Censoring Representations with an Adversary
نویسندگان
چکیده
In practice, there are often explicit constraints on what representations or decisions are acceptable in an application of machine learning. For example it may be a legal requirement that a decision must not favour a particular group. Alternatively it can be that that representation of data must not have identifying information. We address these two related issues by learning flexible representations that minimize the capability of an adversarial critic. This adversary is trying to predict the relevant sensitive variable from the representation, and so minimizing the performance of the adversary ensures there is little or no information in the representation about the sensitive variable. We demonstrate this adversarial approach on two problems: making decisions free from discrimination and removing private information from images. We formulate the adversarial model as a minimax problem, and optimize that minimax objective using a stochastic gradient alternate min-max optimizer. We demonstrate the ability to provide discriminant free representations for standard test problems, and compare with previous state of the art methods for fairness, showing statistically significant improvement across most cases. The flexibility of this method is shown via a novel problem: removing annotations from images, from separate training examples of annotated and unannotated images, and with no a priori knowledge of the form of annotation provided to the model.
منابع مشابه
Bootstrapping Communications into an Anti-Censorship System
Adversary-resistant communication bootstrapping is a fundamental problem faced by many circumvention (anti-censorship) systems such as Tor. Censoring regimes actively harvest and block published Tor entry points and bridge nodes. More recently, some countries have resorted to reactive (follow-up) probing of the destination hosts of outbound encrypted traffic to identify unpublished Tor nodes. W...
متن کاملNonparametric estimation of the multivariate distribution function in a censored regression model with applications
In a regression model with univariate censored responses, a new estimator of the joint distribution function of the covariates and response is proposed, under the assumption that the response and the censoring variable are independent conditionally to the covariates. This estimator is based on the conditional Kaplan-Meier estimator of Beran (1981), and happens to be an extension of the multivar...
متن کاملComputational Complexity of Reliability/Security in Colored Networks and Privacy Preserving Censorship
Dolev-Dwork-Waarts-Yung linked research on reliable point-to-point networks with privacy and authenticity. In their threat model the adversary can only take over a number of nodes bounded by a threshold k. Hirt-Maurer introduced the concept of an adversary structure (i.e. the complement of an access structure). KumarGoundan-Srinathan-Rangan and Desmedt-Wang-Burmester generalized Dolev-DworkWaar...
متن کاملModeling and Inferential Thoughts for Consecutive Gap Times Observed with Death and Censoring
In the perspective of biomedical applications, consider a re- current event situation with a relatively low degree of recurrence. In this setting, the focus is placed on successive inter-event gap times which are observed in the presence of both a terminal event like death and inde- pendent censoring. The terminal event is potentially related to recurrent events while the censoring process is a...
متن کاملActive Protocols for Agile, Censor-Resistant Networks
In this paper we argue that content distribution in the face of censorship is a compelling and feasible application of active networking. In the face of a determined and powerful adversary, every fixed protocol can become known and subsequently monitored, blocked, or its member nodes identified and attacked. Frequent and diverse protocol change is key to allowing information to continue to flow...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1511.05897 شماره
صفحات -
تاریخ انتشار 2015