Freiesleben et al., 2023 - Google Patents
Beyond generalization: a theory of robustness in machine learningFreiesleben et al., 2023
View HTML- Document ID
- 7143893114509980542
- Author
- Freiesleben T
- Grote T
- Publication year
- Publication venue
- Synthese
External Links
Snippet
The term robustness is ubiquitous in modern Machine Learning (ML). However, its meaning varies depending on context and community. Researchers either focus on narrow technical definitions, such as adversarial robustness, natural distribution shifts, and performativity, or …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Freiesleben et al. | Beyond generalization: a theory of robustness in machine learning | |
Meng et al. | Interpretability and fairness evaluation of deep learning models on MIMIC-IV dataset | |
Ntoutsi et al. | Bias in data‐driven artificial intelligence systems—An introductory survey | |
Ramotsoela et al. | Attack detection in water distribution systems using machine learning | |
Bolón-Canedo et al. | Feature selection for high-dimensional data | |
Fahse et al. | Managing bias in machine learning projects | |
Woods et al. | Adversarial explanations for understanding image classification decisions and improved neural network robustness | |
ElShawi et al. | ILIME: local and global interpretable model-agnostic explainer of black-box decision | |
Chen et al. | Amplifying membership exposure via data poisoning | |
Singh et al. | Responsibility & machine learning: Part of a process | |
Morales-Forero et al. | Toward safe AI | |
Shah et al. | A Comprehensive Review of Bias in Deep Learning Models: Methods, Impacts, and Future Directions | |
Sun et al. | A novel belief rule base expert system with interval-valued references | |
Shezan et al. | TKPERM: cross-platform permission knowledge transfer to detect overprivileged third-party applications | |
Chander et al. | Toward trustworthy artificial intelligence (TAI) in the context of explainability and robustness | |
Meher et al. | Deep learning-based software bug classification | |
Baylon et al. | Securing machine learning algorithms | |
Hartley et al. | Neural networks memorise personal information from one sample | |
Mao et al. | Probabilistic inference on integrity for access behavior based malware detection | |
Kapoor et al. | Platform and Model Design for Responsible AI: Design and build resilient, private, fair, and transparent machine learning models | |
Al-Maliki et al. | Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally | |
Purificato et al. | Toward a responsible fairness analysis: from binary to multiclass and multigroup assessment in graph neural network-based user modeling tasks | |
Grover et al. | Keeping it Low-Key: Modern-Day Approaches to Privacy-Preserving Machine Learning | |
Risse et al. | How to compare adversarial robustness of classifiers from a global perspective | |
Krafft et al. | Black-Box Testing and Auditing of Bias in ADM Systems |