Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/3306127.3332070acmconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

Contradict the Machine: A Hybrid Approach to Identifying Unknown Unknowns

Published: 08 May 2019 Publication History
  • Get Citation Alerts
  • Abstract

    Machine predictions that are highly confident yet incorrect, i.e. unknown unknowns, are crucial errors to identify, especially in high-stakes settings like medicine or law. We describe a hybrid approach to identifying unknown unknowns that combines the previous algorithmic and crowdsourcing strategies. Our method uses a set of decision rules to approximate how the model makes high confidence predictions. We present the rules to crowd workers, and challenge them to generate instances that contradict the rules. To select the most promising rule to next present to workers, we use a multi-armed bandit algorithm. We evaluate our method by conducting a user study on Amazon Mechanical Turk. Experimental results on three datasets indicate that our approach discovers unknown unknowns more efficiently than state-of-the-art baselines.

    References

    [1]
    Tiago A. Almeida, José Mar'i a Gó mez Hidalgo, and Akebo Yamakami. 2011. Contributions to the study of SMS spam filtering: new collection and results. In Proceedings of the 2011 ACM Symposium on Document Engineering, Mountain View, CA, USA, September 19--22, 2011. 259--262.
    [2]
    Joshua Attenberg, Panos Ipeirotis, and Foster J. Provost. 2015. Beat the Machine: Challenging Humans to Find a Predictive Model's "Unknown Unknowns". J. Data and Information Quality, Vol. 6, 1 (2015), 1:1--1:17.
    [3]
    Josh Attenberg, Panagiotis G. Ipeirotis, and Foster J. Provost. 2011. Beat the Machine: Challenging Workers to Find the Unknown Unknowns. In Human Computation, Papers from the 2011 AAAI Workshop .
    [4]
    Gagan Bansal and Daniel S. Weld. 2018. A Coverage-Based Utility Model for Identifying Unknown Unknowns. In Proc. of AAAI. https://www.aaai.org/ocs/index.php/AAAI/AAAI18/paper/view/17110
    [5]
    Shai Ben-David, John Blitzer, Koby Crammer, and Fernando Pereira. 2006. Analysis of Representations for Domain Adaptation. Proc. of NIPS. 137--144. http://papers.nips.cc/paper/2983-analysis-of-representations-for-domain-adaptation
    [6]
    Leo Breiman, J. H. Friedman, R. A. Olshen, and C. J. Stone. 1984. Classification and Regression Trees .Wadsworth.
    [7]
    Himabindu Lakkaraju, Ece Kamar, Rich Caruana, and Eric Horvitz. 2017. Identifying Unknown Unknowns in the Open World: Representations and Policies for Guided Exploration. In Proc. of AAAI. 2124--2132. http://aaai.org/ocs/index.php/AAAI/AAAI17/paper/view/14434
    [8]
    Julian John McAuley and Jure Leskovec. 2013. From amateurs to connoisseurs: modeling the evolution of user expertise through online reviews. In 22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13--17, 2013. 897--908.
    [9]
    Bo Pang and Lillian Lee. 2005. Seeing Stars: Exploiting Class Relationships for Sentiment Categorization with Respect to Rating Scales. In Proc. of ACL. 115--124. http://aclweb.org/anthology/P/P05/P05--1015.pdf
    [10]
    William R Thompson. 1933. On the likelihood that one unknown probability exceeds another in view of the evidence of two samples. Biometrika, Vol. 25, 3/4 (1933), 285--294.

    Cited By

    View all
    • (2021)Everyday Algorithm Auditing: Understanding the Power of Everyday Users in Surfacing Harmful Algorithmic BehaviorsProceedings of the ACM on Human-Computer Interaction10.1145/34795775:CSCW2(1-29)Online publication date: 18-Oct-2021

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    AAMAS '19: Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems
    May 2019
    2518 pages
    ISBN:9781450363099

    Sponsors

    Publisher

    International Foundation for Autonomous Agents and Multiagent Systems

    Richland, SC

    Publication History

    Published: 08 May 2019

    Check for updates

    Author Tags

    1. crowdsourcing
    2. multi-armed bandits
    3. unknown unknowns

    Qualifiers

    • Research-article

    Conference

    AAMAS '19
    Sponsor:

    Acceptance Rates

    AAMAS '19 Paper Acceptance Rate 193 of 793 submissions, 24%;
    Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Everyday Algorithm Auditing: Understanding the Power of Everyday Users in Surfacing Harmful Algorithmic BehaviorsProceedings of the ACM on Human-Computer Interaction10.1145/34795775:CSCW2(1-29)Online publication date: 18-Oct-2021

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media