-
Can We Predict Individual Concentrations of Tacrolimus After Liver Transplantation? Application and Tweaking of a Published Population Pharmacokinetic Model in Clinical Practice
Authors:
Marie-Astrid Decrocq-Rudler,
Anna H-X. P. Chan Kwong,
Lucy Meunier,
Julien Fraisse,
José Ursic-Bedoya,
Sonia Khier
Abstract:
Background: Various population pharmacokinetic models have been developed to describe the pharmacokinetics of tacrolimus in adult liver transplantation. However, their extrapolated predictive performance remains unclear in clinical practice. The purpose of this study was to predict concentrations using a selected literature model and to improve these predictions by tweaking the model with a subset…
▽ More
Background: Various population pharmacokinetic models have been developed to describe the pharmacokinetics of tacrolimus in adult liver transplantation. However, their extrapolated predictive performance remains unclear in clinical practice. The purpose of this study was to predict concentrations using a selected literature model and to improve these predictions by tweaking the model with a subset of the target population.Methods: A literature review was conducted to select an adequate population pharmacokinetic model (L). Pharmacokinetic data from therapeutic drug monitoring of tacrolimus in liver-transplanted adults were retrospectively collected. A subset of these data (70%) was exploited to tweak the L-model using the PRIOR subroutine of the NONMEM software, with 2 strategies to weight the prior information: full informative (F) and optimized (O). An external evaluation was performed on the remaining data; bias and imprecision were evaluated for predictions a priori and Bayesian forecasting.Results: Seventy-nine patients (851 concentrations) were enrolled in the study. The predictive performance of L-model was insufficient for a priori predictions, whereas it was acceptable with Bayesian forecasting, from the third prediction (ie, with $\ge$2 previously observed concentrations), corresponding to 1 week after transplantation. Overall, the tweaked models showed a better predictive ability than the L-model. The bias of a priori predictions was --41% with the literature model versus --28.5% and --8.73% with tweaked F and O models, respectively. The imprecision was 45.4% with the literature model versus 38.0% and 39.2% with tweaked F and O models, respectively. For Bayesian predictions, whatever the forecasting state, the tweaked models tend to obtain better results.Conclusions: A pharmacokinetic model can be used, and to improve the predictive performance, tweaking the literature model with the PRIOR approach allows to obtain better predictions.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
An Asymptotic Test for Conditional Independence using Analytic Kernel Embeddings
Authors:
Meyer Scetbon,
Laurent Meunier,
Yaniv Romano
Abstract:
We propose a new conditional dependence measure and a statistical test for conditional independence. The measure is based on the difference between analytic kernel embeddings of two well-suited distributions evaluated at a finite set of locations. We obtain its asymptotic distribution under the null hypothesis of conditional independence and design a consistent statistical test from it. We conduct…
▽ More
We propose a new conditional dependence measure and a statistical test for conditional independence. The measure is based on the difference between analytic kernel embeddings of two well-suited distributions evaluated at a finite set of locations. We obtain its asymptotic distribution under the null hypothesis of conditional independence and design a consistent statistical test from it. We conduct a series of experiments showing that our new test outperforms state-of-the-art methods both in terms of type-I and type-II errors even in the high dimensional setting.
△ Less
Submitted 16 June, 2022; v1 submitted 27 October, 2021;
originally announced October 2021.
-
Equitable and Optimal Transport with Multiple Agents
Authors:
Meyer Scetbon,
Laurent Meunier,
Jamal Atif,
Marco Cuturi
Abstract:
We introduce an extension of the Optimal Transport problem when multiple costs are involved. Considering each cost as an agent, we aim to share equally between agents the work of transporting one distribution to another. To do so, we minimize the transportation cost of the agent who works the most. Another point of view is when the goal is to partition equitably goods between agents according to t…
▽ More
We introduce an extension of the Optimal Transport problem when multiple costs are involved. Considering each cost as an agent, we aim to share equally between agents the work of transporting one distribution to another. To do so, we minimize the transportation cost of the agent who works the most. Another point of view is when the goal is to partition equitably goods between agents according to their heterogeneous preferences. Here we aim to maximize the utility of the least advantaged agent. This is a fair division problem. Like Optimal Transport, the problem can be cast as a linear optimization problem. When there is only one agent, we recover the Optimal Transport problem. When two agents are considered, we are able to recover Integral Probability Metrics defined by $α$-Hölder functions, which include the widely-known Dudley metric. To the best of our knowledge, this is the first time a link is given between the Dudley metric and Optimal Transport. We provide an entropic regularization of that problem which leads to an alternative algorithm faster than the standard linear program.
△ Less
Submitted 25 February, 2021; v1 submitted 12 June, 2020;
originally announced June 2020.
-
Variance Reduction for Better Sampling in Continuous Domains
Authors:
Laurent Meunier,
Carola Doerr,
Jeremy Rapin,
Olivier Teytaud
Abstract:
Design of experiments, random search, initialization of population-based methods, or sampling inside an epoch of an evolutionary algorithm use a sample drawn according to some probability distribution for approximating the location of an optimum. Recent papers have shown that the optimal search distribution, used for the sampling, might be more peaked around the center of the distribution than the…
▽ More
Design of experiments, random search, initialization of population-based methods, or sampling inside an epoch of an evolutionary algorithm use a sample drawn according to some probability distribution for approximating the location of an optimum. Recent papers have shown that the optimal search distribution, used for the sampling, might be more peaked around the center of the distribution than the prior distribution modelling our uncertainty about the location of the optimum. We confirm this statement, provide explicit values for this resha** of the search distribution depending on the population size $λ$ and the dimension $d$, and validate our results experimentally.
△ Less
Submitted 24 April, 2020;
originally announced April 2020.
-
On averaging the best samples in evolutionary computation
Authors:
Laurent Meunier,
Yann Chevaleyre,
Jeremy Rapin,
Clément W. Royer,
Olivier Teytaud
Abstract:
Choosing the right selection rate is a long standing issue in evolutionary computation. In the continuous unconstrained case, we prove mathematically that a single parent $μ=1$ leads to a sub-optimal simple regret in the case of the sphere function. We provide a theoretically-based selection rate $μ/λ$ that leads to better progress rates. With our choice of selection rate, we get a provable regret…
▽ More
Choosing the right selection rate is a long standing issue in evolutionary computation. In the continuous unconstrained case, we prove mathematically that a single parent $μ=1$ leads to a sub-optimal simple regret in the case of the sphere function. We provide a theoretically-based selection rate $μ/λ$ that leads to better progress rates. With our choice of selection rate, we get a provable regret of order $O(λ^{-1})$ which has to be compared with $O(λ^{-2/d})$ in the case where $μ=1$. We complete our study with experiments to confirm our theoretical claims.
△ Less
Submitted 18 June, 2020; v1 submitted 24 April, 2020;
originally announced April 2020.
-
Adversarial Attacks on Linear Contextual Bandits
Authors:
Evrard Garcelon,
Baptiste Roziere,
Laurent Meunier,
Jean Tarbouriech,
Olivier Teytaud,
Alessandro Lazaric,
Matteo Pirotta
Abstract:
Contextual bandit algorithms are applied in a wide range of domains, from advertising to recommender systems, from clinical trials to education. In many of these domains, malicious agents may have incentives to attack the bandit algorithm to induce it to perform a desired behavior. For instance, an unscrupulous ad publisher may try to increase their own revenue at the expense of the advertisers; a…
▽ More
Contextual bandit algorithms are applied in a wide range of domains, from advertising to recommender systems, from clinical trials to education. In many of these domains, malicious agents may have incentives to attack the bandit algorithm to induce it to perform a desired behavior. For instance, an unscrupulous ad publisher may try to increase their own revenue at the expense of the advertisers; a seller may want to increase the exposure of their products, or thwart a competitor's advertising campaign. In this paper, we study several attack scenarios and show that a malicious agent can force a linear contextual bandit algorithm to pull any desired arm $T - o(T)$ times over a horizon of $T$ steps, while applying adversarial modifications to either rewards or contexts that only grow logarithmically as $O(\log T)$. We also investigate the case when a malicious agent is interested in affecting the behavior of the bandit algorithm in a single context (e.g., a specific user). We first provide sufficient conditions for the feasibility of the attack and we then propose an efficient algorithm to perform the attack. We validate our theoretical results on experiments performed on both synthetic and real-world datasets.
△ Less
Submitted 23 October, 2020; v1 submitted 10 February, 2020;
originally announced February 2020.
-
Robust Neural Networks using Randomized Adversarial Training
Authors:
Alexandre Araujo,
Laurent Meunier,
Rafael Pinot,
Benjamin Negrevergne
Abstract:
This paper tackles the problem of defending a neural network against adversarial attacks crafted with different norms (in particular $\ell_\infty$ and $\ell_2$ bounded adversarial examples). It has been observed that defense mechanisms designed to protect against one type of attacks often offer poor performance against the other. We show that $\ell_\infty$ defense mechanisms cannot offer good prot…
▽ More
This paper tackles the problem of defending a neural network against adversarial attacks crafted with different norms (in particular $\ell_\infty$ and $\ell_2$ bounded adversarial examples). It has been observed that defense mechanisms designed to protect against one type of attacks often offer poor performance against the other. We show that $\ell_\infty$ defense mechanisms cannot offer good protection against $\ell_2$ attacks and vice-versa, and we provide both theoretical and empirical insights on this phenomenon. Then, we discuss various ways of combining existing defense mechanisms in order to train neural networks robust against both types of attacks. Our experiments show that these new defense mechanisms offer better protection when attacked with both norms.
△ Less
Submitted 13 February, 2020; v1 submitted 25 March, 2019;
originally announced March 2019.
-
Theoretical evidence for adversarial robustness through randomization
Authors:
Rafael Pinot,
Laurent Meunier,
Alexandre Araujo,
Hisashi Kashima,
Florian Yger,
Cédric Gouy-Pailler,
Jamal Atif
Abstract:
This paper investigates the theory of robustness against adversarial attacks. It focuses on the family of randomization techniques that consist in injecting noise in the network at inference time. These techniques have proven effective in many contexts, but lack theoretical arguments. We close this gap by presenting a theoretical analysis of these approaches, hence explaining why they perform well…
▽ More
This paper investigates the theory of robustness against adversarial attacks. It focuses on the family of randomization techniques that consist in injecting noise in the network at inference time. These techniques have proven effective in many contexts, but lack theoretical arguments. We close this gap by presenting a theoretical analysis of these approaches, hence explaining why they perform well in practice. More precisely, we make two new contributions. The first one relates the randomization rate to robustness to adversarial attacks. This result applies for the general family of exponential distributions, and thus extends and unifies the previous approaches. The second contribution consists in devising a new upper bound on the adversarial generalization gap of randomized neural networks. We support our theoretical claims with a set of experiments.
△ Less
Submitted 11 June, 2019; v1 submitted 4 February, 2019;
originally announced February 2019.