The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2023
DOI: 10.1007/s10618-023-00930-y
|View full text |Cite
|
Sign up to set email alerts
|

NICE: an algorithm for nearest instance counterfactual explanations

Abstract: In this paper we propose a new algorithm, named NICE, to generate counterfactual explanations for tabular data that specifically takes into account algorithmic requirements that often emerge in real-life deployments: (1) the ability to provide an explanation for all predictions, (2) being able to handle any classification model (also non-differentiable ones), (3) being efficient in run time, and (4) providing multiple counterfactual explanations with different characteristics. More specifically, our approach e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 55 publications
0
11
0
Order By: Relevance
“…This privacy risk occurs when the counterfactual algorithm uses instance-based strategies to ind the counterfactual explanations. These counterfactuals correspond to the nearest unlike neighbor and are also called native counterfactuals [5,25]. Other counterfactual algorithms use perturbation where synthetic counterfactuals are generated by perturbing the factual instance and labelling it with the machine learning model, without reference to known cases in the training set [25].…”
Section: Problem Statement: Explanation Linkage Attacksmentioning
confidence: 99%
See 4 more Smart Citations
“…This privacy risk occurs when the counterfactual algorithm uses instance-based strategies to ind the counterfactual explanations. These counterfactuals correspond to the nearest unlike neighbor and are also called native counterfactuals [5,25]. Other counterfactual algorithms use perturbation where synthetic counterfactuals are generated by perturbing the factual instance and labelling it with the machine learning model, without reference to known cases in the training set [25].…”
Section: Problem Statement: Explanation Linkage Attacksmentioning
confidence: 99%
“…Other counterfactual algorithms use perturbation where synthetic counterfactuals are generated by perturbing the factual instance and labelling it with the machine learning model, without reference to known cases in the training set [25]. We focus on counterfactual algorithms that return real instances: several algorithms do this, as this substantially decreases the run time while also increasing desirable properties of the explanations such as plausibility [5]. Plausibility measures how realistic the counterfactual explanation is with respect to the data manifold, which is a desirable property [22], and Brughmans et al [5] show that the techniques resulting in an actual instance have the best plausibility results.…”
Section: Problem Statement: Explanation Linkage Attacksmentioning
confidence: 99%
See 3 more Smart Citations