# preferential_normalizing_flows__58158ea7.pdf Preferential Normalizing Flows Petrus Mikkola, Luigi Acerbi , Arto Klami Department of Computer Science, University of Helsinki first.last@helsinki.fi Eliciting a high-dimensional probability distribution from an expert via noisy judgments is notoriously challenging, yet useful for many applications, such as prior elicitation and reward modeling. We introduce a method for eliciting the expert s belief density as a normalizing flow based solely on preferential questions such as comparing or ranking alternatives. This allows eliciting in principle arbitrarily flexible densities, but flow estimation is susceptible to the challenge of collapsing or diverging probability mass that makes it difficult in practice. We tackle this problem by introducing a novel functional prior for the flow, motivated by a decision-theoretic argument, and show empirically that the belief density can be inferred as the function-space maximum a posteriori estimate. We demonstrate our method by eliciting multivariate belief densities of simulated experts, including the prior belief of a general-purpose large language model over a real-world dataset. 1 Introduction Representing beliefs as probability distributions can be useful, particularly as prior probability distributions in Bayesian inference especially in high-dimensional, non-asymptotic settings where the prior strongly influences the posterior [Gelman et al., 2017] or as probabilistic alternatives to reward models [Leike et al., 2018, Ouyang et al., 2022]. Our goal is to elicit a complex multivariate probability density from an expert, as a representation of their beliefs. By expert, we mean an information source with a belief over a problem of interest, termed belief density, which does not permit direct evaluation or sampling. The problem is an instance of expert knowledge elicitation, where the belief is elicited by asking elicitation queries such as quantiles of the distribution [O Hagan, 2019]. The current elicitation literature (see Mikkola et al. 2023 for a recent overview) focuses almost exclusively on extremely simple distributions, mostly products of univariate distributions of known parametric form. Some isolated works have considered more flexible distributions, for instance quantile-parameterized distributions [Perepolkin et al., 2024] for univariate cases, or Gaussian processes [Oakley and O Hagan, 2007] and copulas for modelling low-dimensional dependencies [Clemen et al., 2000], but we want to move considerably beyond that and elicit flexible beliefs using modern neural network representations [Bishop and Bishop, 2023]. The main challenges are identifying elicitation queries that are sufficiently informative to infer the belief density while being feasible for the expert to answer reliably, and selecting a model class for the belief density that can represent flexible beliefs without simplifying assumptions but that can still be efficiently estimated. Normalizing flows are a natural family for representing flexible distributions [Papamakarios et al., 2021]. When using flows for modelling a density p(x), learning is usually based on either a set of samples x p(x) drawn from the distribution (density estimation; Dinh et al., 2014) or on the log density log p(x) evaluated at flow samples, x q(x), in the variational inference formulation [Rezende and Mohamed, 2015]. Neither strategy applies to our setup, since we do not have the luxury of sampling from the belief density and obviously cannot evaluate it either. In addition to Equal contribution 38th Conference on Neural Information Processing Systems (Neur IPS 2024). (a) n = 10, w/o prior (b) n = 10, w/o prior (c) n = 10, w/ prior (d) n = 100, w/ prior Figure 1: Illustration of belief densities elicited from preferential ranking data by a normalizing flow (contour: true density; heatmap: estimated flow; red: preferred points; blue: non-preferred points). (a)-(b): Typical failure modes of collapsing and diverging mass, when training a flow with just n = 10 rankings. (c)-(d): The proposed functional prior resolves the issues, and already with 10 rankings we can learn the correct belief density, matching the result of the flow trained on larger data. the well-known challenges of training normalizing flows, the setup introduces new difficulties; in particular, a flexible flow easily collapses or finds a way of allocating probability mass in undesirable ways. Significant literature on resolving these issues exists [Behrmann et al., 2021, Salmona et al., 2022, Cornish et al., 2020], but conclusive solutions that guarantee stable learning are still missing. Our solution offers new tools for controlling the flow in low-density areas, and hence we contribute for the general flow literature despite focusing on the specific new task. We build on established literature on knowledge elicitation for the interaction with the expert. Distributions are primarily characterized by their location and covariance structure, yet humans are notoriously bad at assessing covariances between variables [Jennings et al., 1982, Wilson, 1994]. However, human preferences, with potentially strong interconnections between variables, can be recovered by asking individuals to compare or rank alternatives, a topic studied under discrete choice theory [Train, 2009]. The most studied random utility models (RUMs) interpret human choice as utility maximization with an additive noise component [Marschak, 1959]. To infer the correlation structure in human beliefs indirectly from elicitation data, we study a setup where the expert compares or ranks alternatives (events) based on their probability so that their decisions can be modeled by a RUM. In practice, this means that the data for learning the flow will take the form of choice sets Ck = {x1, ..., xk} of candidates presented to the expert, combined with their choices indicating the preference over the alternatives based on their probability. We stress that candidates x are here not samples from the belief density but are instead provided by some other unknown process, such as an active learning method [Houlsby et al., 2011]. The only information about the belief density comes from the choice. We are not aware of any previous works that learn flows from preferential comparisons. We first discuss some additional challenges caused by preferential data, and then show how we can leverage preferential structure to improve learning. Specifically, our learning objective corresponds to a function-space maximum a posteriori (FS-MAP), where Bayesian inference is conducted on the function (flow) itself, not its parameters [Wolpert, 1993, Qiu et al., 2024]. The learning objective is exact, in contrast to flow-based algorithms that model phenomena involving discontinuities [Nielsen et al., 2020, Hoogeboom et al., 2021], such as the argmax operator in the RUM model. By construction, the choice sets explicitly include candidates x that were not preferred by the expert, carrying information about relative densities of preferred vs. not preferred points. This allows us to introduce a functional prior that encourages allocating more mass to regions with high probability under a RUM with exponential noise, solving the collapsing and diverging probability mass problem that poses a challenge for flow inference in small data scenarios. In summary, we introduce the novel problem of inferring probability density from preferential data using normalizing flows and provide a practical solution. We model the expert s choice as a RUM with exponentially distributed noise, and query the expert for comparison or ranking of k alternatives. We derive the likelihoods for k-wise comparisons and rankings and study the distribution of the most preferred point among k alternatives, which we term the k-wise winner. Based on the interpretation of the k-wise winner distribution as a tempered and tilted belief density, we introduce an empirical function prior and the FS-MAP objective for learning the flow. Finally, we validate our method using both synthetic and real data sets. 2 Why learning the density from preferential data is challenging? Learning flows from small samples is challenging, especially in higher dimensions even when learning from direct data, such as samples from the density. Figure 1 illustrates two common challenges of collapsing and diverging probability mass; the illustration is based on our setup to showcase the proposed solution, but the same problems occur in the classical setup. The collapsing mass scenario is a form of overfitting, similar to mode collapse in mixture models [Li et al., 2007], but more extreme for flexible models. In the diverging mass problem, the model places probability mass in the regions of low probability. The problem has connections to difficulties in training [Behrmann et al., 2021, Dhaka et al., 2021, Vaitl et al., 2022, Liang et al., 2022] and issues with coupling flows with increasing depth, which tend to produce exponentially large sample values [Behrmann et al., 2021, Andrade, 2024]. One intuitive explanation is that we simply have no information on how the flow should behave far from the training samples, and an arbitrarily flexible model will at least in some cases behave unexpectedly. If already learning a flow from samples drawn from the density itself is difficult, is it even possible to infer the belief density from preferential data? For instance, for the most popular RUM model (Plackett-Luce; Luce, 1959, Plackett, 1975) we cannot in the noiseless case differentiate between the true density and any normalised positive monotonic transformation of it: Proposition 2.1 (Unidentifiability of a noiseless RUM). Let p be the expert s belief density. For k 2, let Drank := {x1 x2 ... xk} be a k-wise ranking (see Definition 3.3). If W Gumbel(0, β), then for any positive monotonic transformation g holds limβ 0 p(Drank|g p , β) = 1. Proof in B. In other words, the noiseless solution is not even unique and resolving this requires a way of quantifying the relative utility. Noisy RUM induces such a metric due to the noise magnitude providing a natural scale but even then the belief is identifiable only up to a noise scale; see A for a concrete example for the Thurstone-Mosteller model [Thurstone, 1927, Mosteller, 1951]. Another new challenge is that the candidates x presented to the expert are given by some external process. In the simplest case, they are drawn independently from some unknown distribution λ(x), which does not need to relate to the belief density p . We need a formulation that affords estimating p directly, ideally under minimal assumptions on the distribution besides λ(x) > 0 for p (x) > 0. Despite these challenges, we can indeed learn flows as estimates of belief densities as will be explained next, in part by leveraging standard machinery in discrete choice theory to model the expert s choices and in part by introducing a new functional prior for the normalizing flow. The choice process separates the candidate samples x into preferred and non-preferred ones, and we can use this split to construct a prior that helps learning the flow. That is, the preferential setup also opens new opportunities to address problems in learning flows. 3 Random utility model with exponentially distributed noises The random utility model represents the decision maker s stochastic utility U as the sum of a deterministic utility and a stochastic perturbation [Train, 2009], U(x) = f(x) + W(x), (1) where f : X R is a deterministic function called representative utility, and W is a stochastic noise process, often independent across x. The relationship between these concepts and the task will be made specific in Assumptions 1 to 3. We assume that the domain X is a compact subset of Rd. Given a set C X of possible alternatives, the expert selects a specific opinion x C through the noisy utility maximization, x arg max x C U(x ). (2) Definition 3.1 (choice set). Let k 2. The choice set is a set of k alternatives, denoted by Ck = {x1, ..., xk}. We assume that Ck is a set of i.i.d. samples from a probability density λ over X, but note that the formulation can be generalized to other processes. For example, if we ask for a pairwise comparison C2 = (x, x ), the expert s answer would be x x if f(x)+w(x) > f(x )+w(x ) for given a realization w of W. We denote the random utility model with a representative utility f, a stochastic noise process W, and a choice set Ck, by RUM(Ck, f, W). We make the common assumption of representing the probabilistic beliefs of a (human) expert in logarithmic form [Dehaene, 2003]. Assumption 1. f(x) = log p (x); noise is additive for log-density. Assumption 2. f is bounded and continuous. Inspired by Malmberg and Hössjer [2012, 2014], we assume that the noise is exponentially distributed and thus belongs to the exponential family [Azari et al., 2012]. Assumption 3. W(x) Exp(s) independently for any x X With Assumption 1, this corresponds to a model where in the limit of infinitely many alternatives, the expert chooses a point by sampling their belief density (Corollary A.2). The parameter s is here a precision parameter, the reciprocal of the standard deviation of Exp(s). There are two popular types of preferential queries [Fürnkranz and Hüllermeier, 2011]. Definition 3.2 (k-wise comparison). A preferential query that asks the expert to choose the most preferred alternative from Ck is called a k-wise comparison. The choice is denoted by x Ck. Definition 3.3 (k-wise ranking). A preferential query that asks the expert to rank the alternatives in Ck from the most preferred to the least preferred is a called k-wise ranking. The expert s feedback is the ordering xπ(Ck)1 ... xπ(Ck)k for some permutation π. Note that the top-ranked sample of k-wise ranking is the same as the k-wise comparison choice, and the k-wise ranking can be formed as a sequence of k-wise comparisons by repeatedly removing the selected candidate from the choice set, as assumed in the Plackett-Luce model [Plackett, 1975]. Hence, common theoretical tools cover both cases. 3.1 The k-wise winner The chosen point of a k-wise comparison is central to us for two reasons. First, its distribution provides the likelihood for inference when data come in the format of k-wise rankings or comparisons. Second, its distribution in the limit as k offers insights for designing a prior that mitigates the challenge of collapsing and diverging probability mass. Definition 3.4 (k-wise winner). A random vector X k given by the following generative process is called as k-wise winner. 1. Sample k-samples from λ(x), and denote Ck = {x1, ..., xk}. 2. Sample x from a Categorical distribution with support Ck and with probabilities given by RUM(Ck; log p (x), Exp(s)). The density of the k-wise winner is proportional to the k-wise comparison likelihood p(x Ck | Ck), namely to p(x Ck | Ck)λ(Ck). The likelihood of the k-wise comparisons takes the following form. Proposition 3.5. Let Ck be a choice set of k 2 alternatives. Denote C = Ck \ {x} and f C = maxxj C f(xj). The winning probability of a point x Ck equals to P (x Ck | Ck) = exp s(l + 1) max{f C f(x), 0} sym:xj C exp( s(f(x) f(xj))), where Pl sym:xj C denotes the lth elementary symmetric sum of the set C. Proof. See B. The k-wise ranking likelihood is a product of the k-wise comparison likelihoods where the winners are sequentially removed from the choice set and provided in Appendix A as Equation (A.4). In the limit of infinitely many comparisons, the k-wise distribution reduces to a tempered belief density tilted by the sampling distribution λ [Malmberg and Hössjer, 2012, 2014]. Figure 2: (a) The k-wise winner distribution converges to the belief density as k . (b) The k-wise winner distribution can be approximated by a tempered belief density. For example, the tempered belief density with an exponent 1/5 approximates well the pairwise winner distribution. Theorem 3.6. If f is bounded and continuous, then the limit distribution of X k as k exists and its density is given by, p(x) = exp (sf(x)) λ(x) R exp (sf(x )) λ(x )dx . (4) Proof. Apply Theorem 18.4 in [Malmberg and Hössjer, 2014] to our setting and note that the first sentence in the proof of Theorem 18.4 is incorrect. For a random variable Y = X/s with X Exp(s) it holds that Y Exp(s2). However, for a random variable Y = s X with X Exp(s) it holds that Y Exp(1). Thus, the correct standardization is Y s Y . 3.2 The k-wise winner distribution as a tilted and tempered belief density Building on the definitions and theorems above, we now introduce the central idea of how to model the belief density based on the k-wise winner distribution. The RUM precision parameter s acts as a temperature parameter for the belief density, as p(x) λ(x)p (x)s, by Eq. (4). In general, there is no connection between λ(x) and p (x), but intuition can be gained by considering some extreme cases. For λ = p we have p(x) p (x)s+1, whereas for uniform λ(x) and s = 1 the limit distribution is the belief. This is also apparent from Corollary A.2. However, our interest is in cases where k is finite. For k < , forming the k-wise winner distribution requires marginalising over the choice set (Proposition 3.5). The formulas can be found in the Appendix (Corollary A.3), and do not have elegant analytic simplifications. However, they empirically resemble tempered versions of the actual belief as illustrated in Figure 2. In other words, finite k plays a similar role as the RUM noise precision s. When resorting to k < , the choice distribution (Eq. (A.2)) does not match the belief density for the true noise precision s, but we can improve the fit by selecting some alternative noise precision such that the choice distribution better approximates the belief. We will later use this connection to build a prior over the flow, and note that for this purpose we do not need an exact theoretical characterization: It is sufficient to know that for some choice of k and s the choice distribution can resemble the target density, at least to the degree that it can be used as a basis for prior information. Given that k is typically fixed, s can be varied in the prior, implying that the further s is from the optimal value, the greater the prior misspecification. The idea is empirically illustrated in Figure 2. The k-wise winner distribution for varying k is shown in Figure 2(a), where the belief density is a truncated standard normal on the interval [ 5, 5], comparisons are sampled uniformly over the interval, and s = 1. As k increases, the k-wise winner distribution approaches the belief density (here k = 10 is already very close), but we can equivalently approach the same density by changing the noise level (Figure 2(b)). 4 Belief density as normalizing flow We model the belief density p with a normalizing flow [Rezende and Mohamed, 2015, Papamakarios et al., 2021]. We introduce a new learning principle and objective for the flow which is compatible with any standard flow architecture, as long as it affords easy computation of the flow density. A normalizing flow is an invertible mapping T from a latent space Z Rd into a target space X Rd. T consists of a sequence of invertible transformations, so that the forward (generative) direction z 7 T(z) is fast to compute and the backward (normalizing) direction x 7 T 1(x) is either known in closed form or can be approximated efficiently. The base distribution on Z is a simple distribution such as a multivariate normal, whose density is denoted by pz. If we denote the parametrized T by Tϕ given the flow network parameters ϕ, the parameterized model of the log belief density, denoted by fϕ, can be written as, fϕ(x) = log pz T 1 ϕ (x) + log | det JT 1 ϕ (x)|, (5) where JT 1 ϕ is the Jacobian of T 1 ϕ . What complicates the learning of fϕ in our case is the absence of a direct method to sample from p (x), ruling out the conventional algorithms [e.g., Papamakarios et al., 2021]. Instead, we devise a new learning objective explained next. 4.1 Function-space Bayesian inference Our starting point is to perform Bayesian inference for the flow network parameters given preferential dataset D = {(x(i), C(i) k ) | x(i) C(i) k }n i=1 (k-wise comparisons) or D = {(σ(i), C(i) k ) | σ(i) is a permutation on C(i) k }n i=1 (k-wise rankings), p(ϕ | D) p(D | ϕ)p(ϕ), where p(D | ϕ) is the likelihood and p(ϕ) is the prior for the flow network parameters. It is difficult to devise a good prior p(ϕ), and we instead perform inference over the function [Wolpert, 1993], p(fϕ | D) p(D | fϕ)p(fϕ) where p(D | fϕ) is the preferential likelihood for comparisons, Eq. (3), or rankings, Eq. (A.4). The function-space prior is easier to specify as we can focus on the characteristics of the log belief density itself, not its parametrization. The function-space prior is often evaluated at a finite set of representer points X = ( x1, ..., xm), where m should be chosen to be large to capture the behavior of the function at high resolution p(fϕ( X)) [Wolpert, 1993, Qiu et al., 2024]. For example, when f is a Gaussian process, the prior representer points in the posterior corresponds to the datapoints (e.g., Equation 3.12 in Rasmussen and Williams, 2006). Following the considerations above, we construct our prior knowledge of fϕ on a subset of datapoints. 4.2 Empirical functional prior To address the issue of collapsing or diverging probability mass, we introduce an empirical functional prior whose finite marginals at winner points {x1, ..., xn} are independently distributed as p(f) punif(f) Y i exp(fi), (6) where f := (fϕ(x1), ..., fϕ(xn)) and punif is an uninformative bounded (hyper) prior that guarantees that the functional prior is proper. The functional prior Eq. (6) is a special case of a class of priors, p(f) Q i λi exp(sfi), derived from the following decision-theoretic argument under the exponential RUM model. Let us decompose the preference dataset into winners and losers Dk = D k D k by defining D k := {x | Ck s.t. x Ck} and D k := Dk \ D k . The functional prior is the probability of observing only the k-wise winners, p(f) p(D k | f, s, λ)punif(f), where punif(f) 1 (when f is bounded, Assumption 2). The idea is to consider higher k or s (less noise) than the true ones, as both choices make the density more peaked around the modes of p (see Figures 2(a) and 2(b)). This choice encourages the flow to place more mass on the winner points in a way that is consistent with the underlying decision model. We consider k = and s (0, ), where s should be an increasing function of the true k. While setting k = reduces the functional prior to a closed form Eq. (4) by Theorem 3.6, the normalizing constant remains difficult. However, for the special case of λ 1 and s = 1, the normalizing constant equals one. We make this choice to retain computational tractability, reminding that the construct is only used as a prior intended for regularizing the solution and does not need to match the true density as such. This comes at the cost of increased prior misspecification, which can, in turn, degrade the quality of the fit, especially when the true value of k is small (compare Figure 4(a) (k=2) versus Figure 1(d) (k=5)). 4.2.1 Function-space maximum a posteriori We train the flow Tϕ by maximizing the unnormalized function-space posterior density of fϕ conditioned on the preferential data D = D D , using stochastic gradient ascent [Kingma and Ba, 2014]. Denoting all points in D by X and all winner points in D by X , the training objective is X log L(D | fϕ(X), s) + X fϕ(X ), (7) where L is the k-wise comparison or ranking likelihood as per Eqs. (3) and (A.4). In the case of ranking data, the winner point x X is the first-ranked alternative in each individual k-wise ranking, meaning that x is a k-wise winner. A global optimum of Eq. (7) is the function-space maximum a posteriori estimate of the belief density. Pseudo-codes for the overall algorithm (Algorithms 1) and the forward pass for the unnormalized log-posterior (Algorithms 2) are provided in the Appendix. The computational cost of training is similar to standard flow learning from equally many samples. 5 Experiments We first evaluate our method on synthetic data with choices made by simulating the RUM model, to validate the algorithm in cases where the ground truth is known while covering both cases where the responses follow the assumed RUM model and where they do not. We then demonstrate how the method could be used in a realistic elicitation scenario, using a large language model (LLM) as a proxy for a human expert [Choi et al., 2022]. As with a real human, an LLM is unlikely to follow the exact RUM model, but compared to a real user, the LLM expert can tirelessly answer unlimited questions and possible ethical issues and risks relating to human subjects are avoided. LLMs carry their own biases and risks [Tjuatja et al., 2024], but the focus here is on evaluating our algorithm. Code for reproducing all experiments is available at https://github.com/petrus-mikkola/prefflow. Setup In the main experiments we use k-wise ranking with k = 5, using relatively few queries to remain relevant for the intended use-cases where the expert s capacity in providing the information is clearly limited. Since learning a preference of higher dimensions is more difficult, we scale the number of queries n linearly with d but still stay substantially below the large-sample scenarios typically considered in flow learning. The details, together with the choice of the flow and the candidate distribution λ, are provided below for each experiment. As a flow model, we use Real NVP [Dinh et al., 2017] when d = 2 and Neural Spline Flow [Durkan et al., 2019] when d > 2, implemented on top of [Stimper et al., 2023]. For more details, see Appendix C.4. Evaluation We assess performance qualiatively via visual comparison of 2d and 1d marginal distributions between the target belief density and the flow estimate of the belief density, and quantitatively by numerically computing three metrics: the log-likelihood of the preferential data, the Wasserstein distance, and the mean marginal total variation distance (MMTV; Acerbi, 2020) between the target and the estimate. The numerical results are reported as the means and standard deviations of the metrics over replicate runs. As a baseline, we report the results of a method that uses the same preferential comparisons and optimizes the same training objective, but instead of using a flow to represent exp(f) we directly assume the density is a factorized normal distribution parameterized by means and (log-transformed) standard deviations of all dimensions. This exact method has not been presented in the previous literature, but was designed to validate the merit of the flow representation. Table 1: Accuracy of the density represented as a flow (flow) compared to a factorized normal distribution (normal), both learned from preferential data, in three metrics: log-likelihood, Wasserstein distance, and the mean marginal total variation (MMTV). Averages over 20 repetitions (but excluding a few crashed runs), with standard deviations. log-likelihood ( ) wasserstein ( ) MMTV ( ) normal flow normal flow normal flow Onemoon2D -1.98 ( 0.12) -1.09 ( 0.12) 0.45 ( 0.04) 0.25 ( 0.04) 0.30 ( 0.02) 0.21 ( 0.02) Gaussian6D -1.40 ( 0.07) -0.12 ( 0.02) 1.74 ( 0.06) 1.29 ( 0.05) 0.20 ( 0.01) 0.09 ( 0.01) Twogaussians10D -3.99 ( 0.06) -0.09 ( 0.01) 7.31 ( 0.12) 2.60 ( 0.06) 0.47 ( 0.01) 0.08 ( 0.00) Twogaussians20D -6.35 ( 0.12) -0.08 ( 0.01) 11.07 ( 0.15) 4.55 ( 0.07) 0.47 ( 0.00) 0.08 ( 0.00) Funnel10D -2.21 ( 0.06) -0.09 ( 0.01) 5.13 ( 0.04) 3.92 ( 0.04) 0.27 ( 0.00) 0.18 ( 0.01) Abalone7D -5.53 ( 0.03) -2.16 ( 0.12) 0.53 ( 0.00) 0.34 ( 0.01) 0.26 ( 0.00) 0.29 ( 0.01) Figure 3: Cross-plot of selected variables of the estimated flow in the Abalone (left) and LLM knowledge elicitation experiment (middle), and the marginal density of the same variables for the ground truth density in the LLM experiment (right). See Figures C.6 and C.7 for other variables. 5.1 Synthetic tasks First, we study the method on synthetic scenarios. For the first set of experiments, we assume a known density p and simulate the preferential responses from the assumed RUM(Ck, log p , Exp(1)). We consider five different target distributions: Onemoon2D, Gaussian6D, Twogaussians10D, Twogaussians20D, and Funnel10D. The densities of the target distributions can be found in Appendix C.1. For all cases we used 100d queries and λ as a mixture of uniform and Gaussian distribution centered on the mean of the target, with the mixture probability 1/3 for the Gaussian; this technical simplification ensures a sufficient ratio of the samples to align with the target density even when d is high. Table 1 shows that for all scenarios we can learn a useful flow; all metrics are substantially improved compared to the method based on the normal model and visual inspection (Appendix C.5) confirms the solutions match the true densities well. Abalone regression data. Having validated the method when the queries follow the assumed RUM model with a synthetic belief density, we consider a more realistic target density. We first fit a flow model to the continuous covariates of the regression data abalone [Nash et al., 1995], and then use the fitted flow as a ground-truth belief density in the elicitation experiment. The elicitation queries correspond to all k-combinations of the dataset size n = 4177. The numerical results are again provided in Table 1. Figure 3 shows that the learned flow captures the correlations between variables almost perfectly, which can be hard to see as the flow (heatmap) overlaps the true density (contour). There is some mismatch in the marginals, which is also indicated by the MMTV metric. In terms of the Wasserstein distance and visual comparison (Figure C.8), the flow based method clearly outperforms the baseline. (a) Onemoon2D, k = 2, n = 100 (b) Gaussian6D, k = 2, n = 1000 Figure 4: Illustration of belief densities elicited from pairwise comparisons by a normalizing flow. 5.2 Expert elicitation with LLM as the expert In this experiment, we prompt a LLM to provide its belief on how the features of the California housing dataset [Pace and Barry, 1997] are distributed. This resembles a hypothetical expert elicitation scenario, but the human expert is replaced with a LLM (Claude 3 Haiku by Anthropic in March 2024, see Appendix C.2 for the prompt and detailed setup) for easier experimentation. From the perspective of the flow learning algorithm the setup is similar to the intended use-cases. We query in total 220 k-wise rankings through prompting, where the alternatives Ck are uniformly sampled over the domain specified by 1st and 99th percentiles of each variable in the California housing dataset. The range was chosen to ensure λ(x) covers approximately the support of the density, but avoiding outliers. While we lack access to the ground-truth belief density, we can compare the learned LLM s belief density to the empirical data distribution of the California housing dataset, not known for the LLM. Figure 3 shows that there is a remarkable similarity between the distributions such as the marginals of the variables Ave Rooms, Ave Bedrms, Population, and Ave Occup are all correctly distributed on the lower ends of their ranges (which are very broad due to the uniform λ(x)). Figure D.1 shows that the flow trained without the functional prior of (6) is considerably worse, confirming the FS-MAP estimate is superior to maximum likelihood. While there might be multiple mechanisms for how the LLM forms its knowledge about this specific dataset [Brown et al., 2020], many of the features have clear intuitive meaning. For instance, houses are all but guaranteed to have only a few bedrooms, instead of tens. 5.3 Ablation study We validate the sensitivity of the results with respect to the cardinality of the choice set k, the number of comparisons/rankings n, the noise level 1/s, and the choice of distribution λ from which the candidates are sampled. In this section, we report a subset of the analysis for varying k, while the rest can be found in Appendix D. Table 2 presents the results of experiments on synthetic scenarios (Section 5.1) by varying k {2, 3, 5, 10} while keeping n fixed. We observe that the accuracy naturally improves as a function of k. The common special case in which the expert is queried through pairwise comparisons (k = 2) is shown in Figure 4 for the Onemoon2D experiment with n = 100 and the Gaussian6D experiment with n = 1000. The results indicate that we can already roughly learn the target with k = 2 that is most convenient for a user, but naturally with somewhat lower accuracy. For further analysis and more details, see Appendix D. The main takeaway is that low values of s or k, especially when n is large, can cause the flow estimate to become overly dispersed due to higher prior misspecification. 6 Discussion Theoretical and empirical analysis validate our main claim: It is possible to learn flexible distributions from preferential data, and the proposed algorithm solves the problem for some non-trivial but Table 2: Wasserstein distances for varying k across different experiments k = 2 k = 3 k = 5 k = 10 Onemoon2D (n = 100) 0.70 ( 0.09) 0.39 ( 0.05) 0.17 ( 0.03) 0.11 ( 0.03) Gaussian6D (n = 100) 2.69 ( 0.30) 2.01 ( 0.25) 1.46 ( 0.11) 1.04 ( 0.04) Funnel10D (n = 500) 4.82 ( 0.12) 4.36 ( 0.12) 3.96 ( 0.05) 3.83 ( 0.04) Twogaussians10D (n = 500) 5.47 ( 0.24) 3.81 ( 0.26) 2.57 ( 0.08) 2.20 ( 0.02) synthetic scenarios, with otherwise arbitrary but largely unimodal true beliefs. However, open questions worthy of further investigation remain on the path towards practical elicitation tools. The method is efficient only for exponential noise with s = 1 that gives an analytic prior. Other choices would require explicit normalization or energy-based modeling techniques [Chao et al., 2024]. For a given RUM precision we can, in principle, solve for k such that s = 1 becomes approximately correct due to the tempering interpretation (Figure 2), but there are no guarantees that s = 1 is good enough for any k sufficiently small for practical use, and this requires an explicit estimate of the noise precision. The ablation studies show that for fixed k, increasing n generally improves the accuracy and already fairly small n is sufficient for learning a good estimate (Table D.2). For very large n, the accuracy can slightly deteriorate. We believe that this is due to prior misspecification that encourages overestimation of the variation due to the fact that k is finite but in the prior it is assumed to be infinite. Figure D.4 confirms that for a large n the shape of the estimate is extremely close to the target density and the slightly worse Wasserstein distance is due to overestimating the width. We primarily experimented with k-wise ranging with k = 5 and relatively few comparisons. However, we demonstrated that we can learn the beliefs with somewhat limited accuracy already from the most convenient case of pairwise comparisons (k = 2), which is important for practical applications. Finally, we focused on the special case of sampling the candidates independently from λ(x). In many elicitation scenarios they could be result of some active choice instead, for example an acquisition function maximizing information gain [Mac Kay, 1992]. The basic learning principle generalizes for this setup, but additional work would be needed for theoretical and empirical analysis. 7 Conclusions The current tools for representing and eliciting multivariate human beliefs are fundamentally limited. This limits the value of knowledge elicitation in general and introduces biases that are difficult to analyze and communicate when the true beliefs do not match the simplified assumed families. Modern flexible distribution models offer a natural solution for representing also complex human beliefs, but until now we have lacked the means of inferring them from ecologically valid human judgements. We provided the first such method by showing how normalizing flows can be estimated from preferential data using a functional prior induced by the setup. Our focus was in specifying the problem setup and validating the computational algorithm, paving way for future applications involving real human judgements. Despite focusing on the scenario where the elicitation judgements are made by a human expert, the algorithm can be used for learning flows from all kinds of comparison and ranking data. Broader Impact Our goal is to eventually provide methods for accurately characterising human expert beliefs, complementing the existing toolbox with techniques that make less restrictive assumptions and hence support adaptation of better computational tools in a broad range of applications. Knowledge elicitation tools are frequently used e.g. in decision-making and policy recommendations as assistive tools. For such applications, it is critically important to ensure that the mathematical tools are reliable and transparent, and further validation of the methodology is needed before the specific method proposed here could be used in critical applications. Acknowledgments and Disclosure of Funding The work was supported by the Research Council of Finland Flagship programme: Finnish Center for Artificial Intelligence FCAI, and by the grants 345811, 358980, 356498, and 363317. The authors acknowledge support from CSC IT Center for Science, Finland, for computational resources. Luigi Acerbi. Variational Bayesian Monte Carlo with noisy likelihoods. Advances in Neural Information Processing Systems, 33:8211 8222, 2020. Daniel Andrade. Stabilizing training of affine coupling layers for high-dimensional variational inference. Machine Learning: Science and Technology, 2024. Hossein Azari, David Parks, and Lirong Xia. Random utility theory for social choice. In Advances in Neural Information Processing Systems, volume 25, 2012. Jens Behrmann, Paul Vicol, Kuan-Chieh Wang, Roger Grosse, and Joern-Henrik Jacobsen. Understanding and mitigating exploding inverses in invertible neural networks. In International Conference on Artificial Intelligence and Statistics, volume 130 of Proceedings of Machine Learning Research, pages 1792 1800. PMLR, 2021. Christopher M Bishop and Hugh Bishop. Deep learning: Foundations and concepts. Springer Nature, 2023. Tom Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared D Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda Askell, Sandhini Agarwal, Ariel Herbert-Voss, Gretchen Krueger, Tom Henighan, Rewon Child, Aditya Ramesh, Daniel Ziegler, Jeffrey Wu, Clemens Winter, Chris Hesse, Mark Chen, Eric Sigler, Mateusz Litwin, Scott Gray, Benjamin Chess, Jack Clark, Christopher Berner, Sam Mc Candlish, Alec Radford, Ilya Sutskever, and Dario Amodei. Language models are few-shot learners. Advances in Neural Information Processing Systems, 33:1877 1901, 2020. Chen-Hao Chao, Wei-Fang Sun, Yen-Chang Hsu, Zsolt Kira, and Chun-Yi Lee. Training energy-based normalizing flow with score-matching objectives. Advances in Neural Information Processing Systems, 36, 2024. Kristy Choi, Chris Cundy, Sanjari Srivastava, and Stefano Ermon. LMPriors: Pre-trained language models as task-specific priors. ar Xiv preprint ar Xiv:2210.12530, 2022. Robert T. Clemen, Gregory W. Fischer, and Robert L. Winkler. Assessing dependence: Some experimental results. Management Science, 46(8):1100 1115, 2000. ISSN 00251909, 15265501. Rob Cornish, Anthony Caterini, George Deligiannidis, and Arnaud Doucet. Relaxing bijectivity constraints with continuously indexed normalising flows. International Conference on Machine Learning, pages 2133 2143, 2020. Stanislas Dehaene. The neural basis of the Weber Fechner law: a logarithmic mental number line. Trends in cognitive sciences, 7(4):145 147, 2003. Akash Kumar Dhaka, Alejandro Catalina, Manushi Welandawe, Michael R Andersen, Jonathan Huggins, and Aki Vehtari. Challenges and opportunities in high dimensional variational inference. Advances in Neural Information Processing Systems, 34:7787 7798, 2021. Laurent Dinh, David Krueger, and Yoshua Bengio. NICE: Non-linear independent components estimation. ar Xiv preprint ar Xiv:1410.8516, 2014. Laurent Dinh, Jascha Sohl-Dickstein, and Samy Bengio. Density estimation using Real NVP. In International Conference on Learning Representations, 2017. Conor Durkan, Artur Bekasov, Iain Murray, and George Papamakarios. Neural spline flows. In Advances in Neural Information Processing Systems, volume 32, 2019. Johannes Fürnkranz and Eyke Hüllermeier. Preference Learning. Springer-Verlag New York, Inc., 2011. Andrew Gelman, Daniel Simpson, and Michael Betancourt. The prior can often only be understood in the context of the likelihood. Entropy, 19(10):555, 2017. Emiel Hoogeboom, Didrik Nielsen, Priyank Jaini, Patrick Forré, and Max Welling. Argmax flows and multinomial diffusion: Learning categorical distributions. Advances in Neural Information Processing Systems, 34:12454 12465, 2021. Neil Houlsby, Ferenc Huszár, Zoubin Ghahramani, and Máté Lengyel. Bayesian active learning for classification and preference learning. ar Xiv preprint ar Xiv:1112.5745, 2011. D. Jennings, T. M. Amabile, and L. Ross. Informal covariation assessment: Data-based vs. theorybased judgments. In Daniel Kahneman, Paul Slovic, and Amos Tversky, editors, Judgment Under Uncertainty: Heuristics and Biases, pages 211 230. Cambridge University Press, 1982. Diederik P Kingma and Jimmy Ba. Adam: A method for stochastic optimization. ar Xiv preprint ar Xiv:1412.6980, 2014. Jan Leike, David Krueger, Tom Everitt, Miljan Martic, Vishal Maini, and Shane Legg. Scalable agent alignment via reward modeling: a research direction. ar Xiv preprint ar Xiv:1811.07871, 2018. Jia Li, Surajit Ray, and Bruce G Lindsay. A nonparametric statistical approach to clustering via mode identification. Journal of Machine Learning Research, 8(8), 2007. Feynman Liang, Michael Mahoney, and Liam Hodgkinson. Fat tailed variational inference with anisotropic tail adaptive flows. In International Conference on Machine Learning, pages 13257 13270. PMLR, 2022. R Duncan Luce. Individual choice behavior, volume 4. Wiley New York, 1959. David JC Mac Kay. Information-based objective functions for active data selection. Neural computation, 4(4):590 604, 1992. Hannes Malmberg and Ola Hössjer. Argmax over continuous indices of random variables an approach using random fields. Technical report, Technical report, Division of Mathematical Statistics, Department of Mathematics, Stockholm University, 2012. Hannes Malmberg and Ola Hössjer. Probabilistic choice with an infinite set of options: an approach based on random sup measures. Modern Problems in Insurance Mathematics, pages 291 312, 2014. Jacob Marschak. Binary choice constraints on random utility indicators. Technical report, Cowles Foundation for Research in Economics, Yale University, 1959. Petrus Mikkola, Osvaldo A. Martin, Suyog Chandramouli, Marcelo Hartmann, Oriol Abril Pla, Owen Thomas, Henri Pesonen, Jukka Corander, Aki Vehtari, Samuel Kaski, Paul-Christian Bürkner, and Arto Klami. Prior Knowledge Elicitation: The Past, Present, and Future. Bayesian Analysis, pages 1 33, 2023. Frederick Mosteller. Remarks on the method of paired comparisons: The least squares solution assuming equal standard deviations and equal correlations. Psychometrika, 16(1):3 9, 1951. Warwick Nash, Tracy Sellers, Simon Talbot, Andrew Cawthorn, and Wes Ford. Abalone. UCI Machine Learning Repository, 1995. Didrik Nielsen, Priyank Jaini, Emiel Hoogeboom, Ole Winther, and Max Welling. Sur VAE flows: Surjections to bridge the gap between VAEs and flows. Advances in Neural Information Processing Systems, 33:12685 12696, 2020. Jeremy E. Oakley and Anthony O Hagan. Uncertainty in prior elicitations: A nonparametric approach. Biometrika, 94, 2007. Anthony O Hagan. Expert knowledge elicitation: Subjective but scientific. The American Statistician, 73(sup1):69 81, 2019. Long Ouyang, Jeffrey Wu, Xu Jiang, Diogo Almeida, Carroll Wainwright, Pamela Mishkin, Chong Zhang, Sandhini Agarwal, Katarina Slama, Alex Ray, et al. Training language models to follow instructions with human feedback. Advances in Neural Information Processing Systems, 35: 27730 27744, 2022. R Kelley Pace and Ronald Barry. Sparse spatial autoregressions. Statistics & Probability Letters, 33 (3):291 297, 1997. George Papamakarios, Eric Nalisnick, Danilo Jimenez Rezende, Shakir Mohamed, and Balaji Lakshminarayanan. Normalizing flows for probabilistic modeling and inference. The Journal of Machine Learning Research, 22(1):2617 2680, 2021. Dmytro Perepolkin, Benjamin Goodrich, and Ullrika Sahlin. Hybrid elicitation and quantileparametrized likelihood. Statistics and Computing, 34(1):11, 2024. Robin L Plackett. The analysis of permutations. Journal of the Royal Statistical Society Series C: Applied Statistics, 24(2):193 202, 1975. Shikai Qiu, Tim GJ Rudner, Sanyam Kapoor, and Andrew G Wilson. Should we learn most likely functions or parameters? Advances in Neural Information Processing Systems, 36, 2024. Carl Edward Rasmussen and Christopher K. I. Williams. Gaussian processes for machine learning, volume 2. MIT press, 2006. Danilo Rezende and Shakir Mohamed. Variational inference with normalizing flows. In International conference on machine learning, pages 1530 1538. PMLR, 2015. Antoine Salmona, Valentin De Bortoli, Julie Delon, and Agnes Desolneux. Can push-forward generative models fit multimodal distributions? Advances in Neural Information Processing Systems, 35:10766 10779, 2022. Vincent Stimper, David Liu, Andrew Campbell, Vincent Berenz, Lukas Ryll, Bernhard Schölkopf, and José Miguel Hernández-Lobato. normflows: A Py Torch package for normalizing flows. Journal of Open Source Software, 8(86):5361, 2023. L. L. Thurstone. A law of comparative judgment. Psychological Review, 34(4):273 286, 1927. Lindia Tjuatja, Valerie Chen, Tongshuang Wu, Ameet Talwalkwar, and Graham Neubig. Do LLMs exhibit human-like response biases? A case study in survey design. Transactions of the Association for Computational Linguistics, 12:1011 1026, 2024. Kenneth E Train. Discrete choice methods with simulation. Cambridge university press, 2009. Lorenz Vaitl, Kim A Nicoli, Shinichi Nakajima, and Pan Kessel. Gradients should stay on path: better estimators of the reverse-and forward KL divergence for normalizing flows. Machine Learning: Science and Technology, 3(4):045006, 2022. Alyson G Wilson. Cognitive factors affecting subjective probability assessment, volume 4. Citeseer, 1994. David H Wolpert. Bayesian backpropagation over io functions rather than weights. Advances in Neural Information Processing Systems, 6, 1993. John I Yellott Jr. The relationship between Luce s choice axiom, Thurstone s theory of comparative judgment, and the double exponential distribution. Journal of Mathematical Psychology, 15(2): 109 144, 1977. A Theoretical results In Section 2 we mentioned that noisy RUM models can be identified for known noise levels. This can be illustrated by the following example: Example A.1. Consider a probit model (Thurstone-Mosteller) model [Thurstone, 1927, Mosteller, 1951]. Denote the probability mass function by p, its values at two points p(x) and p(x ), and their difference by p = p(x) p(x ). For a sufficiently large data set of pairwise comparisons, we can estimate the winning probability of x: P(x x ) = q. Since noise follows N(0, σ2), we can deduce that P(x x ) = Φσ2( p), where Φσ2 is the cumulative distribution function of N(0, σ2). So, P(x x ) = Φσ2( p) and p = Φ 1 σ2 (q). Since p is the probability mass function, from a pair of equations we obtain p(x) = (1 Φ 1 σ2 (q))/2 and p(x ) = (1 + Φ 1 σ2 (q))/2. For the known noise level σ2, p is identified. Section 3 refers to the following corollary that relates the RUM model with sampling. Corollary A.2. Consider that presenting an -wise comparison with the choice set C = X to the expert is equivalent to presenting a k-wise comparison with large k and points sampled uniformly over X. If the expert choice model follows RUM(X; log p (x), Exp(1)), then asking the expert to pick the most likely alternative out of all possible alternatives is equivalent to sampling from their belief density. Proof. Since λ(x) = 1/vol(X), the terms λ(x) and λ(x ) in Eq. (4) cancel out. The denominator equals R p (x)dx = 1, because f(x) = log p (x) and s = 1. Thus, p(x X) = exp (sf(x)) = p (x). Corollary A.3. For k = 2, the probability density of X k equals to p X k(x) = 2λ(x) Z X FLaplace(0,1/s) (log p (x) log p (x )) λ(x )dx (A.1) For 2 < k < , the probability density of X k is proportional to p X k(x) λ(x) Z X k 1 P (x Ck | Ck) dλ(Ck \ {x}), (A.2) where P (x Ck | Ck) is given by Proposition 3.5. For k = , the probability density of X k equals to p X k(x) = Cλ(x)ps (x), (A.3) where C > 0. If λ(x) = 1/vol(X) and s = 1, then Cλ(x) = 1. Proof. Case k = 2. X P(x x | p , s)λ(x )λ(x)dx The normalizing constant can be computed by using Fubini s theorem. Since P(x x | p )λ(x )λ(x) is X X integrable, it holds that Z X P(x x | p , s)λ(x )λ(x)dx dx = Z X X P(x x | p , s)λ(x )λ(x)d(x , x) = 0.5, by the symmetry and the fact that P(x x | p , s) + P(x x | p , s) = 1. So, the normalizing constant is 2. By Proposition 3.5 and after straightforward algebraic manipulations, P (x Ck | Ck) simplifies to FLaplace(0,1/s) (log p (x) log p (x )), where FLaplace(0,1/s) is the cumulative distribution function of the Laplace distribution with a location parameter of 0 and a scale parameter of 1/s. Case k = . It follows from Theorem 3.6. k-wise ranking likelihood The k-wise ranking likelihood P xπ(Ck)1 ... xπ(Ck)k | Ck can be computed as a product of k-wise comparison likelihoods, j=1 P xπ(Ck)j C(j) | C(j) , (A.4) where C(1) = Ck, . . . , C(k 1) = Ck \ {xπ(Ck)1, ..., xπ(Ck)k 2}. This section provides the proofs for the propositions made in the main paper. Proposition. Let p be the expert s belief density. Denote N = k 1, so that DN = {x1 x2 ... x N x N+1}. If W Gumbel(0, β), then for any positive monotonic transformation g, and for f g p it holds, p(DN|f) β 0 1. Proof. Let f(x) = g(p (x)). Then, by Yellott Jr [1977], p(DN|f, β) = e 1 β f(xn) PN+1 i=n e 1 β f(xi) = e 1 β g(p (xn)) PN+1 i=n e 1 β g(p (xi)) . (B.1) By the product law for limits, lim β 0+ p(DN|f, β) = n=1 lim β 0+ e 1 β g(p (xn)) PN+1 i=n e 1 β g(p (xi)) n=1 I g(p (xn)) = max n i N+1 g(p (xi)) n=1 I p (xn) = max n i N+1 p (xi) n=1 I (p (xn) = p (xn)) The second equation holds because the softmax converges pointwise to the argmax in the limit of the temperature approaches zero. The third equation holds because g preserves the order. The fourth equation holds because p (x1) > p (x2) > ... > p (x N+1). Proposition. Let Ck be a choice set of k 2 alternatives. Denote C = Ck \ {x} and f C = maxxj C f(xj). The winning probability of a point x Ck equals to P (x Ck | Ck) = exp s(l + 1) max{f C f(x), 0} sym:xj C exp( s(f(x) f(xj))), where Pl sym:xj Ck\{x} denotes the lth elementary symmetric sum of the set C. Proof. Fix x Ck, and for any w 0 denote 1w = I{f(x)+w f C}. P (x Ck | Ck) = P xj C {f(x) + W(x) > f(xj) + W(xj)} xj C {f(x) + W(x) > f(xj) + W(xj)} W(x) xj C {W(xj) < f(x) + w f(xj)} w xj C P {W(xj) < f(x) + w f(xj)} w dw 1 e s(f(x)+w f(xj)) I{f(x)+w f(xj)}dw esw e s(f(x) f(xj)) 1wdw 0 se ksw1w Y esw e s(f(x) f(xj)) dw Denote cj := exp( s(f(x) f(xj))). Let bl be the lth elementary symmetric sum of the cj over js. The lth elementary symmetric sum is the sum of all products of l distinct cj over js. We can write, 0 se ksw1w Y esw e s(f(x) f(xj)) dw l=0 ble(k 1 l)swdw l=0 ble(k 1 l)sw ksw1wdw bl s(l + 1) 0 s(l + 1)e s(l+1)w1wdw max{f C f(x),0} s(l + 1)e s(l+1)wdw bl(1 Gs(l+1)(max{f C f(x), 0})) l + 1 , bl exp s(l + 1) max{f C f(x), 0} with convention that b0 = 1 and Gη denotes the cumulative distribution function of Exp(η). Algorithm 1 Full algorithm require: preferential data Dfull while not converged do sample mini-batch D Dfull ϕ ϕFS-Posterior(ϕ|D) end while Algorithm 2 FS-Posterior(ϕ|D) require: precision s input: flow parameters ϕ, mini-batch D X = design matrix of D X = winner points of X loglik = P log L(D | fϕ(X), s) logprior = P fϕ(X ) return: loglik + logprior C Experimental details C.1 Target distributions The logarithmic unnormalized densities of the target distributions used in the synthetic experiments are listed below. Onemoon2D : 1 Gaussian6D : 1 2(x µ)T Σ 1(x µ), µ = 2 ( 1)2 ... ( 1)6 6 10 0.4 0.4 0.4 6 10 0.4 ... ... ... ... 0.4 0.4 6 10 Twogaussians : log 1 2 exp (log N(x | µ, Σ1)) + 1 2 exp (log N(x | µ, Σ2)) , σ2 = 1, ρ = 0.9, d {10, 20}, µ = 31d, Σ1 = σ2 ρσ2 ρσ2 ρσ2 ρσ2 σ2 ρσ2 ρσ2 ρσ2 ρσ2 σ2 ρσ2 ... ... ... ... ... ρσ2 ρσ2 ρσ2 σ2 σ2 ρσ2 ρσ2 ( 1)d 1ρσ2 ρσ2 σ2 ρσ2 ( 1)d 2ρσ2 ρσ2 ρσ2 σ2 ( 1)d 3ρσ2 ... ... ... ... ... ( 1)d 1ρσ2 ( 1)d 2ρσ2 ( 1)d 3ρσ2 σ2 Funnel10D : (x0 1)2 log(2π exp(2bx0)) + (xi 1)2 , a = 3, b = 0.25 C.2 LLM expert elicitation experiment The version of the Claude 3 model used in the LLM expert elicitation experiment was claude-3haiku-20240307. In the experiment, we used the following prompt template to query the LLM. The configurations specified within the XML tags were sampled from λ, a uniform distribution. The prompt template is as follows: Data definition: California Housing We collected information on the variables using all the block groups in California from the 1990 Census. In this sample a block group on average includes 1425.5 individuals living in a geographically compact area. Naturally, the geographical area included varies inversely with the population density. We computed distances among the centroids of each block group as measured in latitude and longitude. This dataset was derived from the 1990 U.S. census, using one row per census block group. A block group is the smallest geographical unit for which the U.S. Census Bureau publishes sample data (a block group typically has a population of 600 to 3,000 people). A household is a group of people residing within a home. Number of Variables: 8 continuous Variable Information: - Med Inc median income (expressed in hundreds of thousands of dollars) in block group - House Age median house age in block group - Ave Rooms average number of rooms per household - Ave Bedrms average number of bedrooms per household - Population block group population - Ave Occup average number of household members - Latitude block group latitude - Longitude block group longitude The variables are: {Med Inc, House Age, Ave Rooms, Ave Bedrms, Population, Ave Occup, Latitude, Longitude} always reported in this order. Given these combinations of variables below, please list them from most likely to least likely in your opinion. Consider what each variable represents and its realistic value in light of the properties of the dataset. A=0.79,0.81,0.40,0.60,0.74,0.49,0.59,0.75,0.00,0.04 B=0.09,0.10,0.22,0.92,0.16,0.95,0.02,0.91,0.25,0.02 C=0.72,0.50,0.17,0.70,0.37,0.78,0.15,0.14,0.05,0.05 D=0.39,0.69,0.27,0.63,0.25,0.13,0.81,0.89,0.31,0.02 E=0.34,0.52,0.01,0.34,0.90,0.42,0.49,0.02,0.26,0.04 1. First, think your answer step by step, considering the model and data definition in detail. 2. Then discuss each combination separately in light of your thoughts about data. Do not assign an ordering yet. 3. Finally, summarize all your considerations. 4. At the end, write your final ordering as a comma-separated list of letters within an XML tag . Table C.1: Accuracy of the density represented as a flow (flow) compared to a factorized normal distribution (normal), both learned from preferential data, in three metrics: log-likelihood, Wasserstein distance, and the mean marginal total variation (MMTV). Averages over 20 repetitions (but excluding a few crashed runs), with standard deviations. log-likelihood ( ) wasserstein ( ) MMTV ( ) normal flow normal flow normal flow Abalone7D -5.53 ( 0.03) -2.16 ( 0.12) 0.53 ( 0.00) 0.34 ( 0.01) 0.26 ( 0.00) 0.29 ( 0.01) mod-Abalone7D -5.25 ( 0.07) -3.52 ( 0.09) 1.05 ( 0.00) 0.65 ( 0.01) - - C.3 Modified Abalone7D experiment By modifying Abalone7D experiment, we can consider a synthetic technical validation constructed so that the data distribution is more realistic. We do this by mis-using a regression data set so that the response variable is interpreted as indication of preference and the queries are formed by presenting the expert a choice between different samples. If we denote by g(xi) the regression function for the ith covariate set, then xi is chosen over xj if g(xi) > g(xj). We remark that the task itself is not particularly interesting as the response variable does not correspond to any real belief (instead, we learn a distribution over the covariates for which the response variable is high), but it is still useful for validating the algorithm as we now need to cope with choice sets that do not match any simple distribution λ(x). Instead, the choice sets are now formed by uniform sampling over the sample indices, which means they are drawn from the marginal distribution of the covariates. Note that this is different from the target density, which is the density of covariates for samples with high response variables. In the experiment, we do not assume any noise on the expert response. Hence, the expert follows a noiseless RUM with the representative utility g(xi) equals to the response variable of ith covariate xi. This means that the choice distribution resembles Dirac delta function at the points with the highest response variables. For this reason, we cannot compute the MMTV metric as it involves integrating over the absolute differences of the marginals, which leads to numerical issues. The numerical results are provided in Table C.1 and the visual results in Figure C.1. C.4 Other experimental details Hyperparameters. In all the experiments, we use the value s = 1 in the preferential likelihood regardless of how misspecified it is with respect to the ground-truth model. Neural Spline Models have 2 hidden layers and 128 hidden units. The number of flows is 6, 8, or 10 depending on the problem complexity. Real NVP models have 4 hidden layers and 2 hidden units. The number of flows is 36 when the number of rankings is more than 50, and 8 otherwise. Other architecture-specific details correspond to the default values implemented in the normflows package, a Py Torch-based implementation of normalizing flows [Stimper et al., 2023]. Optimization details. Models are trained for a varying number of iterations from 105 to 5 105 with the Adamax optimizer [Kingma and Ba, 2014] and varying batch size from 2 to 8. The learning rate varies from 10 5 to 5 10 5 depending on the problem dimensionality, with higher learning rates for higher-dimensional problems. A small weight decay of 10 6 was applied. Computational environment. Models are trained and evaluated on a server with nodes of two Intel Xeon processors, code name Cascade Lake, with 20 cores each running at 2.1 GHz. Double precision numbers were used to improve the stability of the training process. We did not explicitly record the training times or memory consumption, but note that the considered data sets and flow architectures are all relatively small. Experiment replications. Every experiment was replicated with 20 different seeds, ranging from 1 to 20, but a few replications failed due to not well-known reasons, sometimes due to memory issues and sometimes due to numerical instabilities that led the replication to crash. The results are reported over the completed runs. In the main experiment table (Table 1), there was one failed replication in the Twogaussians20D experiment and two in the Onemoon2D experiment. Dataset licence: Abalones: (CC BY 4.0) license, original source [Nash et al., 1995] Figure C.1: Full result plot for the modified Abalone7D experiment, where the target (unnormalized) belief density corresponds to the abalone age. C.5 Plots of learned belief densities Figure 3 presented a subset of the cross-plots for the multivariate densities for the Abalone regression data and the LLM experiment. Here, we provide the complete visual illustrations over the full density for both, as well as corresponding visualisations for all of the other experiments in Figures C.2 to C.8. Figure C.2: Gaussian6D experiment. The target distribution is depicted by light blue contour points and its marginal by a pink curve. The learned flow is depicted by dark blue contour sample points and its marginal by a black curve. Figure C.3: Estimated belief density for the Onemoon2D data. See Figure 1 for other visualisations on the same density. Figure C.4: Twogaussians10D experiment. The target distribution is depicted by light blue contour points and its marginal by a pink curve. The learned flow is depicted by dark blue contour sample points and its marginal by a black curve. Figure C.5: Estimated belief density for the Funnel10D data. The narrow funnel dimension (x1) is extremely difficult to capture accurately, but the flow still extends more in that dimension, seen as clear skew in all marginal histograms. Figure C.6: Full result plot for the LLM expert elicitation experiment, complementing the partial plot presented in Figure 3. Figure C.7: Full result plot for the Abalone7D experiment, complementing the partial plot presented in Figure 3. The target distribution is depicted by light blue contour points and its marginal by a pink curve. The learned flow is depicted by dark blue contour sample points and its marginal by a black curve. Figure C.8: Full result plot for the Abalone7D experiment for the baseline method. Figure D.1: The effect of the functional prior on the learned belief density in Experiment 5.2. The left plot corresponds to learning the LLM s belief density using maximum likelihood in the training, and the right plot to using function-space maximum a posteriori with the proposed functional prior. We hypothesize that the extreme marginals (e.g. median income) obtained from maximum likelihood estimation are due to problems with collapsing or diverging probability mass. Table D.1: The means of the variables based on (first row) the distribution of California housing dataset and the sample from the preferential flow fitted to the LLM s feedback trained (second row) with the likelihood only and (third row) with the both likelihood and prior. Med Inc House Age Ave Rooms Ave Bedrms Population Ave Occup Lat Long True data 3.87 28.64 5.43 1.1 1425.48 3.07 35.63 -119.57 Flow w/ prior 9.83 43.01 125.18 8.07 22983.76 1290.0 28.81 -117.94 Flow w/o prior 5.91 27.19 6.28 1.58 2868.52 3.37 36.43 -119.75 D Ablation studies This section reports additional experimentation to complement the results presented in the main paper. Unless otherwise stated, the rest of the details in the experiments are as discussed in Sections 5 and C.4. The only exception is the number of flows, which are scaled by the number of rankings n to increase flexibility in line with the available data. However, when n is as in the main paper, the number of flows remains unchanged. D.1 Effect of the functional prior Figure D.1 shows the effect of the functional prior for the LLM experiment, showcasing how the maximum likelihood estimate learning the flow without the functional prior exhibits the diverging mass property. Table D.1 summarizes the densities in a quantitative manner by reporting the means for all variables. The table shows how the solution without the prior can be massively off already in terms of the mean estimate, for instance having the mean number of rooms at 125. D.2 Effect of the noise level 1/s Figure D.2 investigates the interplay of the true RUM noise and the assumed noise in the preferential likelihood on the Onemoon2D data. strue = 0.01 strue = 1.0 strue = 5.0 slik = 0.01 Figure D.2: Preferential flow fitted via FS-MAP with varying precision levels in the data generation process (in RUM) strue, and precision levels in the preferential likelihood slik. The first column shows that a lower precision level in RUM leads to a more spread fitted flow, as expected. The middle plot is the only scenario where both the likelihood and the functional prior are correctly specified, resulting in the best result. Since the prior is misspecified in the bottom-right plot, the best results are not achieved, contrary to expectations. However, this misspecification does not lead to catastrophic performance deterioration but rather to a more spread-out fitted flow. D.3 Effect of the candidate sampling distribution λ We validate the sensitivity of the results in terms the choice of the distribution λ that the candidates are sampled from. Figure D.3 studies the effect of λ, the unknown distribution from which the candidates to be compared are sampled from, complementing the experiment reported in Section 5.1 and confirming the method is robust for the choice. In the original experiment the candidates were sampled from a mixture distribution of uniform and Gaussian distribution centered on the mean of the target, with the mixture probability w = 1/3 for the Gaussian. Figure D.3 reports the accuracy as a function of the choice of w for one of the data sets (Onemoon2D), so that λ goes from uniform to a Gaussian, and includes also an additional reference point where λ equals the target. For all w > 0.5 we reach effectively the same accuracy as when sampling from the target itself, and even for the hardest case of uniform λ (with w = 0 the distance is significantly smaller than the reference scale comparing the base distribution with the target. D.4 Effect of the number of rankings n We validate the sensitivity of the results in terms of the number of comparisons/rankings n. Table D.2, as well as Figures D.4 and D.5, report the results of an experiment that studies the effect of n. Increasing n generally improves the accuracy and already fairly small n is sufficient for learning a good estimate (Table D.2). For very large n, the accuracy can slightly deteriorate. We believe that this is due to prior misspecification that encourages overestimation of the variation due to the fact that k is finite but in the prior it is assumed to be infinite. In the Onemoon2D experiment, Figure D.4 confirms that for n = 1000 the shape of the estimate is extremely close and the slightly worse Wasserstein distance is due to overestimating the width. The same holds for other experiments such as Twogaussians10D illustrated in Figure D.5. Figure D.3: The Onemoon2D experiment replicated for varying sampling distributions λ from where the candidates are sampled. In original Onemoon2D, λ is a mixture of uniform and Gaussian distribution centered on the mean of the target, with the mixture probability w = 1/3 for the Gaussian. Here, λ {Uniform, Gaussian-Uniform Mixture, Target} with letting the mixture probability w to vary in {0.1, 1/4, 1/3, 1/2, 2/3, 3/4, 1.0}. The rest of the details can be found in Section 5, specifically n = 200 and k = 5. The distance between the base density and the target density (1.85) provides a scale reference. The method is robust for the sampling distribution and for broad range of w we reach essentially the same accuracy as when sampling from the target itself. Table D.2: Wasserstein distances for varying n (fixed k = 5) across different experiments n 25 50 100 1000 Onemoon2D 0.67 ( 1.34) 0.18 ( 0.04) 0.17 ( 0.03) 0.23 ( 0.02) Gaussian6D 1.70 ( 0.22) 1.50 ( 0.19) 1.46 ( 0.11) 1.26 ( 0.04) n 50 500 2000 10000 Funnel10D 4.33 ( 0.10) 3.96 ( 0.05) 3.89 ( 0.04) 3.92 ( 0.04) Twogaussians10D 2.69 ( 0.31) 2.57 ( 0.08) 2.61 ( 0.05) 2.66 ( 0.04) (a) n = 25, k = 5 (b) n = 100, k = 5 (c) n = 1000, k = 5 Figure D.4: The estimated belief densities in the Onemoon2D experiment of Table D.2 (contour: true density; heatmap: estimated flow). While the coverage of the estimated density with n = 1000 is better than with n = 100, there is more spread with n = 1000 than with n = 100, which explains the slight performance deterioration in Table D.2. (a) n = 50, k = 5 (b) n = 500, k = 5 (c) n = 10000, k = 5 Figure D.5: Cross-plots of selected variables of the estimated flow in the Twogaussians10D experiment of Table D.2 (contour: true density; heatmap: estimated flow). While the coverage of the estimated density with n = 10000 is better than with n = 500, there is more spread with n = 10000 than with n = 500, which explains the slight performance deterioration in Table D.2. D.5 Effect of the cardinality of the choice set k Finally, to complement the ablation studies for k on synthetic settings in Section 5.3, we rerun the LLM expert elicitation experiment with k = 2. Figure D.6 shows that the LLM expert also works with k = 2. We replicated the original experiment conducted with k = 5 and report the estimates side-by-side, visually confirming we learn the essential characteristics of the distribution in both cases. The results are not identical and the case of k = 5 is likely more accurate (see e.g. the marginal distribution of the last feature), but there are no major qualitative differences between the two estimates. Figure D.6: The LLM expert elicitation experiment replicated for the setting of pairwise comparisons (left) and compared to the original setting of 5-wise rankings (right). The estimated flow remains qualitatively the same for the variables shown here (other variables omitted due to lack of space), and this holds true for the rest of the variables as well. Neur IPS Paper Checklist Question: Do the main claims made in the abstract and introduction accurately reflect the paper s contributions and scope? Answer: [Yes] Justification: The abstract lists the main claims and they are summarized at the end of the Introduction, and the paper includes both theoretical analysis and empirical experiments verifying the claims. Guidelines: The answer NA means that the abstract and introduction do not include the claims made in the paper. The abstract and/or introduction should clearly state the claims made, including the contributions made in the paper and important assumptions and limitations. A No or NA answer to this question will not be perceived well by the reviewers. The claims made should match theoretical and experimental results, and reflect how much the results can be expected to generalize to other settings. It is fine to include aspirational goals as motivation as long as it is clear that these goals are not attained by the paper. 2. Limitations Question: Does the paper discuss the limitations of the work performed by the authors? Answer: [Yes] Justification: The limitations are discussed in Section 6, titled Discussion. We explain technical limitations and limitations of the empirical validation, and explain in detail what kind of additional validation would be useful in addressing the limitations. Guidelines: The answer NA means that the paper has no limitation while the answer No means that the paper has limitations, but those are not discussed in the paper. The authors are encouraged to create a separate "Limitations" section in their paper. The paper should point out any strong assumptions and how robust the results are to violations of these assumptions (e.g., independence assumptions, noiseless settings, model well-specification, asymptotic approximations only holding locally). The authors should reflect on how these assumptions might be violated in practice and what the implications would be. The authors should reflect on the scope of the claims made, e.g., if the approach was only tested on a few datasets or with a few runs. In general, empirical results often depend on implicit assumptions, which should be articulated. The authors should reflect on the factors that influence the performance of the approach. For example, a facial recognition algorithm may perform poorly when image resolution is low or images are taken in low lighting. Or a speech-to-text system might not be used reliably to provide closed captions for online lectures because it fails to handle technical jargon. The authors should discuss the computational efficiency of the proposed algorithms and how they scale with dataset size. If applicable, the authors should discuss possible limitations of their approach to address problems of privacy and fairness. While the authors might fear that complete honesty about limitations might be used by reviewers as grounds for rejection, a worse outcome might be that reviewers discover limitations that aren t acknowledged in the paper. The authors should use their best judgment and recognize that individual actions in favor of transparency play an important role in developing norms that preserve the integrity of the community. Reviewers will be specifically instructed to not penalize honesty concerning limitations. 3. Theory Assumptions and Proofs Question: For each theoretical result, does the paper provide the full set of assumptions and a complete (and correct) proof? Answer: [Yes] Justification: We clearly and explicitly state the full set of assumptions, the formal definitions of the key concepts, and provide three propositions and theorems that characterize the method s properties. The full proofs are provided in Appendix, with key intuitions explained in the main paper. Guidelines: The answer NA means that the paper does not include theoretical results. All the theorems, formulas, and proofs in the paper should be numbered and crossreferenced. All assumptions should be clearly stated or referenced in the statement of any theorems. The proofs can either appear in the main paper or the supplemental material, but if they appear in the supplemental material, the authors are encouraged to provide a short proof sketch to provide intuition. Inversely, any informal proof provided in the core of the paper should be complemented by formal proofs provided in appendix or supplemental material. Theorems and Lemmas that the proof relies upon should be properly referenced. 4. Experimental Result Reproducibility Question: Does the paper fully disclose all the information needed to reproduce the main experimental results of the paper to the extent that it affects the main claims and/or conclusions of the paper (regardless of whether the code and data are provided or not)? Answer: [Yes] Justification: We provide sufficient details for reproducing the experiments. The newly proposed algorithm is described via concrete mathematical expressions and pseudocode. Majority of the empirical experiments are conducted on either simulated or publicly available data, and we provide description of the simulation process (in Appendix) and reference for the public data sets, and the code release allows replicating the experiments in whole. For the LLM experiment we provide the exact prompts and make available the LLM responses in the code release, but we note that from the perspective of these experiments the specific LLM or data is not particularly critical; the data is used for verification of the algorithm. Guidelines: The answer NA means that the paper does not include experiments. If the paper includes experiments, a No answer to this question will not be perceived well by the reviewers: Making the paper reproducible is important, regardless of whether the code and data are provided or not. If the contribution is a dataset and/or model, the authors should describe the steps taken to make their results reproducible or verifiable. Depending on the contribution, reproducibility can be accomplished in various ways. For example, if the contribution is a novel architecture, describing the architecture fully might suffice, or if the contribution is a specific model and empirical evaluation, it may be necessary to either make it possible for others to replicate the model with the same dataset, or provide access to the model. In general. releasing code and data is often one good way to accomplish this, but reproducibility can also be provided via detailed instructions for how to replicate the results, access to a hosted model (e.g., in the case of a large language model), releasing of a model checkpoint, or other means that are appropriate to the research performed. While Neur IPS does not require releasing code, the conference does require all submissions to provide some reasonable avenue for reproducibility, which may depend on the nature of the contribution. For example (a) If the contribution is primarily a new algorithm, the paper should make it clear how to reproduce that algorithm. (b) If the contribution is primarily a new model architecture, the paper should describe the architecture clearly and fully. (c) If the contribution is a new model (e.g., a large language model), then there should either be a way to access this model for reproducing the results or a way to reproduce the model (e.g., with an open-source dataset or instructions for how to construct the dataset). (d) We recognize that reproducibility may be tricky in some cases, in which case authors are welcome to describe the particular way they provide for reproducibility. In the case of closed-source models, it may be that access to the model is limited in some way (e.g., to registered users), but it should be possible for other researchers to have some path to reproducing or verifying the results. 5. Open access to data and code Question: Does the paper provide open access to the data and code, with sufficient instructions to faithfully reproduce the main experimental results, as described in supplemental material? Answer: [Yes] Justification: We provide code that includes both implementation of the algorithm and scripts for re-running the experiments. Code is available at https://github.com/petrusmikkola/prefflow. Guidelines: The answer NA means that paper does not include experiments requiring code. Please see the Neur IPS code and data submission guidelines (https://nips.cc/ public/guides/Code Submission Policy) for more details. While we encourage the release of code and data, we understand that this might not be possible, so No is an acceptable answer. Papers cannot be rejected simply for not including code, unless this is central to the contribution (e.g., for a new open-source benchmark). The instructions should contain the exact command and environment needed to run to reproduce the results. See the Neur IPS code and data submission guidelines (https: //nips.cc/public/guides/Code Submission Policy) for more details. The authors should provide instructions on data access and preparation, including how to access the raw data, preprocessed data, intermediate data, and generated data, etc. The authors should provide scripts to reproduce all experimental results for the new proposed method and baselines. If only a subset of experiments are reproducible, they should state which ones are omitted from the script and why. At submission time, to preserve anonymity, the authors should release anonymized versions (if applicable). Providing as much information as possible in supplemental material (appended to the paper) is recommended, but including URLs to data and code is permitted. 6. Experimental Setting/Details Question: Does the paper specify all the training and test details (e.g., data splits, hyperparameters, how they were chosen, type of optimizer, etc.) necessary to understand the results? Answer: [Yes] Justification: We provide the information in writing and the same information can additionally be found in the code. Guidelines: The answer NA means that the paper does not include experiments. The experimental setting should be presented in the core of the paper to a level of detail that is necessary to appreciate the results and make sense of them. The full details can be provided either with the code, in appendix, or as supplemental material. 7. Experiment Statistical Significance Question: Does the paper report error bars suitably and correctly defined or other appropriate information about the statistical significance of the experiments? Answer: [Yes] Justification: We do not make direct comparisons for which testing statistical significance would be applicable, but we do report all numerical values with uncertainty intervals over multiple runs and disclose the details on how this was done. Guidelines: The answer NA means that the paper does not include experiments. The authors should answer "Yes" if the results are accompanied by error bars, confidence intervals, or statistical significance tests, at least for the experiments that support the main claims of the paper. The factors of variability that the error bars are capturing should be clearly stated (for example, train/test split, initialization, random drawing of some parameter, or overall run with given experimental conditions). The method for calculating the error bars should be explained (closed form formula, call to a library function, bootstrap, etc.) The assumptions made should be given (e.g., Normally distributed errors). It should be clear whether the error bar is the standard deviation or the standard error of the mean. It is OK to report 1-sigma error bars, but one should state it. The authors should preferably report a 2-sigma error bar than state that they have a 96% CI, if the hypothesis of Normality of errors is not verified. For asymmetric distributions, the authors should be careful not to show in tables or figures symmetric error bars that would yield results that are out of range (e.g. negative error rates). If error bars are reported in tables or plots, The authors should explain in the text how they were calculated and reference the corresponding figures or tables in the text. 8. Experiments Compute Resources Question: For each experiment, does the paper provide sufficient information on the computer resources (type of compute workers, memory, time of execution) needed to reproduce the experiments? Answer: [Yes] Justification: We explain the used computational environment used to run the experiments in Section C "Experimental details". We state that the computational cost of the new algorithm is similar to broad range of related work, but we did not store exact execution times or memory requirements during experimentation and hence do not report them. The core research questions in the paper are about learning models from very limited data and the question of computational resources is not particularly important for the work. Guidelines: The answer NA means that the paper does not include experiments. The paper should indicate the type of compute workers CPU or GPU, internal cluster, or cloud provider, including relevant memory and storage. The paper should provide the amount of compute required for each of the individual experimental runs as well as estimate the total compute. The paper should disclose whether the full research project required more compute than the experiments reported in the paper (e.g., preliminary or failed experiments that didn t make it into the paper). 9. Code Of Ethics Question: Does the research conducted in the paper conform, in every respect, with the Neur IPS Code of Ethics https://neurips.cc/public/Ethics Guidelines? Answer: [Yes] Justification: We follow the Code of Ethics as instructed and have not identified any risk of violations. Guidelines: The answer NA means that the authors have not reviewed the Neur IPS Code of Ethics. If the authors answer No, they should explain the special circumstances that require a deviation from the Code of Ethics. The authors should make sure to preserve anonymity (e.g., if there is a special consideration due to laws or regulations in their jurisdiction). 10. Broader Impacts Question: Does the paper discuss both potential positive societal impacts and negative societal impacts of the work performed? Answer: [Yes] Justification: These aspects are briefly discussed at the end of Conclusions, in a clearly marked paragraph. As methodological contribution our work does not raise new concerns of negative societal impacts. Guidelines: The answer NA means that there is no societal impact of the work performed. If the authors answer NA or No, they should explain why their work has no societal impact or why the paper does not address societal impact. Examples of negative societal impacts include potential malicious or unintended uses (e.g., disinformation, generating fake profiles, surveillance), fairness considerations (e.g., deployment of technologies that could make decisions that unfairly impact specific groups), privacy considerations, and security considerations. The conference expects that many papers will be foundational research and not tied to particular applications, let alone deployments. However, if there is a direct path to any negative applications, the authors should point it out. For example, it is legitimate to point out that an improvement in the quality of generative models could be used to generate deepfakes for disinformation. On the other hand, it is not needed to point out that a generic algorithm for optimizing neural networks could enable people to train models that generate Deepfakes faster. The authors should consider possible harms that could arise when the technology is being used as intended and functioning correctly, harms that could arise when the technology is being used as intended but gives incorrect results, and harms following from (intentional or unintentional) misuse of the technology. If there are negative societal impacts, the authors could also discuss possible mitigation strategies (e.g., gated release of models, providing defenses in addition to attacks, mechanisms for monitoring misuse, mechanisms to monitor how a system learns from feedback over time, improving the efficiency and accessibility of ML). 11. Safeguards Question: Does the paper describe safeguards that have been put in place for responsible release of data or models that have a high risk for misuse (e.g., pretrained language models, image generators, or scraped datasets)? Answer: [NA] Justification: Our experimentation and data sets are technical in nature and bear no risk of misuse. They are only used for technical validation of the algorithms and we do not release data or pretrained models relating to real-world scenarios. Guidelines: The answer NA means that the paper poses no such risks. Released models that have a high risk for misuse or dual-use should be released with necessary safeguards to allow for controlled use of the model, for example by requiring that users adhere to usage guidelines or restrictions to access the model or implementing safety filters. Datasets that have been scraped from the Internet could pose safety risks. The authors should describe how they avoided releasing unsafe images. We recognize that providing effective safeguards is challenging, and many papers do not require this, but we encourage authors to take this into account and make a best faith effort. 12. Licenses for existing assets Question: Are the creators or original owners of assets (e.g., code, data, models), used in the paper, properly credited and are the license and terms of use explicitly mentioned and properly respected? Answer: [Yes] Justification: We adequately cite all sources and follow the licenses. Guidelines: The answer NA means that the paper does not use existing assets. The authors should cite the original paper that produced the code package or dataset. The authors should state which version of the asset is used and, if possible, include a URL. The name of the license (e.g., CC-BY 4.0) should be included for each asset. For scraped data from a particular source (e.g., website), the copyright and terms of service of that source should be provided. If assets are released, the license, copyright information, and terms of use in the package should be provided. For popular datasets, paperswithcode.com/datasets has curated licenses for some datasets. Their licensing guide can help determine the license of a dataset. For existing datasets that are re-packaged, both the original license and the license of the derived asset (if it has changed) should be provided. If this information is not available online, the authors are encouraged to reach out to the asset s creators. 13. New Assets Question: Are new assets introduced in the paper well documented and is the documentation provided alongside the assets? Answer: [NA] Justification: We do not provide new assets, other than releasing technical data for reproducibility purposes. Guidelines: The answer NA means that the paper does not release new assets. Researchers should communicate the details of the dataset/code/model as part of their submissions via structured templates. This includes details about training, license, limitations, etc. The paper should discuss whether and how consent was obtained from people whose asset is used. At submission time, remember to anonymize your assets (if applicable). You can either create an anonymized URL or include an anonymized zip file. 14. Crowdsourcing and Research with Human Subjects Question: For crowdsourcing experiments and research with human subjects, does the paper include the full text of instructions given to participants and screenshots, if applicable, as well as details about compensation (if any)? Answer: [NA] Justification: Even though our method is designed to eventually be used also in applications that involve human subjects (expert knowledge elicitation), we do not use any data relating to humans in this paper but instead evaluate the method in simulated scenarios and by using a large language model as a proxy for a human expert. Guidelines: The answer NA means that the paper does not involve crowdsourcing nor research with human subjects. Including this information in the supplemental material is fine, but if the main contribution of the paper involves human subjects, then as much detail as possible should be included in the main paper. According to the Neur IPS Code of Ethics, workers involved in data collection, curation, or other labor should be paid at least the minimum wage in the country of the data collector. 15. Institutional Review Board (IRB) Approvals or Equivalent for Research with Human Subjects Question: Does the paper describe potential risks incurred by study participants, whether such risks were disclosed to the subjects, and whether Institutional Review Board (IRB) approvals (or an equivalent approval/review based on the requirements of your country or institution) were obtained? Answer: [NA] Justification: Not required due to not using any data related to human subjects. Guidelines: The answer NA means that the paper does not involve crowdsourcing nor research with human subjects. Depending on the country in which research is conducted, IRB approval (or equivalent) may be required for any human subjects research. If you obtained IRB approval, you should clearly state this in the paper. We recognize that the procedures for this may vary significantly between institutions and locations, and we expect authors to adhere to the Neur IPS Code of Ethics and the guidelines for their institution. For initial submissions, do not include any information that would break anonymity (if applicable), such as the institution conducting the review.