Dynamic Free-Rider Detection in Federated Learning via Simulated Attack Patterns
arXiv cs.LG / 4/7/2026
📰 NewsIdeas & Deep AnalysisModels & Research
Key Points
- Federated learning is vulnerable to free-riders—clients that send fake updates without training—and existing WEF-based detection can miss dynamic free-riders that switch behavior later in training.
- The paper proposes S2-WEF, a server-side simulation method that recreates WEF patterns expected under global-model-mimicking attacks using previously broadcast global models.
- S2-WEF detects suspicious clients by matching similarity between a client’s observed WEF patterns and simulated attack patterns, then augments this with deviation scoring via mutual comparisons among submitted WEFs.
- It distinguishes benign from free-rider clients using two-dimensional clustering and per-score classification, targeting dynamic transitions during training.
- Experiments on three datasets and five attack types show S2-WEF is more robust than prior approaches, while still avoiding proxy datasets and pre-training.
Related Articles

Meta Superintelligence Lab Releases Muse Spark: A Multimodal Reasoning Model With Thought Compression and Parallel Agents
MarkTechPost

Chatbots are great at manipulating people to buy stuff, Princeton boffins find
The Register

Big Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.
Dev.to
v0.20.5
Ollama Releases

Charades-Ego: A Large-Scale Dataset of Paired Third and First Person Videos
Dev.to