Audit Algorithms

Algorithmic audits of algorithms.

94 resources2 categoriesView Original

Papers(87 items)

A

A zest of lime: towards architecture-independen...

(ICLR) *Measures the distance between two remote models using LIME.*

Papers
A

Active Fairness Auditing

(ICML) *Studies of query-based auditing algorithms that can estimate the demographic parity of ML models in a query-efficient manner.*

Papers
A

Adversarial Frontier Stitching for Remote Neura...

(Neural Computing and Applications) (Alternative implementation) *Check if a remote machine learning model is a "leaked" one: through standard API requests to a remote model, extract (or not) a zero-bit watermark, that was inserted to watermark valuable models (eg, large deep neural networks).*

Papers
A

Adversarial Learning

(KDD) *Reverse engineering of remote linear classifiers, using membership queries.*

Papers
A

Adversarial Model Extraction on Graph Neural Ne...

(AAAI Workshop on Deep Learning on Graphs: Methodologies and Applications) *Introduces GNN model extraction and presents a preliminary approach for this.*

Papers
A

Algorithmic Transparency via Quantitative Input...

(Security and Privacy) *Introduces measures that capture the degree of influence of inputs on outputs of the observed system.*

Papers
A

Algorithmic Transparency via Quantitative Input...

(IEEE S&P) *Evaluate the individual, joint and marginal influence of features on a model using shapley values.*

Papers
A

An Empirical Analysis of Algorithmic Pricing on...

(WWW) (Code) *Develops a methodology for detecting algorithmic pricing, and use it empirically to analyze their prevalence and behavior on Amazon Marketplace.*

Papers
A

Auditing Algorithmic Bias on Twitter

(WebSci).

Papers
A

Auditing Algorithms: On Lessons Learned and the...

(AIES) *A practical audit for a well-being recommendation app developed by Telefónica (mostly on bias).*

Papers
A

Auditing Black-Box Models for Indirect Influence

(ICDM) *Evaluate the influence of a variable on a black-box model by "cleverly" removing it from the dataset and looking at the accuracy gap*

Papers
A

Auditing Black-Box Prediction Models for Data M...

(NeurIPS) *Measures the level of data minimization satisfied by the prediction model using a limited number of queries.*

Papers
A

Auditing Fairness by Betting

(Neurips) [[Code]](https://github.com/bchugg/auditing-fairness) *Sequential methods that allows for the continuous monitoring of incoming data from a black-box classifier or regressor.*

Papers
A

Auditing fairness under unawareness through cou...

(Information Processing & Management) *Shows how to unveil whether a black-box model, complying with the regulations, is still biased or not.*

Papers
A

Auditing Local Explanations is Hard

(NeurIPS) *Gives the (prohibitive) query complexity of auditing explanations.*

Papers
A

Auditing News Curation Systems:A Case Study Exa...

(ICWSM) *Audit study of Apple News as a sociotechnical news curation system (trending stories section).*

Papers
A

Auditing radicalization pathways on

(FAT*) *Studies the reachability of radical channels from each others, using random walks on static channel recommendations.*

Papers
A

Auditing the Personalization and Composition of...

(WWW) *A Chrome extension to survey participants and collect the Search Engine Results Pages (SERPs) and autocomplete suggestions, for studying personalization and composition.*

Papers
A

Auditing Yelp’s Business Ranking and Review Rec...

(Arxiv) *Audits the fairness of Yelp’s business

Papers
A

Auditing YouTube’s Recommendation Algorithm for...

(Transactions on Recommender Systems) *What it takes to “burst the bubble,” i.e., revert the bubble enclosure from recommendations.*

Papers
A

Auditing: Active Learning with Outcome-Dependen...

(NIPS) *Learns from a binary classifier paying only for negative labels.*

Papers
B

Back in Black: Towards Formal, Black Box Analys...

(Security and Privacy) *Black-box analysis of sanitizers and filters.*

Papers
B

Bayesian Algorithm Execution: Estimating Comput...

(ICML) *A budget constrained and Bayesian optimization procedure to extract properties out of a black-box algorithm.*

Papers
B

Bias in Online Freelance Marketplaces: Evidence...

(dat workshop) *Measures the TaskRabbit's search algorithm rank.*

Papers
B

Black-Box Ripper: Copying black-box models usin...

(NeurIPS) *Replicates the functionality of a black-box neural model, yet with no limit on the amount of queries (via a teacher/student scheme and an evolutionary search).*

Papers
C

CALM: Curiosity-Driven Auditing for Large Langu...

(AAAI) *Auditing as a black-box optimization problem where the goal is to automatically uncover input-output pairs of the target LLMs that exhibit illegal, immoral, or unsafe behaviors.*

Papers
C

Certifying and Removing Disparate Impact

(SIGKDD) *Proposes SVM-based methods to certify absence of bias and methods to remove biases from a dataset.*

Papers
C

Confidential-PROFITT: Confidential PROof of FaI...

(ICLR) *Proposes fair decision tree learning algorithms along with zero-knowledge proof protocols to obtain a proof of fairness on the audited server.*

Papers
C

Copycat CNN: Stealing Knowledge by Persuading C...

(IJCNN) (Code) *Stealing black-box models (CNNs) knowledge by querying them with random natural images (ImageNet and Microsoft-COCO).*

Papers
C

Counterfactual Explanations without Opening the...

(Harvard Journal of Law & Technology) *To explain a decision on x, find a conterfactual: the closest point to x that changes the decision.*

Papers
D

Data driven exploratory attacks on black box cl...

(Neurocomputing) *Reverse engineers remote classifier models (e.g., for evading a CAPTCHA test).*

Papers
D

Distill-and-Compare: Auditing Black-Box Models ...

(AIES) *Treats black box models as teachers, training transparent student models to mimic the risk scores assigned by black-box models.*

Papers
E

Everyday Algorithm Auditing: Understanding the ...

(CHI) *Makes the case for "everyday algorithmic auditing" by users.*

Papers
E

Extracting Training Data from Large Language Mo...

(USENIX Security) *Extract verbatim text sequences from the GPT-2 model’s training data.*

Papers
E

Extracting Training Data from Large Language Mo...

(arxiv) *Performs a training data extraction attack to recover individual training examples by querying the language model.*

Papers
F

FairLens: Auditing black-box clinical decision ...

(Information Processing & Management) *Presents a pipeline to detect and explain potential fairness issues in Clinical DSS, by comparing different multi-label classification disparity measures.*

Papers
F

Fairness Auditing with Multi-Agent Collaboration

(ECAI) *Considers multiple

Papers
F

FairProof: Confidential and Certifiable Fairnes...

(Arxiv) *Proposes an alternative paradigm to traditional auditing using crytographic tools like Zero-Knowledge Proofs; gives a system called FairProof for verifying fairness of small neural networks.*

Papers
G

GeoDA: a geometric framework for black-box adve...

(CVPR) (Code) *Crafts adversarial examples to fool models, in a pure blackbox setup (no gradients, inferred class only).*

Papers
H

Hardware and software platform inference

(arXiv) *A method for identifying the underlying GPU architecture and software stack of a black-box machine learning model solely based on its input-output behavior.*

Papers
I

Identifying the Machine Learning Family from Bl...

(CAEPIA) *Determines which kind of machine learning model is behind the returned predictions.*

Papers
I

Improved Membership Inference Attacks Against L...

(ICLR) *Presents a framework for running membership inference attacks against classifier, in audit mode.*

Papers
I

Iterative Orthogonal Feature Projection for Dia...

(FATML Workshop) *Performs feature ranking to analyse black-box models*

Papers
K

Keeping Up with the Language Models: Robustness...

(Arxiv) *Proposes a way to extend the shelf-life of auditing datasets by using language models themselves; also finds problems with the current bias auditing metrics and proposes alternatives -- these alternatives highlight that model brittleness superficially increased the previous bias scores.*

Papers
K

Knockoff Nets: Stealing Functionality of Black-...

(CVPR) *Ask to what extent can an adversary steal functionality of such "victim" models based solely on blackbox interactions: image in, predictions out.*

Papers
L

Learning Networks from Random Walk-Based Node S...

(NIPS) *Reversing graphs by observing some random walk commute times.*

Papers
L

LLMs hallucinate graphs too: a structural persp...

(complex networks) *Queries LLMs for known graphs and studies topological hallucinations. Proposes a structural hallucination rank.*

Papers
L

Look at the Variance! Efficient Black-box Expla...

(NeurIPS) *Sobol indices provide an efficient way to capture higher-order interactions between image regions and their contributions to a (black box) neural network’s prediction through the lens of variance.*

Papers
M

Making targeted black-box evasion attacks effec...

(arXiv) *Investigates how an adversary can optimally use its query budget for targeted evasion attacks against deep neural networks.*

Papers
M

Measuring Personalization of Web Search

(WWW) *Develops a methodology for measuring personalization in Web search result.*

Papers
M

Membership Inference Attacks Against Machine Le...

(Symposium on Security and Privacy) *Given a machine learning model and a record, determine whether this record was used as part of the model's training dataset or not.*

Papers
M

Modeling rabbit‑holes on YouTube

(SNAM) *Models the trapping dynamics of users in rabbit holes in YouTube, and provides a measure of this enclosure.*

Papers
N

Neural Network Inversion in Adversarial Setting...

(CCS) *Model inversion approach in the adversary setting based on training an inversion model that acts as aninverse of the original model. With no fullknowledge about the original training data, an accurate inversion is still possible by training the inversion model on auxiliary samplesdrawn from a more generic data distribution.*

Papers
N

Neural Network Model Extraction Attacks in Edge...

(arxiv) *Through the acquisition of memory access events from bus snooping, layer sequence identification bythe LSTM-CTC model, layer topology connection according to the memory access pattern, and layer dimension estimation under data volume constraints, it demonstrates one can accurately recover the a similar network architecture as the attack starting point*

Papers
O

Online Fairness Auditing through Iterative Refi...

(KDD) *Provides an adaptive process that automates the inference of probabilistic guarantees associated with estimating fairness metrics.*

Papers
O

Online Learning for Measuring Incentive Compati...

(WWW) *Measures the incentive compatible- (IC) mechanisms (regret) of black-box auction platforms.*

Papers
O

Opening Up the Black Box:Auditing Google's Top ...

(Flairs-32) *Audit of the Google's Top stories panel that pro-vides insights into its algorithmic choices for selectingand ranking news publisher*

Papers
P

P2NIA: Privacy-Preserving Non-Iterative Auditing

(ECAI) *Proposes a mutually beneficial collaboration for both the auditor and the platform: a privacy-preserving and non-iterative audit scheme that enhances fairness assessments using synthetic or local data, avoiding the challenges associated with traditional API-based audits.*

Papers
P

Peeking Beneath the Hood of Uber

(IMC) *Infer implementation details of Uber's surge price algorithm.*

Papers
P

Practical Black-Box Attacks against Machine Lea...

(Asia CCS) *Understand how vulnerable is a remote service to adversarial classification attacks.*

Papers
P

Privacy Auditing with One (1) Training Run

(NeurIPS - best paper) *A scheme for auditing differentially private machine learning systems with a single training run.*

Papers
P

Privacy Oracle: a System for Finding Applicatio...

(CCS) *Privacy Oracle: a system that uncovers applications' leaks of personal information in transmissions to remoteservers.*

Papers
Q

Queries, Representation & Detection: The Next 1...

(AAAI) *Divides model fingerprinting into three core components, to identify ∼100 previously unexplored combinations of these and gain insights into their performance.*

Papers
Q

Query Strategies for Evading Convex-Inducing Cl...

(JMLR) *Evasion methods for convex classifiers. Considers evasion complexity.*

Papers
R

Remote Explainability faces the bouncer problem

(Nature Machine Intelligence volume 2, pages529–539) (Code) *Shows the impossibility (with one request) or the difficulty to spot lies on the explanations of a remote AI decision.*

Papers
R

Robust ML Auditing using Prior Knowledge

(ICML) *Formally establishes the conditions under which an auditor can prevent audit manipulations using prior knowledge about the ground truth.*

Papers
S

SCALE-UP: An Efficient Black-box Input-level Ba...

(ICLR) *Considers backdoor detection under the black-box setting in machine learning as a service (MLaaS) applications.*

Papers
S

Scaling up search engine audits: Practical insi...

(Journal of Information Science) (Code) *Audits multiple search engines using simulated browsing behavior with virtual agents.*

Papers
S

Setting the Record Straighter on Shadow Banning

(INFOCOM) (Code) *Considers the possibility of shadow banning in Twitter (ie, the moderation black-box algorithm), and measures the probability of several hypothesis.*

Papers
S

Stealing Knowledge from Protected Deep Neural N...

(ICNN) *Composite method which can be used to attack and extract the knowledge ofa black box model even if it completely conceals its softmaxoutput.*

Papers
S

Stealing Machine Learning Models via Prediction...

(Usenix Security) (Code) *Aims at extracting machine learning models in use by remote services.*

Papers
S

Stealing Neural Networks via Timing Side Channels

(arXiv) *Stealing/approximating a model through timing attacks usin queries.*

Papers
S

Stealing the Decoding Algorithms of Language Mo...

(CCS) *Steal the type and hyperparameters of the decoding algorithms of a LLM.*

Papers
T

TamperNN: Efficient Tampering Detection of Depl...

(ISSRE) *Algorithms to craft inputs that can detect the tampering with a remotely executed classifier model.*

Papers
T

The Fair Game: Auditing & debiasing AI algorith...

(Cambridge Forum on AI: Law and Governance) *Aims to simulate the evolution of ethical and legal frameworks in the society by creating an auditor which sends feedback to a debiasing algorithm deployed around an ML system.*

Papers
T

The Imitation Game: Algorithm Selectionby Explo...

(Netys) (Code) *Parametrize a local recommendation algorithm by imitating the decision of a remote and better trained one.*

Papers
T

The topological face of recommendation: models ...

(Complex Networks) *Proposes a bias detection framework for items recommended to users.*

Papers
T

Towards Reverse-Engineering Black-Box Neural Ne...

(ICLR) (Code) *Infer inner hyperparameters (eg number of layers, non-linear activation type) of a remote neural network model by analysing its response patterns to certain inputs.*

Papers
T

Two-Face: Adversarial Audit of Commercial Face ...

(ICWSM) *Performs an adversarial audit on multiple systems APIs and datasets, making a number of concerning observations.*

Papers
U

Uncovering Influence Cookbooks : Reverse Engine...

(CSCW) *Aims at identifying which centrality metrics are in use in a peer ranking service.*

Papers
U

Under manipulations, are some AI models harder ...

(SATML) *Relates the difficulty of black-box audits

Papers
W

When the Umpire is also a Player: Bias in Priva...

(FAccT) *Do Amazon private label products get an unfair share of recommendations and are therefore advantaged compared to 3rd party products?*

Papers
X

XAudit : A Theoretical Look at Auditing with Ex...

(Arxiv) *Formalizes the role of explanations in auditing and investigates if and how model explanations

Papers
X

xGEMs: Generating Examplars to Explain Black-Bo...

(arXiv) *Searches bias in the black box model by training an unsupervised implicit generative model. Thensummarizes the black-box model behavior quantitatively by perturbing data samples along the data manifold.*

Papers
X

XRay: Enhancing the Web's Transparency with Dif...

(USENIX Security) *Audits which user profile data were used for targeting a particular ad, recommendation, or price.*

Papers
Y

Your Echos are Heard: Tracking, Profiling, and ...

(arxiv) *Infers a link between the Amazon Echo system and the ad targeting algorithm.*

Papers

“Why Should I Trust You?”Explaining the Predict...

(arXiv) (Code) *Explains a blackbox classifier model by sampling around data instances.*

Papers