no code implementations • 22 Jun 2024 • John Dickerson, Seyed A. Esmaeili, Jamie Morgenstern, Claire Jie Zhang
Clustering is a fundamental problem in machine learning and operations research.
no code implementations • 21 Nov 2023 • Marina Knittel, Max Springer, John Dickerson, Mohammadtaghi Hajiaghayi
Research in fair machine learning, and particularly clustering, has been crucial in recent years given the many ethical controversies that modern intelligent systems have posed.
no code implementations • 10 Apr 2023 • John Dickerson, Bistra Dilkina, Yu Ding, Swati Gupta, Pascal Van Hentenryck, Sven Koenig, Ramayya Krishnan, Radhika Kulkarni, Catherine Gill, Haley Griffin, Maddy Hunter, Ann Schwartz
This workshop Report Out focuses on the foundational elements of trustworthy AI and OR technology, and how to ensure all AI and OR systems implement these elements in their system designs.
no code implementations • 23 Mar 2023 • Avi Schwarzschild, Max Cembalest, Karthik Rao, Keegan Hines, John Dickerson
We observe on three datasets that we can train a model with this loss term to improve explanation consensus on unseen data, and see improved consensus between explainers other than those used in the loss term.
1 code implementation • 28 Feb 2023 • Alex Stein, Avi Schwarzschild, Michael Curry, Tom Goldstein, John Dickerson
It has been shown that neural networks can be used to approximate optimal mechanisms while satisfying the constraints that an auction be strategyproof and individually rational.
no code implementations • 30 Nov 2022 • Saptarashmi Bandyopadhyay, Chenqi Zhu, Philip Daniel, Joshua Morrison, Ethan Shay, John Dickerson
Reinforcement Learning (RL) algorithms have been successfully applied to real world situations like illegal smuggling, poaching, deforestation, climate change, airport security, etc.
no code implementations • 14 Mar 2022 • Kweku Kwegyir-Aggrey, A. Feder Cooper, Jessica Dai, John Dickerson, Keegan Hines, Suresh Venkatasubramanian
We study the problem of post-processing a supervised machine-learned regressor to maximize fair binary classification at all decision thresholds.
no code implementations • 6 Feb 2022 • Michael Curry, Tuomas Sandholm, John Dickerson
We present an architecture that supports multiple bidders and is perfectly strategyproof, but cannot necessarily represent the optimal mechanism.
1 code implementation • 7 Oct 2021 • Naveen Raman, Sanket Shah, John Dickerson
Rideshare and ride-pooling platforms use artificial intelligence-based matching algorithms to pair riders and drivers.
no code implementations • 15 Jun 2021 • Michael J. Curry, Uro Lyi, Tom Goldstein, John Dickerson
We propose a new architecture to approximately learn incentive compatible, revenue-maximizing auctions from sampled valuations.
no code implementations • 14 Jun 2021 • Sahil Verma, John Dickerson, Keegan Hines
Counterfactual explanations (CFEs) are an emerging technique under the umbrella of interpretability of machine learning (ML) models.
no code implementations • ICLR 2021 • Valeriia Cherepanova, Micah Goldblum, Harrison Foley, Shiyuan Duan, John Dickerson, Gavin Taylor, Tom Goldstein
Facial recognition systems are increasingly deployed by private corporations, government agencies, and contractors for consumer services and mass surveillance programs alike.
no code implementations • NeurIPS 2020 • Ping-Yeh Chiang, Michael Curry, Ahmed Abdelkader, Aounon Kumar, John Dickerson, Tom Goldstein
Despite the vulnerability of object detectors to adversarial attacks, very few defenses are known to date.
1 code implementation • 7 Jul 2020 • Ping-Yeh Chiang, Michael J. Curry, Ahmed Abdelkader, Aounon Kumar, John Dickerson, Tom Goldstein
While adversarial training can improve the empirical robustness of image classifiers, a direct extension to object detection is very expensive.
no code implementations • NeurIPS 2020 • Michael J. Curry, Ping-Yeh Chiang, Tom Goldstein, John Dickerson
We focus on the RegretNet architecture, which can represent auctions with arbitrary numbers of items and participants; it is trained to be empirically strategyproof, but the property is never exactly verified leaving potential loopholes for market participants to exploit.
no code implementations • 4 Mar 2020 • Phebe Vayanos, Yingxiao Ye, Duncan McElfresh, John Dickerson, Eric Rice
For the offline case, where active preference elicitation takes the form of a two and half stage robust optimization problem with decision-dependent information discovery, we provide an equivalent reformulation in the form of a mixed-binary linear program which we solve via column-and-constraint generation.
no code implementations • 25 Feb 2020 • Faez Ahmed, John Dickerson, Mark Fuge
Our method has applications in collaborative work ranging from team formation, the assignment of workers to teams in crowdsourcing, and reviewer allocation to journal papers arriving sequentially.
6 code implementations • NeurIPS 2019 • Ali Shafahi, Mahyar Najibi, Amin Ghiasi, Zheng Xu, John Dickerson, Christoph Studer, Larry S. Davis, Gavin Taylor, Tom Goldstein
Adversarial training, in which a network is trained on adversarial examples, is one of the few defenses against adversarial attacks that withstands strong attacks.
no code implementations • 27 Nov 2018 • Ali Shafahi, Mahyar Najibi, Zheng Xu, John Dickerson, Larry S. Davis, Tom Goldstein
Standard adversarial attacks change the predicted class label of a selected image by adding specially tailored small perturbations to its pixels.