Skip to main content
Erschienen in:
Buchtitelbild

2020 | OriginalPaper | Buchkapitel

Certified Machine-Learning Models

verfasst von : Ernesto Damiani, Claudio A. Ardagna

Erschienen in: SOFSEM 2020: Theory and Practice of Computer Science

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The massive adoption of Machine Learning (ML) has deeply changed the internal structure, the design and the operation of software systems. ML has shifted the focus from code to data, especially in application areas where it is easier to collect samples that embody correct solutions to individual instances of a problem, than to design and code a deterministic algorithm solving it for all instances. There is an increasing awareness of the need to verify key non-functional properties of ML-based software applications like fairness and privacy. However, the traditional approach trying to verify these properties by code inspection is pointless, since ML models’ behavior mostly depends on the data and parameters used to train them. Classic software certification techniques cannot solve the issue as well. The Artificial Intelligence (AI) community has been working on the idea of preventing undesired behavior by controlling a priori the ML models’ training sets and parameters. In this paper, we take a different, online approach to ML verification, where novel behavioral monitoring techniques based on statistical testing are used to support a dynamic certification framework enforcing the desired properties on black-box ML models in operation. Our aim is to deliver a novel framework suitable for practical certification of distributed ML-powered applications in heavily regulated domains like transport, energy, healthcare, even when the certifying authority is not privy to the model training. To achieve this goal, we rely on three key ideas: (i) use test suites to define desired non-functional properties of ML models, (ii) Use statistical monitoring of ML models’ behavior at inference time to check that the desired behavioral properties are achieved, and (iii) compose monitors’ outcome within dynamic, virtual certificates for composite software applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mitkov, R.: Anaphora resolution: the state of the art. School of Languages and European Studies, University of Wolverhampton, pp. 1–34 (1999) Mitkov, R.: Anaphora resolution: the state of the art. School of Languages and European Studies, University of Wolverhampton, pp. 1–34 (1999)
2.
Zurück zum Zitat Lewis, B.: In the game: the interface between Watson and Jeopardy! IBM J. Res. Dev. 56(34), 171–176 (2012)CrossRef Lewis, B.: In the game: the interface between Watson and Jeopardy! IBM J. Res. Dev. 56(34), 171–176 (2012)CrossRef
3.
Zurück zum Zitat Dafoe, A.: AI Governance: A Research Agenda. Governance of AI Program, Future of Humanity Institute, University of Oxford, Oxford, UK (2018) Dafoe, A.: AI Governance: A Research Agenda. Governance of AI Program, Future of Humanity Institute, University of Oxford, Oxford, UK (2018)
4.
Zurück zum Zitat Guizzardi, R., Li, F.-L., Borgida, A., Mylopoulos, J.: An ontological interpretation of non-functional requirements. In: Frontiers in Artificial Intelligence and Applications, Proceedings of the 8th International Conference on Formal Ontology in Information Systems (FOIS) (2014) Guizzardi, R., Li, F.-L., Borgida, A., Mylopoulos, J.: An ontological interpretation of non-functional requirements. In: Frontiers in Artificial Intelligence and Applications, Proceedings of the 8th International Conference on Formal Ontology in Information Systems (FOIS) (2014)
5.
Zurück zum Zitat Kesner, R.P., Gilbert, P.E., Wallenstein, G.V.: Testing neural network models of memory with behavioral experiments. Curr. Opin. Neurobiol. 10(2), 260–265 (2000)CrossRef Kesner, R.P., Gilbert, P.E., Wallenstein, G.V.: Testing neural network models of memory with behavioral experiments. Curr. Opin. Neurobiol. 10(2), 260–265 (2000)CrossRef
6.
Zurück zum Zitat Schelter, S., Böse, J.-H., Kirschnick, J., Klein, T., Seufert, S.: Automatically tracking metadata and provenance of machine learning experiments. In: Proceedings of Workshop on ML Systems at NIPS 2017, Long Beach, CA, USA (2017) Schelter, S., Böse, J.-H., Kirschnick, J., Klein, T., Seufert, S.: Automatically tracking metadata and provenance of machine learning experiments. In: Proceedings of Workshop on ML Systems at NIPS 2017, Long Beach, CA, USA (2017)
7.
Zurück zum Zitat Ardagna, C.A., Bellandi, V., Bezzi, M., Ceravolo, P., Damiani, E., Hebert, C.: Model-based big data analytics-as-a-service. Take Big Data to the Next Level. IEEE Transactions on Services Computing (Early Access) (2018) Ardagna, C.A., Bellandi, V., Bezzi, M., Ceravolo, P., Damiani, E., Hebert, C.: Model-based big data analytics-as-a-service. Take Big Data to the Next Level. IEEE Transactions on Services Computing (Early Access) (2018)
8.
Zurück zum Zitat Redavid, D., et al.: Semantic support for model based big data analytics-as-a-service (MBDAaaS). In: Proceedings of 12th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2018), pp. 1012–1021, Matsue, Japan (2018) Redavid, D., et al.: Semantic support for model based big data analytics-as-a-service (MBDAaaS). In: Proceedings of 12th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2018), pp. 1012–1021, Matsue, Japan (2018)
9.
Zurück zum Zitat Di Martino, B., Esposito, A., Damiani, E.: Towards AI-powered multiple cloud management. IEEE Internet Comput. 23(1), 64–71 (2019)CrossRef Di Martino, B., Esposito, A., Damiani, E.: Towards AI-powered multiple cloud management. IEEE Internet Comput. 23(1), 64–71 (2019)CrossRef
10.
Zurück zum Zitat Khosravi, P., Liang, Y., Choi, Y., Van den Broeck, G.: What to expect of classifiers? reasoning about logistic regression with missing features. In: Proceedings of the ICML Workshop on Tractable Probabilistic Modeling (TPM), pp. 2716–2724, Macao, China (2019) Khosravi, P., Liang, Y., Choi, Y., Van den Broeck, G.: What to expect of classifiers? reasoning about logistic regression with missing features. In: Proceedings of the ICML Workshop on Tractable Probabilistic Modeling (TPM), pp. 2716–2724, Macao, China (2019)
11.
Zurück zum Zitat Biggio, B., Roli, F.: Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recogn. 84, 317–331 (2018)CrossRef Biggio, B., Roli, F.: Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recogn. 84, 317–331 (2018)CrossRef
12.
Zurück zum Zitat Bryson, J., Winfield, A.: Standardizing ethical design for artificial intelligence and autonomous systems. Computer 50(5), 116–119 (2017)CrossRef Bryson, J., Winfield, A.: Standardizing ethical design for artificial intelligence and autonomous systems. Computer 50(5), 116–119 (2017)CrossRef
13.
Zurück zum Zitat Morley, J., Floridi, L., Kinsey, L., Elhalal, A.: From What to How: An Overview of AI Ethics Tools, Methods and Research to Translate Principles into Practices (2019). arXiv:1905.06876v1 Morley, J., Floridi, L., Kinsey, L., Elhalal, A.: From What to How: An Overview of AI Ethics Tools, Methods and Research to Translate Principles into Practices (2019). arXiv:​1905.​06876v1
14.
Zurück zum Zitat McNamara, D., Soon Ong, C., Williamson, R.C.: Costs and benefits of fair representation learning. In: Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, pp. 263–270, ACM, Honolulu, HI, USA (2019) McNamara, D., Soon Ong, C., Williamson, R.C.: Costs and benefits of fair representation learning. In: Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, pp. 263–270, ACM, Honolulu, HI, USA (2019)
15.
Zurück zum Zitat Adel, T., Valera, I., Ghahramani, Z., Weller, A.: One-network adversarial fairness. In: Proceedings of 33rd AAAI Conference on Artificial Intelligence, Honolulu, HI, USA (2019) Adel, T., Valera, I., Ghahramani, Z., Weller, A.: One-network adversarial fairness. In: Proceedings of 33rd AAAI Conference on Artificial Intelligence, Honolulu, HI, USA (2019)
16.
Zurück zum Zitat Raff, E., Sylvester, J., Mills, S.: Fair forests: regularized tree induction to minimize model bias. In: Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, pp. 243–250, ACM, New Orleans, LA (2018) Raff, E., Sylvester, J., Mills, S.: Fair forests: regularized tree induction to minimize model bias. In: Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, pp. 243–250, ACM, New Orleans, LA (2018)
17.
Zurück zum Zitat Madras, D., Creager, E., Pitassi, T., Zemel, R.: Fairness through causal awareness: learning causal latent-variable models for biased data. In: Proceedings of the ACM Conference on Fairness, Accountability, and Transparency, pp. 349–358, ACM, Atlanta, GA (2019) Madras, D., Creager, E., Pitassi, T., Zemel, R.: Fairness through causal awareness: learning causal latent-variable models for biased data. In: Proceedings of the ACM Conference on Fairness, Accountability, and Transparency, pp. 349–358, ACM, Atlanta, GA (2019)
18.
Zurück zum Zitat Rafael, Y., et al.: Four ethical priorities for neurotechnologies and AI. Nat. News 551(7679), 159 (2017)CrossRef Rafael, Y., et al.: Four ethical priorities for neurotechnologies and AI. Nat. News 551(7679), 159 (2017)CrossRef
19.
Zurück zum Zitat Morris, J., Lee, G., Parker, K., Bundell, G.A., Lam, C.P.: Software component certification. Computer 34(9), 30–36 (2001)CrossRef Morris, J., Lee, G., Parker, K., Bundell, G.A., Lam, C.P.: Software component certification. Computer 34(9), 30–36 (2001)CrossRef
20.
Zurück zum Zitat Damiani, E., Manã, A.: Toward ws-certificate. In: Proceedings of the 2009 ACM Workshop on Secure Web Services, pp. 1–2, ACM, Chicago, IS, USA (2009) Damiani, E., Manã, A.: Toward ws-certificate. In: Proceedings of the 2009 ACM Workshop on Secure Web Services, pp. 1–2, ACM, Chicago, IS, USA (2009)
22.
Zurück zum Zitat Spanoudakis, G., Damiani, E., Maña, A.: Certifying services in cloud: the case for a hybrid, incremental and multi-layer approach. In: Proceedings of IEEE 14th International Symposium on High-Assurance Systems Engineering (HASE 2012), pp. 175–176, IEEE, Singapore (2012) Spanoudakis, G., Damiani, E., Maña, A.: Certifying services in cloud: the case for a hybrid, incremental and multi-layer approach. In: Proceedings of IEEE 14th International Symposium on High-Assurance Systems Engineering (HASE 2012), pp. 175–176, IEEE, Singapore (2012)
23.
Zurück zum Zitat Anisetti, M., Ardagna, C.A., Damiani, E., Polegri, G.: Test-based security certification of composite services. ACM Trans. Web (TWEB) 13(1), 3 (2019) Anisetti, M., Ardagna, C.A., Damiani, E., Polegri, G.: Test-based security certification of composite services. ACM Trans. Web (TWEB) 13(1), 3 (2019)
24.
Zurück zum Zitat Méry, D., Kumar Singh, N.: Trustable formal specification for software certification. In: Proceedings of Symposium on Leveraging Applications of Formal Methods, Verification and Validation, 2010. Lecture Notes in Computer Science, vol. 6416, pp. 312–326 (2010) Méry, D., Kumar Singh, N.: Trustable formal specification for software certification. In: Proceedings of Symposium on Leveraging Applications of Formal Methods, Verification and Validation, 2010. Lecture Notes in Computer Science, vol. 6416, pp. 312–326 (2010)
25.
Zurück zum Zitat Denney, E., Pai, G.: Evidence arguments for using formal methods in software certification. In: Proceedings of IEEE Symposium on Software Reliability Engineering (ISSRE), pp. 375–380, IEEE, Pasadena, CA, USA (2013) Denney, E., Pai, G.: Evidence arguments for using formal methods in software certification. In: Proceedings of IEEE Symposium on Software Reliability Engineering (ISSRE), pp. 375–380, IEEE, Pasadena, CA, USA (2013)
26.
Zurück zum Zitat Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Proceedings of CAV 2005: Computer Aided Verification. Lecture Notes in Computer Science, vol. 3576, pp. 281–285 (2005)CrossRef Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Proceedings of CAV 2005: Computer Aided Verification. Lecture Notes in Computer Science, vol. 3576, pp. 281–285 (2005)CrossRef
27.
Zurück zum Zitat Clarkson, M.R., Schneider, F.B.: Hyperproperties. J. Comput. Secur. 18(6), 1157–1210 (2010)CrossRef Clarkson, M.R., Schneider, F.B.: Hyperproperties. J. Comput. Secur. 18(6), 1157–1210 (2010)CrossRef
28.
Zurück zum Zitat Datta, A., Franklin, J., Garg, D., Jia, L., Kaynar, D.: On adversary models and compositional security. IEEE Secur. Priv. 9(3), 26–32 (2011)CrossRef Datta, A., Franklin, J., Garg, D., Jia, L., Kaynar, D.: On adversary models and compositional security. IEEE Secur. Priv. 9(3), 26–32 (2011)CrossRef
29.
Zurück zum Zitat Fuchs, A., Gürgens, S.: Preserving confidentiality in component compositions. In: Proceedings of International Conference on Software Composition. Lecture Notes in Computer Science, vol. 8088, pp. 33–48 (2013)CrossRef Fuchs, A., Gürgens, S.: Preserving confidentiality in component compositions. In: Proceedings of International Conference on Software Composition. Lecture Notes in Computer Science, vol. 8088, pp. 33–48 (2013)CrossRef
30.
Zurück zum Zitat Mellado, D., Fernández-Medina, E., Piattini, M.: A common criteria based security requirements engineering process for the development of secure information systems. Comput. Stan. Interfaces 29(2), 244–253 (2007)CrossRef Mellado, D., Fernández-Medina, E., Piattini, M.: A common criteria based security requirements engineering process for the development of secure information systems. Comput. Stan. Interfaces 29(2), 244–253 (2007)CrossRef
31.
Zurück zum Zitat Scott, S.L.: Multi-armed bandit experiments in the online service economy. Appl. Stochast. Models Bus. Ind. 31, 37–49 (2015)MathSciNetCrossRef Scott, S.L.: Multi-armed bandit experiments in the online service economy. Appl. Stochast. Models Bus. Ind. 31, 37–49 (2015)MathSciNetCrossRef
32.
Zurück zum Zitat Leite, R., Pavel, B., Vanschoren, J,: Selecting classification algorithms with active testing. In: Proceedings of MLDM 2012: Machine Learning and Data Mining in Pattern Recognition. Lecture Notes in Computer Science, vol. 7376, pp. 117–131 (2012)CrossRef Leite, R., Pavel, B., Vanschoren, J,: Selecting classification algorithms with active testing. In: Proceedings of MLDM 2012: Machine Learning and Data Mining in Pattern Recognition. Lecture Notes in Computer Science, vol. 7376, pp. 117–131 (2012)CrossRef
34.
Zurück zum Zitat Menke, J., Martinez, T.R.: Using permutations instead of student’s t distribution for p-values in paired-difference algorithm comparisons. In: Proceedings of 2004 IEEE International Joint Conference on Neural Networks, vol. 2, pp. 1331–1335, IEEE, Budapest, Hungary (2004) Menke, J., Martinez, T.R.: Using permutations instead of student’s t distribution for p-values in paired-difference algorithm comparisons. In: Proceedings of 2004 IEEE International Joint Conference on Neural Networks, vol. 2, pp. 1331–1335, IEEE, Budapest, Hungary (2004)
36.
Zurück zum Zitat Damiani, E., Tettamanzi, A., Liberali, V.: On-line evolution of FPGA-based circuits: a case study on hash functions. In: Proceedings of the First NASA/DoD Workshop on Evolvable Hardware, pp. 26–33, IEEE, Pasadena, CA, USA (1999) Damiani, E., Tettamanzi, A., Liberali, V.: On-line evolution of FPGA-based circuits: a case study on hash functions. In: Proceedings of the First NASA/DoD Workshop on Evolvable Hardware, pp. 26–33, IEEE, Pasadena, CA, USA (1999)
37.
Zurück zum Zitat Brennet, T., Dieterich, W., Ehret, B.: Evaluating the predictive validity of the COMPAS risk and needs assessment system. Crim. Justice Behav. 36(1), 21–40 (2008) Brennet, T., Dieterich, W., Ehret, B.: Evaluating the predictive validity of the COMPAS risk and needs assessment system. Crim. Justice Behav. 36(1), 21–40 (2008)
38.
Zurück zum Zitat Lai, T.L., Robbins, H.: Asymptotically efficient adaptive allocation rules. Adv. Appl. Math. 6(1), 4–22 (1985)MathSciNetCrossRef Lai, T.L., Robbins, H.: Asymptotically efficient adaptive allocation rules. Adv. Appl. Math. 6(1), 4–22 (1985)MathSciNetCrossRef
39.
Zurück zum Zitat Corbett-Davies, S., Pierson, E., Feller, A., Goel, S., Huq, A.: Algorithmic decision making and the cost of fairness. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 797–806, ACM, Halifax, NS, Canada (2017) Corbett-Davies, S., Pierson, E., Feller, A., Goel, S., Huq, A.: Algorithmic decision making and the cost of fairness. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 797–806, ACM, Halifax, NS, Canada (2017)
40.
Zurück zum Zitat Scott, S.L.: Applied stochastic models in business and industry. Appl. Stoch. Models Bus. Ind. 26, 639–658 (2010)MathSciNetCrossRef Scott, S.L.: Applied stochastic models in business and industry. Appl. Stoch. Models Bus. Ind. 26, 639–658 (2010)MathSciNetCrossRef
41.
Zurück zum Zitat Anisetti, M., Ardagna, C.A., Gaudenzi, F., Damiani, E., Diomede, N., Tufarolo, P.: Moon cloud: a cloud platform for ICT security governance. In: Proceedings of IEEE Global Communications Conference (GLOBECOM 2018), pp. 1–7, IEEE, Abu Dhabi, UAE (2018) Anisetti, M., Ardagna, C.A., Gaudenzi, F., Damiani, E., Diomede, N., Tufarolo, P.: Moon cloud: a cloud platform for ICT security governance. In: Proceedings of IEEE Global Communications Conference (GLOBECOM 2018), pp. 1–7, IEEE, Abu Dhabi, UAE (2018)
42.
Zurück zum Zitat Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. TCC 2006: Theory of Cryptography. Lecture Notes in Computer Science, vol. 3876, pp. 265–284 (2006)CrossRef Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. TCC 2006: Theory of Cryptography. Lecture Notes in Computer Science, vol. 3876, pp. 265–284 (2006)CrossRef
Metadaten
Titel
Certified Machine-Learning Models
verfasst von
Ernesto Damiani
Claudio A. Ardagna
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-38919-2_1