Learning with stochastic inputs and adversarial outputs
نویسندگان
چکیده
Most of the research in online learning is focused either on the problem of adversarial classification (i.e., both inputs and labels are arbitrarily chosen by an adversary) or on the traditional supervised learning problem in which samples are independent and identically distributed according to a stationary probability distribution. Nonetheless, in a number of domains the relationship between inputs and outputs may be adversarial, whereas input instances are i.i.d. from a stationary distribution (e.g., user preferences). This scenario can be formalized as a learning problem with stochastic inputs and adversarial outputs. In this paper, we introduce this novel stochastic-adversarial learning setting and we analyze its learnability. In particular, we show that in binary classification, given a hypothesis space H with finite VC-dimension, it is possible to design an algorithm which incrementally builds a suitable finite set of hypotheses from H used as input for an exponentially weighted forecaster and achieves a cumulative regret of order O( √ nV C(H) log n) with overwhelming probability. This result shows that whenever inputs are i.i.d. it is possible to solve any binary classification problem using a finite VCdimension hypothesis space with a sub-linear regret independently from the way labels are generated (either stochastic or adversarial). We also discuss extensions to multi-label classification, regression, learning from experts and bandit settings with stochastic side information, and application to games.
منابع مشابه
A new approach based on alpha cuts for solving data envelopment analysis model with fuzzy stochastic inputs and outputs
Data Envelopment Analysis (DEA) is a widely used technique for measuring the relative efficiencies of homogenous Decision Making Units (DMUs) with multiple inputs and multiple outputs. These factors may be evaluated in fuzzy or stochastic environment. Hence, the classic structures of DEA model may be changed where in two fold fuzzy stochastic environment. For instances, linearity, feasibility a...
متن کاملHybrid Stochastic-Adversarial On-line Learning
Most of the research in online learning focused either on the problem of adversarial classification (i.e., both inputs and labels are arbitrarily chosen by an adversary) or on the traditional supervised learning problem in which samples are independently generated from a fixed probability distribution. Nonetheless, in a number of domains the relationship between inputs and labels may be adversa...
متن کاملA generalized super-efficiency model for ranking extreme efficient DMUs in stochastic DEA
In this current study a generalized super-efficiency model is first proposed for ranking extreme efficient decision making units (DMUs) in stochastic data envelopment analysis (DEA) and then, a deterministic (crisp) equivalent form of the stochastic generalized super-efficiency model is presented. It is shown that this deterministic model can be converted to a quadratic programming model. So fa...
متن کاملPractical Black-Box Attacks against Deep Learning Systems using Adversarial Examples
Machine learning (ML) models, e.g., deep neural networks (DNNs), are vulnerable to adversarial examples: malicious inputs modified to yield erroneous model outputs, while appearing unmodified to human observers. Potential attacks include having malicious content like malware identified as legitimate or controlling vehicle behavior. Yet, all existing adversarial example attacks require knowledge...
متن کاملComparing the Efficiency of Dmus with Normal and Skew-Normal Distribution using Data Envelopment Analysis
Data envelopment analysis (DEA) is a nonparametric approach to evaluate theefficiency of decision making units (DMU) using mathematical programmingtechniques. Almost, all of the previous researches in stochastic DEA have been usedthe stochastic data when the inputs and outputs are normally distributed. But, thisassumption may not be true in practice. Therefore, using a normal distribution wi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Comput. Syst. Sci.
دوره 78 شماره
صفحات -
تاریخ انتشار 2012