SlideShare a Scribd company logo
1 of 30
Download to read offline
The dark side of
deep learning
Milan, 11 November 2017
1
Just about any DL presentation...
2
The deep learning craze
[Business Insider, 2017]
IBM speech recognition is on the verge of super-human accuracy
[Time, 2017]
Are Computers Already Smarter Than Humans?
[LiveScience, 2016]
Artificial Intelligence Beats 'Most Complex Game Devised by
Humans'
[RECODE, 2017]
Intel is paying more than $400 million to buy deep-learning
startup Nervana Systems
3
4
5
I know there's a proverb which that says 'To err is human,' but a
human error is nothing to what a computer can do if it tries.
--- Agatha Christie
People worry that computers will get too smart and take over the
world, but the real problem is that they're too stupid and they've
already taken over the world.
--- Pedro Domingos
6
What about the limitations of
DL?
DL is not magic - it is an incredibly powerful tool for
extracting regularities from data according a given
objective.
Corollary #1: A DL program will be just as smart as the
data it gets.
Corollary #2: A DL program will be just as smart as the
objective it optimizes.
7
Something to worry about #1
Bias and discrimination
8
Word embeddings
Can convert words to vectors of numbers - at the
hearth of most NLP applications with deep learning
9
Embeddings are highly sexists!
Bolukbasi, T., Chang, K.W., Zou, J., Saligrama, V. and Kalai, A., 2016.
Quantifying and reducing stereotypes in word embeddings. arXiv preprint
10
Hundreds of papers were published before this was
openly discussed!
Bolukbasi, T., Chang, K.W., Zou, J.Y., Saligrama, V. and Kalai, A.T., 2016.
. In Advances in Neural Information Processing Systems (pp. 4349-4357).
This is because gender biases probably account for an
increase in testing accuracy.
Man is to computer programmer as woman is to
homemaker? Debiasing word embeddings
11
Recent years have brought extraordinary
advances in the technical domains of AI. Alongside such efforts,
designers and researchers from a range of disciplines need to
conduct what we call social-systems analyses of AI. They need to
assess the impact of technologies on their social, cultural and
political settings
--- There is a blind spot in AI research, Nature, 2016
12
Racism is definitely bad PR!
[New Statesman, 2016]The rise of the racist robots
13
Not just an economic problem
[an investigation] found that the proprietary algorithms widely
used by judges to help determine the risk of reoffending are
almost twice as likely to mistakenly flag black defendants than
white defendants [There is a blind spot in AI research]
14
Discrimination and fairness
[Google Research Blog]Attacking discrimination with smarter machine learning
15
Something to worry about #2
Adversarial attacks
16
Can we break neural networks?
17
Fooling neural networks
(Andrej Karpathy blog)Breaking linear classifiers on Imagenet
18
Universal perturbations!
Moosavi-Dezfooli, S.M., Fawzi, A., Fawzi, O. and Frossard, P., 2016. Universal adversarial
perturbations. arXiv preprint arXiv:1610.08401.
19
20
Something to worry about #3
Privacy
21
Anonymous data?
De Montjoye, Y.A., Radaelli, L. and Singh, V.K., 2015. Unique in the shopping mall: On the reidentifiability of credit card metadata.
Science, 347(6221), pp.536-539.
22
Given access to a black-box classifier, can we infer
whether a specific example was part of the training
dataset?
We can with shadow training:
Shokri, R., Stronati, M., Song, C. and Shmatikov, V., 2017, May. Membership inference attacks against machine learning models. In
2017 IEEE Symposium on Security and Privacy (SP),  (pp. 3-18). IEEE.
23
Privacy in distributed
environments
Hitaj, B., Ateniese, G. and Perez-Cruz, F., 2017. Deep Models Under the GAN: Information Leakage from Collaborative Deep
Learning. arXiv preprint arXiv:1702.07464.
24
Something to worry about #4
Security threats
25
https://www.youtube.com/watch?v=21HjF4A3WE4
26
Something to worry about #5
Hidden technical debt
27
DL is just a tiny component!
(NIPS 2015)
Hidden Technical Debt in Machine Learning Systems
28
(NIPS 2015)
Machine learning offers a fantastically powerful toolkit for
building useful complex prediction systems quickly. ... it is
dangerous to think of these quick wins as coming for free. ... it is
common to incur massive ongoing maintenance costs in real-
world ML systems. [Risk factors include] boundary erosion,
entanglement, hidden feedback loops, undeclared consumers,
data dependencies, configuration issues, changes in the external
world, and a variety of system-level anti-patterns.
Hidden Technical Debt in Machine Learning Systems
29
If you are in Rome, check out our
Meetup:
And our new association:
Italian Association for Machine Learning
30

More Related Content

Similar to Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017

Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
vishal dineshkumar soni
 
Don't Handicap AI without Explicit Knowledge
Don't Handicap AI  without Explicit KnowledgeDon't Handicap AI  without Explicit Knowledge
Don't Handicap AI without Explicit Knowledge
Amit Sheth
 
Principles of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine LearningPrinciples of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine Learning
Jerry Lu
 
PatternLanguageOfData
PatternLanguageOfDataPatternLanguageOfData
PatternLanguageOfData
kimErwin
 

Similar to Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017 (20)

Ronde C: Masterclass - Omgaan met ethische vraagstukken over digitalisering v...
Ronde C: Masterclass - Omgaan met ethische vraagstukken over digitalisering v...Ronde C: Masterclass - Omgaan met ethische vraagstukken over digitalisering v...
Ronde C: Masterclass - Omgaan met ethische vraagstukken over digitalisering v...
 
A primer on Artificial Intelligence (AI) and Machine Learning (ML)
A primer on Artificial Intelligence (AI) and Machine Learning (ML)A primer on Artificial Intelligence (AI) and Machine Learning (ML)
A primer on Artificial Intelligence (AI) and Machine Learning (ML)
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
 
Ai titech-virach-20191026
Ai titech-virach-20191026Ai titech-virach-20191026
Ai titech-virach-20191026
 
Applications of Artificial Intelligence & Associated Technologies
Applications of Artificial Intelligence & Associated TechnologiesApplications of Artificial Intelligence & Associated Technologies
Applications of Artificial Intelligence & Associated Technologies
 
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
 
AI - Exploring Frontiers
AI - Exploring FrontiersAI - Exploring Frontiers
AI - Exploring Frontiers
 
Have we poisoned the internet for good?
Have we poisoned the internet for good?Have we poisoned the internet for good?
Have we poisoned the internet for good?
 
Data Reliability Challenges with Spark by Henning Kropp (Spark & Hadoop User ...
Data Reliability Challenges with Spark by Henning Kropp (Spark & Hadoop User ...Data Reliability Challenges with Spark by Henning Kropp (Spark & Hadoop User ...
Data Reliability Challenges with Spark by Henning Kropp (Spark & Hadoop User ...
 
Don't Handicap AI without Explicit Knowledge
Don't Handicap AI  without Explicit KnowledgeDon't Handicap AI  without Explicit Knowledge
Don't Handicap AI without Explicit Knowledge
 
AI and disinfo (1).pdf
AI and disinfo (1).pdfAI and disinfo (1).pdf
AI and disinfo (1).pdf
 
Principles of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine LearningPrinciples of Artificial Intelligence & Machine Learning
Principles of Artificial Intelligence & Machine Learning
 
PatternLanguageOfData
PatternLanguageOfDataPatternLanguageOfData
PatternLanguageOfData
 
Student Presentation: AI & Government
Student Presentation: AI & GovernmentStudent Presentation: AI & Government
Student Presentation: AI & Government
 
AI Presentation Y65 Class Dinner
AI Presentation Y65 Class DinnerAI Presentation Y65 Class Dinner
AI Presentation Y65 Class Dinner
 
Open Mining Education, Ethics & AI
Open Mining Education, Ethics & AIOpen Mining Education, Ethics & AI
Open Mining Education, Ethics & AI
 
[DSC Europe 23] Rania Wazir - Opening up the box: the complexity of human int...
[DSC Europe 23] Rania Wazir - Opening up the box: the complexity of human int...[DSC Europe 23] Rania Wazir - Opening up the box: the complexity of human int...
[DSC Europe 23] Rania Wazir - Opening up the box: the complexity of human int...
 
ARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCEARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCE
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
AI-SDV 2020: AI, IoT, Blockchain & Co: How to keep track and take advantage o...
AI-SDV 2020: AI, IoT, Blockchain & Co: How to keep track and take advantage o...AI-SDV 2020: AI, IoT, Blockchain & Co: How to keep track and take advantage o...
AI-SDV 2020: AI, IoT, Blockchain & Co: How to keep track and take advantage o...
 

More from Codemotion

More from Codemotion (20)

Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
 
Pompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyPompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending story
 
Pastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaPastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storia
 
Pennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserPennisi - Essere Richard Altwasser
Pennisi - Essere Richard Altwasser
 
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
 
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
 
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
 
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 - Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
 
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
 
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
 
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
 
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
 
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
 
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
 
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
 
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
 
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
 
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
 
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017

  • 1. The dark side of deep learning Milan, 11 November 2017 1
  • 2. Just about any DL presentation... 2
  • 3. The deep learning craze [Business Insider, 2017] IBM speech recognition is on the verge of super-human accuracy [Time, 2017] Are Computers Already Smarter Than Humans? [LiveScience, 2016] Artificial Intelligence Beats 'Most Complex Game Devised by Humans' [RECODE, 2017] Intel is paying more than $400 million to buy deep-learning startup Nervana Systems 3
  • 4. 4
  • 5. 5
  • 6. I know there's a proverb which that says 'To err is human,' but a human error is nothing to what a computer can do if it tries. --- Agatha Christie People worry that computers will get too smart and take over the world, but the real problem is that they're too stupid and they've already taken over the world. --- Pedro Domingos 6
  • 7. What about the limitations of DL? DL is not magic - it is an incredibly powerful tool for extracting regularities from data according a given objective. Corollary #1: A DL program will be just as smart as the data it gets. Corollary #2: A DL program will be just as smart as the objective it optimizes. 7
  • 8. Something to worry about #1 Bias and discrimination 8
  • 9. Word embeddings Can convert words to vectors of numbers - at the hearth of most NLP applications with deep learning 9
  • 10. Embeddings are highly sexists! Bolukbasi, T., Chang, K.W., Zou, J., Saligrama, V. and Kalai, A., 2016. Quantifying and reducing stereotypes in word embeddings. arXiv preprint 10
  • 11. Hundreds of papers were published before this was openly discussed! Bolukbasi, T., Chang, K.W., Zou, J.Y., Saligrama, V. and Kalai, A.T., 2016. . In Advances in Neural Information Processing Systems (pp. 4349-4357). This is because gender biases probably account for an increase in testing accuracy. Man is to computer programmer as woman is to homemaker? Debiasing word embeddings 11
  • 12. Recent years have brought extraordinary advances in the technical domains of AI. Alongside such efforts, designers and researchers from a range of disciplines need to conduct what we call social-systems analyses of AI. They need to assess the impact of technologies on their social, cultural and political settings --- There is a blind spot in AI research, Nature, 2016 12
  • 13. Racism is definitely bad PR! [New Statesman, 2016]The rise of the racist robots 13
  • 14. Not just an economic problem [an investigation] found that the proprietary algorithms widely used by judges to help determine the risk of reoffending are almost twice as likely to mistakenly flag black defendants than white defendants [There is a blind spot in AI research] 14
  • 15. Discrimination and fairness [Google Research Blog]Attacking discrimination with smarter machine learning 15
  • 16. Something to worry about #2 Adversarial attacks 16
  • 17. Can we break neural networks? 17
  • 18. Fooling neural networks (Andrej Karpathy blog)Breaking linear classifiers on Imagenet 18
  • 19. Universal perturbations! Moosavi-Dezfooli, S.M., Fawzi, A., Fawzi, O. and Frossard, P., 2016. Universal adversarial perturbations. arXiv preprint arXiv:1610.08401. 19
  • 20. 20
  • 21. Something to worry about #3 Privacy 21
  • 22. Anonymous data? De Montjoye, Y.A., Radaelli, L. and Singh, V.K., 2015. Unique in the shopping mall: On the reidentifiability of credit card metadata. Science, 347(6221), pp.536-539. 22
  • 23. Given access to a black-box classifier, can we infer whether a specific example was part of the training dataset? We can with shadow training: Shokri, R., Stronati, M., Song, C. and Shmatikov, V., 2017, May. Membership inference attacks against machine learning models. In 2017 IEEE Symposium on Security and Privacy (SP),  (pp. 3-18). IEEE. 23
  • 24. Privacy in distributed environments Hitaj, B., Ateniese, G. and Perez-Cruz, F., 2017. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning. arXiv preprint arXiv:1702.07464. 24
  • 25. Something to worry about #4 Security threats 25
  • 27. Something to worry about #5 Hidden technical debt 27
  • 28. DL is just a tiny component! (NIPS 2015) Hidden Technical Debt in Machine Learning Systems 28
  • 29. (NIPS 2015) Machine learning offers a fantastically powerful toolkit for building useful complex prediction systems quickly. ... it is dangerous to think of these quick wins as coming for free. ... it is common to incur massive ongoing maintenance costs in real- world ML systems. [Risk factors include] boundary erosion, entanglement, hidden feedback loops, undeclared consumers, data dependencies, configuration issues, changes in the external world, and a variety of system-level anti-patterns. Hidden Technical Debt in Machine Learning Systems 29
  • 30. If you are in Rome, check out our Meetup: And our new association: Italian Association for Machine Learning 30