2021
DOI: 10.48550/arxiv.2106.04823
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Taxonomy of Machine Learning Safety: A Survey and Primer

Abstract: The open-world deployment of Machine Learning (ML) algorithms in safety-critical applications such as autonomous vehicles needs to address a variety of ML vulnerabilities such as interpretability, verifiability, and performance limitations. Research explores different approaches to improve ML dependability by proposing new models and training techniques to reduce generalization error, achieve domain adaptation, and detect outlier examples and adversarial attacks. In this paper, we review and organize practical… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 183 publications
(257 reference statements)
0
4
0
Order By: Relevance
“…Safe navigation is also a priority for applications. Navigation should avoid certain states if they are unethical to create, or if their creation would have negative ecological consequences (Aswani et al, 2013;Mohseni et al, 2021). Notably, many paths discovered by our approach transiently put the community into higher richness states that include novel species (e.g., orangecoloured states in Figure 2).…”
Section: Extensions To the Navigation Approachmentioning
confidence: 96%
“…Safe navigation is also a priority for applications. Navigation should avoid certain states if they are unethical to create, or if their creation would have negative ecological consequences (Aswani et al, 2013;Mohseni et al, 2021). Notably, many paths discovered by our approach transiently put the community into higher richness states that include novel species (e.g., orangecoloured states in Figure 2).…”
Section: Extensions To the Navigation Approachmentioning
confidence: 96%
“…Other techniques mainly include clustering, dataset analysis techniques, prediction techniques, estimation techniques (3%), association techniques, and statistical analysis. The study showed that public datasets accounted for 79% of experiments and experiments on private datasets were 21%, which were compared in the research studies [25]. A comprehensive study of 18 techniques for intrusion detection was conducted: six of these methods were found to be most prevalent: support vector machine, deep neural network, random forest, naive Bayes, decision tree, and K-nearest neighbor.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Other representative benchmark efforts include [39][40][41][42]3], all demonstrating the brittleness of deep models under various distribution shifts. Readers of interest are referred to a recent survey [43].…”
Section: Robustness To Distributional Shiftsmentioning
confidence: 99%