Ethical Adversaries

نویسندگان

چکیده

Machine learning is being integrated into a growing number of critical systems with far-reaching impacts on society. Unexpected behaviour and unfair decision processes are coming under increasing scrutiny due to this widespread use its theoretical considerations. Individuals, as well organisations, notice, test, criticize results hold model designers deployers accountable. We offer framework that assists these groups in mitigating representations stemming from the training datasets. Our relies two inter-operating adversaries improve fairness. First, trained goal preventing guessing protected attributes' values while limiting utility losses. This first step optimizes model's parameters for Second, leverages evasion attacks adversarial machine generate new examples will be misclassified. These then used retrain step. steps iteratively applied until significant improvement fairness obtained. evaluated our well-studied datasets literature - including COMPAS where it can surpass other approaches concerning demographic parity, equality opportunity also utility. investigated trade-offs between targets terms hyperparameters illustrated findings subtle difficulties when unfairness highlight how assist designers.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Keeping Ahead of Our Adversaries

EVERY SOFTWARE SYSTEM is potentially vulnerable in ways that aren’t always imagined during development. For example, pacemakers and implantable cardioverterde brillators (ICDs), which monitor and regulate cardiac rhythms, typically provide wireless access to healthcare providers so that they can modify settings and collect telemetry. However, a malicious user could transmit commands to ICDs to ...

متن کامل

Tiny Groups Tackle Byzantine Adversaries

A popular technique for tolerating malicious faults in open distributed systems is to establish small groups of participants, each of which has a non-faulty majority. These groups are used as building blocks to design attack-resistant algorithms. Despite over a decade of active research, current constructions require group sizes of O(logn), where n is the number of participants in the system. T...

متن کامل

Witness-Indistinguishability Against Quantum Adversaries

Proof systems are a central concept in complexity theory and cryptography. Zero-knowledge and witnessindistinguishability are useful security properties of proof systems. Considering the increased power of quantum computation, it comes as a natural question to understand what happens to these security properties when quantum computation becomes feasible. Zero-knowledge [GMR89] is the security p...

متن کامل

Repeated Games against Budgeted Adversaries

We study repeated zero-sum games against an adversary on a budget. Given that an adversary has some constraint on the sequence of actions that he plays, we consider what ought to be the player’s best mixed strategy with knowledge of this budget. We show that, for a general class of normal-form games, the minimax strategy is indeed efficiently computable and relies on a “random playout” techniqu...

متن کامل

Repeated Games against Budgeted Adversaries

We study repeated zero-sum games against an adversary on a budget. Given that an adversary is constrained by the amount he can play each action, we consider what ought to be the player’s best mixed strategy with knowledge of this budget. We show that, for a general class of normal-form games, the minimax strategy is indeed efficiently computable and relies on a simple random walk.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SIGKDD explorations

سال: 2021

ISSN: ['1931-0153', '1931-0145']

DOI: https://doi.org/10.1145/3468507.3468513