-
On the Relationship Between Interpretability and Explainability in Machine Learning
Authors:
Benjamin Leblanc,
Pascal Germain
Abstract:
Interpretability and explainability have gained more and more attention in the field of machine learning as they are crucial when it comes to high-stakes decisions and troubleshooting. Since both provide information about predictors and their decision process, they are often seen as two independent means for one single end. This view has led to a dichotomous literature: explainability techniques d…
▽ More
Interpretability and explainability have gained more and more attention in the field of machine learning as they are crucial when it comes to high-stakes decisions and troubleshooting. Since both provide information about predictors and their decision process, they are often seen as two independent means for one single end. This view has led to a dichotomous literature: explainability techniques designed for complex black-box models, or interpretable approaches ignoring the many explainability tools. In this position paper, we challenge the common idea that interpretability and explainability are substitutes for one another by listing their principal shortcomings and discussing how both of them mitigate the drawbacks of the other. In doing so, we call for a new perspective on interpretability and explainability, and works targeting both topics simultaneously, leveraging each of their respective assets.
△ Less
Submitted 25 April, 2024; v1 submitted 19 November, 2023;
originally announced November 2023.
-
Seeking Interpretability and Explainability in Binary Activated Neural Networks
Authors:
Benjamin Leblanc,
Pascal Germain
Abstract:
We study the use of binary activated neural networks as interpretable and explainable predictors in the context of regression tasks on tabular data; more specifically, we provide guarantees on their expressiveness, present an approach based on the efficient computation of SHAP values for quantifying the relative importance of the features, hidden neurons and even weights. As the model's simplicity…
▽ More
We study the use of binary activated neural networks as interpretable and explainable predictors in the context of regression tasks on tabular data; more specifically, we provide guarantees on their expressiveness, present an approach based on the efficient computation of SHAP values for quantifying the relative importance of the features, hidden neurons and even weights. As the model's simplicity is instrumental in achieving interpretability, we propose a greedy algorithm for building compact binary activated networks. This approach doesn't need to fix an architecture for the network in advance: it is built one layer at a time, one neuron at a time, leading to predictors that aren't needlessly complex for a given task.
△ Less
Submitted 10 June, 2024; v1 submitted 7 September, 2022;
originally announced September 2022.
-
PAC-Bayesian Learning of Aggregated Binary Activated Neural Networks with Probabilities over Representations
Authors:
Louis Fortier-Dubois,
Gaël Letarte,
Benjamin Leblanc,
François Laviolette,
Pascal Germain
Abstract:
Considering a probability distribution over parameters is known as an efficient strategy to learn a neural network with non-differentiable activation functions. We study the expectation of a probabilistic neural network as a predictor by itself, focusing on the aggregation of binary activated neural networks with normal distributions over real-valued weights. Our work leverages a recent analysis d…
▽ More
Considering a probability distribution over parameters is known as an efficient strategy to learn a neural network with non-differentiable activation functions. We study the expectation of a probabilistic neural network as a predictor by itself, focusing on the aggregation of binary activated neural networks with normal distributions over real-valued weights. Our work leverages a recent analysis derived from the PAC-Bayesian framework that derives tight generalization bounds and learning procedures for the expected output value of such an aggregation, which is given by an analytical expression. While the combinatorial nature of the latter has been circumvented by approximations in previous works, we show that the exact computation remains tractable for deep but narrow neural networks, thanks to a dynamic programming approach. This leads us to a peculiar bound minimization learning algorithm for binary activated neural networks, where the forward pass propagates probabilities over representations instead of activation values. A stochastic counterpart that scales to wide architectures is proposed.
△ Less
Submitted 14 April, 2023; v1 submitted 28 October, 2021;
originally announced October 2021.
-
Towards an Active, Autonomous and Intelligent Cyber Defense of Military Systems: the NATO AICA Reference Architecture
Authors:
Paul Theron,
Alexander Kott,
Martin Drašar,
Krzysztof Rzadca,
Benoît LeBlanc,
Mauno Pihelgas,
Luigi Mancini,
Agostino Panico
Abstract:
Within the future Global Information Grid, complex massively interconnected systems, isolated defense vehicles, sensors and effectors, and infrastructures and systems demanding extremely low failure rates, to which human security operators cannot have an easy access and cannot deliver fast enough reactions to cyber-attacks, need an active, autonomous and intelligent cyber defense. Multi Agent Syst…
▽ More
Within the future Global Information Grid, complex massively interconnected systems, isolated defense vehicles, sensors and effectors, and infrastructures and systems demanding extremely low failure rates, to which human security operators cannot have an easy access and cannot deliver fast enough reactions to cyber-attacks, need an active, autonomous and intelligent cyber defense. Multi Agent Systems for Cyber Defense may provide an answer to this requirement. This paper presents the concept and architecture of an Autonomous Intelligent Cyber defense Agent (AICA). First, we describe the rationale of the AICA concept. Secondly, we explain the methodology and purpose that drive the definition of the AICA Reference Architecture (AICARA) by NATO's IST-152 Research and Technology Group. Thirdly, we review some of the main features and challenges of Multi Autonomous Intelligent Cyber defense Agent (MAICA). Fourthly, we depict the initially assumed AICA Reference Architecture. Then we present one of our preliminary research issues, assumptions and ideas. Finally, we present the future lines of research that will help develop and test the AICA / MAICA concept.
△ Less
Submitted 7 June, 2018;
originally announced June 2018.
-
Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG
Authors:
Alexander Kott,
Ryan Thomas,
Martin Drašar,
Markus Kont,
Alex Poylisher,
Benjamin Blakely,
Paul Theron,
Nathaniel Evans,
Nandi Leslie,
Rajdeep Singh,
Maria Rigaki,
S Jay Yang,
Benoit LeBlanc,
Paul Losiewicz,
Sylvain Hourlier,
Misty Blowers,
Hugh Harney,
Gregory Wehner,
Alessandro Guarino,
Jana Komárková,
James Rowell
Abstract:
This report summarizes the discussions and findings of the Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience organized by the NATO research group IST-152-RTG. The workshop was held in Prague, Czech Republic, on 18-20 October 2017. There is a growing recognition that future cyber defense should involve extensive use of partially autonomous agents that actively patrol the fr…
▽ More
This report summarizes the discussions and findings of the Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience organized by the NATO research group IST-152-RTG. The workshop was held in Prague, Czech Republic, on 18-20 October 2017. There is a growing recognition that future cyber defense should involve extensive use of partially autonomous agents that actively patrol the friendly network, and detect and react to hostile activities rapidly (far faster than human reaction time), before the hostile malware is able to inflict major damage, evade friendly agents, or destroy friendly agents. This requires cyber-defense agents with a significant degree of intelligence, autonomy, self-learning, and adaptability. The report focuses on the following questions: In what computing and tactical environments would such an agent operate? What data would be available for the agent to observe or ingest? What actions would the agent be able to take? How would such an agent plan a complex course of actions? Would the agent learn from its experiences, and how? How would the agent collaborate with humans? How can we ensure that the agent will not take undesirable destructive actions? Is it possible to help envision such an agent with a simple example?
△ Less
Submitted 20 April, 2018;
originally announced April 2018.
-
Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0
Authors:
Alexander Kott,
Paul Théron,
Martin Drašar,
Edlira Dushku,
Benoît LeBlanc,
Paul Losiewicz,
Alessandro Guarino,
Luigi Mancini,
Agostino Panico,
Mauno Pihelgas,
Krzysztof Rzadca,
Fabio De Gaspari
Abstract:
This report - a major revision of its previous release - describes a reference architecture for intelligent software agents performing active, largely autonomous cyber-defense actions on military networks of computing and communicating devices. The report is produced by the North Atlantic Treaty Organization (NATO) Research Task Group (RTG) IST-152 "Intelligent Autonomous Agents for Cyber Defense…
▽ More
This report - a major revision of its previous release - describes a reference architecture for intelligent software agents performing active, largely autonomous cyber-defense actions on military networks of computing and communicating devices. The report is produced by the North Atlantic Treaty Organization (NATO) Research Task Group (RTG) IST-152 "Intelligent Autonomous Agents for Cyber Defense and Resilience". In a conflict with a technically sophisticated adversary, NATO military tactical networks will operate in a heavily contested battlefield. Enemy software cyber agents - malware - will infiltrate friendly networks and attack friendly command, control, communications, computers, intelligence, surveillance, and reconnaissance and computerized weapon systems. To fight them, NATO needs artificial cyber hunters - intelligent, autonomous, mobile agents specialized in active cyber defense. With this in mind, in 2016, NATO initiated RTG IST-152. Its objective has been to help accelerate the development and transition to practice of such software agents by producing a reference architecture and technical roadmap. This report presents the concept and architecture of an Autonomous Intelligent Cyber-defense Agent (AICA). We describe the rationale of the AICA concept, explain the methodology and purpose that drive the definition of the AICA Reference Architecture, and review some of the main features and challenges of AICAs.
△ Less
Submitted 22 March, 2023; v1 submitted 28 March, 2018;
originally announced March 2018.
-
An Enhanced Nonlinear Critical Gradient for Electron Turbulent Transport due to Reversed Magnetic Shear
Authors:
J. L. Peterson,
G. W. Hammett,
D. R. Mikkelsen,
H. Y. Yuh,
J. Candy,
W. Guttenfelder,
S. M. Kaye,
B. LeBlanc
Abstract:
The first nonlinear gyrokinetic simulations of electron internal transport barriers (e-ITBs) in the National Spherical Torus Experiment show that reversed magnetic shear can suppress thermal transport by increasing the nonlinear critical gradient for electron-temperature-gradient-driven turbulence to three times its linear critical value. An interesting feature of this turbulence is nonlinearly dr…
▽ More
The first nonlinear gyrokinetic simulations of electron internal transport barriers (e-ITBs) in the National Spherical Torus Experiment show that reversed magnetic shear can suppress thermal transport by increasing the nonlinear critical gradient for electron-temperature-gradient-driven turbulence to three times its linear critical value. An interesting feature of this turbulence is nonlinearly driven off-midplane radial streamers. This work reinforces the experimental observation that magnetic shear is likely an effective way of triggering and sustaining e-ITBs in magnetic fusion devices.
△ Less
Submitted 11 May, 2011;
originally announced May 2011.
-
High flux expansion divertor studies in NSTX
Authors:
V. A. Soukhanovskii,
R. Maingi,
R. E. Bell,
D. A. Gates,
R. Kaita,
H. W. Kugel,
B. P. LeBlanc,
R. Maqueda,
J. E. Menard,
D. Mueller,
S. F. Paul,
R. Raman,
A. L. Roquemore
Abstract:
High flux expansion divertor studies have been carried out in the National Spherical Torus Experiment using steady-state X-point height variations from 22 to 5-6 cm. Small-ELM H-mode confinement was maintained at all X-point heights. Divertor flux expansions from 6 to 26-28 were obtained, with associated reduction in X-point connection length from 5-6 m to 2 m. Peak divertor heat flux was reduce…
▽ More
High flux expansion divertor studies have been carried out in the National Spherical Torus Experiment using steady-state X-point height variations from 22 to 5-6 cm. Small-ELM H-mode confinement was maintained at all X-point heights. Divertor flux expansions from 6 to 26-28 were obtained, with associated reduction in X-point connection length from 5-6 m to 2 m. Peak divertor heat flux was reduced from 7-8 MW/m$^2$ to 1-2 MW/m$^2$. In low X-point configuration, outer strike point became nearly detached. Among factors affecting deposition of parallel heat flux in the divertor, the flux expansion factor appeared to be dominant
△ Less
Submitted 21 December, 2009;
originally announced December 2009.
-
Time-Changed Bessel Processes and Credit Risk
Authors:
Marc Atlan,
Boris Leblanc
Abstract:
The Constant Elasticity of Variance (CEV) model is mathematically presented and then used in a Credit-Equity hybrid framework. Next, we propose extensions to the CEV model with default: firstly by adding a stochastic volatility diffusion uncorrelated from the stock price process, then by more generally time changing Bessel processes and finally by correlating stochastic volatility moves to the s…
▽ More
The Constant Elasticity of Variance (CEV) model is mathematically presented and then used in a Credit-Equity hybrid framework. Next, we propose extensions to the CEV model with default: firstly by adding a stochastic volatility diffusion uncorrelated from the stock price process, then by more generally time changing Bessel processes and finally by correlating stochastic volatility moves to the stock ones. Properties about strict local and true martingales in this study are discussed. Analytical formulas are provided and Fourier and Laplace transform techniques can then be used to compute option prices and probabilities of default.
△ Less
Submitted 13 April, 2006;
originally announced April 2006.