Auditing black-box models for indirect influence

被引:125
作者
Adler, Philip [1 ]
Falk, Casey [1 ]
Friedler, Sorelle A. [1 ]
Nix, Tionney [1 ]
Rybeck, Gabriel [1 ]
Scheidegger, Carlos [2 ]
Smith, Brandon [1 ]
Venkatasubramanian, Suresh [3 ]
机构
[1] Haverford Coll, Dept Comp Sci, Haverford, PA 19041 USA
[2] Univ Arizona, Dept Comp Sci, Tucson, AZ 85721 USA
[3] Univ Utah, Dept Comp Sci, Salt Lake City, UT 84112 USA
基金
美国国家科学基金会;
关键词
Black-box auditing; ANOVA; Algorithmic accountability; Deep learning; Discrimination-aware data mining; Feature influence; Interpretable machine learning;
D O I
10.1007/s10115-017-1116-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data-trained predictive models see widespread use, but for the most part they are used as black boxes which output a prediction or score. It is therefore hard to acquire a deeper understanding of model behavior and in particular how different features influence the model prediction. This is important when interpreting the behavior of complex models or asserting that certain problematic attributes (such as race or gender) are not unduly influencing decisions. In this paper, we present a technique for auditing black-box models, which lets us study the extent to which existing models take advantage of particular features in the data set, without knowing how the models work. Our work focuses on the problem of indirect influence: how some features might indirectly influence outcomes via other, related features. As a result, we can find attribute influences even in cases where, upon further direct examination of the model, the attribute is not referred to by the model at all. Our approach does not require the black-box model to be retrained. This is important if, for example, the model is only accessible via an API, and contrasts our work with other methods that investigate feature influence such as feature selection. We present experimental evidence for the effectiveness of our procedure using a variety of publicly available data sets and models. We also validate our procedure using techniques from interpretable learning and feature selection, as well as against other black-box auditing procedures. To further demonstrate the effectiveness of this technique, we use it to audit a black-box recidivism prediction algorithm.
引用
收藏
页码:95 / 122
页数:28
相关论文
共 50 条
[21]   DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection [J].
Li, Yuanchun ;
Hua, Liayi ;
Wang, Haoyu ;
Chen, Chunyang ;
Liu, Yunxin .
2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, :263-274
[22]   Explaining the black-box smoothly-A counterfactual approach [J].
Singla, Sumedha ;
Eslami, Motahhare ;
Pollack, Brian ;
Wallace, Stephen ;
Batmanghelich, Kayhan .
MEDICAL IMAGE ANALYSIS, 2023, 84
[23]   DIFFERENTIABLE SIGNAL PROCESSING WITH BLACK-BOX AUDIO EFFECTS [J].
Ramirez, Marco A. Martinez ;
Wang, Oliver ;
Smaragdis, Paris ;
Bryan, Nicholas J. .
2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, :66-70
[24]   Physical Black-Box Adversarial Attacks Through Transformations [J].
Jiang, Wenbo ;
Li, Hongwei ;
Xu, Guowen ;
Zhang, Tianwei ;
Lu, Rongxing .
IEEE TRANSACTIONS ON BIG DATA, 2023, 9 (03) :964-974
[25]   Deep Learning for Black-Box Modeling of Audio Effects [J].
Ramirez, Marco A. Martinez ;
Benetos, Emmanouil ;
Reiss, Joshua D. .
APPLIED SCIENCES-BASEL, 2020, 10 (02)
[26]   An Effective Way to Boost Black-Box Adversarial Attack [J].
Feng, Xinjie ;
Yao, Hongxun ;
Che, Wenbin ;
Zhang, Shengping .
MULTIMEDIA MODELING (MMM 2020), PT I, 2020, 11961 :393-404
[27]   A review of black-box adversarial attacks on image classification [J].
Zhu, Yanfei ;
Zhao, Yaochi ;
Hu, Zhuhua ;
Luo, Tan ;
He, Like .
NEUROCOMPUTING, 2024, 610
[28]   Adaptive hyperparameter optimization for black-box adversarial attack [J].
Zhenyu Guan ;
Lixin Zhang ;
Bohan Huang ;
Bihe Zhao ;
Song Bian .
International Journal of Information Security, 2023, 22 :1765-1779
[29]   Fairness improvement for black-box classifiers with Gaussian process [J].
Dang Nguyen ;
Gupta, Sunil ;
Rana, Santu ;
Shilton, Alistair ;
Venkatesh, Svetha .
INFORMATION SCIENCES, 2021, 576 :542-556
[30]   Black-Box Adversarial Attack via Overlapped Shapes [J].
Williams, Phoenix ;
Li, Ke ;
Min, Geyong .
PROCEEDINGS OF THE 2022 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION, GECCO 2022, 2022, :467-468