Home 9 Publications 9 Patch Shortcuts: Interpretable Proxy Models Efficiently FindBlack-Box Vulnerabilities

Patch Shortcuts: Interpretable Proxy Models Efficiently FindBlack-Box Vulnerabilities

Author: J. Rosenzweig, J. Sicking, S. Houben, M. Mock, M. Akila
Journal: SAIAD Workshop at CVPR
Year: 2021

Citation information

J. Rosenzweig, J. Sicking, S. Houben, M. Mock, M. Akila,
SAIAD Workshop at CVPR,
2021,
https://doi.org/10.48550/arXiv.2104.11691

An important pillar for safe machine learning (ML) is the systematic mitigation of weaknesses in neural networks to afford their deployment in critical applications. An ubiqui-tous class of safety risks are learned shortcuts, i.e. spurious correlations a network exploits for its decisions that have no semantic connection to the actual task. Networks relying on such shortcuts bear the risk of not generalizing well to unseen inputs. Explainability methods help to uncover such network vulnerabilities. However, many of these techniques are not directly applicable if access to the networkis constrained, in so-called black-box setups. These setups are prevalent when using third-party ML components. To address this constraint, we present an approach to detect learned shortcuts using an interpretable-by-design network as a proxy to the black-box model of interest. Leveraging the proxy’s guarantees on introspection we automatically extract candidates for learned shortcuts. Their transferability to the black box is validated in a systematic fashion. Concretely, as proxy model we choose a BagNet, which bases its decisions purely on local image patches. We demonstrate on the autonomous driving dataset A2D2 that extracted patch shortcuts significantly influence the blackbox model. By efficiently identifying such patch-based vulnerabilities, we contribute to safer ML models.