SlideShare a Scribd company logo
Curating Naturally Adversarial
Datasets for Learning-Enabled Medical
Cyber-Physical Systems
Sydney Pugh1, Ivan Ruchkin2, James Weimer3, and Insup Lee1
1 University of Pennsylvania
2 University of Florida
3 Vanderbilt University
15th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS)
May 16, 2024
Outline
• Introduction
• Motivation
• Related Work
• Problem Statement
• Approach
• Results
• Conclusion
ICCPS -- 5/16/24 2
Reality of the LE-MCPS Domain
LABELED
Data
UNLABELED Data
Primarily used
for training LE-MCPS
Often unused!
How can we make unlabeled data useful
to LE-MCPS developers?
ICCPS -- 5/16/24 3
Can be used for training or analysis
In our paper, we investigate whether
we can we use unlabeled data to
analyze the robustness of trained LE-MCPS
Evaluating Robustness using Unlabeled Data
ICCPS -- 5/16/24 4
Unlabeled
Data
Labeled
Data
Clinician
Adversarial
Dataset
Curation
Labels are highly accurate
but expensive!
Mostly focuses on synthetic
adversarial examples!
Robustness is typically evaluated by observing a LE-MCPS’s
performance against adversarial examples.
Adversarial
Dataset
Synthetic Adversarial Examples
• Apply adversarial perturbations to clean inputs to cause misclassification
• Given sample 𝑥 with true label 𝑦, add noise 𝛿 such that 𝑓 𝑥 + 𝛿 ≠ 𝑦
• E.g., ℓ! adversarial examples (Vorobeychik et al., 2018)
• Limitations: adding noise to medical data typically yields invalid/unrealistic examples
• Synthetic data generation techniques
• E.g., Patient simulators and Generative Adversarial Networks (GANs)
• Limitations: lack of realism; difficult to generate complex physiology; bias
ICCPS -- 5/16/24 5
Clean ECG ECG with noise
Noise
Evaluating Robustness using Weakly-Labeled Data
ICCPS -- 5/16/24 6
Unlabeled
Data
Labels are inexpensive but
less accurate!
Mostly focuses on synthetic
adversarial examples!
We can avoid manual labeling with weakly-supervised data labeling!
Clinician Labeling Functions
def LF_1(x):
return heuristic_1(x)
⋮
def LF_2(x):
return re.find(“abnormal”, x)
Programmatic
Weak
Supervision
Weakly-Labeled
Data
Adversarial
Dataset
Curation
Adversarial
Dataset
• Weak label confidences are typically overconfident
• However, we suspect the ordering of confidences is legit
Evaluating Robustness via Our Approach
ICCPS -- 5/16/24 7
Key Idea 1: Sample natural adversarial examples from real unlabeled medical data!
Key Idea 2: Uncertainty in weak labels are indicative of “adversarialness”
Dataset Curation via
Adversarial Ordering
Adversarially Ordered
Natural Datasets
More adversarial
Weakly-Labeled
Data
Weakly-Labeled Data
High uncertainty
More adversarial
Labels prone to inaccuracies
Predictions disagree with labels
Low uncertainty
Less adversarial
Labels largely correct
Predictions match labels
Analyze robustness by observing trend in accuracy across the datasets
Natural Adversarial Examples
• Hendrycks et al. discovered that clean, realistic inputs can also degrade the
performance of machine learning models
• Constructs a naturally adversarial dataset from ImageNet via adversarial filtration
• Remove examples classified easily via very predictable classification boundaries
• Limitation: medical data often lacks spurious cues
• Possible feature-based approaches
• Density estimator with outlier detection (Aggarwal 2013)
• Out-of-distribution (OOD) detectors (Ruff et al., 2021)
• Out of scope for this paper
ICCPS -- 5/16/24 8
Hendrycks et al.,
“Natural adversarial
examples”, CVPR
2021.
Problem Statement
ICCPS -- 5/16/24 9
Dataset Curation
via Adversarial
Ordering
Inputs Outputs
Unlabeled Data
𝑋
Labeling Functions
Λ = 𝜆 ∶ 𝒳 → 𝒴 or “𝑎𝑏𝑠𝑡𝑎𝑖𝑛”
𝐷!, …, 𝐷"
where 𝐷# = 𝑥$, &
𝑦$
Adversarially Ordered
Natural Datasets
Outline
• Introduction
• Motivation
• Related Work
• Problem Statement
• Approach
• Results
• Conclusion
ICCPS -- 5/16/24 10
Dataset Curation via Adversarial Ordering
Labeling
Functions (LFs)
Λ
Unlabeled
Data
𝑋
ICCPS -- 5/16/24 11
LF Pruning
Step 1
𝐷!, …, 𝐷"
Adversarially Ordered
Natural Datasets
Independent LFs
Λ′ ⊆ Λ
Probabilistic
Labeling
Step 2 LF Weights
𝜇
Weak Labels
-
𝑌
Confidence
Intervals
Step 3
Intervals
Θ%, Θ&
Adversarial
Dataset Curation
Step 4
Independent LFs
Λ′ ⊆ Λ
Labeling Function Pruning
• Weakly-supervised data labeling techniques
assume LFs are conditionally independent if not
otherwise specified
• We identify an independent subset of LFs Λ′ ⊆ Λ
• At a high-level, we
1. Construct a graph representation of LF dependencies
• LFs as nodes
• Edges between LFs with Pearson Correlation magnitude > 𝛿
2. Rank LFs (in descending order) by the number of
maximal cliques they belong to
• Break ties by giving preference to LFs with higher coverage
• Reveals subsets of LFs that tend to share similar labeling
patterns
3. Iterate through the ranking to drop dependent LFs
• Goal: select smallest subset of LFs that cover all the cliques
ICCPS -- 5/16/24 12
LF Maximal cliques
𝜆! 𝜆", 𝜆! , 𝜆#, 𝜆!
𝜆# 𝜆#, 𝜆!
𝜆" 𝜆", 𝜆!
𝜆$,&,' 𝜆$, 𝜆&, 𝜆'
𝜆( 𝜆(
𝛿 = 0.5
X
Result: Λ#
= 𝜆$, 𝜆%, 𝜆&
𝜆"
𝜆#
𝜆$
𝜆%
𝜆&
𝜆'
Graph
𝜆(
Correlation
Matrix
X
X X
Dataset Curation via Adversarial Ordering
Labeling
Functions (LFs)
Λ
Unlabeled
Data
𝑋
ICCPS -- 5/16/24 13
LF Pruning
Step 1
𝐷!, …, 𝐷"
Adversarially Ordered
Natural Datasets
Independent LFs
Λ′ ⊆ Λ
Probabilistic
Labeling
Step 2 LF Weights
𝜇
Weak Labels
-
𝑌
Confidence
Intervals
Step 3
Intervals
Θ%, Θ&
Adversarial
Dataset Curation
Step 4
Independent LFs
Λ′ ⊆ Λ
Weak Labels
-
𝑌
LF Weights
𝜇
Probabilistic Labeling
• We weakly label the unlabeled input data 𝑋 using programmatic weak supervision
• A label model aggregates the outputs of independent LFs Λ′ via a weighted combination
• How are the LF weights 𝜇 determined?
• Depends on the model used
• Majority Vote whose weight vector is uniform
• Snorkel whose weight vector reflects the unknown accuracies of the LFs (Ratner, et al. 2019)
• Limitation: weak label confidences are typically overconfident
ICCPS -- 5/16/24 14
Label Model
Independent LFs Output
𝑃
) 𝑌 = 𝑦 𝝀 = 0
*+$
|-!|
𝜇*
(/)
2 𝟏 𝜆* 𝑥 = 𝑦
…then softmax over 𝒴
Weak Labels
Dataset Curation via Adversarial Ordering
Labeling
Functions (LFs)
Λ
Unlabeled
Data
𝑋
ICCPS -- 5/16/24 15
LF Pruning
Step 1
𝐷!, …, 𝐷"
Adversarially Ordered
Natural Datasets
Independent LFs
Λ′ ⊆ Λ
Probabilistic
Labeling
Step 2 LF Weights
𝜇
Weak Labels
-
𝑌
Confidence
Intervals
Step 3
Intervals
Θ%, Θ&
Adversarial
Dataset Curation
Step 4
Independent LFs
Λ′ ⊆ Λ
Weak Labels
-
𝑌
LF Weights
𝜇
Intervals
Θ%, Θ&
Confidence Intervals for Weak Labels
• Construct intervals Θ', Θ( containing
the true uncertainty in weak labels #
𝑌
with probability at least 1 − 𝛼
• The interval size depends on two factors:
• Weights of non-abstaining LFs
• Number of non-abstaining LFs
• We construct Clopper-Pearson
confidence intervals where we consider
LFs as Bernoulli trials
• Number of trials 𝑛 𝑥 is the number non-
abstaining LFs
• Number of success 𝑠 𝑥 is the normalized
probability of label &
𝑦 weighted by 𝑛 𝑥
ICCPS -- 5/16/24 16
Θ) 𝛼; 𝑛, 𝑠 = 𝐵
𝛼
2
; 𝑠, 𝑛 − 𝑠 + 1
Θ* 𝛼; 𝑛, 𝑠 = 𝐵 1 −
𝛼
2
; 𝑠 + 1 , 𝑛 − 𝑠
where 𝐵 𝑞; 𝑎, 𝑏 is the 𝑞-th quantile from a
beta distribution with shape parameters 𝑎
and 𝑏 and
𝑛 𝑥 = 9
+,$
|.!|
𝟏 𝜆+ 𝑥 ≠ “𝑎𝑏𝑠𝑡𝑎𝑖𝑛”
𝑠 𝑥 = 𝑛 𝑥 @
exp ∑+,$
|.!|
𝜇+
(0)
@ 𝟏 𝜆+ 𝑥 = F
𝑦
∑0∈𝒴 exp ∑+,$
|.!|
𝜇+
(0)
@ 𝟏 𝜆+ 𝑥 = 𝑦
For 𝑥 ∈ 𝑋 with weak label F
𝑦 ∈ 𝒴,
Dataset Curation via Adversarial Ordering
Labeling
Functions (LFs)
Λ
Unlabeled
Data
𝑋
ICCPS -- 5/16/24 17
LF Pruning
Step 1
𝐷!, …, 𝐷"
Adversarially Ordered
Natural Datasets
Independent LFs
Λ′ ⊆ Λ
Probabilistic
Labeling
Step 2 LF Weights
𝜇
Weak Labels
-
𝑌
Confidence
Intervals
Step 3
Intervals
Θ%, Θ&
Adversarial
Dataset Curation
Step 4
Independent LFs
Λ′ ⊆ Λ
Weak Labels
-
𝑌
LF Weights
𝜇
Intervals
Θ%, Θ&
𝐷!, …, 𝐷"
Adversarially Ordered
Natural Datasets
Adversarial Dataset Curation
• Curate a sequence of adversarially ordered datasets 𝐷!, …, 𝐷"
1. Adversarially order the data
• Intuition: samples with small CI lower bounds are more adversarial
• Order samples by CI lower bound in descending order
2. Construct datasets from the adversarial ordering
• For each dataset 𝐷1, select the top ⁄
100 𝑛 percent of ordered samples
𝑥'4
, 𝑥'5
, … , 𝑥'|6|
where Θ( 𝑥'4
≥ Θ( 𝑥'5
≥ ⋯ ≥ Θ( 𝑥|*| and 𝑖%, … , 𝑖|*| ∈ 1, … , |𝑋|
𝐷+ = 𝑥'7
, @
𝑦'7
for 𝑗 ∈ 1, … ,
𝑖 D 𝑋
𝑁
ICCPS -- 5/16/24 18
Outline
• Introduction
• Motivation
• Related Work
• Problem Statement
• Approach
• Results
• Conclusion
ICCPS -- 5/16/24 19
Evaluation
• Goal: Statistically valid adversarial ordering
• Accuracy of the weak labels per dataset decreases
• Robust LE-MCPS is expected to show decreasing accuracy on our datasets
• We use Spearman’s Rank Correlation to validate adversarial ordering
• Good result indicated by negative correlation with statistically significant p-value (<0.01)
• Bad result indicated by positive correlation with statistically significant p-value (<0.01)
• Otherwise abstain
ICCPS -- 5/16/24 20
High uncertainty
More adversarial
Labels prone to inaccuracies
Predictions disagree with labels
Low uncertainty
Less adversarial
Labels largely correct
Predictions match labels
Analyze robustness by observing trend in accuracy across the datasets
Results
• Datasets:
• HR Low/High, RR
Low/High, SpO2 Low:
classify suppressible
physiologic monitoring
alarms from time-series
vital sign data
• Cross-modal: classify
abnormal radiography
images from
corresponding imaging text
reports
• Crowdsourcing: classify
sentiment in tweets
• Recsys: predict if a user
will read and like a book
given their reading history
• Spam: classify spam
emails
ICCPS -- 5/16/24 21
Abstain
Abstain
Abstain
Abstain
Abstain
Abstain
Abstain
Abstain
Abstain
Abstain
Abstain
Abstain
Abstain
Abstain
Abstain
Abstain
Takeaways:
• Our approach successfully produces natural datasets
with statistically valid adversarial ordering
• And does not produce statistically invalid datasets!
Our approach
without LF
pruning and
confidence
intervals
Our approach
without
confidence
intervals
Our
approach
without LF
pruning
Outline
• Introduction
• Motivation
• Related Work
• Problem Statement
• Approach
• Results
• Conclusion
ICCPS -- 5/16/24 22
Conclusion
• We proposed a weakly-supervised approach to curating
adversarially ordered datasets for evaluating robustness
• Using unlabeled data
• And labeling functions
• We demonstrated our approach yields datasets with statistically
valid adversarial ordering
• Future work:
• Evaluate real-world LE-MCPS on our datasets
• Create a significance detector for adversarial ordering
• Generally requires ground truth
ICCPS -- 5/16/24 23
Thank You!
ICCPS -- 5/16/24 24
Sydney Pugh
sfpugh@seas.upenn.edu
Ivan Ruchkin Insup Lee
James Weimer
Recently
defended and
graduating this
summer!
Code
Paper

More Related Content

Similar to Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Physical Systems

Database Searching
Database SearchingDatabase Searching
Database Searching
Meghaj Mallick
 
Feature selection with imbalanced data in agriculture
Feature selection with  imbalanced data in agricultureFeature selection with  imbalanced data in agriculture
Feature selection with imbalanced data in agriculture
Aboul Ella Hassanien
 
Lecture 7 gwas full
Lecture 7 gwas fullLecture 7 gwas full
Lecture 7 gwas full
Lekki Frazier-Wood
 
XabTracker & SeqAgent: Integrated LIMS & Sequence Analysis Tools for Antibody...
XabTracker & SeqAgent: Integrated LIMS & Sequence Analysis Tools for Antibody...XabTracker & SeqAgent: Integrated LIMS & Sequence Analysis Tools for Antibody...
XabTracker & SeqAgent: Integrated LIMS & Sequence Analysis Tools for Antibody...
Mark Evans
 
Outlier analysis and anomaly detection
Outlier analysis and anomaly detectionOutlier analysis and anomaly detection
Outlier analysis and anomaly detection
ShantanuDeosthale
 
Data in science
Data in science Data in science
Data in science
Sreejith Aravindakshan
 
Descriptive Analytics: Data Reduction
 Descriptive Analytics: Data Reduction Descriptive Analytics: Data Reduction
Descriptive Analytics: Data Reduction
Nguyen Ngoc Binh Phuong
 
Parkinson disease classification recorded v2.0
Parkinson disease classification recorded   v2.0Parkinson disease classification recorded   v2.0
Parkinson disease classification recorded v2.0
Nikhil Shrivastava, MS, SAFe PMPO
 
Parkinson disease classification v2.0
Parkinson disease classification v2.0Parkinson disease classification v2.0
Parkinson disease classification v2.0
Nikhil Shrivastava, MS, SAFe PMPO
 
Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)Asiri Wijesinghe
 
03 presentation-bothiesson
03 presentation-bothiesson03 presentation-bothiesson
03 presentation-bothiesson
InfinIT - Innovationsnetværket for it
 
Robust inference via generative classifiers for handling noisy labels
Robust inference via generative classifiers for handling noisy labelsRobust inference via generative classifiers for handling noisy labels
Robust inference via generative classifiers for handling noisy labels
Kimin Lee
 
Probability density estimation using Product of Conditional Experts
Probability density estimation using Product of Conditional ExpertsProbability density estimation using Product of Conditional Experts
Probability density estimation using Product of Conditional ExpertsChirag Gupta
 
Environmental statistics
Environmental statisticsEnvironmental statistics
Environmental statistics
Georgios Ath. Kounis
 
Probability Forecasting - a Machine Learning Perspective
Probability Forecasting - a Machine Learning PerspectiveProbability Forecasting - a Machine Learning Perspective
Probability Forecasting - a Machine Learning Perspectivebutest
 
Contrast Pattern Aided Regression and Classification
Contrast Pattern Aided Regression and ClassificationContrast Pattern Aided Regression and Classification
Contrast Pattern Aided Regression and Classification
Artificial Intelligence Institute at UofSC
 
Spss basic Dr Marwa Zalat
Spss basic Dr Marwa ZalatSpss basic Dr Marwa Zalat
Spss basic Dr Marwa Zalat
Marwa Zalat
 
Analysing & interpreting data.ppt
Analysing & interpreting data.pptAnalysing & interpreting data.ppt
Analysing & interpreting data.ppt
manaswidebbarma1
 

Similar to Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Physical Systems (20)

Database Searching
Database SearchingDatabase Searching
Database Searching
 
Feature selection with imbalanced data in agriculture
Feature selection with  imbalanced data in agricultureFeature selection with  imbalanced data in agriculture
Feature selection with imbalanced data in agriculture
 
Lecture 7 gwas full
Lecture 7 gwas fullLecture 7 gwas full
Lecture 7 gwas full
 
XabTracker & SeqAgent: Integrated LIMS & Sequence Analysis Tools for Antibody...
XabTracker & SeqAgent: Integrated LIMS & Sequence Analysis Tools for Antibody...XabTracker & SeqAgent: Integrated LIMS & Sequence Analysis Tools for Antibody...
XabTracker & SeqAgent: Integrated LIMS & Sequence Analysis Tools for Antibody...
 
Outlier analysis and anomaly detection
Outlier analysis and anomaly detectionOutlier analysis and anomaly detection
Outlier analysis and anomaly detection
 
Data in science
Data in science Data in science
Data in science
 
0 introduction
0  introduction0  introduction
0 introduction
 
Descriptive Analytics: Data Reduction
 Descriptive Analytics: Data Reduction Descriptive Analytics: Data Reduction
Descriptive Analytics: Data Reduction
 
Parkinson disease classification recorded v2.0
Parkinson disease classification recorded   v2.0Parkinson disease classification recorded   v2.0
Parkinson disease classification recorded v2.0
 
Parkinson disease classification v2.0
Parkinson disease classification v2.0Parkinson disease classification v2.0
Parkinson disease classification v2.0
 
Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)Basic Local Alignment Search Tool (BLAST)
Basic Local Alignment Search Tool (BLAST)
 
03 presentation-bothiesson
03 presentation-bothiesson03 presentation-bothiesson
03 presentation-bothiesson
 
Robust inference via generative classifiers for handling noisy labels
Robust inference via generative classifiers for handling noisy labelsRobust inference via generative classifiers for handling noisy labels
Robust inference via generative classifiers for handling noisy labels
 
Probability density estimation using Product of Conditional Experts
Probability density estimation using Product of Conditional ExpertsProbability density estimation using Product of Conditional Experts
Probability density estimation using Product of Conditional Experts
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
Environmental statistics
Environmental statisticsEnvironmental statistics
Environmental statistics
 
Probability Forecasting - a Machine Learning Perspective
Probability Forecasting - a Machine Learning PerspectiveProbability Forecasting - a Machine Learning Perspective
Probability Forecasting - a Machine Learning Perspective
 
Contrast Pattern Aided Regression and Classification
Contrast Pattern Aided Regression and ClassificationContrast Pattern Aided Regression and Classification
Contrast Pattern Aided Regression and Classification
 
Spss basic Dr Marwa Zalat
Spss basic Dr Marwa ZalatSpss basic Dr Marwa Zalat
Spss basic Dr Marwa Zalat
 
Analysing & interpreting data.ppt
Analysing & interpreting data.pptAnalysing & interpreting data.ppt
Analysing & interpreting data.ppt
 

More from Ivan Ruchkin

Language-Enhanced Latent Representations for Out-of-Distribution Detection in...
Language-Enhanced Latent Representations for Out-of-Distribution Detection in...Language-Enhanced Latent Representations for Out-of-Distribution Detection in...
Language-Enhanced Latent Representations for Out-of-Distribution Detection in...
Ivan Ruchkin
 
​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...
​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...
​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...
Ivan Ruchkin
 
Repairing Learning-Enabled Controllers While Preserving What Works
Repairing Learning-Enabled Controllers While Preserving What WorksRepairing Learning-Enabled Controllers While Preserving What Works
Repairing Learning-Enabled Controllers While Preserving What Works
Ivan Ruchkin
 
Poster: Conservative Safety Monitors of Stochastic Dynamical Systems
Poster: Conservative Safety Monitors of Stochastic Dynamical SystemsPoster: Conservative Safety Monitors of Stochastic Dynamical Systems
Poster: Conservative Safety Monitors of Stochastic Dynamical Systems
Ivan Ruchkin
 
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Ivan Ruchkin
 
Verify-then-Monitor: Calibration Guarantees for Safety Confidence
Verify-then-Monitor: Calibration Guarantees for Safety ConfidenceVerify-then-Monitor: Calibration Guarantees for Safety Confidence
Verify-then-Monitor: Calibration Guarantees for Safety Confidence
Ivan Ruchkin
 
Causal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical SystemsCausal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical Systems
Ivan Ruchkin
 
Conservative Safety Monitors of Stochastic Dynamical Systems
Conservative Safety Monitors of Stochastic Dynamical SystemsConservative Safety Monitors of Stochastic Dynamical Systems
Conservative Safety Monitors of Stochastic Dynamical Systems
Ivan Ruchkin
 
Confidence Composition for Monitors of Verification Assumptions
Confidence Composition for Monitors of Verification AssumptionsConfidence Composition for Monitors of Verification Assumptions
Confidence Composition for Monitors of Verification Assumptions
Ivan Ruchkin
 
Overcoming Heterogeneity in Autonomous Cyber-Physical Systems
Overcoming Heterogeneity in Autonomous Cyber-Physical SystemsOvercoming Heterogeneity in Autonomous Cyber-Physical Systems
Overcoming Heterogeneity in Autonomous Cyber-Physical Systems
Ivan Ruchkin
 
High-Confidence Data Programming for Evaluating Suppression of Physiological ...
High-Confidence Data Programming for Evaluating Suppression of Physiological ...High-Confidence Data Programming for Evaluating Suppression of Physiological ...
High-Confidence Data Programming for Evaluating Suppression of Physiological ...
Ivan Ruchkin
 
Data Generation with PROSPECT: a Probability Specification Tool
Data Generation with PROSPECT: a Probability Specification ToolData Generation with PROSPECT: a Probability Specification Tool
Data Generation with PROSPECT: a Probability Specification Tool
Ivan Ruchkin
 
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Ivan Ruchkin
 
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Ivan Ruchkin
 
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Ivan Ruchkin
 
On the Role of Assumptions in Engineering Smart Systems
On the Role of Assumptions in Engineering Smart SystemsOn the Role of Assumptions in Engineering Smart Systems
On the Role of Assumptions in Engineering Smart Systems
Ivan Ruchkin
 
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Ivan Ruchkin
 
Overview of Epidemic Models for COVID-19
Overview of Epidemic Models for COVID-19Overview of Epidemic Models for COVID-19
Overview of Epidemic Models for COVID-19
Ivan Ruchkin
 
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical SystemsThesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Ivan Ruchkin
 
Towards a Formal Framework for Hybrid Planning in Self-Adaptation
Towards a Formal Framework for Hybrid Planning in Self-AdaptationTowards a Formal Framework for Hybrid Planning in Self-Adaptation
Towards a Formal Framework for Hybrid Planning in Self-Adaptation
Ivan Ruchkin
 

More from Ivan Ruchkin (20)

Language-Enhanced Latent Representations for Out-of-Distribution Detection in...
Language-Enhanced Latent Representations for Out-of-Distribution Detection in...Language-Enhanced Latent Representations for Out-of-Distribution Detection in...
Language-Enhanced Latent Representations for Out-of-Distribution Detection in...
 
​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...
​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...
​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...
 
Repairing Learning-Enabled Controllers While Preserving What Works
Repairing Learning-Enabled Controllers While Preserving What WorksRepairing Learning-Enabled Controllers While Preserving What Works
Repairing Learning-Enabled Controllers While Preserving What Works
 
Poster: Conservative Safety Monitors of Stochastic Dynamical Systems
Poster: Conservative Safety Monitors of Stochastic Dynamical SystemsPoster: Conservative Safety Monitors of Stochastic Dynamical Systems
Poster: Conservative Safety Monitors of Stochastic Dynamical Systems
 
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
 
Verify-then-Monitor: Calibration Guarantees for Safety Confidence
Verify-then-Monitor: Calibration Guarantees for Safety ConfidenceVerify-then-Monitor: Calibration Guarantees for Safety Confidence
Verify-then-Monitor: Calibration Guarantees for Safety Confidence
 
Causal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical SystemsCausal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical Systems
 
Conservative Safety Monitors of Stochastic Dynamical Systems
Conservative Safety Monitors of Stochastic Dynamical SystemsConservative Safety Monitors of Stochastic Dynamical Systems
Conservative Safety Monitors of Stochastic Dynamical Systems
 
Confidence Composition for Monitors of Verification Assumptions
Confidence Composition for Monitors of Verification AssumptionsConfidence Composition for Monitors of Verification Assumptions
Confidence Composition for Monitors of Verification Assumptions
 
Overcoming Heterogeneity in Autonomous Cyber-Physical Systems
Overcoming Heterogeneity in Autonomous Cyber-Physical SystemsOvercoming Heterogeneity in Autonomous Cyber-Physical Systems
Overcoming Heterogeneity in Autonomous Cyber-Physical Systems
 
High-Confidence Data Programming for Evaluating Suppression of Physiological ...
High-Confidence Data Programming for Evaluating Suppression of Physiological ...High-Confidence Data Programming for Evaluating Suppression of Physiological ...
High-Confidence Data Programming for Evaluating Suppression of Physiological ...
 
Data Generation with PROSPECT: a Probability Specification Tool
Data Generation with PROSPECT: a Probability Specification ToolData Generation with PROSPECT: a Probability Specification Tool
Data Generation with PROSPECT: a Probability Specification Tool
 
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
 
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
 
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
 
On the Role of Assumptions in Engineering Smart Systems
On the Role of Assumptions in Engineering Smart SystemsOn the Role of Assumptions in Engineering Smart Systems
On the Role of Assumptions in Engineering Smart Systems
 
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
 
Overview of Epidemic Models for COVID-19
Overview of Epidemic Models for COVID-19Overview of Epidemic Models for COVID-19
Overview of Epidemic Models for COVID-19
 
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical SystemsThesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
 
Towards a Formal Framework for Hybrid Planning in Self-Adaptation
Towards a Formal Framework for Hybrid Planning in Self-AdaptationTowards a Formal Framework for Hybrid Planning in Self-Adaptation
Towards a Formal Framework for Hybrid Planning in Self-Adaptation
 

Recently uploaded

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Physical Systems

  • 1. Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Physical Systems Sydney Pugh1, Ivan Ruchkin2, James Weimer3, and Insup Lee1 1 University of Pennsylvania 2 University of Florida 3 Vanderbilt University 15th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS) May 16, 2024
  • 2. Outline • Introduction • Motivation • Related Work • Problem Statement • Approach • Results • Conclusion ICCPS -- 5/16/24 2
  • 3. Reality of the LE-MCPS Domain LABELED Data UNLABELED Data Primarily used for training LE-MCPS Often unused! How can we make unlabeled data useful to LE-MCPS developers? ICCPS -- 5/16/24 3 Can be used for training or analysis In our paper, we investigate whether we can we use unlabeled data to analyze the robustness of trained LE-MCPS
  • 4. Evaluating Robustness using Unlabeled Data ICCPS -- 5/16/24 4 Unlabeled Data Labeled Data Clinician Adversarial Dataset Curation Labels are highly accurate but expensive! Mostly focuses on synthetic adversarial examples! Robustness is typically evaluated by observing a LE-MCPS’s performance against adversarial examples. Adversarial Dataset
  • 5. Synthetic Adversarial Examples • Apply adversarial perturbations to clean inputs to cause misclassification • Given sample 𝑥 with true label 𝑦, add noise 𝛿 such that 𝑓 𝑥 + 𝛿 ≠ 𝑦 • E.g., ℓ! adversarial examples (Vorobeychik et al., 2018) • Limitations: adding noise to medical data typically yields invalid/unrealistic examples • Synthetic data generation techniques • E.g., Patient simulators and Generative Adversarial Networks (GANs) • Limitations: lack of realism; difficult to generate complex physiology; bias ICCPS -- 5/16/24 5 Clean ECG ECG with noise Noise
  • 6. Evaluating Robustness using Weakly-Labeled Data ICCPS -- 5/16/24 6 Unlabeled Data Labels are inexpensive but less accurate! Mostly focuses on synthetic adversarial examples! We can avoid manual labeling with weakly-supervised data labeling! Clinician Labeling Functions def LF_1(x): return heuristic_1(x) ⋮ def LF_2(x): return re.find(“abnormal”, x) Programmatic Weak Supervision Weakly-Labeled Data Adversarial Dataset Curation Adversarial Dataset • Weak label confidences are typically overconfident • However, we suspect the ordering of confidences is legit
  • 7. Evaluating Robustness via Our Approach ICCPS -- 5/16/24 7 Key Idea 1: Sample natural adversarial examples from real unlabeled medical data! Key Idea 2: Uncertainty in weak labels are indicative of “adversarialness” Dataset Curation via Adversarial Ordering Adversarially Ordered Natural Datasets More adversarial Weakly-Labeled Data Weakly-Labeled Data High uncertainty More adversarial Labels prone to inaccuracies Predictions disagree with labels Low uncertainty Less adversarial Labels largely correct Predictions match labels Analyze robustness by observing trend in accuracy across the datasets
  • 8. Natural Adversarial Examples • Hendrycks et al. discovered that clean, realistic inputs can also degrade the performance of machine learning models • Constructs a naturally adversarial dataset from ImageNet via adversarial filtration • Remove examples classified easily via very predictable classification boundaries • Limitation: medical data often lacks spurious cues • Possible feature-based approaches • Density estimator with outlier detection (Aggarwal 2013) • Out-of-distribution (OOD) detectors (Ruff et al., 2021) • Out of scope for this paper ICCPS -- 5/16/24 8 Hendrycks et al., “Natural adversarial examples”, CVPR 2021.
  • 9. Problem Statement ICCPS -- 5/16/24 9 Dataset Curation via Adversarial Ordering Inputs Outputs Unlabeled Data 𝑋 Labeling Functions Λ = 𝜆 ∶ 𝒳 → 𝒴 or “𝑎𝑏𝑠𝑡𝑎𝑖𝑛” 𝐷!, …, 𝐷" where 𝐷# = 𝑥$, & 𝑦$ Adversarially Ordered Natural Datasets
  • 10. Outline • Introduction • Motivation • Related Work • Problem Statement • Approach • Results • Conclusion ICCPS -- 5/16/24 10
  • 11. Dataset Curation via Adversarial Ordering Labeling Functions (LFs) Λ Unlabeled Data 𝑋 ICCPS -- 5/16/24 11 LF Pruning Step 1 𝐷!, …, 𝐷" Adversarially Ordered Natural Datasets Independent LFs Λ′ ⊆ Λ Probabilistic Labeling Step 2 LF Weights 𝜇 Weak Labels - 𝑌 Confidence Intervals Step 3 Intervals Θ%, Θ& Adversarial Dataset Curation Step 4 Independent LFs Λ′ ⊆ Λ
  • 12. Labeling Function Pruning • Weakly-supervised data labeling techniques assume LFs are conditionally independent if not otherwise specified • We identify an independent subset of LFs Λ′ ⊆ Λ • At a high-level, we 1. Construct a graph representation of LF dependencies • LFs as nodes • Edges between LFs with Pearson Correlation magnitude > 𝛿 2. Rank LFs (in descending order) by the number of maximal cliques they belong to • Break ties by giving preference to LFs with higher coverage • Reveals subsets of LFs that tend to share similar labeling patterns 3. Iterate through the ranking to drop dependent LFs • Goal: select smallest subset of LFs that cover all the cliques ICCPS -- 5/16/24 12 LF Maximal cliques 𝜆! 𝜆", 𝜆! , 𝜆#, 𝜆! 𝜆# 𝜆#, 𝜆! 𝜆" 𝜆", 𝜆! 𝜆$,&,' 𝜆$, 𝜆&, 𝜆' 𝜆( 𝜆( 𝛿 = 0.5 X Result: Λ# = 𝜆$, 𝜆%, 𝜆& 𝜆" 𝜆# 𝜆$ 𝜆% 𝜆& 𝜆' Graph 𝜆( Correlation Matrix X X X
  • 13. Dataset Curation via Adversarial Ordering Labeling Functions (LFs) Λ Unlabeled Data 𝑋 ICCPS -- 5/16/24 13 LF Pruning Step 1 𝐷!, …, 𝐷" Adversarially Ordered Natural Datasets Independent LFs Λ′ ⊆ Λ Probabilistic Labeling Step 2 LF Weights 𝜇 Weak Labels - 𝑌 Confidence Intervals Step 3 Intervals Θ%, Θ& Adversarial Dataset Curation Step 4 Independent LFs Λ′ ⊆ Λ Weak Labels - 𝑌 LF Weights 𝜇
  • 14. Probabilistic Labeling • We weakly label the unlabeled input data 𝑋 using programmatic weak supervision • A label model aggregates the outputs of independent LFs Λ′ via a weighted combination • How are the LF weights 𝜇 determined? • Depends on the model used • Majority Vote whose weight vector is uniform • Snorkel whose weight vector reflects the unknown accuracies of the LFs (Ratner, et al. 2019) • Limitation: weak label confidences are typically overconfident ICCPS -- 5/16/24 14 Label Model Independent LFs Output 𝑃 ) 𝑌 = 𝑦 𝝀 = 0 *+$ |-!| 𝜇* (/) 2 𝟏 𝜆* 𝑥 = 𝑦 …then softmax over 𝒴 Weak Labels
  • 15. Dataset Curation via Adversarial Ordering Labeling Functions (LFs) Λ Unlabeled Data 𝑋 ICCPS -- 5/16/24 15 LF Pruning Step 1 𝐷!, …, 𝐷" Adversarially Ordered Natural Datasets Independent LFs Λ′ ⊆ Λ Probabilistic Labeling Step 2 LF Weights 𝜇 Weak Labels - 𝑌 Confidence Intervals Step 3 Intervals Θ%, Θ& Adversarial Dataset Curation Step 4 Independent LFs Λ′ ⊆ Λ Weak Labels - 𝑌 LF Weights 𝜇 Intervals Θ%, Θ&
  • 16. Confidence Intervals for Weak Labels • Construct intervals Θ', Θ( containing the true uncertainty in weak labels # 𝑌 with probability at least 1 − 𝛼 • The interval size depends on two factors: • Weights of non-abstaining LFs • Number of non-abstaining LFs • We construct Clopper-Pearson confidence intervals where we consider LFs as Bernoulli trials • Number of trials 𝑛 𝑥 is the number non- abstaining LFs • Number of success 𝑠 𝑥 is the normalized probability of label & 𝑦 weighted by 𝑛 𝑥 ICCPS -- 5/16/24 16 Θ) 𝛼; 𝑛, 𝑠 = 𝐵 𝛼 2 ; 𝑠, 𝑛 − 𝑠 + 1 Θ* 𝛼; 𝑛, 𝑠 = 𝐵 1 − 𝛼 2 ; 𝑠 + 1 , 𝑛 − 𝑠 where 𝐵 𝑞; 𝑎, 𝑏 is the 𝑞-th quantile from a beta distribution with shape parameters 𝑎 and 𝑏 and 𝑛 𝑥 = 9 +,$ |.!| 𝟏 𝜆+ 𝑥 ≠ “𝑎𝑏𝑠𝑡𝑎𝑖𝑛” 𝑠 𝑥 = 𝑛 𝑥 @ exp ∑+,$ |.!| 𝜇+ (0) @ 𝟏 𝜆+ 𝑥 = F 𝑦 ∑0∈𝒴 exp ∑+,$ |.!| 𝜇+ (0) @ 𝟏 𝜆+ 𝑥 = 𝑦 For 𝑥 ∈ 𝑋 with weak label F 𝑦 ∈ 𝒴,
  • 17. Dataset Curation via Adversarial Ordering Labeling Functions (LFs) Λ Unlabeled Data 𝑋 ICCPS -- 5/16/24 17 LF Pruning Step 1 𝐷!, …, 𝐷" Adversarially Ordered Natural Datasets Independent LFs Λ′ ⊆ Λ Probabilistic Labeling Step 2 LF Weights 𝜇 Weak Labels - 𝑌 Confidence Intervals Step 3 Intervals Θ%, Θ& Adversarial Dataset Curation Step 4 Independent LFs Λ′ ⊆ Λ Weak Labels - 𝑌 LF Weights 𝜇 Intervals Θ%, Θ& 𝐷!, …, 𝐷" Adversarially Ordered Natural Datasets
  • 18. Adversarial Dataset Curation • Curate a sequence of adversarially ordered datasets 𝐷!, …, 𝐷" 1. Adversarially order the data • Intuition: samples with small CI lower bounds are more adversarial • Order samples by CI lower bound in descending order 2. Construct datasets from the adversarial ordering • For each dataset 𝐷1, select the top ⁄ 100 𝑛 percent of ordered samples 𝑥'4 , 𝑥'5 , … , 𝑥'|6| where Θ( 𝑥'4 ≥ Θ( 𝑥'5 ≥ ⋯ ≥ Θ( 𝑥|*| and 𝑖%, … , 𝑖|*| ∈ 1, … , |𝑋| 𝐷+ = 𝑥'7 , @ 𝑦'7 for 𝑗 ∈ 1, … , 𝑖 D 𝑋 𝑁 ICCPS -- 5/16/24 18
  • 19. Outline • Introduction • Motivation • Related Work • Problem Statement • Approach • Results • Conclusion ICCPS -- 5/16/24 19
  • 20. Evaluation • Goal: Statistically valid adversarial ordering • Accuracy of the weak labels per dataset decreases • Robust LE-MCPS is expected to show decreasing accuracy on our datasets • We use Spearman’s Rank Correlation to validate adversarial ordering • Good result indicated by negative correlation with statistically significant p-value (<0.01) • Bad result indicated by positive correlation with statistically significant p-value (<0.01) • Otherwise abstain ICCPS -- 5/16/24 20 High uncertainty More adversarial Labels prone to inaccuracies Predictions disagree with labels Low uncertainty Less adversarial Labels largely correct Predictions match labels Analyze robustness by observing trend in accuracy across the datasets
  • 21. Results • Datasets: • HR Low/High, RR Low/High, SpO2 Low: classify suppressible physiologic monitoring alarms from time-series vital sign data • Cross-modal: classify abnormal radiography images from corresponding imaging text reports • Crowdsourcing: classify sentiment in tweets • Recsys: predict if a user will read and like a book given their reading history • Spam: classify spam emails ICCPS -- 5/16/24 21 Abstain Abstain Abstain Abstain Abstain Abstain Abstain Abstain Abstain Abstain Abstain Abstain Abstain Abstain Abstain Abstain Takeaways: • Our approach successfully produces natural datasets with statistically valid adversarial ordering • And does not produce statistically invalid datasets! Our approach without LF pruning and confidence intervals Our approach without confidence intervals Our approach without LF pruning
  • 22. Outline • Introduction • Motivation • Related Work • Problem Statement • Approach • Results • Conclusion ICCPS -- 5/16/24 22
  • 23. Conclusion • We proposed a weakly-supervised approach to curating adversarially ordered datasets for evaluating robustness • Using unlabeled data • And labeling functions • We demonstrated our approach yields datasets with statistically valid adversarial ordering • Future work: • Evaluate real-world LE-MCPS on our datasets • Create a significance detector for adversarial ordering • Generally requires ground truth ICCPS -- 5/16/24 23
  • 24. Thank You! ICCPS -- 5/16/24 24 Sydney Pugh sfpugh@seas.upenn.edu Ivan Ruchkin Insup Lee James Weimer Recently defended and graduating this summer! Code Paper