doi
stringlengths 10
10
| chunk-id
stringlengths 1
4
| chunk
stringlengths 1
1.66k
| id
stringlengths 10
10
| title
stringlengths 19
148
| summary
stringlengths 345
1.92k
| source
stringlengths 31
31
| authors
sequence | categories
sequence | comment
stringlengths 4
284
⌀ | journal_ref
stringclasses 14
values | primary_category
stringclasses 16
values | published
stringlengths 8
8
| updated
stringlengths 8
8
| references
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2211.00053 | 45 | Bill Yuchen Lin, Wangchunshu Zhou, Ming Shen, Pei Zhou, Chandra Bhagavatula, Yejin Choi,
and Xiang Ren. CommonGen: A constrained text generation challenge for generative commonsense reasoning. In Findings of the Association for Computational Linguistics: EMNLP
2020 , pp. 1823–1840, Online, November 2020. Association for Computational Linguistics.
doi: 10.18653/v1/2020.findings-emnlp.165. URL https://aclanthology.org/2020.
findings-emnlp.165 .
Alisa Liu, Maarten Sap, Ximing Lu, Swabha Swayamdipta, Chandra Bhagavatula, Noah A. Smith,
and Yejin Choi. DExperts: Decoding-time controlled text generation with experts and antiexperts. In Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing (Volume
1: Long Papers) , pp. 6691–6706, Online, August 2021. Association for Computational Linguistics. doi: 10.18653/v1/2021.acl-long.522. URL https://aclanthology.org/2021.
acl-long.522 . | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 46 | acl-long.522 .
Xianggen Liu, Lili Mou, Fandong Meng, Hao Zhou, Jie Zhou, and Sen Song. Unsupervised paraphrasing by simulated annealing. In Proceedings of the 58th Annual Meeting of the Association for
Computational Linguistics , pp. 302–312, Online, July 2020. Association for Computational Linguistics. doi: 10.18653/v1/2020.acl-main.28. URL https://aclanthology.org/2020.
acl-main.28 .
Ximing Lu, Peter West, Rowan Zellers, Ronan Le Bras, Chandra Bhagavatula, and Yejin Choi.
NeuroLogic decoding: (un)supervised neural text generation with predicate logic constraints.
InProceedings of the 2021 Conference of the North American Chapter of the Association
for Computational Linguistics: Human Language Technologies , pp. 4288–4299, Online, June
2021. Association for Computational Linguistics. doi: 10.18653/v1/2021.naacl-main.339. URL
https://aclanthology.org/2021.naacl-main.339 . | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 47 | https://aclanthology.org/2021.naacl-main.339 .
Ximing Lu, Sean Welleck, Liwei Jiang, Jack Hessel, Lianhui Qin, Peter West, Prithviraj Ammanabrolu, and Yejin Choi. Quark: Controllable text generation with reinforced unlearning.
12
Preprint. Under review.
CoRR , abs/2205.13636, 2022a. doi: 10.48550/arXiv.2205.13636. URL https://doi.org/
10.48550/arXiv.2205.13636 .
Ximing Lu, Sean Welleck, Peter West, Liwei Jiang, Jungo Kasai, Daniel Khashabi, Ronan Le Bras,
Lianhui Qin, Youngjae Yu, Rowan Zellers, Noah A. Smith, and Yejin Choi. NeuroLogic
a*esque decoding: Constrained text generation with lookahead heuristics. In Proceedings of
the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies , pp. 780–799, Seattle, United States, July 2022b. Association for Computational Linguistics. doi: 10.18653/v1/2022.naacl-main.57. URL https: | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 48 | //aclanthology.org/2022.naacl-main.57 .
Kathleen McKeown. Text Generation . Studies in Natural Language Processing. Cambridge University Press, 1985. doi: 10.1017/CBO9780511620751.
Ning Miao, Hao Zhou, Lili Mou, Rui Yan, and Lei Li. Cgmh: Constrained sentence generation by
metropolis-hastings sampling. Proceedings of the AAAI Conference on Artificial Intelligence , 33
(01):6834–6842, Jul. 2019. doi: 10.1609/aaai.v33i01.33016834. URL https://ojs.aaai.
org/index.php/AAAI/article/view/4659 .
Swaroop Mishra, Matthew Finlayson, Pan Lu, Leonard Tang, Sean Welleck, Chitta Baral, Tanmay
Rajpurohit, Oyvind Tafjord, Ashish Sabharwal, Peter Clark, and Ashwin Kalyan. Lila: A unified
benchmark for mathematical reasoning. In Proceedings of the 2022 Conference on Empirical
Methods in Natural Language Processing (EMNLP) , 2022. | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 49 | benchmark for mathematical reasoning. In Proceedings of the 2022 Conference on Empirical
Methods in Natural Language Processing (EMNLP) , 2022.
Ansong Ni, Jeevana Priya Inala, Chenglong Wang, Oleksandr Polozov, Christopher Meek, Dragomir
Radev, and Jianfeng Gao. Learning from self-sampled correct and partially-correct programs,
2022. URL https://arxiv.org/abs/2205.14318 .
Jekaterina Novikova, Ond ˇrej Dušek, and Verena Rieser. The E2E dataset: New challenges for
end-to-end generation. In Proceedings of the 18th Annual SIGdial Meeting on Discourse and Dialogue , pp. 201–206, Saarbrücken, Germany, August 2017. Association for Computational Linguistics. doi: 10.18653/v1/W17-5525. URL https://aclanthology.org/W17-5525 .
Arkil Patel, Satwik Bhattamishra, and Navin Goyal. Are NLP models really able to solve simple
math word problems? In Proceedings of the 2021 Conference of the North American Chapter
of the Association for Computational Linguistics: Human Language Technologies , pp. 2080– | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 50 | math word problems? In Proceedings of the 2021 Conference of the North American Chapter
of the Association for Computational Linguistics: Human Language Technologies , pp. 2080–
2094, Online, June 2021. Association for Computational Linguistics. doi: 10.18653/v1/2021.
naacl-main.168. URL https://aclanthology.org/2021.naacl-main.168 .
Lianhui Qin, Sean Welleck, Daniel Khashabi, and Yejin Choi. Cold decoding: Energy-based constrained text generation with langevin dynamics. arXiv preprint arXiv:2202.11705 , 2022.
Alec Radford, Jeffrey Wu, Rewon Child, David Luan, Dario Amodei, Ilya Sutskever, et al. Language
models are unsupervised multitask learners. OpenAI blog , 1(8):9, 2019.
Colin Raffel, Noam Shazeer, Adam Roberts, Katherine Lee, Sharan Narang, Michael Matena, Yanqi
Zhou, Wei Li, and Peter J. Liu. Exploring the limits of transfer learning with a unified text-totext transformer. Journal of Machine Learning Research , 21(140):1–67, 2020. URL http: | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 51 | //jmlr.org/papers/v21/20-074.html .
Machel Reid and Graham Neubig. Learning to model editing processes, 2022. URL https:
//openreview.net/forum?id=1bEaEzGwfhP .
Subhro Roy, Tim Vieira, and Dan Roth. Reasoning about quantities in natural language. Transactions of the Association for Computational Linguistics , 3:1–13, 2015.
William Saunders, Catherine Yeh, Jeff Wu, Steven Bills, Long Ouyang, Jonathan Ward, and Jan
Leike. Self-critiquing models for assisting human evaluators, 2022. URL https://arxiv.
org/abs/2206.05802 .
Timo Schick, Jane Dwivedi-Yu, Zhengbao Jiang, Fabio Petroni, Patrick Lewis, Gautier Izacard,
Qingfei You, Christoforos Nalmpantis, Edouard Grave, and Sebastian Riedel. Peer: A collaborative language model, 2022. URL https://arxiv.org/abs/2208.11663 .
13
Preprint. Under review.
Nisan Stiennon, Long Ouyang, Jeffrey Wu, Daniel Ziegler, Ryan Lowe, Chelsea V oss, Alec | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 52 | 13
Preprint. Under review.
Nisan Stiennon, Long Ouyang, Jeffrey Wu, Daniel Ziegler, Ryan Lowe, Chelsea V oss, Alec
Radford, Dario Amodei, and Paul F Christiano. Learning to summarize with human feedback. In H. Larochelle, M. Ranzato, R. Hadsell, M.F. Balcan, and H. Lin (eds.), Advances in Neural Information Processing Systems , volume 33, pp. 3008–3021. Curran Associates, Inc., 2020. URL https://proceedings.neurips.cc/paper/2020/file/
1f89885d556929e98d3ef9b86448f951-Paper.pdf .
Jason Wei, Xuezhi Wang, Dale Schuurmans, Maarten Bosma, Ed Chi, Quoc Le, and Denny Zhou.
Chain of thought prompting elicits reasoning in large language models. ArXiv , abs/2201.11903,
2022.
Daniel M. Ziegler, Nisan Stiennon, Jeffrey Wu, Tom B. Brown, Alec Radford, Dario Amodei, Paul
Christiano, and Geoffrey Irving. Fine-tuning language models from human preferences. arXiv | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 53 | Christiano, and Geoffrey Irving. Fine-tuning language models from human preferences. arXiv
preprint arXiv:1909.08593 , 2019. URL https://arxiv.org/abs/1909.08593 .
14
Preprint. Under review.
APPENDIX
A A DDITIONAL EXPERIMENTAL DETAILS
A.1 M ATHEMATICAL PROGRAM SYNTHESIS
We fine-tune a separate instance of GPT-Neo 1.3B as an initial generator, using the Huggingface library with default hyperparameters, except for evaluation steps, which we set to a
small number to ensure a strong checkpoint is selected for each dataset. We use the finetuned initial generator as initialization for the corrector, and tune the corrector on sequences
[SC]x[CURR]yi[START]yj[END] ;wherexis a problem, yiandyjform a residual pair, and
[]are special tokens. The loss is on tokens after [START] .
Feedback. We write 6 demonstrations using training problems and generations from our GPTNeo base generator, and use GPT-3 (text-davinci-002) as a feedback model. We use the
same training procedure and hyperparameters, except that the sequences now include feedback, | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 54 | same training procedure and hyperparameters, except that the sequences now include feedback,
[SC]x[CURR]yi[FEEDBACK]F(x,yi)[START]yj[END] ;wherexis a problem, yiandyjform a
residual pair, and F(x;yi)is feedback. We include loss on tokens after [FEEDBACK] .
A.2 L EXICALLY -CONSTRAINED GENERATION
Hyper-parameters. Table 8 and Table 9 show hyperparameters for CommonGen and E2E.
Human Evaluation. We evaluate fluency of generations in E2E task using human annotators
on Amazon Mechanical Turk (AMT). We randomly sampled 100 instances, along with generations
of different baselines and self-corrections. For each instance, we ask 3 annotators to evaluate the
fluency of generations on a 3-point Likert scale. We aggregate annotations from 3 annotators using
majority vote. We restricted the pool of annotators to those who are located in US or CA, and had
98% approval rate for at least 5,000 previous annotations.
Hyperparameter Assignment
Predictor GPT-2 Large
# steps 6000
batch size 128
optimizer Adam
learning rate 1:e 5
decoding alg. beam search (k=5) | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 55 | # steps 6000
batch size 128
optimizer Adam
learning rate 1:e 5
decoding alg. beam search (k=5)
Table 8: Hyperparameters for C OMMON GEN.Hyperparameter Assignment
Predictor GPT-2 Medium
# steps 10000
batch size 100
optimizer Adam
learning rate 1:e 5
decoding alg. beam search (k=5)
Table 9: Hyperparameters for E2E.
B A DDITIONAL RESULTS
Toxicity Fluency Diversity
Avg. Max .Prob. Perplexity dist-2 dist-3
GPT2-L 0.527 0.520 11.31 0.85 0.85
SELF-CORRECT 0.171 0.026 11.81 0.80 0.83
SELF-CORRECT +FEEDBACK 0.156 0.020 11.86 0.80 0.83
Table 10: Evaluation results of toxicity reduction experiments with natural language feedback.
15
Preprint. Under review.
Bleu-4 CIDER Coverage Runtime
NeuroLogic [22] 26.70 14.70 97.70 2.04s/sent
NeuroLogic-A*esque [24] 28.20 15.20 97.80 19.24s/sent | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 56 | NeuroLogic-A*esque [24] 28.20 15.20 97.80 19.24s/sent
GPT-2 27.90 14.97 91.38 0.2s/sent
SELF-CORRECT 27.98 15.30 94.58 0.8s/sent
SELF-CORRECT + feedback 27.82 15.24 95.88 0.8s/sent
SELF-CORRECT +NeuroLogic 28.17 15.28 97.80 2.24s/sent
Table 11: Evaluation rresults of lexically-constrained generation on C OMMON GEN.
Coverage BLEU-4 NIST R-L METEOR CIDER
PREFIX -TUNING (Li & Liang, 2021) 91.16 70.30 8.82 72.10 46.30 2.46
GPT-2 91.50 67.12 8.67 70.25 45.58 2.33
SELF-CORRECT 98.77 68.81 8.78 68.60 45.11 2.38
Table 12: Evaluation results of lexically-constrained generation on E2E.
C Q UALITATIVE EXAMPLES
16
Preprint. Under review.
Problem:
Ralph watches TV for 4 hours a day from | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 57 | C Q UALITATIVE EXAMPLES
16
Preprint. Under review.
Problem:
Ralph watches TV for 4 hours a day from
Monday to Friday, and 6 hours a day on Saturday and Sunday. How many hours does Ralph
spend watching TV in one week?
Generator:
a=4*7
b=6*7
c=a+b
answer=c
print (answer)Corrector:
a=4*5
b=6*2
c=a+b
answer=c
print (answer)Problem:
The pirates plan to explore 4 islands. Two islands require walking 20 miles per day while
the other two islands require 25 miles per day.
How many miles will they have to walk if it
takes 1.5 days to explore each island?
Generator:
a=20*2
b=25*2
c=a+b
d=c*1.5
e=d+b
answer=e
print (answer)Corrector:
a=20*2
b=25*2
c=a+b
d=c*1.5
answer=d
print (answer) | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 58 | a=20*2
b=25*2
c=a+b
d=c*1.5
answer=d
print (answer)
Figure 7: Grade school math (GSM) self-corrections. Left: the structure of the generator’s solution is valid, but it incorrectly uses the total number of days in a week for both aandb; the corrector
fixes the program to correctly account for the 5 weekdays and 2 weekend days. Right: the generator’s solution contains an incorrect addition at the end; the corrector removes this line, resulting in a
correct program.
Problem:
A spiral notebook costs 15, and a personal
planner costs $10. How much would it cost in
total to buy 4 spiral notebooks and 8 personal
planners at a 20% discount?
Generator:
a=4*15
b=8*10
c=a+b
answer=c
print (answer)Corrector:
a=4*15
b=8*10
c=a+b
d=c*20/100
e=c-d
answer=e
print (answer)Problem:
Julia has $40. She spends half of her money
to buy a new game for her phone. She spends | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 59 | answer=e
print (answer)Problem:
Julia has $40. She spends half of her money
to buy a new game for her phone. She spends
a quarter of what she has left on in-game purchases. How much money does she have left?
Generator:
a=40/2
b=40-a
c=b/4
d=b-c
e=d+40
answer=e
print (answer)Corrector:
a=40/2
b=a/4
c=a-b
answer= c
print (answer)
Figure 8: Grade school math (GSM) self-corrections. Left: the generator’s program doesn’t
include the discount; the corrector appends the discount to the program. Right: a more sophisticated
multipart correction. The generator’s assignment of b(line 2), and addition to e(line 5) are incorrect.
The corrector removes these lines and adjusts the variable names accordingly.
17
Preprint. Under review.
Constraints:
‘table’, ‘paper’, ‘read’
Generator:
A man is reading book on a table.
Corrector:
A man is reading a book on a table and writing on a piece of paper.
Constraints: | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 60 | Generator:
A man is reading book on a table.
Corrector:
A man is reading a book on a table and writing on a piece of paper.
Constraints:
’stand’, ’wait’, ’look’
Generator:
He waits for someone to look at him.
Corrector:
He waits for someone to stand and look him in the eye.
Constraints:
’walk’, ’park’, ’bench’, ’dog’, ’sit’
Generator:
A dog sitting on a bench in a park.
Corrector:
A dog sitting on a bench and a man walking a dog in a park.
Constraints:
name : The Mill | Type : restaurant | food : English | price : high | customer rating : average | area : riverside | family friendly : yes
| near : Cafe Rouge
Generator:
The Mill is an expensive, three star restaurant located near Cafe Rouge.
Corrector:
The Mill is a children friendly English restaurant in the riverside area near Cafe
Rouge. It has an average customer rating and a high price range.
Constraints:
name : Blue Spice | Type : restaurant | food : Chinese | area : riverside | family friendly : yes | near : Rainbow Vegetarian Cafe
Generator: | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
2211.00053 | 61 | Constraints:
name : Blue Spice | Type : restaurant | food : Chinese | area : riverside | family friendly : yes | near : Rainbow Vegetarian Cafe
Generator:
Blue Spice is a restaurant providing Chinese food. It is located in the riverside.
It is near Rainbow Vegetarian Cafe.
Corrector:
Blue Spice is a family friendly Chinese restaurant in the riverside area near Rainbow
Vegetarian Cafe.
Figure 9: Constrained generation self-corrections. Top: C OMMON GEN, and Bottom: E2E. Words
in green indicate constraints that were previously missing.
Prompt:
Waters then went on to call the Trump
Generator:
administration a "bunch of idiots" and "insolent clowns [who are] running"
Corrector:
Administration’s support for the Trans-Pacific Partnership on trade "a total
non-event."
Figure 10: Toxicity control self-corrections. Words in red indicate toxic language.
18 | 2211.00053 | Generating Sequences by Learning to Self-Correct | Sequence generation applications require satisfying semantic constraints,
such as ensuring that programs are correct, using certain keywords, or avoiding
undesirable content. Language models, whether fine-tuned or prompted with
few-shot demonstrations, frequently violate these constraints, and lack a
mechanism to iteratively revise their outputs. Moreover, some powerful language
models are of extreme scale or inaccessible, making it inefficient, if not
infeasible, to update their parameters for task-specific adaptation. We present
Self-Correction, an approach that decouples an imperfect base generator (an
off-the-shelf language model or supervised sequence-to-sequence model) from a
separate corrector that learns to iteratively correct imperfect generations. To
train the corrector, we propose an online training procedure that can use
either scalar or natural language feedback on intermediate imperfect
generations. We show that Self-Correction improves upon the base generator in
three diverse generation tasks - mathematical program synthesis,
lexically-constrained generation, and toxicity control - even when the
corrector is much smaller than the base generator. | http://arxiv.org/pdf/2211.00053 | [
"Sean Welleck",
"Ximing Lu",
"Peter West",
"Faeze Brahman",
"Tianxiao Shen",
"Daniel Khashabi",
"Yejin Choi"
] | [
"cs.CL"
] | null | null | cs.CL | 20221031 | 20221031 | [
{
"id": "2202.11705"
},
{
"id": "1909.08593"
},
{
"id": "2211.00053"
}
] |
1906.07337 | 0 | arXiv:1906.07337v1 [cs.CL] 18 Jun 2019Measuring Bias in Contextualized Word Representations
Keita Kurita Nidhi Vyas Ayush Pareek Alan W Black Yulia Tsvet kov
Carnegie Mellon University
{kkurita,nkvyas,apareek,awb,ytsvetko }@andrew.cmu.edu
Abstract
Contextual word embeddings such as BERT
have achieved state of the art performance in
numerous NLP tasks. Since they are optimized
to capture the statistical properties of training
data, they tend to pick up on and amplify social stereotypes present in the data as well. In
this study, we (1) propose a template-based
method to quantify bias in BERT; (2) show that
this method obtains more consistent results in
capturing social biases than the traditional cosine based method; and (3) conduct a case
study, evaluating gender bias in a downstream
task of Gender Pronoun Resolution. Although
our case study focuses on gender bias, the proposed technique is generalizable to unveiling
other biases, including in multiclass settings,
such as racial and religious biases.
1 Introduction
Type-level word embedding models, including
word2vec and GloVe ( Mikolov et al. ,2013 ; | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 1 | such as racial and religious biases.
1 Introduction
Type-level word embedding models, including
word2vec and GloVe ( Mikolov et al. ,2013 ;
Pennington et al. ,2014 ), have been shown
to exhibit social biases present in humangenerated training data ( Bolukbasi et al. ,
2016 ;Caliskan et al. ,2017 ;Garg et al. ,2018 ;
Manzini et al. ,2019 ). These embeddings are then
used in a plethora of downstream applications,
which perpetuate and further amplify stereotypes
(Zhao et al. ,2017 ;Leino et al. ,2019 ). To reveal
and quantify corpus-level biases is word embeddings, Bolukbasi et al. (2016 ) used the word
analogy task ( Mikolov et al. ,2013 ). For example,
they showed that gendered male word embeddings
likehe, man are associated with higher-status jobs
like computer programmer anddoctor , whereas
gendered words like sheorwoman are associated
with homemaker andnurse .
Contextual word embedding models, such
as ELMo and BERT ( Peters et al. ,2018 ;
Devlin et al. ,2019 ) have become increasingly common, replacing traditional type-levelembeddings and attaining new state of the art | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 2 | Devlin et al. ,2019 ) have become increasingly common, replacing traditional type-levelembeddings and attaining new state of the art
results in the majority of NLP tasks. In these
models, every word has a different embedding,
depending on the context and the language model
state; in these settings, the analogy task used to
reveal biases in uncontextualized embeddings
is not applicable. Recently, May et al. (2019 )
showed that traditional cosine-based methods
for exposing bias in sentence embeddings fail
to produce consistent results for embeddings
generated using contextual methods. We find
similar inconsistent results with cosine-based
methods of exposing bias; this is a motivation
to the development of a novel bias test that we
propose.
In this work, we propose a new method to quantify bias in BERT embeddings ( §2). Since BERT
embeddings use a masked language modelling objective, we directly query the model to measure the
bias for a particular token. More specifically, we
create simple template sentences containing the attribute word for which we want to measure bias
(e.g. programmer ) and the target for bias (e.g. she
for gender). We then mask the attribute and target
tokens sequentially, to get a relative measure of | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 3 | for gender). We then mask the attribute and target
tokens sequentially, to get a relative measure of
bias across target classes (e.g. male and female).
Contextualized word embeddings for a given token change based on its context, so such an approach allows us measure the bias for similar categories divergent by the the target attribute ( §2). We
compare our approach with the cosine similaritybased approach ( §3) and show that our measure of
bias is more consistent with human biases and is
sensitive to a wide range of biases in the model
using various stimuli presented in Caliskan et al.
(2017 ). Next, we investigate the effect of a specific
type of bias in a specific downstream task: gender
bias in BERT and its effect on the task of Gendered Pronoun Resolution (GPR) ( Webster et al. ,
2018 ). We show that the bias in GPR is highly
correlated with our measure of bias ( §4). Finally,
we highlight the potential negative impacts of using BERT in downstream real world applications
(§5). The code and data used in this work are publicly available.1
2 Quantifying Bias in BERT | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 4 | (§5). The code and data used in this work are publicly available.1
2 Quantifying Bias in BERT
BERT is trained using a masked language modelling objective i.e. to predict masked tokens, denoted as [MASK], in a sentence given the entire
context. We use the predictions for these [MASK]
tokens to measure the bias encoded in the actual
representations.
We directly query the underlying masked language model in BERT2to compute the association
between certain targets (e.g., gendered words)
andattributes (e.g. career-related words). For
example, to compute the association between the
target male gender and the attribute programmer ,
we feed in the masked sentence “[MASK] is a
programmer” to BERT, and compute the probability assigned to the sentence ‘ heis a programmer” (ptgt). To measure the association, however,
we need to measure how much more BERT prefers
the male gender association with the attribute programmer , compared to the female gender. We thus
re-weight this likelihood ptgtusing the prior bias
of the model towards predicting the male gender.
To do this, we mask out the attribute programmer
and query BERT with the sentence “[MASK] is a | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 5 | of the model towards predicting the male gender.
To do this, we mask out the attribute programmer
and query BERT with the sentence “[MASK] is a
[MASK]”, then compute the probability BERT assigns to the sentence ‘ heis a [MASK]” ( pprior).
Intuitively, pprior represents how likely the word
heis in BERT, given the sentence structure and no
other evidence. Finally, the difference between the
normalized predictions for the words heandshe
can be used to measure the gender bias in BERT
for the programmer attribute.
Generalizing, we use the following procedure
to compute the association between a target and
an attribute:
1. Prepare a template sentence
e.g.“[TARGET] is a [ATTRIBUTE]”
2. Replace [TARGET] with [MASK] and computeptgt=P([MASK]=[TARGET] |sentence)
3. Replace both [TARGET] and [ATTRIBUTE]
with [MASK], and compute prior probability
pprior=P([MASK]=[TARGET] |sentence)
1https://bit.ly/2EkJwh1
2For all experiments we use
the uncased version of BERT BASE | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 6 | 1https://bit.ly/2EkJwh1
2For all experiments we use
the uncased version of BERT BASE
https://storage.googleapis.com/bert_models/2018_10_ 18/uncased_L-12_H-768_A-12.zip .4. Compute the association as logptgt
pprior
We refer to this normalized measure of association as the increased log probability score and the
difference between the increased log probability
scores for two targets (e.g. he/she) as log probability bias score which we use as measure of bias.
Although this approach requires one to construct
a template sentence, these templates are merely
simple sentences containing attribute words of interest, and can be shared across multiple targets
and attributes. Further, the flexibility to use such
templates can potentially help measure more finegrained notions of bias in the model.
In the next section, we show that our proposed
log probability bias score method is more effective at exposing bias than traditional cosine-based
measures.
3 Correlation with Human Biases
We investigate the correlation between our measure of bias and human biases. To do this, we
apply the log probability bias score to the same
set of attributes that were shown to exhibit human
bias in experiments that were performed using | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 7 | apply the log probability bias score to the same
set of attributes that were shown to exhibit human
bias in experiments that were performed using
the Implicit Association Test ( Greenwald et al. ,
1998 ). Specifically, we use the stimuli used in
the Word Embedding Association Test (WEAT)
(Caliskan et al. ,2017 ).
Word Embedding Association Test (WEAT) :
The WEAT method compares set of target concepts (e.g. male and female words) denoted as X
andY(each of equal size N), with a set of attributes to measure bias over social attributes and
roles (e.g. career/family words) denoted as Aand
B. The degree of bias for each target concept tis
calculated as follows:
s(t,A,B) = [ meana∈Asim(t,a)−meanb∈Bsim(t,b)],
where simis the cosine similarity between the embeddings. The test statistics is
S(X,Y,A,B ) = [ meanx∈Xs(x,A,B)−
meany∈Ys(y,A,B)],
where the test is a permutation test over XandY.
Thep-value is computed as | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 8 | meany∈Ys(y,A,B)],
where the test is a permutation test over XandY.
Thep-value is computed as
p= Pr[S(Xi,Yi,A,B)> S(X,Y,A,B )]
The effect size is measured as
d=S(X,Y,A,B )
stdt∈X∪Ys(t,A,B)
Category Templates
Pleasant/Unpleasant (Insects/Flowers) T are A, T is A
Pleasant/Unpleasant (EA/AA) T are A, T is A
Career/Family (Male/Female) T likes A, T like A, T is interes ted in A
Math/Arts (Male/Female) T likes A, T like A, T is interested i n A
Science/Arts (Male/Female) T likes A, T like A, T is interest ed in A
Table 1: Template sentences used for the WEAT tests (T: targe t, A: attribute)
Category Targets Templates
Pleasant/Unpleasant (Insects/Flowers) flowers,insects, flower,insect T are A, the T is A | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 9 | Pleasant/Unpleasant (Insects/Flowers) flowers,insects, flower,insect T are A, the T is A
Pleasant/Unpleasant (EA/AA) black, white T people are A, th e T person is A
Career/Family (Male/Female) he,she,boys,girls,men,wom en T likes A, T like A, T is interested in A
Math/Arts (Male/Female) he,she,boys,girls,men,women T l ikes A, T like A, T is interested in A
Science/Arts (Male/Female) he,she,boys,girls,men,wome n T likes A, T like A, T is interested in A
Table 2: Template sentences used and target words for the gra mmatically correct sentences (T: target, A: attribute)
It is important to note that the statistical test is a
permutation test, and hence a large effect size does
not guarantee a higher degree of statistical significance.
3.1 Baseline: WEAT for BERT
To apply the WEAT method on BERT, we first
compute the embeddings for target and attribute | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 10 | 3.1 Baseline: WEAT for BERT
To apply the WEAT method on BERT, we first
compute the embeddings for target and attribute
words present in the stimuli using multiple templates, such as “TARGET is ATTRIBUTE” (Refer Table 1for an exhaustive list of templates used
for each category). We mask the TARGET to
compute the embedding3for the ATTRIBUTE and
vice versa. Words that are absent in the BERT vocabulary are removed from the targets. We ensure
that the number of words for both targets are equal,
by removing random words from the smaller target set. To confirm whether the reduction in vocabulary results in a change of p-value, we also
conduct the WEAT on GloVe with the reduced vocabulary.4
3.2 Proposed: Log Probability Bias Score
To compare our method measuring bias, and to
test for human-like biases in BERT, we also compute the log probability bias score for the same
set of attributes and targets in the stimuli. We
compute the mean log probability bias score for
each attribute, and permute the attributes to measure statistical significance with the permutation
test. Since many TARGETs in the stimuli cause
the template sentence to become grammatically | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 11 | test. Since many TARGETs in the stimuli cause
the template sentence to become grammatically
3We use the outputs from the final layer of BERT as embeddings
4WEAT was originally used to study the GloVe embeddingsincorrect, resulting in low predicted probabilities, we fixed the TARGET to common pronouns/indicators of category such as flower, he,
she(Table 2contains a full list of target words and
templates). This avoids large variance in predicted
probabilities, leading to more reliable results. The
effect size is computed in the same way as the
WEAT except the standard deviation is computed
over the mean log probability bias scores .
We experiment over the following categories
of stimuli in the WEAT experiments: Category 1
(flower/insect targets and pleasant/unpleasant attributes), Category 3 (European American/African
American names and pleasant/unpleasant attributes), Category 6 (male/female names and career/family attributes), Category 7 (male/female
targets and math/arts attributes) and Category 8
(male/female targets and science/arts attributes).
3.3 Comparison Results
The WEAT on GloVe returns similar findings
to those of Caliskan et al. (2017 ) except for the | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 12 | 3.3 Comparison Results
The WEAT on GloVe returns similar findings
to those of Caliskan et al. (2017 ) except for the
European/African American names and pleasant/unpleasant association not exhibiting significant bias. This is due to only 5 of the African
American names being present in the BERT vocabulary. The WEAT for BERT fails to find any
statistically significant biases at p <0.01. This
implies that WEAT is not an effective measure
for bias in BERT embeddings, or that methods for
constructing embeddings require additional investigation. In contrast, our method of querying the
underlying language model exposes statistically
significant association across all categories, showing that BERT does indeed encode biases and that
our method is more sensitive to them.
Category WEAT on GloVe WEAT on BERT Ours on BERT
Log Probability Bias Scor e
Pleasant/Unpleasant (Insects/Flowers) 1.543* 0.6688 0.8 744*
Pleasant/Unpleasant (EA/AA) 1.012 1.003 0.8864*
Career/Family (Male/Female) 1.814* 0.5047 1.126* | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 13 | Career/Family (Male/Female) 1.814* 0.5047 1.126*
Math/Arts (Male/Female) 1.061 0.6755 0.8495*
Science/Arts (Male/Female) 1.246* 0.8815 0.9572*
Table 3: Effect sizes of bias measurements on WEAT Stimuli. ( * indicates significant at p <0.01)
Gender Prior Prob. Avg. Predicted Prob.
Male 10.3% 11.5%
Female 9.8% 13.9%
Table 4: Probability of pronoun referring to neither
entity in a sentence of GPR
4 Case Study: Effects of Gender Bias on
Gendered Pronoun Resolution
Dataset We examined the downstream effects of
bias in BERT using the Gendered Pronoun Resolution (GPR) task ( Webster et al. ,2018 ). GPR
is a sub-task in co-reference resolution, where
a pronoun-containing expression is to be paired
with the referring expression. Since pronoun resolving systems generally favor the male entities
(Webster et al. ,2018 ), this task is a valid testbed for our study. We use the GAP dataset5
byWebster et al. (2018 ), containing 8,908 humanlabeled ambiguous pronoun-name pairs, created | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 14 | byWebster et al. (2018 ), containing 8,908 humanlabeled ambiguous pronoun-name pairs, created
from Wikipedia. The task is to classify whether
an ambiguous pronoun Pin a text refers to entity
A, entityBor neither. There are 1,000 male and
female pronouns in the training set each, with 103
and 98 of them not referring to any entity in the
sentence, respectively.
Model We use the model suggested on Kaggle,6
inspired by Tenney et al. (2019 ). The model uses
BERT embeddings for P,AandB, given the context of the input sentence. Next, it uses a multilayer perceptron (MLP) layer to perform a naive
classification to decide if the pronoun belongs to
A,Bor neither. The MLP layer uses a single hidden layer with 31 dimensions, a dropout of 0.6 and
L2 regularization with weight 0.1.
Results Although the number of male pronouns
associated with no entities in the training data is
slightly larger, the model predicted the female pro5https://github.com/google-research-datasets/gap-cor eference
6https://www.kaggle.com/mateiionita/taming-the-bert- a-baselinenoun referring to no entities with a significantly | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 15 | higher probability ( p= 0.007 on a permutation
test); see Table 4. As the training set is balanced,
we attribute this bias to the underlying BERT representations.
We also investigate the relation between the
topic of the sentence and model’s ability to associate the female pronoun with no entity. We first
extracted 20 major topics from the dataset using
non-negative matrix factorization ( Lee and Seung ,
2001 ) (refer to Appendix for the list of topics). We
then compute the bias score for each topic as the
sum of the log probability bias score for the top
15 most prevalent words of each topic weighted
by their weights within the topic. For this, we use
a generic template “[TARGET] are interested in
[ATTRIBUTE]” where TARGET is either men or
women. Next we compute a bias score for each
sample in the training data as the sum of individual bias scores of topics present in the sample, weighted by the topic weights. Finally, we
measured the Spearman correlation coefficient to
be 0.207 (which is statistically significant with
p= 4e−11) between the bias scores for male
gender across all samples and the model’s probability to associate a female pronoun with no entity. | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 16 | p= 4e−11) between the bias scores for male
gender across all samples and the model’s probability to associate a female pronoun with no entity.
We conclude that models using BERT find it challenging to perform coreference resolution when
the gender pronoun is female and if the topic is
biased towards the male gender.
5 Real World Implications
In previous sections, we discussed that BERT has
human-like biases, which are propagated to downstream tasks. In this section, we discuss another potential negative impact of using BERT in
a downstream model. Given that three quarters of
US employers now use social media for recruiting
job candidates ( Segal ,2014 ), many applications
are filtered using job recommendation systems and
other AI-powered services. Zhao et al. (2018 ) discussed that resume filtering systems are biased
when the model has strong association between
gender and certain professions. Similarly, certain
gender-stereotyped attributes have been strongly
associated with occupational salary and prestige
(Glick ,1991 ). Using our proposed method, we
investigate the gender bias in BERT embeddingss
for certain occupation and skill attributes.
Datasets : We use three datasets for our study of
gender bias in employment attributes:
•Employee Salary Dataset7for Montgomery | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 17 | for certain occupation and skill attributes.
Datasets : We use three datasets for our study of
gender bias in employment attributes:
•Employee Salary Dataset7for Montgomery
County of Maryland- Contains 6882 instances of “Job Title” and “Salary” records
along with other attributes. We sort this
dataset in decreasing order of salary and take
the first 1000 instances as a proxy for highpaying and prestigious jobs.
•Positive and Negative Traits Dataset8-Contains a collection of 234 and 292 adjectives
considered “positive” and “negative” traits,
respectively.
•O*NET 23.2 technology skills9Contains
17649 unique skills for 27660 jobs, which are
posted online
Discussion We used the following two templates
to measure gender bias:
•“TARGET is ATTRIBUTE”, where TARGET are male and female pronouns viz. he
andshe. The ATTRIBUTE are job titles from
the Employee Salary dataset, or the adjectives from the Positive and Negative traits
dataset.
•“TARGET can do ATTRIBUTE”, where
the TARGETs are the same, but the ATTRIBUTE are skills from the O*NET
dataset.
Table 5shows the percentage of attributes that | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 18 | the TARGETs are the same, but the ATTRIBUTE are skills from the O*NET
dataset.
Table 5shows the percentage of attributes that
were more strongly associated with the male than
the female gender. The results prove that BERT
expresses strong preferences for male pronouns,
raising concerns with using BERT in downstream
tasks like resume filtering.
7https://catalog.data.gov/dataset/employee-salaries- 2017
8http://ideonomy.mit.edu/essays/traits.html
9https://www.onetcenter.org/database.html#individual -filesDataset Percentage
Salary 88.5%
Pos-Traits 80.0%
Neg-Traits 78.9%
Skills 84.0%
Table 5: Percentage of attributes associated more
strongly with the male gender
6 Related Work
NLP applications ranging from core tasks such
as coreference resolution ( Rudinger et al. ,2018 )
and language identification ( Jurgens et al. ,2017 ),
to downstream systems such as automated essay
scoring ( Amorim et al. ,2018 ), exhibit inherent social biases which are attributed to the datasets
used to train the embeddings ( Barocas and Selbst , | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 19 | scoring ( Amorim et al. ,2018 ), exhibit inherent social biases which are attributed to the datasets
used to train the embeddings ( Barocas and Selbst ,
2016 ;Zhao et al. ,2017 ;Yao and Huang ,2017 ).
There have been several efforts to investigate
the amount of intrinsic bias within uncontextualized word embeddings in binary ( Bolukbasi et al. ,
2016 ;Garg et al. ,2018 ;Swinger et al. ,2019 ) and
multiclass ( Manzini et al. ,2019 ) settings.
Contextualized embeddings such as BERT
(Devlin et al. ,2019 ) and ELMo ( Peters et al. ,
2018 ) have been replacing the traditional typelevel embeddings. It is thus important to understand the effects of biases learned by these embedding models on downstream tasks. However,
it is not straightforward to use the existing biasexposure methods for contextualized embeddings.
For instance, May et al. (2019 ) used WEAT on
sentence embeddings of ELMo and BERT, but
there was no clear indication of bias. Rather, they
observed counterintuitive behavior like vastly differentp-values for results concerning gender.
Along similar lines, Basta et al. (2019 ) noted
that contextual word-embeddings are less biased | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 20 | Along similar lines, Basta et al. (2019 ) noted
that contextual word-embeddings are less biased
than traditional word-embeddings. Yet, biases
like gender are propagated heavily in downstream
tasks. For instance, Zhao et al. (2019 ) showed
that ELMo exhibits gender bias for certain professions. As a result, female entities are predicted less accurately than male entities for certain
occupation words, in the coreference resolution
task. Field and Tsvetkov (2019 ) revealed biases
in ELMo embeddings that limit their applicability
across data domains. Motivated by these recent
findings, our work proposes a new method to expose and measure bias in contextualized word embeddings, specifically BERT. As opposed to previous work, our measure of bias is more consistent
with human biases. We also study the effect of this
intrinsic bias on downstream tasks, and highlight
the negative impacts of gender-bias in real world
applications.
7 Conclusion
In this paper, we showed that querying the underlying language model can effectively measure bias
in BERT and expose multiple stereotypes embedded in the model. We also showed that our measure of bias is more consistent with human-biases,
and outperforms the traditional WEAT method on
BERT. Finally we showed that these biases can | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 21 | and outperforms the traditional WEAT method on
BERT. Finally we showed that these biases can
have negative downstream effects. In the future,
we would like to explore the effects on other
downstream tasks such as text classification, and
device an effective method of debiasing contextualized word embeddings.
Acknowledgments
This material is based upon work supported by
the National Science Foundation under Grant
No. IIS1812327.
References
Evelin Amorim, Marcia Canc ¸ado, and Adriano Veloso.
2018. Automated essay scoring in the presence of
biased ratings. In Proc. of NAACL , pages 229–237.
Solon Barocas and Andrew D Selbst. 2016. Big data’s
disparate impact. Calif. L. Rev. , 104:671.
Christine Basta, Marta R Costa-juss` a, and Noe Casas.
2019. Evaluating the underlying gender bias in
contextualized word embeddings. arXiv preprint
arXiv:1904.08783 .
Tolga Bolukbasi, Kai-Wei Chang, James Y Zou,
Venkatesh Saligrama, and Adam T Kalai. 2016.
Man is to computer programmer as woman is to | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 22 | Venkatesh Saligrama, and Adam T Kalai. 2016.
Man is to computer programmer as woman is to
homemaker? debiasing word embeddings. In Proc.
of NIPS , pages 4349–4357.
Aylin Caliskan, Joanna J Bryson, and Arvind
Narayanan. 2017. Semantics derived automatically
from language corpora contain human-like biases.
Science , 356(6334):183–186.
Jacob Devlin, Ming-Wei Chang, Kenton Lee, and
Kristina Toutanova. 2019. Bert: Pre-training of deep
bidirectional transformers for language understanding. In Proc. of NAACL .
Anjalie Field and Yulia Tsvetkov. 2019. Entity-centric
contextual affective analysis. In Proc. of ACL .Nikhil Garg, Londa Schiebinger, Dan Jurafsky, and
James Zou. 2018. Word embeddings quantify
100 years of gender and ethnic stereotypes. Proceedings of the National Academy of Sciences ,
115(16):E3635–E3644.
Peter Glick. 1991. Trait-based and sex-based discrimination in occupational prestige, occupational salary,
and hiring. Sex Roles , 25(5-6):351–378.
Anthony Greenwald, Debbie E. McGhee, and Jordan | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 23 | and hiring. Sex Roles , 25(5-6):351–378.
Anthony Greenwald, Debbie E. McGhee, and Jordan
L. K. Schwartz. 1998. Measuring individual differences in implicit cognition: The implicit association
test. Journal of personality and social psychology ,
74:1464–80.
David Jurgens, Yulia Tsvetkov, and Dan Jurafsky.
2017. Incorporating dialectal variability for socially
equitable language identification. In Proc. of ACL ,
pages 51–57.
Daniel Lee and Hyunjune Seung. 2001. Algorithms for
non-negative matrix factorization. In Proc. of NIPS .
Klas Leino, Matt Fredrikson, Emily Black, Shayak
Sen, and Anupam Datta. 2019. Feature-wise bias
amplification. In Prof. of ICLR .
Thomas Manzini, Yao Chong, Yulia Tsvetkov, and
Alan W Black. 2019. Black is to criminal as caucasian is to police: Detecting and removing multiclass bias in word embeddings. In Proc. of NAACL .
Chandler May, Alex Wang, Shikha Bordia, Samuel R.
Bowman, and Rachel Rudinger. 2019. On measuring social biases in sentence encoders. In Proc. of | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 24 | Bowman, and Rachel Rudinger. 2019. On measuring social biases in sentence encoders. In Proc. of
NAACL .
Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Proc.of NIPS , pages 3111–3119.
Jeffrey Pennington, Richard Socher, and Christopher
Manning. 2014. GloVe: Global vectors for word
representation. In Proce. of EMNLP , pages 1532–
1543.
Matthew E Peters, Mark Neumann, Mohit Iyyer, Matt
Gardner, Christopher Clark, Kenton Lee, and Luke
Zettlemoyer. 2018. Deep contextualized word representations. In Proc. of NAACL .
Rachel Rudinger, Jason Naradowsky, Brian Leonard,
and Benjamin Van Durme. 2018. Gender bias in
coreference resolution. In Proc. of NAACL .
J Segal. 2014. Social media use in hiring: Assessing
the risks. HR Magazine , 59(9).
Nathaniel Swinger, Maria De-Arteaga, Neil Heffernan IV , Mark Leiserson, and Adam Kalai. 2019.
What are the biases in my word embedding? In | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 25 | What are the biases in my word embedding? In
Proc. of the AAAI/ACM Conference on Artificial Intelligence, Ethics, and Society (AIES) .
Ian Tenney, Patrick Xia, Berlin Chen, Alex Wang,
Adam Poliak, R. Thomas McCoy, Najoung Kim,
Benjamin Van Durme, Samuel R. Bowman, Dipanjan Das, and Ellie Pavlick. 2019. What do you learn
from context? probing for sentence structure in contextualized word representations. In Proc. of ICLR .
Kellie Webster, Marta Recasens, Vera Axelrod, and Jason Baldridge. 2018. Mind the gap: A balanced corpus of gendered ambiguous pronouns. Transactions
of the Association for Computational Linguistics .
Sirui Yao and Bert Huang. 2017. Beyond parity: Fairness objectives for collaborative filtering. In Advances in Neural Information Processing Systems ,
pages 2921–2930.
Jieyu Zhao, Tianlu Wang, Mark Yatskar, Ryan Cotterell, Vicente Ordonez, and Kai-Wei Chang. 2019.
Gender bias in contextualized word embeddings. In
NAACL (short) .
Jieyu Zhao, Tianlu Wang, Mark Yatskar, Vicente Ordonez, and Kai-Wei Chang. 2017. Men also like | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 26 | NAACL (short) .
Jieyu Zhao, Tianlu Wang, Mark Yatskar, Vicente Ordonez, and Kai-Wei Chang. 2017. Men also like
shopping: Reducing gender bias amplification using
corpus-level constraints. In Proc. of EMNLP .
Jieyu Zhao, Yichao Zhou, Zeyu Li, Wei Wang, and KaiWei Chang. 2018. Learning gender-neutral word
embeddings.Appendix
Topic Id Top 5 Words
1 match,round,second,team,season
2 times,city,jersey,york,new
3 married,son,died,wife,daughter
4 best,award,actress,films,film
5 friend,like,work,mother,life
6 university,music,attended,high,school
7 president,general,governor,party,state
8 songs,solo,song,band,album
9 medal,gold,final,won,world
10 best,role,character,television,series
11 kruse,moved,amy,esme,time
12 usa,trunchbull,pageant,2011,miss
13 american,august,brother,actress,born | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1906.07337 | 27 | 12 usa,trunchbull,pageant,2011,miss
13 american,august,brother,actress,born
14 sir,died,church,song,john
15 natasha,days,hospital,helene,later
16 played,debut,sang,role,opera
17 january,december,october,july,married
18 academy,member,american,university,family
19 award,best,played,mary,year
20 jersey,death,james,king,paul
Table 6: Extracted topics for the GPR dataset | 1906.07337 | Measuring Bias in Contextualized Word Representations | Contextual word embeddings such as BERT have achieved state of the art
performance in numerous NLP tasks. Since they are optimized to capture the
statistical properties of training data, they tend to pick up on and amplify
social stereotypes present in the data as well. In this study, we (1)~propose a
template-based method to quantify bias in BERT; (2)~show that this method
obtains more consistent results in capturing social biases than the traditional
cosine based method; and (3)~conduct a case study, evaluating gender bias in a
downstream task of Gender Pronoun Resolution. Although our case study focuses
on gender bias, the proposed technique is generalizable to unveiling other
biases, including in multiclass settings, such as racial and religious biases. | http://arxiv.org/pdf/1906.07337 | [
"Keita Kurita",
"Nidhi Vyas",
"Ayush Pareek",
"Alan W Black",
"Yulia Tsvetkov"
] | [
"cs.CL"
] | 1st ACL Workshop on Gender Bias for Natural Language Processing 2019 | null | cs.CL | 20190618 | 20190618 | [
{
"id": "1906.07337"
},
{
"id": "1904.08783"
}
] |
1907.11274 | 0 | arXiv:1907.11274v2 [cs.CY] 29 Jul 2019REDUCING MALICIOUS USE OF SYNTHETIC MEDIA RESEARCH :
CONSIDERATIONS AND POTENTIAL RELEASE PRACTICES FOR
MACHINE LEARNING
Aviv Ovadya
The Thoughtful Technology Project
[email protected] Whittlestone
Leverhulme Centre for the Future of Intelligence
University of Cambridge
[email protected]
ABSTRACT
The aim of this paper is to facilitate nuanced discussion aro und research norms and practices to
mitigate the harmful impacts of advances in machine learnin g (ML). We focus particularly on the
use of ML to create “synthetic media” (e.g. to generate or man ipulate audio, video, images, and
text), and the question of what publication and release proc esses around such research might look
like, though many of the considerations discussed will appl y to ML research more broadly. We are
not arguing for any specific approach on when or how research s hould be distributed, but instead try
to lay out some useful tools, analogies, and options for thin king about these issues. | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 1 | to lay out some useful tools, analogies, and options for thin king about these issues.
We begin with some background on the idea that ML research mig ht be misused in harmful ways,
and why advances in synthetic media, in particular, are rais ing concerns. We then outline in more
detail some of the different paths to harm from ML research, b efore reviewing research risk mitigation strategies in other fields and identifying component s that seem most worth emulating in the
ML and synthetic media research communities. Next, we outli ne some important dimensions of
disagreement on these issues which risk polarizing convers ations.
Finally, we conclude with recommendations, suggesting tha t the machine learning community might
benefit from: working with subject matter experts to increas e understanding of the risk landscape and
possible mitigation strategies; building a community and n orms around understanding the impacts
of ML research, e.g. through regular workshops at major conf erences; and establishing institutions
and systems to support release practices that would otherwi se be onerous and error-prone.
Keywords synthetic media ·research practices ·release practices ·societal impacts ·negative impacts ·machine
learning·malicious use ·dual-use·deepfakes ·fake news
1 Introduction
Technological advances can result in harm to both individua ls and societal structures, through accidents, unintended | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 2 | 1 Introduction
Technological advances can result in harm to both individua ls and societal structures, through accidents, unintended
consequences, and malicious use – even as the same advances p rovide incredible benefits. Concern about harms resulting from advances in machine learning (ML) have risen dramat ically in recent years, with a growing community of
researchers and practitioners doing crucial work to addres s issues such as the fairness, accountability, and transpar ency
of deployed systems [1]. In this paper, we focus primarily on the ways that advances in ML research might be deliberately misused by malicious actors (which we refer to as “ma l-use”) [2], though we also touch on other unintended
consequences.1
1Unintended consequences are also particularly salient for the case of synthetic video and audio, where the simple exist ence of
the technology, regardless of its use, can allow bad actors t o claim that evidence of e.g. corruption or war crimes were sy nthesized
in order to avoid accountability. For example, allegations of videos being faked have been used to justify a coup in Gabon [3], and
exculpate a cabinet minister in Malaysia [4].
DRAFT - JULY 2019 | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 3 | exculpate a cabinet minister in Malaysia [4].
DRAFT - JULY 2019
One specific example of where mal-use concerns have been rais ed recently is around the use of ML in synthetic media2:
the manipulation and generation of increasingly realistic audio, video, images, and text. It is now possible to produce
synthetic images of faces that are almost indistinguishabl e from photographs [5]. It is becoming easier to manipulate
existing videos of people: replacing a person’s facial expr essions or movements with those of another person [6, 7],
and/or overlaying synthesized speech which imitates a pers on’s voice [8]. Language models have advanced to the
point where, given a sentence prompt, they can write article s that appear at least superficially convincing [9]. These
advances could be used to impersonate people, sway public op inion, or more generally spread doubt about the veracity
of all media. Modern synthetic media is in fact already being used for harm: face-swapping tools are being used to
harass journalists [10], synthetic voices are being used fo r financial crimes [11], and synthetic faces have allegedly
been used for espionage [12].
These examples bring into focus the need for humility around what we don’t know concerning potential impacts | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 4 | been used for espionage [12].
These examples bring into focus the need for humility around what we don’t know concerning potential impacts
of technology, and perhaps suggests that we must develop bet ter systems for understanding such impacts. Related
concerns have sparked debate about responsible research pr actices in ML [13], and in particular whether sometimes it
is appropriate to withhold open publication of some aspects of this research.
We begin with some background on the idea that ML research mig ht be misused in harmful ways, and why advances
in synthetic media, in particular, are raising concerns. We then review research risk mitigation strategies in other
fields and identifying components that may be worth emulatin g in the ML and synthetic media research communities.
Finally, we outline some important dimensions of disagreem ent on these issues which risk polarizing conversations,
before concluding with some recommendations for research a nd practice.
2 How research can lead to harm
How might advances in ML and synthetic media end up resulting in harm? We begin by spelling this out in more
detail: different ways that research might empower malicio us actors, and some possible paths to harm from this.
2.1 Types of hazard
We can distinguish several different types of “information hazard” that might result from machine learning research in
general.3 | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 5 | 2.1 Types of hazard
We can distinguish several different types of “information hazard” that might result from machine learning research in
general.3
•Product hazard: Research produces software that can be directly used for har m(e.g. rootkits for computer
hacking). Product hazards increase the likelihood of mal-u se by adversaries with minimal technical capabilities (e.g. ‘script kiddies’ who use existing programs or sc ripts to hack into computers but lack the ability to
write their own, or less sophisticated information warfare operations), or those who have weak motivations
for harm (e.g. online hacking or deception just ‘for fun’).
•Data hazard: research produces detailed information or outputs which if disseminated, create risk of use
for harm (e.g. easy nuclear blueprints; models, training data or cod e for harmful software). Data hazards
increase the likelihood of mal-use by adversaries with some technical capabilities, but without e.g. access to
high-quality researchers.
•Attention hazard: research which directs attention towards an idea or data tha t increases risk (e.g. the idea
that it is possible to use voice-cloning for phishing). Atte ntion hazards increase the likelihood of mal-use by
adversaries who may not have realized that their objectives can be aided by new technologies. | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 6 | adversaries who may not have realized that their objectives can be aided by new technologies.
An important thing to note is that potential mitigations wil l bedifferent for each type of hazard – and potentially even
in conflict . One way to mitigate attention hazards is to be very careful a bout talking to media organizations and others
with large reach about ways that research advances could be u sed maliciously (such as in voice cloning, for example).
At the same time, raising wider concern about malicious use c ases of ML progress might be exactly what is needed
to incentivize mitigations for data hazards or product haza rds (e.g. some public concern may be required to ensure
that tech platforms prioritize developing technology to id entify voice cloning, or for telecoms to build mitigating
infrastructure to make phone number spoofing harder).
2Not all synthetic media techniques involve ML. For example, traditional computer graphics techniques are also used for image
and video manipulation. For simplicity of language, we will not consider these distinctly as the considerations for res earch practices
are very similar.
3This is based loosely on a taxonomy from [14]
2
DRAFT - JULY 2019
2.2 The path to harm
But how might these different types of ‘hazard’ actually lea d to real-world harms? It is worth connecting the dots here | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 7 | 2.2 The path to harm
But how might these different types of ‘hazard’ actually lea d to real-world harms? It is worth connecting the dots here
between the theoretical potential for mal-use, and what act ually makes significant harm more likely.
Below we talk through some factors influencing whether a capa bility leads to sustained mal-use in practice. We use
artificial voice cloning as an illustrative example, as a rel atively new capability with many useful applications (e.g. in
voice translation and audio editing) but also significant po tential for mal-use (e.g. in scams, political propaganda, a nd
market manipulation).
1.Awareness : Do actors with malicious intent know about a capability and believe it can help them?
We can break this down into:
•Attention of adversaries : Are malicious actors likely to realize that they could use a new capability
to further their ends? If adversary groups are already using closely related methods, this is much more
likely: for example, if edited voice clips are already being used for political manipulation, groups doing
this are more likely to pay attention to demonstrations of vo ice cloning.
•‘Convincibility’ of those with resources : Are there compelling arguments, perhaps by authoritative | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 8 | this are more likely to pay attention to demonstrations of vo ice cloning.
•‘Convincibility’ of those with resources : Are there compelling arguments, perhaps by authoritative
third parties, for the effectiveness of new capabilities? F or example, a scammer who realizes that voice
cloning is useful might need to be able to convince a superior that this technology is effective enough to
justify the costs and overcome institutional inertia.
2.Deployment : How difficult is it for adversaries to weaponize this capabi lity in practice?
For a capability to be deployed for malicious purposes, adve rsaries not only need to be aware but to have the
necessary skills and resources to productize and weaponize the capability. This isn’t a binary – e.g. having
ML expertise vs. not – but rather many different factors will influence how easy a capability is to weaponize.
At the extreme, we might have a product which can be immediate ly used by anyone, regardless of technical
capability (such as free to use voice cloning software).
Factors that influence the ease of deployment for mal-use inc lude:
•Talent pipelines : How difficult is it to source someone who can apply a new capab ility for the desired | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 9 | •Talent pipelines : How difficult is it to source someone who can apply a new capab ility for the desired
use case? (e.g. do malicious actors need someone with machin e learning experience, programming
experience, or can they just use a program directly to achiev e their goals?) [12].
•Reproducibility : How difficult is it to reproduce a capability given the infor mation available? (e.g. is it
easy to replicate a voice cloning capability given the avail able papers, models, code, etc.?)
•Modifiability : How difficult is it to modify or use a system in order to enable mal-use? (e.g. if a voice
cloning product makes it difficult to clone a voice without co nsent or watermarks, how hard is it to
overcome those limitations?)
•Slottability : Can new capabilities be slotted into existing organizatio nal processes or technical systems?
(e.g. are there already established processes for phone sca ms into which new voice generation capabilities can be slotted easily, without any need to change goals o r strategy?)
•Environmental factors : How does the existing ‘environment’ or ‘infrastructure’ i mpact the usefulness | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 10 | •Environmental factors : How does the existing ‘environment’ or ‘infrastructure’ i mpact the usefulness
of the new capability for malicious actors? (E.g. currently , in the US it is easy to ‘spoof’ phone numbers
to make it appear like a call is coming from a family member, wh ich could impact the likelihood of voice
cloning being weaponized for phone scams.)
Websites now enabling anyone to instantly generate seeming ly photorealistic faces are a concrete example
of deployment barriers falling away and making mal-use easi er. It had been possible for well over a year to
generate synthetic images of faces with fairly high quality , but such websites have enabled anyone to do so
with no technical expertise. This capability can also immed iately slot into existing processes, such as fake
account creation. Previously, malicious actors would ofte n use existing photos of real people, which could be
identified with reverse image search [15], unlike wholly gen erated synthetic images.
3.Sustained use : How likely is it that a capability will lead to sustained use with substantial negative impacts?
Even if adversaries are aware of and able to weaponize some ne w capability, whether or not this leads to
sustained use depends on: | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 11 | Even if adversaries are aware of and able to weaponize some ne w capability, whether or not this leads to
sustained use depends on:
•Actual ROI : If malicious actors believe that the return on investment ( ROI) for using a capability is low
they might not continue to use it in practice. For example, if a form of mal-use is easy to detect, then
adversaries might decide it’s not worth the risk or might be s hut down very quickly.
3
DRAFT - JULY 2019
•Assessment of ROI : If malicious actors have no way of assessing whether new cap abilities are helping them better achieve their goals, or if their assessments are flawed, they might not continue to put
resources into using those capabilities.
2.3 Access ratchets
We can think of this as a kind of progression, from a theoretic al capability to scaled-up use in practice. Once a
technology has progressed down this path and has become easy to use, and proven to have high ROI for mal-use, it
can be much more difficult to address than at earlier stages – w e call this the access ratchet (like a ratchet, increased
access to technology cannot generally be undone). For any ca pability with potential for mal-use, it is therefore worth | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 12 | access to technology cannot generally be undone). For any ca pability with potential for mal-use, it is therefore worth
thinking about where it currently sits on this progression: how much attention and interest it is receiving; whether it
has been weaponized and/or how costly it would be to do so; and whether it’s likely to be, or already in sustained use.
This can help us think more clearly about where the greatest r isks of mal-use are, and different kinds of interventions
that might be appropriate or necessary in a given situation.
Researchers may argue that a capability is unlikely to cause harm since it has not been used maliciously yet. What
this doesn’t address is the fact that a capability which has n ot yet been used maliciously might sit anywhere along this
progression, which makes a huge difference to how likely it i s to cause harm. For example, Face2Face, a technique
for real-time facial reenactment (i.e. changing a person’s expressions in a video), has existed for 3 years but not
been developed into any products that can easily be used. Thi s lack of productization makes harmful use vastly less
likely, especially given the competition for AI and enginee ring talent today. It is also worth considering how costly
it would be to make a given capability easier to misuse: even t he DeepFake application, which is more accessible to | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 13 | it would be to make a given capability easier to misuse: even t he DeepFake application, which is more accessible to
non-technical users, is currently resource-intensive to w eaponize in practice.
2.4 Indirect harms
Sometimes the path to harm from synthetic media research wil l be fairly direct and immediate: such as a person losing
their money, returning to our example of voice cloning being used in financial scams.
But in other cases, improved synthetic media capabilities m ight cause harm in more complex and indirect ways. Consider the case where misinformation purveyors get hold of so phisticated synthetic media capabilities and use them
to win substantial democratic power, which they then use to c ontrol narratives further and undermine any mitigation
efforts (not an uncommon path from democracy to authoritari anism). We can think about this as a disinformation
ratchet : the ability to use disinformation to enhance one’s ability to distribute further disinformation; and the opportunity for this type of ratchet can be influenced by new tec hnology impacting media distribution channels and
capabilities.
These less direct kinds of harms may be harder to anticipate o r imagine, but in the long-run may be much more
important – particularly if they influence the future develo pment of technology in ways that undermine our ability to | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 14 | important – particularly if they influence the future develo pment of technology in ways that undermine our ability to
deal with future threats. We suggest that it’s particularly important to consider these kinds of “sociotechnical-path
dependencies” as well as more direct and immediate threats, and what kinds of risk mitigation strategies might best
address them.
3 Mitigating harm through release practices
There is unlikely to be any ‘one size fits all’ solution to miti gating mal-use of ML research: the path to harm will look
very different across contexts, and potential harms need to be weighed against benefits which will also vary depending
on the area. We therefore need discussion about different ap proaches to mitigating mal-use: including around what
research is conducted in the first place; standards and proce dures for risk assessment; and processes for deciding when
and how to release different types of research outputs. Here we focus particularly on the latter – how careful release
practices might help mitigate mal-use within ML research.
However, this is not to suggest we think release practices ar e the main or even necessarily the most important component of mitigating mal-use. Another crucial piece is how r esearch directions are chosen and prioritized in the first | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 15 | place. This is challenging because much of ML research often involves developing general capabilities which can then
be applied to a variety of different purposes – we can’t simpl y decide to build only ‘beneficial’ ML capabilities. That
aside, we still may be able to say some very general things abo ut the kinds of capabilities that are more likely to be
broadly beneficial, or the kinds of problems that should idea lly be driving ML research. It is also important to think
about what types of research are encouraged/discouraged by conferences, journals, funders, job interviewers and so
on.
4
DRAFT - JULY 2019
3.1 Challenges to mitigating harm
First, it’s worth considering some of the serious challenge s to attempting to decrease harm by limiting access to
research:
•Thecomposition problem : Two independent pieces of research that seem innocent can b e combined in ways
that enable significant malicious use.4
•Theslow drip problem : Research advancement can be a slow and continuous evolutio n, where it’s difficult
to draw the line between research that is dangerous and that w hich is not. | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 16 | to draw the line between research that is dangerous and that w hich is not.
•Theconflation problem : Many of the underlying goals of various fields of research (n atural language processing, computation photography, etc.) may be directly we aponizable if achieved. For example, the ability
to create convincing dialogue can be used to both support peo ple or manipulate people at scale.
•The defector problem : Even if researchers in some regions or organizations coope ratively decide not to
pursue or publish a particular area of research, those agree ments might not be followed by “defectors” who
then gain a competitive edge.
These challenges may seem daunting even for those who would a dvocate for limiting release of some forms of research.
They also motivate the development of a nuanced menu of optio ns for release practices, and careful evaluation of the
efficacy of whatever measures are chosen. Even without overc oming these challenges, it is possible that release
practices could substantially mitigate harm if they impact the rate of deployment of mal-use technology.5
3.2 A brief tour of analogs in other fields | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 17 | practices could substantially mitigate harm if they impact the rate of deployment of mal-use technology.5
3.2 A brief tour of analogs in other fields
There is precedent in several other fields of research – inclu ding biotechnology and information security – for establishing processes for reducing the negative risks of resear ch and release. A good first step would, therefore, be to
look at what we can learn from these fields for the case of ML res earch. Here we present some promising practices
identified from other fields.
A caveat: just because research norms and processes exist in other fields, it does not necessarily mean that they are
widely and coherently used in those fields, or that they provi de a net positive impact. Evaluating which research
practices have been adopted and work well across different fi elds is out of scope for this short paper, but would
certainly be valuable to look into further.
3.2.1 Biosafety
Biosafety processes and principles exist to ensure safe han dling of infective microorganisms in biology/biotechnolo gy
research [16]. Some key components of biosafety practices i nclude: | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 18 | research [16]. Some key components of biosafety practices i nclude:
•Procedures : Steps and rules that must be followed, e.g. for decontamina tion (including basics such as wearing
gloves and shoes).
•Lab safety officer : An internal role responsible for enforcing safety.
•Training : Learning safety processes via peers/programs.
•Architecture : Incorporating safety considerations into building and to ol design (e.g. the design of doors and
airflow).
•Audits : Providing external accountability, usually at random tim es via local government.
•Safety level designations : Different microorganisms classified by risk group (e.g. Eb ola is level 4) with
different safety procedures for different levels (e.g. lev el 1 is open bench work, level 4 requires special
clothing, airlock entry, special waste disposal, etc.).
•Safety level definers : Organisations who determine safety levels, e.g. the Cente rs for Disease Control and
Prevention (CDC).
4This might be particularly challenging given the success of transfer learning.
5In terms of the ratchet terminology used earlier, delaying r elease of research could slow down the speed of an ‘access rat chet’ | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 19 | 5In terms of the ratchet terminology used earlier, delaying r elease of research could slow down the speed of an ‘access rat chet’
(i.e. slowing down widespread access to a technology), pote ntially providing enough extra time strengthen a ‘sociotec hnical immune
system’ that could halt a disinformation ratchet.
5
DRAFT - JULY 2019
3.2.2 Computer/Information security
Various practices exist in the field of information security to prevent exploitation of vulnerabilities in important sy stems.
Key components include:
•OPSEC (‘operations security’) : Procedures for identifying and protecting critical infor mation that could be
used by adversaries. Includes identification of critical in formation, analysis of threats, vulnerabilities, and
risks, and application of appropriate measures.
•Architecture : Use systems that are “secure by design” and so keep you secur e automatically where possible.
•Coordinated/responsible disclosure : Processes to ensure that exploits which could affect impor tant systems
are not publicly disclosed until there has been an opportuni ty to fix the vulnerability.
•ISACs/CERTs (Information Sharing & Analysis Centers/Computer Emergen cy Response Teams): Disclosure
coordination entities. | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 20 | •ISACs/CERTs (Information Sharing & Analysis Centers/Computer Emergen cy Response Teams): Disclosure
coordination entities.
3.2.3 Institutional Review Boards (IRBs)
IRBs are designed to protect human subjects in biomedical an d behavioral research (including e.g. clinical trials of
new drugs or devices and psychology studies of behavior, opi nions or attitudes) [17]:
•Case dependent scrutiny : Research proposals are assessed on a case-by-case basis us ing external expert
evaluation, and are determined to either be: (a) exempt (whe n risks are minimal), (b) expedited (slightly
more than minimal risk), or (c) full review (all other propos als).
•Approval rubrics : Criteria for approval of research proposals include: havi ng sound research principles to
minimize risk to subjects; establishing that risks to subje cts are reasonable relative to anticipated benefits;
selecting subjects in equitable ways, and avoiding undue em phasis on a vulnerable population.
•External expert & community evaluation : Studies are reviewed by people who have expertise in the res earch
and in the impacts of the work (such as community members).
•Continuous evaluation : Process can be ongoing, not one-time, with periodic update s: the IRB can suspend
or terminate previously approved research. | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 21 | •Continuous evaluation : Process can be ongoing, not one-time, with periodic update s: the IRB can suspend
or terminate previously approved research.
This is not meant to be exhaustive but demonstrates a variety of systems that have been used to mitigate negative
risks of research and release. Other analogs worth explorin g include those around nuclear technology, spam detection,
classified information, and environmental impact.
3.3 Potential release practices
What should ML and synthetic media research emulate from the se other fields? Many aspects of these practices and
processes may be applicable in ML research, including parti cularly: external expert evaluation of risks and appropriate responses, coordinated/responsible disclosure, trai ning in responsible research processes, disclosure coordi nation
entities, safety level designations, safety level defining entities, and case-dependent response (depending on safet y
levels).
Reframing and renaming all of these practices and processes to focus on the release of potentially hazardous ML
systems leaves us with the following components that may be n eeded in ML:
•Release options : Different options for release.
•Release rubric : Guidelines for when to use each type (decided by case-depen dent evaluation).
•Release rubric processes : How to do case-dependent evaluation.
•Release coordination : Who decides/gets access. | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 22 | •Release rubric processes : How to do case-dependent evaluation.
•Release coordination : Who decides/gets access.
•Release training : How to learn processes/norms.
•Release process entities : Who manages all of this?
Each of these components can be broken down further; we explo re “release options” here as an example.
6
DRAFT - JULY 2019
3.4 Release options
The question of how to release research with potential for ma l-use is not a binary one: there are many different choices
to make beyond simply ‘release’ or ‘don’t release’. Focusin g on this binary choice can lead the debate around openness
of ML research to become very polarized.
Some important dimensions we might consider when thinking a bout release strategies include:
•Content: What is released
Potential options include:
–A fully runnable system (with varying power)
–A modifiable system (with varying modifiability)
–Source code (varying versions)
–Training data (varying sizes)
–Trained models (varying strength/fine-tunability/data-n eeds)
–Paper/concept (varying detail level)
–Harmful use case ideas (varying detail level) | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 23 | –Paper/concept (varying detail level)
–Harmful use case ideas (varying detail level)
•Timing: When it is released
Potential options include:
–Immediate release
–Timed release: Set a specific time to release components, all owing time for mitigation of any potential
harms. This is common in information security.
–Periodic evaluation: Don’t release immediately, but set a t ime period/intervals (e.g. every 2 months), at
which point an evaluation is done to reassess the risk of rele ase given mitigation progress.
–Evented release: Wait to release until some particular type of external event (e.g. someone else replicating or publicizing the same technology).
–Staged release: Release systems of successively increasin g levels of power on a fixed timeline, or triggered by external events.
•Distribution: Where/Who it is released to
Potential options include:
–Public access (with varying degrees of publicity)
–Ask for access: Anyone who wants access to data or a system ask s and is approved on a case-by-case
basis, potentially with specific requirements around use.
–Release safety levels: People and possibly organizations c an request to be recognized as ‘safe’, after | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 24 | basis, potentially with specific requirements around use.
–Release safety levels: People and possibly organizations c an request to be recognized as ‘safe’, after
auditing and approval they gain the ability to access all mat erial at a given safety level.
–Access communities: Research groups developing their own t rusted communities through informal processes which all have access to shared repositories.
Within the domain of synthetic media, it’s worth diving deep er into potential mitigations specific to products, models,
and demos relevant to that space.
There are a number of mechanisms researchers and companies c an use to reduce malicious use from general synthetic
media systems that allow e.g. virtual impersonation:
•Consent : Requiring consent by those being impersonated.
•Detectability : Intentionally not trying to thwart detection.
•Watermarking : Embedding context about modifications/original.
•Referenceability : Centrally storing all modifications for reference.
It’s important to note that none of these are perfect – they ar e part of a “defense in depth”. It is also possible to add
constraints on synthesis (e.g. ensuring that only particul ar faces can be generated through the system).
7
DRAFT - JULY 2019 | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 25 | constraints on synthesis (e.g. ensuring that only particul ar faces can be generated through the system).
7
DRAFT - JULY 2019
3.5 Examples in practice
This menu of options is valuable in theory, but it’s also wort h briefly exploring some examples in practice. One of
the most notable public positions in this space comes from Go ogle: “We generally seek to share Google research to
contribute to growing the wider AI ecosystem. However we do n ot make it available without first reviewing the potential risks for abuse. Although each review is content spe cific, key factors that we consider in making this judgment
include: risk and scale of benefit vs downside, nature and uni queness, and mitigation options.” [18]
Beyond Google, a number of labs have had to consider these iss ues. As mentioned earlier, the researchers behind
Face2Face and those behind many other synthetic media syste ms have chosen not to share their code. Some researchers
have released code but intentionally made it difficult to use for non-experts.
Different product companies in this space are also explorin g mitigations.6Synthesia is only working with closely | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 26 | Different product companies in this space are also explorin g mitigations.6Synthesia is only working with closely
vetted clients. Lyrebird, which enables voice cloning, mak es it more difficult to impersonate someone without consent
by requiring users to speak particular phrases instead of ju st training on arbitrary provided data.
4 Disagreements around release practices
Different people and groups will have differing views on whi ch kinds of release strategies should be used when. Here
we lay out some different dimensions on which people may disa gree which affect their views about release strategies
for ML research. Our aim is to recognize that genuine divides exist and can lead to polarization of opinion, but that
more nuanced discussion can prevent this.
4.1 Value trade-offs
Some disagreements stem from fundamental views about the va lue of openness vs. caution in research.
The ML community has very strong norms around openness: free sharing of data, algorithms, models, and research
papers. These strong openness norms appear to be broadly mot ivated by (1) distributing the benefits of research
widely by making it accessible to all of society, and (2) enab ling scientific progress by making it easier for researchers
to critique and build on one another’s work. | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 27 | to critique and build on one another’s work.
Research practices that attempt to limit mal-use by being mo re cautious about how it is released and distributed
necessarily reduce some forms of openness. Some who take ope nness to be a fundamental value in research may
therefore disagree with such practices on principle. Howev er, there are multiple different aspects to openness in
research, and, as we’ve tried to highlight in this paper, mul tiple different approaches to being cautious about researc h
release. Not all of these will necessarily be in tension with one another, and more exploration of research practices
that decrease risk while protecting the most important aspe cts of openness would be valuable.
4.2 Beliefs about risks
Some disagree about the relative size of different risks inv olved in ML research.
On the one hand, there is the risk that advances in ML might be m isused by malicious actors in potentially catastrophic
ways, which we’ve discussed. But restricting the release of ML research also creates its own risks: (1) of increasing
power concentration, as a few research groups disproportio nately control how ML capabilities evolve, and (2) of
creating public confusion or even panic, by creating the imp ression that advances are more threatening than they are. | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 28 | creating public confusion or even panic, by creating the imp ression that advances are more threatening than they are.
Beliefs about the relative size of these risks can lead to two very different perspectives. Those who believe that ML
advances will lead to significant harm very soon may want to ri sk such power concentration in order to safeguard
democracy and public trust in the long term. By contrast, for those who think weaponization is less immediately
relevant and that we can reassess risks in the future, the cos ts of restricting research may seem less palatable.
While there is a genuine tension here, it is worth considerin g approaches that could address both sides of the concern
(or at least address one side without exacerbating the other .) For example, some standardization of release practices,
potentially managed by external entities, could help mitig ate misuse without leading to power concentration.
6For more on this, see this crowdsourced list of organization s and their actions to mitigate risk: http://bit.ly/synth- ethics.
8
DRAFT - JULY 2019
4.3 Beliefs about efficacy
Another dimension of disagreement centers not around what t he risks are but how effective different practices are
likely to be at reducing them.
Given strong incentives or low barriers to develop a technol ogy (or achieve an insight), some suggest it is impossible | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 29 | likely to be at reducing them.
Given strong incentives or low barriers to develop a technol ogy (or achieve an insight), some suggest it is impossible
to prevent either from leading to mal-use the long run, which could mean that restricting the release of research with
potential for mal-use is futile. Others suggest that we can s ignificantly impact incentives or barriers, or that slowing
down release into the world can still make a significant diffe rence, especially if this gives us time to build defenses
against potential mal-use. There is also the perspective th at it is easier to build systems to defend against mal-use if
more research is public, and the counterview that public inf ormation can sometimes help attackers more than defenders
(‘security through obscurity’ may be unnecessary for e.g. k eeping data private but is still allegedly crucial for antispam defense). As ML researchers continue to experiment wit h release practices and explore similar challenges in
other fields, we may learn about the efficacy of different appr oaches which can help inform these beliefs.
4.4 Beliefs about future needs
Finally, there’s a question of whether we might eventually n eed processes for release of ML research, even if they’re
not essential now. | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 30 | Finally, there’s a question of whether we might eventually n eed processes for release of ML research, even if they’re
not essential now.
For those who believe that we might develop much more advance d ML systems in the relatively near future, and
that potential for harm will increase with these advances, t hen it probably makes sense to start developing careful
norms and processes now regardless of current harms. For tho se who are more skeptical of the possibility of much
more advanced capabilities, think that such capabilities a re unlikely to be dangerous, and/or that restricting releas e is
unlikely to be effective in the future regardless, developi ng such processes now looks unnecessary.
*
Part of the reason for laying out various different options f or release of research is to show that this needn’t be a
polarized debate: it’s not a simple choice between ‘open’ or ‘closed’ ML research. It’s worth considering whether,
within our menu of options, there are approaches which can st rike a balance between the differing perspectives outlined
here.
5 Recommendations
We’ve laid out some considerations, tools, and options for t hinking through release of potentially harmful research in
a nuanced way. But what must be done now? Here are some brief re commendations:
1.Increase understanding of the risk landscape and possible mitigation strategies: | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 31 | a nuanced way. But what must be done now? Here are some brief re commendations:
1.Increase understanding of the risk landscape and possible mitigation strategies:
•Develop standardized language for talking about these issues e.g. around hazards, adversa ries, mitigations and release options.
•Map risks of different types of ML research in collaboration with subj ect matter experts, such as e.g.
misinformation security researchers for synthetic media. Map out both immediate direct threats and
potential longer-term path dependencies, in ways that addr ess researcher concerns around risk hyperbole.
Develop practices for safely discussing such risks.7
•Map mitigation options , e.g. ways of reducing the harms resulting from mal-use of sy nthetic media
research, and the stages/times at which they are applicable .
2.Build a community and norms around competency in understanding the impacts of ML resear ch:
•Establish regular workshops to focus on release challenges.
•Spread awareness of the risks of ML research to both groups who might be affecte d and who can help
mitigate the risks. Proactively seek to include and learn fr om those who have been impacted.
•Encourage impact evaluation both positive and negative, for research publications, pre sentations, and
proposals (such as that proposed by the ACM FCA [19]). | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 32 | •Encourage impact evaluation both positive and negative, for research publications, pre sentations, and
proposals (such as that proposed by the ACM FCA [19]).
3.Fund institutions and systems to grow and manage research practices in ML, including poten tially:
7This type of investigation might also be referred to as e.g. t hreat models, risk analysis, or impact analysis, each of whi ch
involves a different set of useful lenses.
9
DRAFT - JULY 2019
•Support expert impact evaluation of research proposals, so that the burden of this does not fal l entirely
on individual researchers (who may not have the relevant exp ertise to assess hazards). This might involve e.g. identifying groups with subject matter expertis e who can do evaluations (at the request of
researchers), coordinating, and potentially even paying f or review.
•Prototype vetting systems to help enable shared access to potentially sensitive resea rch (as opposed to
the current system where researchers attempt to validate if those requesting their models are malicious
actors [20], often via error-prone ad-hoc Googling).
•Develop release procedures for research already deemed to raise potential risks (manag ing all of the | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 33 | actors [20], often via error-prone ad-hoc Googling).
•Develop release procedures for research already deemed to raise potential risks (manag ing all of the
above if needed, so that individual researchers can spend mo re time on actual research while still mitigating risks). Currently, organizations are unilaterally not publicly releasing results, so developing better
procedures could actually open up research.
6 Conclusion
It is clear that advances in ML have the potential to be misuse d: the main example we have discussed here is how
advances in synthetic media creation may be used to sow disin formation and mistrust (but many others can be, and
have been discussed [2]). We must start thinking about how to responsibly safeguard ML research.
Here we focus on the role of release and publication practice s in preventing mal-use of ML research. The idea that we
might sometimes restrict research release has been met with understandable concern from parts of the ML community
for whom openness is an important value. Our aim here has been to decrease polarization in this debate; to emphasize
that this is not a simple choice between “open” and “closed” M L research. There are a variety of options for how
and when different aspects of research are released, includ ing many drawn from parallels to existing fields, and many
possible processes for making these decisions. | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 34 | and when different aspects of research are released, includ ing many drawn from parallels to existing fields, and many
possible processes for making these decisions.
There will always be disagreements about the relative risks and benefits of different types of research, the effectivene ss
of different mitigation strategies, and ultimately how to b alance the values of openness vs. caution. We must more
deeply explore the risks and options, and develop release st rategies and processes that appropriately balance and
manage the trade-offs.
Ultimately, we want research to benefit humanity. We see this work as part of a maturing of the ML community,
alongside crucial efforts to ensure that ML systems are fair , transparent, and accountable. As ML reshapes our lives,
researchers will continue to come to terms with their new pow ers and impacts on world affairs.
References
[1] Jess Whittlestone, Rune Nyrup, Anna Alexandrova, Kanta Dihal, and Stephen Cave. Ethical and Societal Implications of Algorithms, Data, and Artificial Intelligence: a Roadmap for Research. London: Nuffield Foundation ,
2019. | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 35 | 2019.
[2] Miles Brundage, Shahar Avin, Jack Clark, Helen Toner, Pe ter Eckersley, Ben Garfinkel, Allan Dafoe, Paul
Scharre, Thomas Zeitzoff, Bobby Filar, et al. The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. arXiv preprint arXiv:1802.07228 , 2018.
[3] Ali Breland. The Bizarre and Terrifying Case of the “Deep fake” Video that Helped Bring an African Nation to
the Brink. Mother Jones , 2019.
[4] Nic Ker. Is the political aide viral sex video confession real or a Deepfake? Malay Mail , 2019.
[5] Tero Karras, Samuli Laine, and Timo Aila. A Style-Based G enerator Architecture for Generative Adversarial
Networks. In Proceedings of the IEEE Conference on Computer Vision and Pa ttern Recognition , pages 4401–
4410, 2019.
[6] Caroline Chan, Shiry Ginosar, Tinghui Zhou, and Alexei A Efros. Everybody Dance Now. arXiv preprint
arXiv:1808.07371 , 2018. | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 36 | arXiv:1808.07371 , 2018.
[7] Justus Thies, Michael Zollhofer, Marc Stamminger, Chri stian Theobalt, and Matthias Nießner. Face2face: Realtime face capture and reenactment of rgb videos. In Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition , pages 2387–2395, 2016.
[8] RJ Skerry-Ryan, Eric Battenberg, Ying Xiao, Yuxuan Wang , Daisy Stanton, Joel Shor, Ron J Weiss, Rob Clark,
and Rif A Saurous. Towards End-to-End Prosody Transfer for E xpressive Speech Synthesis with Tacotron. arXiv
preprint arXiv:1803.09047 , 2018.
10
DRAFT - JULY 2019
[9] Alec Radford, Jeffrey Wu, Rewon Child, David Luan, Dario Amodei, and Ilya Sutskever. Language Models are
Unsupervised Multitask Learners. OpenAI Blog , 1(8), 2019.
[10] Drew Harwell. Fake-porn videos are being weaponized to harass and humiliate women: ‘Everybody is a potential
target’. Washington Post , December 2018. | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 37 | [10] Drew Harwell. Fake-porn videos are being weaponized to harass and humiliate women: ‘Everybody is a potential
target’. Washington Post , December 2018.
[11] BBC News. Fake voices ‘help cyber-crooks steal cash’, J uly 2019.
[12] Raphael Satter. Experts: Spy used AI-generated face to connect with targets. AP News , June 2019.
[13] Claire Leibowicz, Steven Adler, and Peter Eckersley. W hen Is it Appropriate to Publish High-Stakes AI Research? Partnership on AI blog post, April 2019.
[14] Nick Bostrom. Information Hazards: A Typology of Poten tial Harms from Knowledge. Review of Contemporary
Philosophy , 10:44–79, 2011.
[15] Gregory Goth. Propaganda Bots vs. Transparency. ACM News , 2017.
[16] World Health Organization. Laboratory Biosafety Manual . Geneva: World Health Organization, 2004.
[17] Kyle B Enfield and Jonathon D Truwit. The Purpose, Compos ition, and Function of an Institutional Review
Board: Balancing Priorities. Respiratory care , 53(10):1330–1336, 2008.
[18] Google. Perspectives on Issues in AI Governance, 2019. | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |
1907.11274 | 38 | [18] Google. Perspectives on Issues in AI Governance, 2019.
[19] Brent Hecht, L Wilcox, JP Bigham, J Schöning, E Hoque, J E rnst, Y Bisk, L De Russis, L Yarosh, B Anjum,
et al. It’s Time to Do Something: Mitigating the Negative Imp acts of Computing Through a Change to the Peer
Review Process. ACM Future of Computing Blog , 2018.
[20] Rowan Zellers. Why We Released Grover, July 2019.
We are grateful to the many researchers across academia, ind ustry, and civil society who provided invaluable feedback.
This is meant to be just the start of a conversation, and we are likely to update this document as we learn more. If you
have thoughts or feedback, or would like to otherwise contri bute to this discussion, please reach out to the authors via
email or on Twitter.
11 | 1907.11274 | Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning | The aim of this paper is to facilitate nuanced discussion around research
norms and practices to mitigate the harmful impacts of advances in machine
learning (ML). We focus particularly on the use of ML to create "synthetic
media" (e.g. to generate or manipulate audio, video, images, and text), and the
question of what publication and release processes around such research might
look like, though many of the considerations discussed will apply to ML
research more broadly. We are not arguing for any specific approach on when or
how research should be distributed, but instead try to lay out some useful
tools, analogies, and options for thinking about these issues.
We begin with some background on the idea that ML research might be misused
in harmful ways, and why advances in synthetic media, in particular, are
raising concerns. We then outline in more detail some of the different paths to
harm from ML research, before reviewing research risk mitigation strategies in
other fields and identifying components that seem most worth emulating in the
ML and synthetic media research communities. Next, we outline some important
dimensions of disagreement on these issues which risk polarizing conversations.
Finally, we conclude with recommendations, suggesting that the machine
learning community might benefit from: working with subject matter experts to
increase understanding of the risk landscape and possible mitigation
strategies; building a community and norms around understanding the impacts of
ML research, e.g. through regular workshops at major conferences; and
establishing institutions and systems to support release practices that would
otherwise be onerous and error-prone. | http://arxiv.org/pdf/1907.11274 | [
"Aviv Ovadya",
"Jess Whittlestone"
] | [
"cs.CY",
"cs.LG"
] | 11 pages. Language fixes and tweaks for clarity | null | cs.CY | 20190725 | 20190729 | [
{
"id": "1803.09047"
},
{
"id": "1802.07228"
},
{
"id": "1907.11274"
},
{
"id": "1808.07371"
}
] |