Mu’Alem and Noam Nisan. Truthful approximation mechanisms for restricted combinatorial auctions. Games and Economic Behavior, 64(2):612–631, 2008.
- Nisan & Ronen (1999) Noam Nisan and Amir Ronen. Algorithmic mechanism design. In Proceedings of the thirty-first annual ACM symposium on Theory of computing, pp. 129–140, 1999.
- Pei (2020) Jian Pei. A survey on data pricing: from economics to data science. IEEE Transactions on knowledge and Data Engineering, 34(10):4586–4608, 2020.
- Procaccia (2013) Ariel D Procaccia. Cake cutting: Not just child’s play. Communications of the ACM, 56(7):78–87, 2013.
- Procaccia & Tennenholtz (2013) Ariel D Procaccia and Moshe Tennenholtz. Approximate mechanism design without money. ACM Transactions on Economics and Computation (TEAC), 1(4):1–26, 2013.
- Roth (1986) Alvin E Roth. On the allocation of residents to rural hospitals: a general property of two-sided matching markets. Econometrica: Journal of the Econometric Society, pp. 425–427, 1986.
- Shi & Shen (2021) Chengshuai Shi and Cong Shen. Federated multi-armed bandits. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 35, pp. 9603–9611, 2021.
- Shi et al. (2020) Chengshuai Shi, Wei Xiong, Cong Shen, and Jing Yang. Decentralized multi-player multi-armed bandits with no collision information. In International Conference on Artificial Intelligence and Statistics, pp. 1519–1528. PMLR, 2020.
- Sim et al. (2020) Rachael Hwee Ling Sim, Yehong Zhang, Mun Choon Chan, and Bryan Kian Hsiang Low. Collaborative machine learning with incentive-aware model rewards. In International conference on machine learning, pp. 8927–8936. PMLR, 2020.
- Sviridenko (2004) Maxim Sviridenko. A note on maximizing a submodular set function subject to a knapsack constraint. Operations Research Letters, 32(1):41–43, 2004.
- Talwar (2003) Kunal Talwar. The price of truth: Frugality in truthful mechanisms. In Annual Symposium on Theoretical Aspects of Computer Science, pp. 608–619. Springer, 2003.
- Tu et al. (2022) Xuezhen Tu, Kun Zhu, Nguyen Cong Luong, Dusit Niyato, Yang Zhang, and Juan Li. Incentive mechanisms for federated learning: From economic and game theoretic perspective. IEEE transactions on cognitive communications and networking, 8(3):1566–1593, 2022.
- Vickrey (1961) William Vickrey. Counterspeculation, auctions, and competitive sealed tenders. The Journal of finance, 16(1):8–37, 1961.
- Wang et al. (2020) Yuanhao Wang, Jiachen Hu, Xiaoyu Chen, and Liwei Wang. Distributed bandit learning: Near-optimal regret with efficient communication. In International Conference on Learning Representations, 2020.
- Wei et al. (2023) Zhepei Wei, Chuanhao Li, Haifeng Xu, and Hongning Wang. Incentivized communication for federated bandits. In Thirty-seventh Conference on Neural Information Processing Systems, 2023.
- Wolsey (1982) Laurence A Wolsey. An analysis of the greedy algorithm for the submodular set covering problem. Combinatorica, 2(4):385–393, 1982.
- Xu et al. (2021) Xinyi Xu, Lingjuan Lyu, Xingjun Ma, Chenglin Miao, Chuan Sheng Foo, and Bryan Kian Hsiang Low. Gradient driven rewards to guarantee fairness in collaborative machine learning. Advances in Neural Information Processing Systems, 34:16104–16117, 2021.
- Zhu et al. (2021) Zhaowei Zhu, Jingxuan Zhu, Ji Liu, and Yang Liu. Federated bandit: A gossiping approach. In Abstract Proceedings of the 2021 ACM SIGMETRICS/International Conference on Measurement and Modeling of Computer Systems, pp. 3–4, 2021.
Appendix A Proof of Monotonicity (Proposition 5)
Our proof of monotonicity relies on the submodularity property and the following lemma. Note that our proof holds true for any time step , and thus the subscript is omitted below to keep our notations simple.
Definition 11 (Submodularity)
A set function is submodular, if for every and it holds that
Lemma 12
Proof of Lemma 12. Considering two input budget and and the corresponding outputs and of Algorithm 2. In the following, we show that if . Without loss of generality, we denote and as the corresponding output, where , , .
Under different budget, the selected client in each round can vary due to the changed constraint in Line 3 of Algorithm 2. For example, under budget , a client with the largest ratio may not be selected because including it would cause the total cost to exceed . In contrast, under budget , it can be selected due to the increased budget. Consequently, this can create different output sequences and .
Let be the first time when the two sequences diverge, i.e, , and . If such a does not exist, the two sequences are precisely the same and we will have . In the remainder of this proof, we assume exists and show that consequently. Let and be the set that contains the first elements in and , so we have . According to the greedy strategy (Line 3 of Algorithm 2), it is clear that , meaning that the cost of client is even higher than the total costs of clients in , which is the reason that appears in the output under a larger budget but is not (thus is skipped) in the output under . Moreover, this also implies that client has a larger value-to-cost ratio than that of any client in at the -th round, formally
(8) |
For clarity, we denote the value of client as , quantifying how much client can improve the objective function with respect to the set . Then we have
where the first inequality follows from Eq. (8), and the second one holds true because . Therefore, we can derive that
(9) |
Now we are ready to compare the objective value of and , and show that . By simple decomposition, we can rewrite as follows
Likewise, we have
Recall that , and thus we have . Therefore,
where the first inequality directly follows Eq. (9), and the last step utilizes the submodularity property (see Definition 11) of the submodular function , i.e., . This concludes the proof.
Now we are ready to prove the monotonicity of Algorithm 1 by contradiction.
Proof of Proposition 5. An algorithm is monotone if a client remains selected by the algorithm whenever its reported cost satisfies , provided it gets selected when reporting . Let and be the resulting participant set and budget determined by Algorithm 1 when client reports . Without loss of generality, we set , where , and denote as the set of clients selected before . According to the greedy selection strategy in Algorithm 2, we have
(10) |
Denote and as the resulting participant set and budget determined by Algorithm 1 when client reports . Since decreasing client ’s claimed cost will increase the ratio in the left-hand side of Eq. (10), it will remain selected (no later than the -th round) when , otherwise the terminating participant set is not sufficient. The algorithm only deviates from this when the following condition is true:
According to Eq. (10), this is only possible when because the increased budget allows additional candidate clients with both larger value and cost, potentially surpassing the largest affordable ratio under . However, it contradicts the fact that any feasible terminating budget must be at most — as Lemma 12 guarantees that a larger budget input to Algorithm 2 must always result in either exactly the same set or a different set with strictly higher objective value. Meanwhile, the terminating condition (Line 3 of Algorithm 1) ensures that the entire search process will promptly terminate once it finds the minimum budget that satisfies the constraint. Therefore, given budget already satisfies the constraint, it is impossible for the algorithm to terminate with a solution that has a higher budget than , which finishes the proof.
Appendix B Greedy Incentive Search
In contrast to Algorithm 1, one straightforward alternative is to adopt the vanilla greedy method to solve the problem in Eq. (3), as presented in Algorithm 3. The idea is to iteratively rank all non-selected clients according to their individual value-to-cost ratio and choose the one with the largest ratio (Line 3-4), until the resulting participant set satisfies the constraint (Line 2).
It is not difficult to verify this straightforward greedy algorithm is also monotonic, as decreasing a client’s claimed cost essentially encourages its selection, thus making it a truthful mechanism. One notable difference between this greedy incentive search algorithm and our truthful incentive search (Algorithm 1) is that it does not compromise for the constraint. As a result, as pointed out by previous studies (Wolsey, 1982), this greedy algorithm does not admit any constant-factor approximation guarantee (i.e., it becomes problem instance specific), as shown in Lemma 13.
Lemma 13 (Theorem 2 of Wolsey (1982))
Under parameter and clients’ reported participation cost , Algorithm 3 is guaranteed to obtain a participant set such that
in which where the denominator is the smallest non-zero marginal gain from adding any element to the intermediate set , i.e., the set contains the first elements of the output set , and the numerator is the largest singleton value of ; where is the total number of iterations in the greedy search and ; .
Alternatively, we can reformulate Algorithm 3 into an equivalent counterpart (Algorithm 4) that provides a bi-criteria approximation guarantee similar to Algorithm 1. Note that these two variants essentially lead to the same outcome when parameterized with and , where and are the specified hyper-parameters in Algorithm 3 and Algorithm 4, respectively.
Lemma 14
Proof of Lemma 14. The proof of this lemma largely repeats that of Lemma 9, with a minor difference in Eq. (7) (i.e., vs., ). Unlike Algorithm 1 slightly increasing the budget by a constant factor , Algorithm 4 increases the budget in a pre-ordered way based on the result of Algorithm 5. Similar to Eq. (7), the subscript is omitted, and we have
(11) |
Additionally, it is not difficult to see since this is the terminating condition of Algorithm 4. Combining both completes the proof.
Appendix C Technical Lemmas
Lemma 15 (Lemma 10 of Abbasi-Yadkori et al. (2011))
Suppose and for any , . Let for some . Then,
Lemma 16 (Lemma 11 of Abbasi-Yadkori et al. (2011))
Let be a sequence in , is a positive definite matrix and define . Then we have that
Further, if for all , then
Appendix D Proof of Lemma 7
Our proof utilizes the following matrix determinant lemma (Harville, 2008).
Lemma 17 (Matrix Determinant Lemma)
Let be an invertible n-by-n matrix, and are n-by-m matrices, we have that
Proof of Lemma 7. It is known that the infinite critical value is unavoidable for a monopoly client under the truthful mechanism design. To eliminate this issue, we first analyze the root cause of the existence of a monopoly client. Denote as the covariance matrix constructed by all sufficient statistics available in the system at time step , and , . Specifically, client is a monopoly, i.e., being essential to satisfy the constraint in Eq. (3) at time step , such that having all the other clients’ data still cannot satisfy the constraint. According to Lemma 17, plugging in and , we have
where , represents the number of new data points in . Next, we show that there exists a lower bound of the ratio above, such that as long as we set the hyper-parameter less than the lower bound, it is guaranteed that no client can be essential. Moreover, for a positive definite matrix , we have where denotes the minimum eigenvalue of . Plugging in , we have , where is the regularization parameter defined in Eq. (12). It follows that
where the second step holds by elementary algebra, the third step utilizes the fact that , and the last step follows from Lemma 15. Therefore, as long as we set , it is guaranteed that no client will be essential at time step . This finishes the proof.
Appendix E Communication Cost and Regret Analysis
As Truth-FedBan directly inherits from the basic protocol proposed in (Wei et al., 2023) with a truthful incentive mechanism, most part of the proof for communication cost and regret analysis (Theorem 4) in their paper extends to our problem setting. Therefore, with slight modifications, we can achieve the same sub-linear guarantee.
In essence, the only difference in terms of establishing the theoretical bounds for regret and communication cost between our method and (Wei et al., 2023) lies in the relaxation of the constraint in Eq. (3), which deviated from the original constraint in Eq. (1) by a constant-factor gap of . Moreover, as we reformulate the determinant ratio constraint (i.e., ) into a log determinant ratio constraint (i.e., ), the notion of in our work is slightly different from that in their work. Specifically, denote the hyper-parameter in their method as , then any used in their theoretical results can be replaced by our notation of via the transformation .
In the following, we present the corresponding theoretical results of our proposed Truth-FedBan and refer the readers to the proof details in Theorem 4 of (Wei et al., 2023).
Lemma 18 (Communication Frequency Bound)
By setting the communication threshold , the total number of communication rounds is upper bounded by
where .
Communication Cost:
In each communication round, all clients first upload scalars to the server and then download scalars. According to Lemma 18, the total communication cost is .
Lemma 19 (Instantaneous Regret Bound)
Given parameter , with probability , the instantaneous pseudo-regret in -th communication round is bounded by
Proof of Theorem 10. We followed the notion of good epoch and bad epoch defined in (Wang et al., 2020). Combining with Lemma 16, we can bound the accumulative regret in the good epochs as,
Furthermore, we can show that the regret across all bad epochs satisfies,
Using the communication threshold specified in Lemma 18, we have
Henceforth, by setting , we can show that , and therefore
This concludes the proof.
Appendix F General Framework for Incentivized Federated Bandits
Algorihtm 6 shows the incentivized communication protocol proposed by Wei et al. (2023). The arm selection strategy for client as time step is based on the upper confidence bound method:
(12) |
where is the ridge regression estimator of with regularization parameter , , and . denotes the covariance matrix constructed using the data available to client up to time .
Appendix G Implementation Details
G.1 Hyper-parameter Settings
As introduced in Section 3, the proposed Truth-FedBan works with any realization of the valuation function. For demonstration purpose, we instantiate it as a combination of client’s weighted data collection cost plus its intrinsic preference cost, i.e., , where , and each client ’s intrinsic preference cost is uniformly sampled from . In the simulated environment (Section 5), the time horizon is , total number of clients , context dimension . We set the hyper-parameter , in Algorithm 1 and Algorithm 3. The tolerance factor in Algorithm 7 is .
As stated in Section 4.2, we do not assume a monopoly-free environment and thus any truthful incentive mechanism has to pay essential clients infinite incentives to guarantee their participation when necessary. Nonetheless, to visualize the impact of infinite payment, we simplify it as a constant value of that is orders of magnitude greater than the average participation cost. and the infinite critical value is simplified.
G.2 Critical Value Calculation for Algorihtm 3
It is not difficult to show that Algorithm 3 is also monotone and thus inherently associated with a critical payment scheme to make the resulting mechanism truthful. We now elaborate on the critical value calculation method for it. And the critical value based payment scheme for Algorithm 1 can be derived in a similar spirit.
For each client in the participant set (subscript is omitted for simplicity), the critical value is determined as follows. First, rerun Algorithm 3 without client , i.e., setting ; if the process fails to terminate with a feasible set , it suggests that client is essential to satisfy the constraint, then its critical value is . Otherwise, the process can terminate and return a feasible set, denoted as , then the critical value is calculated by
(13) |
where and represent the selected client and intermediate set of at -th round. Denote , now suppose we are placing client at the -th position of . To do so, the maximal participation cost that client can claim should satisfy that the corresponding value-to-cost ratio is higher than that of client , i.e., . In other words, the maximal cost client can claim to replace is . Therefore, the critical value calculated in Eq. (13) ensures that as long as the client claims slightly less than , it can replace at least one client in the rounds, thus becomes selected by the server. On the contrary, if is higher than , we can show that it will by no means get selected by the server. Specifically, the condition guarantees . We can start from the selection of the first client , and we want to guarantee client will not be selected. The condition tells us , where denotes the client that was selected in the first place when we exclude . We know is also higher than all the other clients, so algorithm will still select client , i.e., . Then for , the condition suggests . Therefore, will not be selected at either, and . We can show client will not be selected in by induction.
G.3 Critical Value Calculation for Algorihtm 1
In contrast, there is no explicit formula to calculate the critical value in Truth-FedBan. Following Mu’Alem & Nisan (2008), we calculate the critical value using bisection search as described in Algorithm 7.
The idea remains the same as stated above, to calculate the critical value of a particular client, we first rerun Algorithm 1 without it in the candidate client set. If the client is essential, its critical value is . Otherwise, we can calculate the critical value via Algorithm 7. Specifically, for any participant in the set found by Algorithm 1, it is clear that the bound of ’s critical value is its claimed cost , otherwise it would not have been included in . Denote as the terminating budget determined by Algorithm 1 when client is not considered, we can also have a upper bound for . With the lower and upper bound as input to Algorithm 7, it has been proven (Burden et al., 2015) that the number of iterations that Algorithm 7 needs to converge to a root to within a certain tolerance is bounded by , where .
Appendix H Time Complexity Analysis of Algorithm 1
As the proposed Algorithm 1 includes a subroutine process of Algorithm 2, thus we start the time complexity analysis with Algorithm 2. Specifically, the worst-case time complexity of the while loop is . The operation inside the while loop involves finding the maximum element in a set, which takes time. Therefore, the time complexity of Algorithm 2 is .
Let be the number of iterations of the while loop (Line 3) in Algorithm 1. Hence, the time complexity of Algorithm 1 is . Specifically, the worst case is to consistently increase the budget until it reaches . Therefore, we can upper bound by considering the loop-breaking case: , i.e., , where . As a result, Algorithm 1 yields the following polynomial time complexity of .