Firebolt: Weak Supervision Under Weaker Assumptions

被引:0
|
作者
Kuang, Zhaobin [1 ]
Arachie, Chidubem [1 ,2 ]
Liang, Bangyong [1 ]
Narayana, Pradyumna [1 ]
DeSalvo, Giulia [1 ]
Quinn, Michael [1 ]
Huang, Bert [3 ]
Downs, Geoffrey [1 ]
Yang, Yang [1 ]
机构
[1] Google, Mountain View, CA 94043 USA
[2] Virginia Tech, Blacksburg, VA USA
[3] Tufts Univ, Medford, MA 02155 USA
关键词
FRAMEWORK;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Modern machine learning demands a large amount of training data. Weak supervision is a promising approach to meet this demand. It aggregates multiple labeling functions (LFs) noisy, user-provided labeling heuristics to rapidly and cheaply curate probabilistic labels for large-scale unlabeled data. However, standard assumptions in weak supervision such as user-specified class bal- ance, similar accuracy of an LF in classifying different classes, and full knowledge of LF de- pendency at inference time might be undesir- able in practice. In response, we present Firebolt, a new weak supervision framework that seeks to operate under weaker assumptions. In particular, Firebolt learns the class balance and class-specific accuracy of LFs jointly from unlabeled data. It carries out inference in an efficient and interpretable manner. We analyze the parameter estimation error of Firebolt and characterize its impact on downstream model performance. Furthermore, we show that on five publicly available datasets, Firebolt outperforms a state-of-the-art weak supervision method by up to 5.8 points in AUC. We also provide a case study in the production setting of a tech company, where a Firebolt-supervised model outperforms the existing weakly-supervised production model by 1.3 points in AUC and speeds up label model training and inference from one hour to three minutes.
引用
收藏
页数:46
相关论文
共 50 条
  • [1] Generalizing PMAC Under Weaker Assumptions
    Datta, Nilanjan
    Yasuda, Kan
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 433 - 450
  • [2] Classical optimality conditions under weaker assumptions
    Di, S
    SIAM JOURNAL ON OPTIMIZATION, 1996, 6 (01) : 178 - 197
  • [3] UNBIASEDNESS OF FOURIER INTEGRAL ESTIMATOR UNDER WEAKER ASSUMPTIONS
    CHEN, DF
    COMMUNICATIONS IN STATISTICS-THEORY AND METHODS, 1994, 23 (05) : 1275 - 1281
  • [4] Election Verifiability for Helios under Weaker Trust Assumptions
    Cortier, Veronique
    Galindo, David
    Glondu, Stephane
    Izabachene, Malika
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 327 - 344
  • [5] Contextuality under weak assumptions
    Simmons, Andrew W.
    Wallman, Joel J.
    Pashayan, Hakop
    Bartlett, Stephen D.
    Rudolph, Terry
    NEW JOURNAL OF PHYSICS, 2017, 19
  • [6] Inference for autocorrelations under weak assumptions
    Romano, JP
    Thombs, LA
    JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 1996, 91 (434) : 590 - 600
  • [7] Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions
    Alawatugoda, Janaka
    CRYPTOGRAPHY, 2023, 7 (01)
  • [8] Weak Regularity of the Inverse Under Minimal Assumptions
    Hencl, Stanislav
    Kauranen, Aapo
    Luisto, Rami
    ARCHIVE FOR RATIONAL MECHANICS AND ANALYSIS, 2020, 238 (01) : 185 - 213
  • [9] BLOCK BOOTSTRAP CONSISTENCY UNDER WEAK ASSUMPTIONS
    Calhoun, Gray
    ECONOMETRIC THEORY, 2018, 34 (06) : 1383 - 1406
  • [10] On Multiplier Processes Under Weak Moment Assumptions
    Mendelson, Shahar
    GEOMETRIC ASPECTS OF FUNCTIONAL ANALYSIS, 2017, 2169 : 301 - 318