Mlcheck– Property-Driven Testing of Machine Learning Models

Total Page:16

File Type:pdf, Size:1020Kb

Mlcheck– Property-Driven Testing of Machine Learning Models MLCheck– Property-Driven Testing of Machine Learning Models Arnab Sharma Caglar Demir Department of Computer Science Data Science Group University of Oldenburg Paderborn University Oldenburg, Germany Paderborn, Germany [email protected] [email protected] Axel-Cyrille Ngonga Ngomo Heike Wehrheim Data Science Group Department of Computer Science Paderborn University University of Oldenburg Paderborn, Germany Oldenburg, Germany [email protected] [email protected] ABSTRACT 1 INTRODUCTION In recent years, we observe an increasing amount of software with The importance of quality assurance for applications developed machine learning components being deployed. This poses the ques- using machine learning (ML) increases steadily as they are being tion of quality assurance for such components: how can we validate deployed in a growing number of domains and sites. Supervised ML whether specified requirements are fulfilled by a machine learned algorithms “learn” their behaviour as generalizations of training software? Current testing and verification approaches either focus data using sophisticated statistical or mathematical methods. Still, on a single requirement (e.g., fairness) or specialize on a single type developers need to make sure that their software—whether learned of machine learning model (e.g., neural networks). or programmed—satisfies certain specified requirements. Currently, In this paper, we propose property-driven testing of machine two orthogonal approaches can be followed to achieve this goal: (A) learning models. Our approach MLCheck encompasses (1) a lan- employing an ML algorithm guaranteeing some requirement per guage for property specification, and (2) a technique for system- design, or (B) validating the requirement on the model generated atic test case generation. The specification language is compara- by the ML algorithm. ble to property-based testing languages. Test case generation em- Both approaches have their individual shortcomings: Approach ploys advanced verification technology for a systematic, property- A is only available for a handful of requirements (e.g., fairness, dependent construction of test suites, without additional user- monotonicity, robustness) [23, 33, 41]. Moreover, such algorithms supplied generator functions. We evaluate MLCheck using require- cannot ensure the complete fulfillment of the requirement. For ments and data sets from three different application areas (software example, Galhotra et al. [15] have found fairness-aware ML al- discrimination, learning on knowledge graphs and security). Our gorithms to generate unfair predictions, and Sharma et al. [35] evaluation shows that despite its generality MLCheck can even out- detected non-monotonic predictions in supposedly monotone clas- perform specialised testing approaches while having a comparable sifiers. For robustness to adversarial attacks, the algorithms can runtime. only reduce the attack surface. Approach B, on the other hand, is only possible if a validation technique exists which is applicable to KEYWORDS (1) the specific type of machine learning classifier under considera- tion (i.e., neural network, SVM, etc.) and (2) the specific property to Machine Learning Testing, Decision Tree, Neural Network, Property- be checked. Current validation techniques are restricted to either a Based Testing. single model type or a single property (or even both). ACM Reference Format: In this paper, we propose property-driven testing as a validation arXiv:2105.00741v1 [cs.SE] 3 May 2021 Arnab Sharma, Caglar Demir, Axel-Cyrille Ngonga Ngomo, and Heike technique for machine learning models overcoming the shortcom- Wehrheim. 2021. MLCheck– Property-Driven Testing of Machine Learning ings of approach B. Our technique allows developers to specify the Models . In Proceedings of ACM Conference (Conference’DD). ACM, New property under interest and—based on the property—performs a York, NY, USA, 12 pages. https:XXXX targeted generation of test cases. The target is to find test cases violating the property. The approach is applicable to arbitrary types of non-stochastic properties and arbitrary types of supervised ma- Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed chine learning models. We consider the model under test (MUT) as for profit or commercial advantage and that copies bear this notice and the full citation a black-box of which we just observe the input-output behaviour. on the first page. Copyrights for components of this work owned by others than ACM To achieve a systematic generation of test cases, specific to both must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a MUT and property, we train a second white-box model approximat- fee. Request permissions from [email protected]. ing the MUT by using its predictions as training data. Knowing Conference’DD, MM YYYY, XX the white-box’s internal structure, we can apply state-of-the-art © 2021 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM...$15.00 verification technology to verify the property on it. A verification https:XXXX result of “failure” (property not satisfied) is then accompanied by Conference’DD, MM YYYY, XX Arnab Sharma, Caglar Demir, Axel-Cyrille Ngonga Ngomo, and Heike Wehrheim (one or more) counterexamples, which we subsequently store as 2 FOUNDATIONS test inputs whenever they are failures for the MUT as well. We start by introducing some basic terminology in machine learning We currently employ two types of ML models as approximating and formally defining the properties to be checked for our three white-boxes: decision trees and neural networks. While no prior application areas. knowledge is required pertaining to the internal structure of the A supervised machine learning (ML) algorithm works in two model under test, the internals of the white-box model are accessible steps. In the first (learning) phase, it is presented with a set of data to verification. Test generation proceeds by (1) encoding both prop- instances (training data) and generates a function (the predictive erty and white-box model as logical formulae and (2) using an SMT model), generalising from the training data. The generated predic- (Satisfiability Modulo Theories) solver to check their satisfiability. tive model (short, model) is then used in the second (prediction) Counterexamples in this case directly come in the form of satisfying phase to predict classes for unknown data instances. assignments to logical variables which encode feature and class Formally, the generated model is a function values. Due to the usage of an approximating white-box model, test generation is an iterative procedure: whenever a counterexample " : -1 × ... × -= ! /1 × ... × /< , on the white-box model is found which is not valid for the MUT, where -8 is the value set of feature 8, 1 ≤ 8 ≤ =, and every / 9 , 1 ≤ the white-box model gets retrained. This way the approximation 9 ≤ <, contains the classes for the 9th label. Instead of numbering quality of the white-box model is successively improved. features and labels, we also use feature names 퐹1, . , 퐹= and label We have implemented our approach in a tool called MLCheck names !1,...,!<, and let 퐹 = f퐹1, . , 퐹= g, ! = f!1,...,!< g. We and evaluated it on requirements of three different application freely mix numbers and names in our formalizations. When < ¡ 1, areas: the learning problem is a multilabel classification problem; when j/8 j ¡ 2 for some 8, the learning problem is a multiclass classification • Software discrimination studies whether ML models give problem. In case j/8 j = 2 for all 8, it is a binary classification problem. ® ® predictions which are (un)biased with respect to some at- We write - for -1 × ... × -=, / for /1 × .../< and use an index tributes. Different definitions of such fairness requirements (like in G8 ) to access the 8-th component. The training data consists exist (see [40]); we exemplarily use individual discrimina- of elements from -® × /®, i.e., data instances with known associated tion [15]. class labels. During the prediction, the generated predictive model • Knowledge graphs are a family of knowledge representa- assigns classes I 2 /® to a data instance G 2 -® (which is poten- tion techniques. We consider learning classifiers for entities tially not in the training data). Based on this formalization, we based on knowledge graphs embeddings [12] and exemplar- define properties relevant to our three application areas software ily consider the properties of class disjointness and subsump- discrimination, knowledge representation and security. tion. Software discrimination. Fairness of predictive models refers • Security of machine learning applications investigates if to the absence of discrimination of individuals due to certain fea- ML models are vulnerable to attacks, i.e., can be manipu- ture values. More precisely, a model has no individual discrimina- lated as to give specific predictions. We exemplarily study tion [15] if flipping the value of a single, so called sensitive feature, vulnerability to trojan attacks [17]. while keeping the values of other features does not change the prediction. In all three areas, we compare our approach to either other tools specifically testing such properties (if they exist)
Recommended publications
  • Explaining First Impressions: Modeling, Recognizing, and Explaining Apparent Personality from Videos
    Noname manuscript No. (will be inserted by the editor) Explaining First Impressions: Modeling, Recognizing, and Explaining Apparent Personality from Videos Hugo Jair Escalante∗ · Heysem Kaya∗ · Albert Ali Salah∗ · Sergio Escalera · Ya˘gmur G¨u¸cl¨ut¨urk · Umut G¨u¸cl¨u · Xavier Bar´o · Isabelle Guyon · Julio Jacques Junior · Meysam Madadi · Stephane Ayache · Evelyne Viegas · Furkan G¨urpınar · Achmadnoer Sukma Wicaksana · Cynthia C. S. Liem · Marcel A. J. van Gerven · Rob van Lier Received: date / Accepted: date ∗ Means equal contribution by the authors. Hugo Jair Escalante INAOE, Mexico and ChaLearn, USA E-mail: [email protected] Heysem Kaya Namık Kemal University, Department of Computer Engineering, Turkey E-mail: [email protected] Albert Ali Salah Bo˘gazi¸ci University, Dept. of Computer Engineering, Turkey and Nagoya University, FCVRC, Japan E-mail: [email protected] Furkan G¨urpınar Bo˘gazi¸ciUniversity, Computational Science and Engineering, Turkey E-mail: [email protected] Sergio Escalera University of Barcelona and Computer Vision Center, Spain E-mail: [email protected] Meysam Madadi Computer Vision Center, Spain E-mail: [email protected] Ya˘gmur G¨u¸cl¨ut¨urk,Umut G¨u¸cl¨u,Marcel A. J. van Gerven and Rob van Lier Radboud University, Donders Institute for Brain, Cognition and Behaviour, Nijmegen, the Netherlands E-mail: fy.gucluturk,u.guclu,m.vangerven,[email protected] Xavier Bar´oand Julio Jacques Junior Universitat Oberta de Catalunya and Computer Vision Center, Spain arXiv:1802.00745v3 [cs.CV] 29 Sep 2019 E-mail: fxbaro,[email protected] Isabelle Guyon UPSud/INRIA, Universit´eParis-Saclay, France and ChaLearn, USA 2 H.J.
    [Show full text]
  • Arxiv:2008.08516V1 [Cs.LG] 19 Aug 2020
    Automated Machine Learning - a brief review at the end of the early years Hugo Jair Escalante Computer Science Department Instituto Nacional de Astrof´ısica, Optica´ y Electronica,´ Tonanzintla, Puebla, 72840, Mexico E-mail: [email protected] Abstract Automated machine learning (AutoML) is the sub-field of machine learning that aims at automating, to some extend, all stages of the design of a machine learning system. In the context of supervised learning, AutoML is concerned with feature extraction, pre processing, model design and post processing. Major contributions and achievements in AutoML have been taking place during the recent decade. We are there- fore in perfect timing to look back and realize what we have learned. This chapter aims to summarize the main findings in the early years of AutoML. More specifically, in this chapter an introduction to AutoML for supervised learning is provided and an historical review of progress in this field is presented. Likewise, the main paradigms of AutoML are described and research opportunities are outlined. 1 Introduction Automated Machine Learning or AutoML is a term coined by the machine learning community to refer to methods that aim at automating the design and development of machine learning systems and appli- cations [33]. In the context of supervised learning, AutoML aims at relaxing the need of the user in the loop from all stages in the design of supervised learning systems (i.e., any system relying on models for classification, recognition, regression, forecasting, etc.). This is a tangible need at present, as data are be- arXiv:2008.08516v1 [cs.LG] 19 Aug 2020 ing generated vastly and in practically any context and scenario, however, the number of machine learning experts available to analyze such data is overseeded.
    [Show full text]
  • Robust Deep Learning: a Case Study Victor Estrade, Cécile Germain, Isabelle Guyon, David Rousseau
    Robust deep learning: A case study Victor Estrade, Cécile Germain, Isabelle Guyon, David Rousseau To cite this version: Victor Estrade, Cécile Germain, Isabelle Guyon, David Rousseau. Robust deep learning: A case study. JDSE 2017 - 2nd Junior Conference on Data Science and Engineering, Sep 2017, Orsay, France. pp.1-5, 2017. hal-01665938 HAL Id: hal-01665938 https://hal.inria.fr/hal-01665938 Submitted on 17 Dec 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Robust deep learning: A case study Victor Estrade, Cecile Germain, Isabelle Guyon, David Rousseau Laboratoire de Recherche en Informatique Abstract. We report on an experiment on robust classification. The literature proposes adversarial and generative learning, as well as feature construction with auto-encoders. In both cases, the context is domain- knowledge-free performance. As a consequence, the robustness quality relies on the representativity of the training dataset wrt the possible perturbations. When domain-specific a priori knowledge is available, as in our case, a specific flavor of DNN called Tangent Propagation is an effective and less data-intensive alternative. Keywords: Domain adaptation, Deep Neural Networks, High Energy Physics 1 Motivation This paper addresses the calibration of a classifier in presence of systematic errors, with an example in High Energy Physics.
    [Show full text]
  • CVPR 2019 Outstanding Reviewers We Are Pleased to Recognize the Following Researchers As “CVPR 2019 Outstanding Reviewers”
    CVPR 2019 Cover Page CVPR 2019 Organizing Committee Message from the General and Program Chairs Welcome to the 32nd meeting of the IEEE/CVF Conference on papers, which allowed them to be free of conflict in the paper review Computer Vision and Pattern Recognition (CVPR 2019) at Long process. To accommodate the growing number of papers and Beach, CA. CVPR continues to be one of the best venues for attendees while maintaining the three-day length of the conference, researchers in our community to present their most exciting we run oral sessions in three parallel tracks and devote the entire advances in computer vision, pattern recognition, machine learning, technical program to accepted papers. robotics, and artificial intelligence. With oral and poster We would like to thank everyone involved in making CVPR 2019 a presentations, tutorials, workshops, demos, an ever-growing success. This includes the organizing committee, the area chairs, the number of exhibitions, and numerous social events, this is a week reviewers, authors, demo session participants, donors, exhibitors, that everyone will enjoy. The co-location with ICML 2019 this year and everyone else without whom this meeting would not be brings opportunity for more exchanges between the communities. possible. The program chairs particularly thank a few unsung heroes Accelerating a multi-year trend, CVPR continued its rapid growth that helped us tremendously: Eric Mortensen for mentoring the with a record number of 5165 submissions. After three months’ publication chairs and managing camera-ready and program efforts; diligent work from the 132 area chairs and 2887 reviewers, including Ming-Ming Cheng for quickly updating the website; Hao Su for those reviewers who kindly helped in the last minutes serving as working overtime as both area chair and AC meeting chair; Walter emergency reviewers, 1300 papers were accepted, yielding 1294 Scheirer for managing finances and serving as the true memory of papers in the final program after a few withdrawals.
    [Show full text]
  • Safety and Robustness Certification of Neural Networks with Abstract
    AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation Timon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri∗, Martin Vechev Department of Computer Science ETH Zurich, Switzerland Abstract—We present AI2, the first sound and scalable an- Attack Original Perturbed Diff alyzer for deep neural networks. Based on overapproximation, AI2 can automatically prove safety properties (e.g., robustness) FGSM [12], = 0:3 of realistic neural networks (e.g., convolutional neural networks). The key insight behind AI2 is to phrase reasoning about safety and robustness of neural networks in terms of classic abstract Brightening, δ = 0:085 interpretation, enabling us to leverage decades of advances in that area. Concretely, we introduce abstract transformers that capture the behavior of fully connected and convolutional neural Fig. 1: Attacks applied to MNIST images [25]. network layers with rectified linear unit activations (ReLU), as well as max pooling layers. This allows us to handle real-world neural networks, which are often built out of those types of layers. The FGSM [12] attack perturbs an image by adding to it a 2 We present a complete implementation of AI together with particular noise vector multiplied by a small number (in an extensive evaluation on 20 neural networks. Our results Fig. 1, = 0:3). The brightening attack (e.g., [32]) perturbs demonstrate that: (i) AI2 is precise enough to prove useful specifications (e.g., robustness), (ii) AI2 can be used to certify an image by changing all pixels above the threshold 1 − δ to the effectiveness of state-of-the-art defenses for neural networks, the brightest possible value (in Fig.
    [Show full text]
  • Arxiv:2104.10201V1 [Cs.LG] 20 Apr 2021
    Bayesian Optimization is Superior to Random Search for Machine Learning Hyperparameter Tuning: Analysis of the Black-Box Optimization Challenge 2020 Ryan Turner David Eriksson Michael McCourt Juha Kiili [email protected] [email protected] [email protected] [email protected] Twitter Facebook SigOpt, an Intel company Valohai Eero Laaksonen Zhen Xu Isabelle Guyon [email protected] [email protected] [email protected] Valohai 4Paradigm ChaLearn Abstract This paper presents the results and insights from the black-box optimization (BBO) challenge at NeurIPS 2020 which ran from July–October, 2020. The chal- lenge emphasized the importance of evaluating derivative-free optimizers for tun- ing the hyperparameters of machine learning models. This was the first black-box optimization challenge with a machine learning emphasis. It was based on tuning (validation set) performance of standard machine learning models on real datasets. This competition has widespread impact as black-box optimization (e.g., Bayesian optimization) is relevant for hyperparameter tuning in almost every machine learn- ing project as well as many applications outside of machine learning. The final leaderboard was determined using the optimization performance on held-out (hid- den) objective functions, where the optimizers ran without human intervention. Baselines were set using the default settings of several open-source black-box op- timization packages as well as random search. 1 Introduction In black-box optimization we aim to solve the problem minx2Ω f(x), where f is a computation- ally expensive black-box function and the domain Ω is commonly a hyper-rectangle. The fact that evaluations are computationally expensive typically limits the number of evaluations of f to a few hundred.
    [Show full text]
  • Challenges in Machine Learning, 2017
    Neural Connectomics Challenge Battaglia, D., Guyon, I., Lemaire, V., Orlandi, J., Ray, B., Soriano, J. (Eds.) The Springer Series on Challenges in Machine Learning, 2017 Author’s manuscript Table of Contents 1 First Connectomics Challenge: From Imaging to Connectivity 1 J.G. Orlandi, B. Ray, D. Battaglia, I. Guyon, V. Lemaire, M. Saeed, J. Soriano, A. Statnikov & O. Stetter; JMLR W&CP 11:1–17, 2014. Reconstruction of Excitatory Neuronal Connectivity via Metric Score Pooling and Regularization 27 C. Tao, W. Lin & J. Feng; JMLR W&CP 11:27–36, 2014. SuperSlicing Frame Restoration for Anisotropic ssTEM and Video Data 37 D. Laptev & J.M. Buhmann; JMLR W&CP 11:37–47, 2014. Neural Connectivity Reconstruction from Calcium Imaging Signal using Random Forest with Topological Features 49 W.M. Czarnecki & R. Jozefowicz; JMLR W&CP 11:49–58, 2014. Signal Correlation Prediction Using Convolutional Neural Networks 59 L. Romaszko; JMLR W&CP 11:59–70, 2014. Simple Connectome Inference from Partial Correlation Statistics in Calcium Imaging 71 A. Sutera et al; JMLR W&CP 11:71–83, 2014. Predicting Spiking Activities in DLS Neurons with Linear-Nonlinear-Poisson Model 85 S. Ma & D.J. Barker; JMLR W&CP 11:85–92, 2014. Efficient combination of pairwise feature networks 93 P. Bellot & P.E. Meyer; JMLR W&CP 11:93–100, 2014. Supervised Neural Network Structure Recovery 101 I.M.d. Abril & A. Now´e; JMLR W&CP 11:101–108, 2014. i ii JMLR: Workshop and Conference Proceedings 11:1–17,2014Connectomics(ECML2014)[DRAFTDONOTDISTRIBUTE] First Connectomics Challenge: From Imaging to Connectivity Javier G.
    [Show full text]
  • Design of Experiments for the NIPS 2003 Variable Selection Benchmark Isabelle Guyon – July 2003 [email protected]
    Design of experiments for the NIPS 2003 variable selection benchmark Isabelle Guyon – July 2003 [email protected] Background: Results published in the field of feature or variable selection (see e.g. the special issue of JMLR on variable and feature selection: http://www.jmlr.org/papers/special/feature.html) are for the most part on different data sets or used different data splits, which make them hard to compare. We formatted a number of datasets for the purpose of benchmarking variable selection algorithms in a controlled manner1. The data sets were chosen to span a variety of domains (cancer prediction from mass-spectrometry data, handwritten digit recognition, text classification, and prediction of molecular activity). One dataset is artificial. We chose data sets that had sufficiently many examples to create a large enough test set to obtain statistically significant results. The input variables are continuous or binary, sparse or dense. All problems are two-class classification problems. The similarity of the tasks allows participants to enter results on all data sets. Other problems will be added in the future. Method: Preparing the data included the following steps: - Preprocessing data to obtain features in the same numerical range (0 to 999 for continuous data and 0/1 for binary data). - Adding “random” features distributed similarly to the real features. In what follows we refer to such features as probes to distinguish them from the real features. This will allow us to rank algorithms according to their ability to filter out irrelevant features. - Randomizing the order of the patterns and the features to homogenize the data.
    [Show full text]
  • Advances in Neural Information Processing Systems 29
    Advances in Neural Information Processing Systems 29 30th Annual Conference on Neural Information Processing Systems 2016 Barcelona, Spain 5-10 December 2016 Volume 1 of 7 Editors: Daniel D. Lee Masashi Sugiyama Ulrike von Luxburg Isabelle Guyon Roman Garnett ISBN: 978-1-5108-3881-9 Printed from e-media with permission by: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 Some format issues inherent in the e-media version may also appear in this print version. Copyright© (2016) by individual authors and NIPS All rights reserved. Printed by Curran Associates, Inc. (2017) For permission requests, please contact Neural Information Processing Systems (NIPS) at the address below. Neural Information Processing Systems 10010 North Torrey Pines Road La Jolla, CA 92037 USA Phone: (858) 453-1623 Fax: (858) 587-0417 [email protected] Additional copies of this publication are available from: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 USA Phone: 845-758-0400 Fax: 845-758-2633 Email: [email protected] Web: www.proceedings.com Contents Contents .................................................................... iii Preface ..................................................................... xli Donors .................................................................... xlvii NIPS foundation ......................................................... xlix Committees ................................................................. li Reviewers .................................................................. liv Scan Order
    [Show full text]
  • An Introduction to Variable and Feature Selection
    Journal of Machine Learning Research 3 (2003) 1157-1182 Submitted 11/02; Published 3/03 An Introduction to Variable and Feature Selection Isabelle Guyon [email protected] Clopinet 955 Creston Road Berkeley, CA 94708-1501, USA Andre´ Elisseeff [email protected] Empirical Inference for Machine Learning and Perception Department Max Planck Institute for Biological Cybernetics Spemannstrasse 38 72076 Tubingen,¨ Germany Editor: Leslie Pack Kaelbling Abstract Variable and feature selection have become the focus of much research in areas of application for which datasets with tens or hundreds of thousands of variables are available. These areas include text processing of internet documents, gene expression array analysis, and combinatorial chemistry. The objective of variable selection is three-fold: improving the prediction performance of the pre- dictors, providing faster and more cost-effective predictors, and providing a better understanding of the underlying process that generated the data. The contributions of this special issue cover a wide range of aspects of such problems: providing a better definition of the objective function, feature construction, feature ranking, multivariate feature selection, efficient search methods, and feature validity assessment methods. Keywords: Variable selection, feature selection, space dimensionality reduction, pattern discov- ery, filters, wrappers, clustering, information theory, support vector machines, model selection, statistical testing, bioinformatics, computational biology, gene expression,
    [Show full text]
  • Chapter 10: Analysis of the Automl Challenge Series 2015-2018
    Chapter 10 Analysis of the AutoML Challenge Series 2015–2018 Isabelle Guyon, Lisheng Sun-Hosoya, Marc Boullé, Hugo Jair Escalante, Sergio Escalera , Zhengying Liu, Damir Jajetic, Bisakha Ray, Mehreen Saeed, Michèle Sebag, Alexander Statnikov, Wei-Wei Tu, and Evelyne Viegas Abstract The ChaLearn AutoML Challenge (The authors are in alphabetical order of last name, except the first author who did most of the writing and the second author who produced most of the numerical analyses and plots.) (NIPS 2015 – ICML 2016) consisted of six rounds of a machine learning competition of progressive difficulty, subject to limited computational resources. It was followed by I. Guyon () University of Paris-Sud, Orsay, France INRIA, University of Paris-Saclay, Paris, France ChaLearn and ClopiNet, Berkeley, CA, USA e-mail: [email protected] L. Sun-Hosoya · Z. Liu Laboratoire de Recherche en Informatique, University of Paris-Sud, Orsay, France University of Paris-Saclay, Paris, France M. Boullé Machine Learning Group, Orange Labs, Lannion, France H. J. Escalante Computational Sciences Department, INAOE and ChaLearn, Tonantzintla, Mexico S. Escalera Computer Vision Center, University of Barcelona, Barcelona, Spain D. Jajetic IN2, Zagreb, Croatia B. Ray Langone Medical Center, New York University, New York, NY, USA M. Saeed Department of Computer Science, National University of Computer and Emerging Sciences, Islamabad, Pakistan M. Sebag Laboratoire de Recherche en Informatique, CNRS, Paris, France University of Paris-Saclay, Paris, France © The Author(s) 2019 177 F. Hutter et al. (eds.), Automated Machine Learning, The Springer Series on Challenges in Machine Learning, https://doi.org/10.1007/978-3-030-05318-5_10 178 I.
    [Show full text]
  • Analysis of the Automl Challenge Series 2015-2018
    Analysis of the AutoML Challenge series 2015-2018 Isabelle Guyon, Lisheng Sun-Hosoya, Marc Boullé, Hugo Escalante, Sergio Escalera, Zhengying Liu, Damir Jajetic, Bisakha Ray, Mehreen Saeed, Michèle Sebag, et al. To cite this version: Isabelle Guyon, Lisheng Sun-Hosoya, Marc Boullé, Hugo Escalante, Sergio Escalera, et al.. Analysis of the AutoML Challenge series 2015-2018. Frank Hutter; Lars Kotthoff; Joaquin Vanschoren. AutoML: Methods, Systems, Challenges, Springer Verlag, In press, The Springer Series on Challenges in Machine Learning. hal-01906197 HAL Id: hal-01906197 https://hal.archives-ouvertes.fr/hal-01906197 Submitted on 26 Oct 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. JMLR: Workshop and Conference Proceedings 1:1{76, 2017 ICML 2015 AutoML Workshop Analysis of the AutoML Challenge series 2015-2018 Isabelle Guyon [email protected] UPSud/INRIA, U. Paris-Saclay, France and ChaLearn, USA Lisheng Sun-Hosoya [email protected] UPSud, U. Paris-Saclay, France Marc Boull´e [email protected] Orange Labs, France Hugo Jair Escalante [email protected] INAOE, Mexico Sergio Escalera [email protected] Computer Vision Center and University of Barcelona, Barcelona, Spain Zhengying Liu [email protected] UPSud, U.
    [Show full text]