advertisement
Mitigating the risks of the AI black box
Enterprises are placing their highest hopes on machine learning. However machine learning, which sits at the heart of AI (artificial intelligence),…
Enterprises are placing their highest hopes on machine learning. However machine learning, which sits at the heart of AI (artificial intelligence), is also starting to unnerve many enterprise legal and security professionals.
One of the biggest concerns around AI is that complex ML-based models often operate as black boxes. This means the models—especially deep learning models composed of artificial neural networks—may be so complex and arcane that they obscure how they actually drive automated inferencing. Just as worrisome, ML-based applications may inadvertently obfuscate responsibility for any biases and other adverse consequences that their automated decisions may produce.
To mitigate these risks, people are starting to demand greater transparency into how machine learning operates in practice and throughout the entire workflow in which models are built, trained, and deployed. Innovative framework for algorithmic transparency—also known as explainability, interpretability, or accountability—are gaining adoption among working data scientists. Chief among these frameworks are LIME, Shapley, DeepLIFT, Skater, AI Explainability 360, What-If-Tool, Activation Atlases, InterpretML, and Rulex Explainable AI.
advertisement
All these tools and techniques help data scientists generate “post-hoc explanations” of which particular data inputs drove which particular algorithmic inferences under various circumstances. However, as noted here, recent research shows that these frameworks can be hacked, thereby reducing trust in the explanations they generate and exposing enterprises to the following risks:
- Algorithmic deceptions may sneak into the public record.Unscrupulous parties may hack the narrative explanations that these frameworks generate, perhaps for the purpose of misrepresenting or obscuring any biases in the machine learning models being described. In other words, “perturbation-based” approaches such as LIME and Shapley can be tricked into generating “innocuous” post-hoc explanations for algorithmic behaviors that are unambiguously biased.
- Technical vulnerabilities may be disclosed inadvertently. Exposing information about machine learning algorithms can make them more vulnerable to adversarial attacks. Full visibility into how machine learning models operate may expose them to attacks that are designed either to trick how they make inferences from live operational data or to poison them at the outset by injecting bogus data into their training workflows.
- Intellectual property theft may be encouraged.Entire machine learning algorithms and training data sets can be stolen based simply on their explanations alone, as well as through their APIs and other features. Transparent explanation of how machine learning models operate may enable the underlying models to be reconstructed with full fidelity by unauthorized third parties. Similarly, transparency may make it possible to partially or entirely reconstruct training data sets, which is an attack known as “model inversion.”
- Privacy violations may run rampant.Machine learning transparency may make it possible for unauthorized third parties to ascertain whether a particular individual’s data record was in a model’s training data set. This adversarial tactic, known as a “membership inference attack,” may enable hackers to unlock considerable amounts of privacy-sensitive data.
To mitigate the technical risks of algorithmic transparency, enterprise data professionals should explore the following strategies:
- Control access to model outputs and monitor when access privileges are being abused, thereby detecting adversarial attacks on transparent machine learning models before they can emerge into full-blown threats.
- Add controlled amounts of randomized noise—aka “perturbations”—into the data used to train transparent machine learning models, thereby making it more difficult for adversarial hackers to use post-hoc explanations or model manipulations to gain insight into the original raw data itself.
- Insert intermediary layers between the raw data and the final transparent machine learning models, such as by training final models from “student” or “federated” models that were themselves trained by distinct segments of the source data. This makes it more difficult for an unauthorized third party to recover the full training data from post-hoc explanations that were generated against final models
In addition to these risks of a technical nature, enterprises that disclose fully how their machine learning models were built and trained may expose themselves to more lawsuits and regulatory scrutiny. Without sacrificing machine learning transparency, mitigating these broader business risks will require a data science devops practice under which post-hoc algorithmic explanations are automatically generated.
advertisement
Just as important, enterprises will need to continually monitor these explanations for anomalies, such as evidence that they, or the models which they purportedly describe, have been hacked. This is a critical concern, because trust in the entire AI edifice will come tumbling down if the enterprises that build and train machine learning models can’t vouch for the transparency of the models’ official documentation.