Table 3.
The attack probabilities of four defense methods under different numbers of poisoners
Defense methods | Number of poisoners |
||||
---|---|---|---|---|---|
One | Two | Three | Four | Five | |
Trimmed mean [15] | 0.9608 | 0.9324 | 0.9134 | 0.8942 | 0.8721 |
Krum [16] | 0.9576 | 0.9576 | 0.9576 | 0.8610 | 0.8520 |
Median [17] | 0.9423 | 0.9423 | 0.9423 | 0.9024 | 0.8512 |
Variant of our defense strategy (without evidence of clustering) | 0.9615 | 0.9584 | 0.9460 | 0.9233 | 0.9135 |
Variant of our defense strategy (without evidence of upload frequency) | 0.9621 | 0.9593 | 0.9463 | 0.9245 | 0.9087 |
Variant of our defense strategy (without evidence of historical trust) | 0.9623 | 0.9597 | 0.9477 | 0.9217 | 0.9063 |
Our defense strategy (three evidences) | 0.9627 | 0.9632 | 0.9640 | 0.9631 | 0.9512 |