Visible to the public Learning from Untrusted Data

TitleLearning from Untrusted Data
Publication TypeConference Paper
Year of Publication2017
AuthorsCharikar, Moses, Steinhardt, Jacob, Valiant, Gregory
Conference NameProceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4528-6
KeywordsGenerative Adversarial Learning, high-dimensional statistics, Metrics, outlier removal, pubcrawl, resilience, Resiliency, Robust Learning, Scalability
Abstract

The vast majority of theoretical results in machine learning and statistics assume that the training data is a reliable reflection of the phenomena to be learned. Similarly, most learning techniques used in practice are brittle to the presence of large amounts of biased or malicious data. Motivated by this, we consider two frameworks for studying estimation, learning, and optimization in the presence of significant fractions of arbitrary data. The first framework, list-decodable learning, asks whether it is possible to return a list of answers such that at least one is accurate. For example, given a dataset of n points for which an unknown subset of $\alpha$n points are drawn from a distribution of interest, and no assumptions are made about the remaining (1 - $\alpha$)n points, is it possible to return a list of poly(1/$\alpha$) answers? The second framework, which we term the semi-verified model, asks whether a small dataset of trusted data (drawn from the distribution in question) can be used to extract accurate information from a much larger but untrusted dataset (of which only an $\alpha$-fraction is drawn from the distribution). We show strong positive results in both settings, and provide an algorithm for robust learning in a very general stochastic optimization setting. This result has immediate implications for robustly estimating the mean of distributions with bounded second moments, robustly learning mixtures of such distributions, and robustly finding planted partitions in random graphs in which significant portions of the graph have been perturbed by an adversary.

URLhttps://dl.acm.org/citation.cfm?doid=3055399.3055491
DOI10.1145/3055399.3055491
Citation Keycharikar_learning_2017