Machine Learning (ML) is a subset of artificial intelligence (AI) that enables systems to learn and improve from experience without being explicitly programmed. It involves using data and algorithms to allow computers to identify patterns, make decisions, or predict outcomes. ML now replaces humans at many critical decision points and is used in various applications, such as healthcare, finance, e-commerce, software and technology, education, and law. However, as ML systems increasingly influence high-stakes domains, ensuring their safety, security, and overall trustworthiness gains a high importance. This also explains a recent global push for regulating ML models all over the world, including in Canada.
This seminar-style course will explore different topics in emerging research areas related to the development of trustworthy ML systems, i.e., systems that are reliable, secure, explainable, ethical, and also compliant with existing law and regulations. Students will learn about quality assurance methods for ML systems, attacks against ML systems, defense techniques to mitigate such attacks, and ethical implications of using ML systems.
The course assumes students already have a basic understanding of machine learning. Most of the course readings will come from both seminal and recent papers in the field. Each student will read, summarize, and present several scientific papers, as well as propose, implement, and present their own original project. As such, the course will also focus on polishing the students’ research, development, communication, and technical presentation skills.
By the end of the course, students will learn:
This course does not have formal prerequisites. However, previous programming experience and a basic understanding of machine learning (equivalent to CPSC 340 or ELEC400M/ELEC571M ) are necessary.
Instructor | Lectures: Office hours: |
---|
Week |
Topic |
Major Deadlines |
W1: Jan 9 |
Introductions to Trustworthy AI, application scenarios, what can go wrong; Course logistics |
|
W2: Jan 16 |
AI Trustworthiness: Overview |
Submit 2-3 discussion points for each video |
W3: Jan 23 |
Explainability and Transparency |
Jan 20-Jan 21, 5pm: Select papers you would like to present |
W4: Jan 30 |
LLMs: Grounding and Factuality |
|
W5: Feb 6 |
Privacy |
Project M0: Finalize groups and discuss project ideas |
W6: Feb 13 |
Workshop: project proposal presentations |
Project M1: Project proposal |
W7: Feb 20 | Mid-term Break | |
W8: Feb 27 |
LLMs: Alignment and Jailbreaking Attacks |
|
W9: Mar 6 |
Adversarial Attacks |
|
W10: Mar 13 |
Legal Implications: Privacy and IP Protection |
Project M2: Report outline and intermediate status |
W11: Mar 20 |
Fairness, Ethics, Society |
|
W12: Mar 27 |
Open to topics of interest / guest speaker |
|
W13: Apr 3 |
Workshop: |
Project M3: Presentation slides |
(W14: Apr 10) |
(no class) |
Project M4: Final project report |
For weeks 3-5 and 8-11, students will read the assigned research papers (2 papers each week). Each student will submit a two-page summary of each paper that, on the first page, describes (a) the technical approach and (b) a critical review of the paper. On the second page, specify (c) how AI technology was used when working on the assignment.
For (a), describe, in bullet points, the input and outputs of the approach, its technical novelty, how the approach was evaluated, and what the results show. The description should take about 1/2 of the page. Points will be deduced for explanations that are not clear or not specific to the paper.
For (b), specify, in bullet points, 1-2 main strengths and weaknesses of the paper (not including those listed in the paper) and 1-2 suggestions for improvement and follow-up work. Points will be deduced for unclear statements, for listing non-original strength / weaknesses / suggestions, i.e., those stated in the paper, and for infeasible suggestions, which do not specify the execution plan. The description should take about 1/2 of the page and both (a) and (b) should be one page combined.
For (c), specify which AI technology, if any, was used to work on the assignment and how exactly these technology were used. Then, describe positives and negatives of using these technologies, i.e., when they were helpful - state how; when they were not helpful - state how and describe why, in your opinion, they were not helpful for your task. A template MS-Word document for paper summaries can be found here can be found here.
Each week, a student will present one of the assigned research papers to the class (two students each week). The student should motivate the need for the contribution made by the paper, put it in context of related work, summarize the proposed technique and its evaluation, discuss the strengths and weaknesses of the approach (beyond those listed in the paper), and lead the discussion on the paper. Depending on the number of course participants, each student will present 1-2 papers. Students do not need to submit summaries of the papers they present.
The project will be performed by groups of 2-3 students. The scope of each group's project should match the number of students involved. The expectation for the project is to deepen the class’s understanding of topics related to trustworthy AI. That can include novel usage serious and identification of their pitfalls; novel applications of existing techniques to different scenarios; technical solutions; collection of statistical data on Trust ML issues and their impact on society, and novel literature reviews. Come to talk to the course instructor at least one week before the deadline if you want some ideas for inspiration!
There are five deliverables for the project. All reports should follow IEEE conference proceedings template, specified in the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf options).
The use of AI technology (such as ChatGPT and CoPilot) is allowed in this course, but all usages should be explicitly declared and documented. Students are ultimately accountable for the work they submit. Unreported and undocumented use is considered academic integrity violation and will be treated accordingly. As such, throughout the course, students will document and critically analyze their usage of AI technology, identifying its strengths and weaknesses. The analysis must be submitted as part of the assignment and will be graded.
The academic enterprise is founded on honesty, civility, and integrity. As members of this enterprise, all students are expected to know, understand, and follow the codes of conduct regarding academic integrity. At the most basic level, this means submitting only original work done by you and acknowledging all sources of information or ideas and attributing them to others as required. This also means you should not cheat, copy, or mislead others about what is your work. Violations of academic integrity (i.e., misconduct) lead to the breakdown of the academic enterprise, and therefore serious consequences arise and harsh sanctions are imposed. For example, incidences of plagiarism or cheating may result in a mark of zero on the assignment or exam and more serious consequences may apply if the matter is referred to the President’s Advisory Committee on Student Discipline. Careful records are kept in order to monitor and prevent recurrences.
For more information, see here.UBC values respect for the person and ideas of all members of the academic community. Harassment and discrimination are not tolerated nor is suppression of academic freedom. UBC provides appropriate accommodation for students with disabilities and for religious, spiritual and cultural observances. UBC values academic honesty and students are expected to acknowledge the ideas generated by others and to uphold the highest academic standards in all of their actions. Details of UBC’s respectful environment policies, which all students, staff and faculty are expected to follow, can be found here: https://hr.ubc.ca/working-ubc/respectful-environment
UBC provides resources to support student learning and to maintain healthy lifestyles but recognizes that sometimes crises arise and so there are additional resources to access including those for survivors of sexual violence. UBC values respect for the person and ideas of all members of the academic community. Harassment and discrimination are not tolerated nor is suppression of academic freedom. UBC provides appropriate accommodation for students with disabilities and for religious, spiritual and cultural observances. UBC values academic honesty and students are expected to acknowledge the ideas generated by others and to uphold the highest academic standards in all of their actions. Details of the policies and how to access support are available here