# sequential_harmful_shift_detection_without_labels__6adb4dd6.pdf Sequential Harmful Shift Detection Without Labels Salim I. Amoukou Tom Bewley Saumitra Mishra Freddy Lecue Daniele Magazzeni Manuela Veloso J.P. Morgan AI Research We introduce a novel approach for detecting distribution shifts that negatively impact the performance of machine learning models in continuous production environments, which requires no access to ground truth data labels. It builds upon the work of Podkopaev and Ramdas [2022], who address scenarios where labels are available for tracking model errors over time. Our solution extends this framework to work in the absence of labels, by employing a proxy for the true error. This proxy is derived using the predictions of a trained error estimator. Experiments show that our method has high power and false alarm control under various distribution shifts, including covariate and label shifts and natural shifts over geography and time. 1 Introduction When deploying a machine learning model in production, it is common to encounter changes in the data distribution, such as shifts in covariates [Shimodaira, 2000], labels [Saerens et al., 2002, Lipton et al., 2018] or concepts [Gonçalves Jr et al., 2014]. Many methods exist for detecting such distribution shifts. However, a distinct but equally important challenge is assessing whether a shift has a harmful impact on the prediction error of a given model, which may necessitate interventions such as ceasing production or retraining the model. Not all distribution shifts are harmful, but traditional methods for shift detection are unable to distinguish harmful and benign shifts. While some approaches address the specific issue of performance shift, most require access to ground truth data labels in the production environment [Gama et al., 2013, 2014, Bayram et al., 2022]. In scenarios where predictions concern future outcomes, such as medical diagnosis or credit scoring, immediate access to labels in production is not feasible. This work focuses on the challenge of detecting harmful distribution shifts those that increase model error in production without requiring access to labels. As Trivedi et al. [2023] note, current methods for harmful shift detection without labels rely on disparate heuristics, often lacking a solid theoretical foundation. Such methods include proxies based on aggregate dataset-level statistics [Deng and Zheng, 2021], optimal transport mappings between training and production distributions [Koebler et al., 2023], and model-specific metrics such as input margins [Mouton et al., 2023], perturbation-sensitivity [Ng et al., 2023], disagreement-metrics [Chen et al., 2023, Ginsberg et al., 2022], and prediction confidence [Guillory et al., 2021, Garg et al., 2022]. While such methods may be practically effective in certain contexts, they rely on assumptions and correlations that do not hold universally, so can provide no guarantees. Furthermore, conventional methods rely on two-sample or batch testing, which involves comparing the statistical properties of a production dataset with those of a control sample. These methods have inherent limitations, as the sample size is prespecified. This is a problem because the necessary amount of data to detect any given shift is unknown beforehand. Furthermore, in real-world scenarios, data typically arrive sequentially over time and shifts may occur either suddenly or gradually. In such scenarios, it may be desirable to detect harmful shifts as early as possible. Batch testing is ill-suited to the sequential context [Maharaj et al., 2023], as it does not accommodate the collection of additional data for retesting without adjusting for multiple testing, leading to diminished power. Correspondence to: Salim I. Amoukou 38th Conference on Neural Information Processing Systems (Neur IPS 2024). The most principled and relevant work to our problem is that of Podkopaev and Ramdas [2022], which tackles the problem of sequential harmful shift detection with false alarm control but assumes the availability of ground truth labels in production. Our work builds on the foundation established by Podkopaev and Ramdas [2022], extending the methodology to detect harmful shifts in unlabeled production data while effectively managing false alarms. Our approach leverages a secondary model to estimate the errors of the primary model. While learning such a model might seem challenging at first, consider a situation where the primary model performs well overall but struggles with specific data subgroups. Sagawa et al. [2019] demonstrate that this phenomenon can occur in natural distributions. In such cases, learning to predict error given X might be easier than the primary task of predicting Y given X , because the error estimator only needs to identify those subgroups where the primary model struggles. This approach has shown promise in recent studies [Zrnic and Candès, 2024, Amoukou and Brunel, 2023]. More generally, Zrnic and Candès [2024] note that predicting the magnitude of the error, rather than its direction, is often easier. Furthermore, our approach is based on estimating the proportion of high-error observations over time. For this task, the error estimator does not need to be very accurate; it only needs to assign higher values to observations with higher errors. That is, the estimator only needs to correctly order most observations from low to high error, which is easier than precisely predicting the error itself. We demonstrate in Section 4.1 that even a relatively inaccurate error estimator can be effective at identifying high-error observations, and thus provides the functionality required by our framework. Although this paper uses a learned error estimator s predictions as a proxy for error, we note that any scalar function correlated with error could suffice to isolate high-error observations. For example, for a well-calibrated binary classification model, we could instead use that model s predicted probability, tracking observations with predictions near 0.5 to identify uncertain predictions. Prediction of error estimator True model error Labeled calibration data Calibrated threshold Unlabeled production data 6/10 10/(10+10) + ϵtol + corrections Time in production t Figure 1: Overview of the proposed approach. Left: calibrating an estimated error threshold to separate low/high true errors. Right: sequentially tracking production data exceeding the threshold and raising an alarm upon a significant increase. Figure 1 gives an overview of our approach. We first fit the secondary error estimator model to predict the error of the primary model, then use labeled data to calibrate an estimated error threshold (---) that separates observations with low (x) and high (x) true error as fully as possible. We run the error estimator on all observations encountered in production and continually monitor the proportion of observations whose estimated error falls above the threshold. We raise an alarm when this exceeds the rate of high-error observations (x) in the calibration set plus a tolerance threshold ϵtol and correction terms to deal with the sequential setting and account for uncertainty in the estimates. In the example shown, this occurs at time t = 10. The rest of this paper is organized as follows. Section 2 outlines the problem definition and Section 3 provides an overview of the foundational work of Podkopaev and Ramdas [2022] as background. Section 4 is dedicated to the presentation and theoretical analysis of our sequential statistical test. Section 5 demonstrates the empirical efficacy of our method, showcasing its strong detection capabilities and controlled false alarm rates across various types of harmful shift. 2 Problem Definition Let X and Y be input and label spaces, f : X Y be a predictive model, and ℓ: Y2 E be a measurable and bounded error function that is selected for monitoring purposes. The model s error on a specific observation (X, Y ) X Y, drawn from a joint distribution P(X,Y ) = PXPY |X, is represented by the random variable E = ℓ(f(X), Y ). The probability distribution of the error is denoted by PE. As discussed above, our focus is not on detecting shifts in covariates or labels per se, but rather changes in the error distribution PE. Error changes can be caused by various types of shift in the underlying joint distribution, including changes in PX while the conditional label distribution PY |X remains constant (covariate shift) or changes in PY while PX|Y remains constant (label shift). We assume access to a dataset Dn = {(X0 i , Y 0 i )}n i=1, sampled independently from a source distribution P 0 (X,Y ). In addition, we have a sequence of data (Xt, Yt)t 1 drawn independently from a time- varying distribution encountered by the model in production, P t (X,Y ). We model the ocurrence of a shift in production by assuming this distribution is equal to the source before some time T N { } (i.e., P t (X,Y ) = P 0 (X,Y ), t < T) and different thereafter (i.e., P t (X,Y ) = P 0 (X,Y ), t T). Our goal whenever there is a shift, (i.e., T < ), is to decide if this shift is harmful to the model error. To formalize this, we introduce θ : P(E) R+ as a mapping from probability distributions on the error space E to a real-valued parameter. This mapping could, for instance, map the distribution to its mean or a certain quantile. We aim to construct a sequential test for the following pair of hypotheses: H0 : t 1, 1 t Pt k=1θ(P k E) θ(P 0 E) + ϵtol; (1) H1 : t T : 1 t Pt k=1θ(P k E) > θ(P 0 E) + ϵtol, (2) where P k E denotes the error distribution at at time k, the running risk 1 t Pt k=1 θ(P k E) is the average value of the error parameter up to time t, and ϵtol 0 is a tolerance level. Intuitively, H0 holds if the running risk remains below that of the source distribution (+ϵtol) for all time throughout production, and H1 holds if this condition is violated. Objective. Construct a α-level sequential test, defined by an alarm function Φ : k=1X k {0, 1}, which at time t uses the first t observations X1, . . . , Xt to output 0 (no harmful shift so far) or 1 (harmful shift; raise an alarm) with a controlled false alarm rate and high power, i.e., PH0 ( t 1 : Φ(X1, . . . , Xt) = 1) α, and PH1 ( t 1 : Φ(X1, . . . , Xt) = 1) 1. (3) We refer to this problem definition as sequential harmful shift detection (SHSD). 3 SHSD with Production Labels A work closely related to ours is that of Podkopaev and Ramdas [2022], which offers a solution for scenarios where the ground truth labels of the production data are available. This method leverages confidence sequences [Darling and Robbins, 1967, Jennison and Turnbull, 1984, Johari et al., 2015, Jamieson and Jain, 2018], which are time-uniform (i.e., valid for any time) confidence intervals, allowing for the ongoing monitoring of any bounded random variable. With access to labels, it is possible to calculate the true errors on the production data over time and monitor the running risk. Choosing the mean as the error parameter i.e. θ(P k E) = EP k[E], Podkopaev and Ramdas [2022] use the empirical production errors E1 = ℓ(f(X1), Y1), . . . , Et = ℓ(f(Xt), Yt), to construct a confidence sequence lower bound ˆL for the running risk, satisfying a chosen miscoverage level αprod (0, 1): P t 1, 1 t Pt k=1θ(P k E) ˆL(E1, . . . , Et) 1 αprod. (4) This equation guarantees that the lower bound remains valid over time with high probability. Furthermore, given the errors on the source data E0 1 = ℓ(f(X0 1), Y 0 1 ), . . . , E0 n = ℓ(f(X0 n), Y 0 n ), either another confidence sequence or a traditional confidence interval method [Howard et al., 2021, Waudby Smith and Ramdas, 2020] can be used to construct a fixed-time upper confidence bound ˆU for the mean error θ(P 0 E). For a miscoverage level αsource (0, 1), ˆU satisfies the following condition: n 1, P θ(P 0 E) ˆU(E0 1, . . . , E0 n) 1 αsource. (5) An alarm is raised when the lower bound of the running risk in production exceeds the upper bound of the source error plus a tolerance ϵtol. Formally, this equates to defining the function Φ as follows: Φm(E1, . . . , Et) = 1 n ˆL(E1, . . . , Et) > ˆU(E0 1, . . . , E0 n) + ϵtol o , (6) where the subscripted m denotes that the mean is the error parameter being tracked. This methodology provides uniform control over the false alarm rate across time, i.e., PH0 ( t 1 : Φm(E1, . . . , Et) = 1) αsource + αprod. (7) It also makes no assumptions about the data distribution or the type of shift. However, the reliance on immediate access to ground truth production labels at each time t limits the method s practical applicability. We now propose a solution that avoids the need for production labels. 4 Sequential Harmful Shift Detection without Production Labels This section consists of two subsections, each detailing one of the two stages of our proposal. The initial stage consists of fitting an error estimator and calibrating it to identify high-error observations with few mistakes. Following this, we apply confidence sequence methods to track the proportion of high errors over time in production, and develop a test for raising an alarm based on this proportion. 4.1 Fitting and Calibrating the Error Estimator The primary drawback of the Podkopaev and Ramdas [2022] method is its reliance on having ground truth labels for the production data, which are often unavailable in real-world scenarios. A straightforward solution is to use a plug-in approach: replace the true error in production with an estimated error obtained from a secondary predictive model, denoted as ˆr : X E. This model trained to predict the true error of the primary model using any available labeled data. We can then reformulate the alarm function of Equation 6 to deal with unlabeled production data as follows: ˆΦm(X1, . . . , Xt) = 1 n ˆL(ˆr(X1), . . . , ˆr(Xt)) > ˆU(E0 1, . . . , E0 n) + ϵtol o (8) If ˆr( ) is sufficiently accurate, the performance of this alarm mechanism should align closely with what would be achieved if ground truth labels were available. However, even if the estimator ˆr exhibits strong performance on its training distribution, the absence of labels in production makes it difficult to conclusively determine the alarm s reliability in a shifting production environment. Our strategy to address this issue consists of using a calibration step to derive a more reliable statistic from the imperfect estimator ˆr( ). Specifically, we propose to track the proportion of observations above a carefully-selected quantile of estimated error, rather than the mean value as in the original method of Podkopaev and Ramdas [2022]. The fundamental hypothesis here is that an estimator, even if not particularly accurate at predicting error magnitudes, may still effectively distinguish between the lowest and highest errors across a dataset, thereby preserving most ordinal relationships between observations. For example, if ˆr( ) has correctly represented some underlying patterns to predict the errors, and if k-th and l-th ranked errors are significantly different, then it is highly probable that ˆr(X(k)) ˆr(X(l)). Focusing on the aggregate distinction of low and high errors rather than the prediction of specific magnitudes allows us to utilize an imperfect estimator ˆr more effectively. Our proposed calibration process is as follows. Given the labeled source data Dn and a trained error estimator ˆr, we identify an empirical quantile of the true errors, q = Q(p, {E0 i }n i=1), p [0.5, 1), and an empirical quantile for the estimated errors ˆq = Q(ˆp, {ˆr(X0 i ) : X0 i Dn)}, ˆp (0, 1), such that the selector function Sˆr,ˆq(X) = 1{ˆr(X) > ˆq} reliably distinguishes between observations with true error below and above q. Specifically, we seek to balance the statistical power and false discovery proportion (FDP) of the selector, which are defined as follows: Power = Pn i=1 Sˆr,ˆq(X0 i ) 1{E0 i > q} Pn i=1 1{E0 i > q} ; FDP = Pn i=1 Sˆr,ˆq(X0 i ) 1{E0 i q} Pn i=1 Sˆr,ˆq(X0 i ) . (9) Figure 2: Calibration toy example. Left: threshold grid created by sweeping p [0.5, 0.95] at increments of 0.05 and ˆp [0.1, 0.9] at increments of 0.1. Middle: FDP of selector for each (p, ˆp) pair. Black outline indicates pairs for which FDP < 0.2. Right: selector power for each (p, ˆp) pair. Green dotted outline indicates the pair that maximises power subject to the FDP < 0.2 limit. Corresponding thresholds (q, ˆq) shown as thick lines in left plot. We search over a uniform grid of quantile pairs (p, ˆp), compute the associated thresholds (q, ˆq), and identify those that achieve an FDP below a maximum value. Among these qualifying pairs, we select the one that maximizes the power. Figure 2 illustrates this process for a toy example. In this case, thresholds are found that achieve a selector power of 0.72 while keeping FDP below the specified maximum of 0.2. We now present empirical evidence that it is possible to achieve high power and a controlled FDP in realistic settings, using the California house prices [Dua and Graff, 2017], Bike sharing demand [Fanaee-T, 2013], HELOC [FICO, 2018] and Nhanesi [CDC, 1999-2022] datasets. We partition each dataset into training (60%), test (20%) and calibration (20%) sets and use the training data to train random forests (RFs) as the primary models. However, we first ablate the training data in various ways to ensure the models perform poorly on certain subgroups. The ablation is done on a per-feature basis. For continuous features, we exclude 80% of observations with values either above or below the median. For categorical features, we exclude data from one category. We then simulate production environments by gradually reintroducing these previously excluded observations alongside the test set. For each dataset, the number of distribution shifts studied equals the number of features times the number of splits: two for continuous features and the number of categories for discrete ones. We use half of the calibration sets to train RF regressors as the error estimators, then use the remainder to calibrate true and estimated error thresholds using the grid search process described above. Figure 3: Selector FDP (left) and power (right) vs estimator accuracy. Results on source data in blue; results on production data in red. In Figure 3, we present the distribution of the FDP and power across all datasets and shifts, relative to the performance of the error estimator, as measured by the R-squared score on the source/calibration data. The R-squared score is binned into quantiles, with 10 bins used. We observe that the estimators are generally highly imperfect, with R-squared values consistently below 0.3. Despite these low predictive accuracies, we can still find threshold pairs that achieve an FDP below 0.2 in the source data (shown next to the red boxplot). The power ranges from 0.4 for the least accurate estimators to 0.9 for the most accurate. Crucially, when we apply the calibrated thresholds in the production environments, we achieve similarly low FDP values (shown in red), almost always below 0.25 (though some reach 0.4), while the power remains similar to the source data, ranging from 0.4 to 0.9. This consistency of the FDP/power even when error estimators are not particularly accurate is promising for shift detection. 4.2 Sequential Testing Framework and Performance Guarantees We can now state the specific objective of our sequential testing framework. During production, we propose to test if there is an increase in the proportion of observations exceeding the true error quantile q obtained in calibration. This is formalized in terms of the following hypotheses: H0 : t 1, 1 t Pt k=1PP k(E > q) PP 0(E > q) + ϵtol, (10) H1 : t T : 1 t Pt k=1PP k(E > q) > PP 0(E > q) + ϵtol, (11) where PP k denotes a probability taken under distribution P k. Note that this is a special case of the general test in Equations 1 and 2, with the probability θ(P k E) = PP k(E > q) as the error parameter. Since we cannot observe production errors directly, we use the selector function Sˆr,ˆq(X) as a proxy for a check on the true error E > q. The effectiveness of the sequential test under this substitution depends on how well the selector s power and FDP properties generalize from the source distribution to the production environment. In particular, we can show that the method outlined below provably controls the false alarm rate given in Equation 3 if the following assumption holds: Assumption 4.1. t 1, 1 t Pt k=1 PP k (Sˆr,ˆq(X) = 1, E q) PP 0 (Sˆr,ˆq(X) = 1, E q). Referring back to the example in Figure 2 (left), this assumption implies that at all times during production, the proportion of data observed so far falling the quadrant above and to the left of the calibrated thresholds (---) does not exceed that observed under the source distribution. While we do not claim that this assumption always holds exactly, we find that it is only violated to a small extent in realistic settings (see Appendix A for more discussion and experimental analysis). If this is the case, and thresholds (q, ˆq) have been found that yield a small number of false discoveries in calibration, PP 0 (Sˆr,ˆq(X) = 1, E q), then the number of false discoveries in production will also remain low. A substantial increase in false discoveries in production would require a shift specifically targeting those rare observations with low error but high estimated error. With this foundation established, we can now describe our testing methodology. Following a similar approach to that used by Podkopaev and Ramdas [2022], we construct: 1. A lower bound of 1 t Pt k=1 PP k(E > q) using a confidence sequence. 2. An upper bound of PP 0(E > q) using a traditional confidence interval. To construct the lower bound, we rewrite the target quantity as follows: 1 t Pt k=1 PP k(E > q) = 1 t Pt k=1 PP k(Sˆr,ˆq(X) = 1, E > q) + PP k(Sˆr,ˆq(X) = 0, E > q) (12) t Pt k=1 PP k(Sˆr,ˆq(X) = 1, E > q) (13) t Pt k=1 PP k(Sˆr,ˆq(X) = 1) 1 t Pt k=1 PP k(Sˆr,ˆq(X) = 1, E q) (14) t Pt k=1 PP k(Sˆr,ˆq(X) = 1) PP 0(Sˆr,ˆq(X) = 1, E q). (15) The last inequality uses Assumption 4.1 to substitute the probability of a false discovery in production with the probability on the source. As we can empirically estimate both PP k(Sˆr,ˆq(X) = 1) and PP 0(Sˆr,ˆq(X) = 1, E q) (via the labeled source data Dn), we can use a confidence sequence to construct a valid time-uniform lower bound of their sum. Specifically, we define the bound ˆLq as ˆLq = 1 t Pt k=1 1 {Sˆr,ˆq(Xk) = 1} 1 n Pn i=1 1 Sˆr,ˆq(X0 i ) = 1, E0 i q wt wn, (16) where wt and wn are the widths of the lower and upper bounds of 1 t Pt k=1 PP t(Sˆr,ˆq(X) = 1) and PP 0(Sˆr,ˆq(X) = 1, E q) with miscoverage levels α1 and α2 respectively, such that for a total miscoverage level αprod = α1 + α2 (0, 1), P t 1 : 1 t Pt k=1 PP k(E > q) ˆLq 1 αprod. (17) The specific values of wt and wn used in our experiments are given in Appendix B. Respectively, these choices correspond to the predictably-mixed empirical-Bernstein (PM-EB) confidence sequence described by Podkopaev and Ramdas [2022], and the classic Hoeffding interval. We similarly compute an upper bound ˆUq for PP 0(E > q) as follows: n Pn i=1 1{E0 i > q} + wn, (18) where wn is the same as above. This bound satisfies a miscoverage level αsource (0, 1), such that P PP 0(E > q) ˆUq 1 αsource. (19) Finally, we define our sequential test using the following alarm function: Φq(X1, . . . , Xt) = 1 n ˆLq > ˆUq + ϵtol o , (20) where the subscripted q denotes that we are now detecting shifts in error across a particular quantile, rather than the mean. In Appendix C, we provide a proof of the following statement: Theorem 4.2. Under Assumption 4.1, ˆLq and ˆUq satisfy Equations 17 and 19. Therefore, the function Φq has false alarm control, i.e., PH0 ( t 1 : Φq(X1, . . . , Xt) = 1) αsource + αprod. (21) While a controlled false alarm rate is a desirable property, the power of Φq may be limited if the degree of error change is not large. Noting that (1/t) Pt k=1 PP k(E > q) is lower-bounded by (1/t) Pt k=1 PP k(Sˆr,ˆq(X) = 1, E > q), detecting a change requires this probability to exceed PP 0(E > q). Thus, we also propose to compare 1 t Pt k=1 PP k(Sˆr,ˆq(X) = 1, E > q) directly with PP 0(Sˆr,ˆq(X) = 1, E > q). This leads to a second test with higher power. It uses an upper bound of PP 0(Sˆr,ˆq(X) = 1, E > q), defined as: n Pn i=1 1{Sˆr,ˆq(X0 i ) = 1, E0 i > q} + wn, (22) satisfying P PP 0(Sˆr,ˆq(X) = 1, E > q) ˆU 2 q 1 αsource. (23) The alarm function for the second test is defined as: Φ2 q(X1, . . . , Xt) = 1 n ˆLq > ˆU 2 q + ϵtol o . (24) Through an almost identical proof, we can similarly show that Φ2 q also has false alarm control for comparing (1/t) Pt k=1 PP k(Sˆr,ˆq(X) = 1, E > q) with PP 0(Sˆr,ˆq(X) = 1, E > q). 5 Experiments In this section, we compare the performance of the plug-in approach of Podkopaev and Ramdas [2022] s method (Equation 8), which is designed to detect a change in the mean error, and our approach, which determines if an increasing number of observations fall beyond a certain quantile. We focus on the second test (Equation 24) to simplify the comparison with the mean detector and because it consistently outperforms the first statistics. Results for the first test are reported in Appendix E. We conduct three experiments using a variety of datasets and setups. The first experiment aims to illustrate the different approaches and demonstrate the applicability of our method to image data and deep learning models. The second experiment returns to the tabular datasets studied in Section 4.1, going into more detail by comparing the mean and quantile detection approaches in terms of power and FDP on the numerous generated shifts. The final experiment also consists of a large-scale evaluation of the approaches, in this case on natural shifts due to temporal and geographical changes. Although the focus of this paper is on the sequential or online setting, we provide an analysis using state-of-the-art methods in the batch setting in Appendix F. 5.1 Illustrative Example on an Image Dataset The first experiment replicates the setup of Saerens et al. [2002] using the Celeb A dataset [Liu et al., 2015]. They demonstrate that a Res Net50 model [He et al., 2016] trained on this dataset performs poorly on males with blond hair due to spurious correlations. We split this dataset into a training set (60%), test set (20%) and calibration set (20%), and train a Res Net50 on the training set. Using half of the calibration set, we train another Res Net50 (with a regression head) as an error estimator. The remaining half is employed to determine the empirical quantiles p [0.5, 1), ˆp (0, 1) at which we achieve maximum power while keeping the FDP below 0.2. We create a harmful shift in production as follows. For each time step up to t = 4990, we sample an observation uniform-randomly from the test set. Thereafter, we begin to oversample instances of males with blond hair, sampling such an observation with probability βt = 1/(1 + exp( (t 4990))), and a random observation otherwise. The objective of this experiment is to visually observe how the methods can be used to monitor performance shift over time and to evaluate how each method compares to an idealised version with access to true production errors. Both Podkopaev and Ramdas [2022] s method (mean detector) and our approach (quantile detector) involve comparing a lower bound to an upper bound. For both methods, Figure 4 displays the lower bound in blue and the version calculated with true production errors in gray. For the quantile detector, the blue line corresponds to ˆLq of Equation 16, which is the estimated lower bound of 1 t Pt k=1 PP k(E > q) with estimated production errors. The gray line represents the lower bound of this same quantity, except computed using the true errors. The blue lower bound of the plug-in approach of the mean detector is defined as ˆL(ˆr(X1), . . . , ˆr(Xt)). The gray line represents ˆL(E1, . . . , Et), the lower bound of the original mean detector using true errors. The upper bound that needs to be surpassed for each method to raise an alarm is depicted in red. For the quantile detector, this is the second lower bound ˆL2 q, and for the mean detector, it is ˆU(ˆr(X1), . . . , ˆr(Xt)). For the quantile detector, we also plot in pink the upper bound of the first statistic Φq (Equation 20). Figure 4: Evolution of bounds in production for mean detector (left) and quantile detector (right). The R-squared value of the error estimator on the source distribution is 0.35, which is not especially high. By analyzing the upper bounds for each method in Figure 4, we observe that all bounds remain roughly constant before the shift starts. Unsurprisingly, we observe the mean detector using true production errors quickly detects the shift (gray line). In contrast, its plug-in version raises an alarm with a significantly delayed detection. For the quantile detector, there is a much smaller difference between the lower bound of the plug-in and the one using true production errors. This observation validates our expectation that the FDP remains relatively stable post-shift. Additionally, as expected, the plot shows that the lower bound of the quantile detector crosses the upper bound of the second statistic (red line) much earlier than that of the first statistic (pink line). This experiment suggests that in scenarios with a less accurate error estimator, targeting quantile changes is more effective for detecting harmful shifts than focusing on mean change. Additional experiments on image datasets confirming this observation can be found in Appendix D. Larger-scale analyses in the following subsections examine the advantages of the quantile detector in more depth. 5.2 Synthetic Shifts on Tabular Datasets In this section, we conduct a large-scale experiment to evaluate the effectiveness of both methods in detecting harmful shifts while maintaining their ability to control false alarms. We also analyze how these metrics relate to the performance of the error estimator. We use two regression datasets (California house prices and bike sharing demand) as well as two classification datasets (HELOC and Nhanesi). We follow the feature-splitting setup of Section 4.1 to generate synthetic distribution shifts, excluding splits that result in subsets with fewer than 10 observations, and repeat each split 50 times with different random seeds. Table 1: Description of the shifts generated. Data # Generated Shifts H-M H-Q california 62 10 48 bike 2129 57 961 heloc 3385 774 1283 nhanesi 1697 377 679 Table 1 shows the number of generated shifts and the number of harmful shifts detected by each method using the true errors (H-M for mean detector and H-Q for quantile detector). A shift is considered harmful by each method as soon as the lower bound exceeds the upper bound plus ϵtol = 0. The left plot of Figure 5 displays the aggregated results across all distribution shifts for mean detection (red) and quantile detection (green) on the different datasets. The points labeled all-[method] represent the average results across the datasets. The quantile method achieves a significantly better power-FDP balance: (power 0.83, FDP 0.11) compared to the mean method: (power 0.67, FDP 0.41) across all experiments. An exception is observed for the Nhanesi dataset, where the mean detection shows slightly better power. However, overall, the quantile detection demonstrates a superior trade-off between power and false alarms. A similar trend is observed in the middle plot, which analyzes the absolute difference in detection time between each method using estimated errors and the same method with access to true errors. In the right plot, we compute how the power across datasets varies when we increase the threshold at which we consider the true shift as harmful (ϵtol). Across varying intensities of shift, the quantile detector consistently outperforms the mean detector, with false alarm rates at ϵtol = 0 being 0.41 and 0.11, respectively. Figure 5: Left: Power/FDP when ϵtol = 0 for all datasets. Middle: Absolute detection time difference vs. the methods using true errors. Right: Power values for different harmfulness thresholds (ϵtol). In Figure 6, we further investigate the relationship between the power (top row) and FDP (bottom row) of each method and the error estimator s performance binned into 10 quantiles for each dataset. The error estimator performance, measured by R-squared values, is generally low across all experiments (0.10 - 0.26). Notably, the quantile detector consistently maintains a lower FDP compared to the mean detector across all error estimator values. Regarding power, excluding the Nhanesi dataset, the quantile detector performs better than or equal to the mean detector. Figure 6: Power and FDP by error across all datasets. 5.3 Natural Shifts on a Tabular Dataset In the last experiment, we conduct another large-scale evaluation of our approach on natural shifts within the Folktables dataset [Ding et al., 2021]. This dataset is derived from US Census data spanning all fifty states within the US (plus Puerto Rico), each with a unique data distribution. Furthermore, it includes data from multiple years (from 2014 to 2018), introducing a form of temporal distribution shift in addition to the variations between states. We select the income feature as the target label, specifically predicting whether income exceeds $50, 000. We first split the dataset of each state in the year 2014 into training (50%), and calibration (50%). Then, we train a separate RF classifier in each state in the year 2014, and an RF regressor to learn the error of the primary model on the calibration set. Subsequently, we evaluate the model s error on all the remaining 50 states over 5 years, effectively creating 250 production datasets. We consider a shift to be harmful if the model s error in production exceeds the error on the calibration dataset plus ϵtol = 0. We introduce the shift in all datasets starting at time t = 3300. Table 2 summarizes the results for both methods, demonstrating that the quantile detector consistently outperforms the mean detector across all metrics. Table 2: Comparison of detection methods on Folktables data. Method Power FDP Mean detection time Quantile detector 0.48 0.019 3727 Mean detector 0.01 0.19 4945 Figure 7: Power corresponding to different levels of the harmfulness threshold (ϵtol) on Folktables. Figure 7 plots the sensitivity of each method relative to the shift harmfulness threshold. We observe that the quantile detector maintains superior performance across all threshold values. Overall, this experiment provides good evidence that our proposed method is effective under the kinds of natural shift encountered in realistic production environments. 6 Conclusion We have introduced an approach to identifying harmful distribution shifts in continuous production environments where ground truth labels are unavailable. Utilizing a plug-in strategy that substitutes true errors with estimated errors, alongside a threshold calibration step, our method effectively controls false alarms without relying on perfect error predictions. Experiments on real-world datasets demonstrate that our approach is effective in terms of detection power, false alarm control and detection time across various shifts, including covariate, label, and temporal shifts. In future work, we plan to apply interpretability techniques to the quantile detector to understand where and how the data are shifting in the input space, and to use this information to improve the primary model itself. This paper was prepared for informational purposes by the Artificial Intelligence Research group of JPMorgan Chase & Co and its affiliates ( J.P. Morgan ) and is not a product of the Research Department of J.P. Morgan. J.P. Morgan makes no representation and warranty whatsoever and disclaims all liability, for the completeness, accuracy or reliability of the information contained herein. This document is not intended as investment research or investment advice, or a recommendation, offer or solicitation for the purchase or sale of any security, financial instrument, financial product or service, or to be used in any way for evaluating the merits of participating in any transaction, and shall not constitute a solicitation under any jurisdiction or to any person, if such solicitation under such jurisdiction or to such person would be unlawful. Salim I Amoukou and Nicolas JB Brunel. Adaptive conformal prediction by reweighting nonconformity score. ar Xiv preprint ar Xiv:2303.12695, 2023. Firas Bayram, Bestoun S Ahmed, and Andreas Kassler. From concept drift to model degradation: An overview on performance-aware drift detectors. Knowledge-Based Systems, 245:108632, 2022. CDC. National health and nutrition examination survey, 1999-2022. URL https://wwwn.cdc. gov/Nchs/Nhanes/Default.aspx. Jiefeng Chen, Frederick Liu, Besim Avci, Xi Wu, Yingyu Liang, and Somesh Jha. Detecting Errors and Estimating Accuracy on Unlabeled Data with Self-training Ensembles, May 2023. URL http://arxiv.org/abs/2106.15728. ar Xiv:2106.15728 [cs]. Donald A Darling and Herbert Robbins. Confidence sequences for mean, variance, and median. Proceedings of the National Academy of Sciences, 58(1):66 68, 1967. W. Deng and L. Zheng. Are labels always necessary for classifier accuracy evaluation? In 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 15064 15073, Los Alamitos, CA, USA, jun 2021. IEEE Computer Society. doi: 10.1109/CVPR46437.2021.01482. URL https://doi.ieeecomputersociety.org/10.1109/CVPR46437.2021.01482. Frances Ding, Moritz Hardt, John Miller, and Ludwig Schmidt. Retiring adult: New datasets for fair machine learning. Advances in Neural Information Processing Systems, 34, 2021. Dheeru Dua and Casey Graff. UCI machine learning repository, 2017. URL http://archive.ics. uci.edu/ml. Hadi Fanaee-T. Bike Sharing Dataset. UCI Machine Learning Repository, 2013. DOI: https://doi.org/10.24432/C5W894. FICO. Fico. explainable machine learning challenge, 2018. URL https://community.fico.com/ s/explainable-machine-learning-challenge. Joao Gama, Raquel Sebastiao, and Pedro Pereira Rodrigues. On evaluating stream learning algorithms. Machine learning, 90:317 346, 2013. João Gama, Indr e Žliobait e, Albert Bifet, Mykola Pechenizkiy, and Abdelhamid Bouchachia. A survey on concept drift adaptation. ACM computing surveys (CSUR), 46(4):1 37, 2014. Saurabh Garg, Sivaraman Balakrishnan, Zachary Chase Lipton, Behnam Neyshabur, and Hanie Sedghi. Leveraging unlabeled data to predict out-of-distribution performance. In International Conference on Learning Representations, 2022. URL https://openreview.net/forum?id= o_Hsi MPYh_x. Tom Ginsberg, Zhongyuan Liang, and Rahul G Krishnan. A learning based hypothesis test for harmful covariate shift. ar Xiv preprint ar Xiv:2212.02742, 2022. Paulo M Gonçalves Jr, Silas GT de Carvalho Santos, Roberto SM Barros, and Davi CL Vieira. A comparative study on concept drift detectors. Expert Systems with Applications, 41(18):8144 8156, 2014. Devin Guillory, Vaishaal Shankar, Sayna Ebrahimi, Trevor Darrell, and Ludwig Schmidt. Predicting with Confidence on Unseen Distributions. In 2021 IEEE/CVF International Conference on Computer Vision (ICCV), pages 1114 1124, Montreal, QC, Canada, October 2021. IEEE. ISBN 978-1-66542-812-5. doi: 10.1109/ICCV48922.2021.00117. URL https://ieeexplore.ieee. org/document/9710388/. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 770 778, 2016. Steven R Howard, Aaditya Ramdas, Jon Mc Auliffe, and Jasjeet Sekhon. Time-uniform, nonparametric, nonasymptotic confidence sequences. ar Xiv preprint ar Xiv:1810.08240, 2021. Kevin Jamieson and Lalit Jain. A bandit approach to multiple testing with false discovery control. ar Xiv preprint ar Xiv:1809.02235, 2018. Christopher Jennison and Bruce W Turnbull. Repeated confidence intervals for group sequential clinical trials. Controlled Clinical Trials, 5(1):33 45, 1984. Ramesh Johari, Leo Pekelis, and David J Walsh. Always valid inference: Bringing sequential analysis to a/b testing. ar Xiv preprint ar Xiv:1512.04922, 2015. Alexander Koebler, Thomas Decker, Michael Lebacher, Ingo Thon, Volker Tresp, and Florian Buettner. Towards explanatory model monitoring. In XAI in Action: Past, Present, and Future Applications, 2023. URL https://openreview.net/forum?id=n VGu Wh4S2G. Alex Krizhevsky, Vinod Nair, and Geoffrey Hinton. Cifar-10 (canadian institute for advanced research). URL http://www.cs.toronto.edu/~kriz/cifar.html. Zachary Lipton, Yu-Xiang Wang, and Alexander Smola. Detecting and correcting for label shift with black box predictors. In International conference on machine learning, pages 3122 3130. PMLR, 2018. Ziwei Liu, Ping Luo, Xiaogang Wang, and Xiaoou Tang. Deep learning face attributes in the wild. In Proceedings of the IEEE international conference on computer vision, pages 3730 3738, 2015. Akash Maharaj, Ritwik Sinha, David Arbour, Ian Waudby-Smith, Simon Z Liu, Moumita Sinha, Raghavendra Addanki, Aaditya Ramdas, Manas Garg, and Viswanathan Swaminathan. Anytimevalid confidence sequences in an enterprise a/b testing platform. In Companion Proceedings of the ACM Web Conference 2023, pages 396 400, 2023. Coenraad Mouton, Marthinus W. Theunissen, and Marelie H. Davel. Input margins can predict generalization too, 2023. Nathan Hoyen Ng, Neha Hulkund, Kyunghyun Cho, and Marzyeh Ghassemi. Predicting out-ofdomain generalization with neighborhood invariance. Transactions on Machine Learning Research, 2023. ISSN 2835-8856. URL https://openreview.net/forum?id=j Yk Wd Jz Twn. Aleksandr Podkopaev and Aaditya Ramdas. Tracking the risk of a deployed model and detecting harmful distribution shifts. In International Conference on Learning Representations, 2022. URL https://openreview.net/forum?id=Ro_z Aj Zppv. Marco Saerens, Patrice Latinne, and Christine Decaestecker. Adjusting the outputs of a classifier to new a priori probabilities: a simple procedure. Neural computation, 14(1):21 41, 2002. Shiori Sagawa, Pang Wei Koh, Tatsunori B Hashimoto, and Percy Liang. Distributionally robust neural networks for group shifts: On the importance of regularization for worst-case generalization. ar Xiv preprint ar Xiv:1911.08731, 2019. Hidetoshi Shimodaira. Improving predictive inference under covariate shift by weighting the loglikelihood function. Journal of statistical planning and inference, 90(2):227 244, 2000. Puja Trivedi, Danai Koutra, and Jayaraman J Thiagarajan. A closer look at scoring functions and generalization prediction. In ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pages 1 5. IEEE, 2023. Ian Waudby-Smith and Aaditya Ramdas. Estimating means of bounded random variables by betting. ar Xiv preprint ar Xiv:2010.09686, 2020. Han Xiao, Kashif Rasul, and Roland Vollgraf. Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. ar Xiv preprint ar Xiv:1708.07747, 2017. Tijana Zrnic and Emmanuel J Candès. Active statistical inference. ar Xiv preprint ar Xiv:2403.03208, 2024. A Discussion of Assumption 4.1 To formalize the statement in the main body of the paper, we do not expect Assumption 4.1 to hold exactly, but we expect that in realistic settings, for all t 1, the inequality k=1 PP k (Sˆr,ˆq(X) = 1, E q) PP 0 (Sˆr,ˆq(X) = 1, E q) + δtol holds with a small δtol. For instance, in Figure 8, we compute the empirical distribution estimate of δ = 1 t Pt k=1 PP k (Sˆr,ˆq(X) = 1, E q) PP 0 (Sˆr,ˆq(X) = 1, E q) with t equals to the total number of production data across the different distribution shifts and datasets of Section 5.2 and the natural distribution shifts of Section 5.3. Figure 8: Distribution of δ across the different shifts and datasets of Section 5.2 (a) and the natural distribution shifts of Section 5.3 (b) We observe that Assumption 4.1 is valid approximately 50% of the time for both experimental setups, corresponding to the cases where δ is negative. In the other half of the cases where the assumption is not verified, we note that δ is very small, often less than 0.01. It should be noted that Assumption 4.1 allows for controlling false alarms when δ is zero or negative. To control false alarms when δ is positive, it is sufficient to always add δ to the lower bound ˆLq (Eq. 16) to have the false alarm guarantee. Specifically, under the assumption that for all t 1, 1 t Pt k=1 PP k (Sˆr,ˆq(X) = 1, E q) PP 0 (Sˆr,ˆq(X) = 1, E q) + δ we can show, similar to Theorem 4.2, that the corrected bounds ˆLcorr q = ˆLq δ used in the following statistic: Φcorr q (X1, . . . , Xt) = 1 n ˆLcorr q > ˆUq + ϵtol o , (25) will have false alarm control. The proof is identical to the proof of the Theorem 4.2, with ˆLq replaced by ˆLcorr q . However, in practice, we do not know the value of δ. Fortunately, in most realistic cases we have observed, δ is very small, especially compared to our maximum false alarm threshold of 0.2. Therefore, not adding this correction has very little impact on the statistics without correction (Equation 20). B Bounds of the Confidence Sequences and Intervals Used In our experiments, the confidence sequence bound wt is that of the Empirical Bernstein confidence sequence, as defined in the Theorem below. For a more detailed presentation of different confidence sequences, we refer the reader to Howard et al. [2021]. Theorem B.1. Let ˆµt = 1 t Pt i=1 Xi, and suppose Xi are bounded a.s. for each i 1. Then, for each α (0, 1), Ct = {θt wt} forms a (1 α)-level confidence sequence for E(ˆµt), where wt = cα ˆVt log log ˆVt t , ˆVt = Pt i=1(Xi ˆµi 1)2 denotes an empirical variance term and cα p When we use a confidence interval, we use the classic Hoeffding interval: Cn = {ˆµn wn} forms a (1 α)-level confidence interval for E(ˆµn), where wn = log(2/α) Theorem C.1. Under Assumption 4.1, ˆLq and ˆUq satisfy Equations 17 and 19. Therefore, the function Φq has false alarm control, i.e., PH0 ( t 1 : Φq(X1, . . . , Xt) = 1) αsource + αprod. (26) PH0 { t 1 : Φq(X1, . . . , Xt) = 1} = PH0 n t 1 : ˆLq > ˆUq + ϵtol o k=1 PP k (Sˆr,ˆq(X) = 1) ˆUq PP 0(Sˆr,ˆq(X) = 1) k=1 PP k (Sˆr,ˆq(X) = 1) PP 0(Sˆr,ˆq(X) = 1) k=1 PP k (Sˆr,ˆq(X) = 1) ˆUq PP 0(Sˆr,ˆq(X) = 1) > 0 k=1 PP k (Sˆr,ˆq(X) = 1) + PH0 n ˆUq PP 0(Sˆr,ˆq(X) = 1) > 0 o αsource + αprod The last inequality is due to Equation 17 and 19. D Additional Experiments on Image Datasets Here, we conduct two experiments using image datasets, specifically CIFAR-10 [Krizhevsky et al.] and Fashion MNIST [Xiao et al., 2017]. Similar to previous experiments, we remove some part of the data during training phase, here 90% of the observations with label 3 for both datasets, and reintroduce them gradually during the production phase. In Figure 9, we observe the same behavior as in Section 5.1. The quantile detector detects changes more quickly than the mean detector, and the performance of the former is closer to the true version than that of the latter. (a) Bounds on CIFAR-10 (b) Bounds on MNIST Figure 9: Evolution of the bounds in production for mean detector (left) and quantile detector (right). E Comparison Between Φq and Φ2 q In this section, we will revisit the main experiments from sections 5.2 and 5.3, incorporating comparisons with the quantile detector using the first statistic Φq. As expected, in figure 10, we consistently observe that the first statistic Φq achieves a better FDP than the second statistic Φ2 q at the cost of a much smaller power. In addition, Φq fails to detect any shift in the California dataset and has a much higher detection time. Figure 10: Left: Power/FDP when ϵtol = 0 for all datasets. Middle: Absolute detection time difference vs. the methods using true errors. Right: Power values for different harmfulness thresholds (ϵtol). In Figure 11, we have also computed the power relative to the harmfulness threshold ϵtol of the Folktables data from Section 5.3. The second statistic performs much better than the first in terms of power, although the FDP of the latter is smaller (0.004) compared to 0.019 for the former. Figure 11: Power corresponding to different levels of the harmfulness threshold (ϵtol) on Folktables. F Evaluations in Batch Setting In this section, we compare our approach with a leading method, Detectron, proposed by Ginsberg et al. [2022], in a batch setting. Directly comparing our method (SHSD) to those in Ginsberg et al. [2022] presents challenges due to fundamental differences in their design. Their methods are tailored for an offline batch setup, which requires a complete batch of production data to compute statistics and trigger alarms. In contrast, our approach is optimized for an online setting where shifts may occur gradually and continuously, necessitating real-time decisions without the ability to observe an entire unlabelled batch upfront. Our methodology is designed to detect harmful performance shifts on the fly, processing each observation sequentially without requiring access to the full production dataset. Applying offline methods like Detectron in an online setting would be both impractical and unfair, as these methods rely on training a model or computing statistics from a batch of data. Additionally, it would be computationally expensive since Detectron requires training a new model for each batch of production data. Consequently, deploying this approach online would entail training a number of models proportional to the production data size. To provide a meaningful comparison, we evaluated our method alongside Detectron in a batch setting, progressively increasing the size of the production or out-of-distribution (OOD) data. We generated shifts in line with the setup described in Section 5.2, ensuring no shift within the first 1300 samples of production data. We utilized the NHANESI classification dataset, as Detectron is specifically designed for classification tasks. Our experiments were replicated 50 times, yielding a total of 10,200 shift instances. Table 3: Comparison of Power and FDP metrics for Detectron and SHSD across different OOD sizes. OOD Size Power Detectron FDP Detectron Power SHSD FDP SHSD 100 N/A 1.00 N/A 0.00 1000 N/A 1.00 N/A 0.00 2000 0.96 0.61 0.40 0.02 3000 0.98 0.60 0.63 0.02 3500 0.98 0.60 0.67 0.02 8593 0.98 0.60 0.74 0.04 The results, summarized in Table 3, demonstrate that for smaller sample sizes (100 and 1000), our method did not detect any shifts, as expected given the lack of shifts in the initial 1300 samples. However, Detectron raised a significant number of alarms (1126 out of 1700 for sample size 100 and 1493 for sample size 1000), all of which were false alarms. For larger sample sizes, while Detectron shows high power in detecting shifts, it also produces a high false discovery proportion (FDP). In contrast, our method exhibits lower power but significantly better control over false alarms, consistent with our objective of minimizing false positives. These results confirm that our method performs robustly in both batch and online settings, effectively maintaining low false alarm rates while detecting harmful shifts as they arise. F.1 Limitations of Disagreement-based Detectors In this section, we highlight some potential limitations of disagreement-based detectors, such as Detectron, which may limit their effectiveness in certain contexts. Figure 12: Illustration of a Disagreement-Based Detector Failure Case The primary concept behind Detectron is to train a disagreement classifier that performs comparably to the original model on the training distribution while disagreeing with the original model s predictions on production data. This approach is highly sensitive to the base model s performance, the choice of function class, and the size and nature of the production data. Although Detectron shows high power in detecting harmful shifts (as evidenced by our experiments), it may raise false alarms when the shift is benign. In Figure 12, we illustrate a failure case for the disagreement-based detector. In this example, training data points are represented in red and green, with the ground truth shaded accordingly. The solid black line represents the decision boundary of a base model, which we assume to be a perfect classifier. The data has shifted to the right, resulting in unlabeled production data that is still correctly classified by the base model. We ve also depicted the potential learnable classifier as a dashed line, representing the boundary of all possible functions, which depends on the model type, complexity used for the disagreement classifier, and the nature and size of the data. We have shown a potential disagreement classifier in orange that performs similarly to the original model on training data but disagrees with the predictions of the base classifier in the production data. As shown, even with a benign shift, we can still find a disagreement classifier that performs well on training data but disagrees significantly in production, raising a false alarm. G Experimental Compute Resources We run all our experiments on an Amazon EC2 instance (c5.4xlarge) that consists of 16 v CPUs and 32 GB of RAM. H Impact Statement This research, focusing on developing algorithms to detect harmful distribution shifts in machine learning models, has significant and diverse practical impacts. It offers a solution to a key challenge in the safe deployment of AI across various industries by detecting shifts without needing labeled data. For instance, in healthcare, the ability to identify harmful shifts in predictive models enhances the accuracy and reliability of diagnostic tools, which is especially vital as patient data continuously changes due to new diseases or demographic shifts. In finance, the algorithms can detect market trends or consumer behaviour changes that might negatively impact forecasting models, leading to more adaptive and resilient economic models, improved risk management, and better-informed decision-making processes. Neur IPS Paper Checklist Question: Do the main claims made in the abstract and introduction accurately reflect the paper s contributions and scope? Answer: [Yes] Justification: This work s main contributions can be found in the abstract and introduction. Guidelines: The answer NA means that the abstract and introduction do not include the claims made in the paper. The abstract and/or introduction should clearly state the claims made, including the contributions made in the paper and important assumptions and limitations. A No or NA answer to this question will not be perceived well by the reviewers. The claims made should match theoretical and experimental results, and reflect how much the results can be expected to generalize to other settings. It is fine to include aspirational goals as motivation as long as it is clear that these goals are not attained by the paper. 2. Limitations Question: Does the paper discuss the limitations of the work performed by the authors? Answer: [Yes] Justification: On lines 40-51, we discussed the potential difficulty of learning a second estimator and provided rationale and examples of when it is possible. We presented the assumptions under which our method should have false alarm control and discussed its validity in practice in appendix A. Guidelines: The answer NA means that the paper has no limitation while the answer No means that the paper has limitations, but those are not discussed in the paper. The authors are encouraged to create a separate "Limitations" section in their paper. The paper should point out any strong assumptions and how robust the results are to violations of these assumptions (e.g., independence assumptions, noiseless settings, model well-specification, asymptotic approximations only holding locally). The authors should reflect on how these assumptions might be violated in practice and what the implications would be. The authors should reflect on the scope of the claims made, e.g., if the approach was only tested on a few datasets or with a few runs. In general, empirical results often depend on implicit assumptions, which should be articulated. The authors should reflect on the factors that influence the performance of the approach. For example, a facial recognition algorithm may perform poorly when image resolution is low or images are taken in low lighting. Or a speech-to-text system might not be used reliably to provide closed captions for online lectures because it fails to handle technical jargon. The authors should discuss the computational efficiency of the proposed algorithms and how they scale with dataset size. If applicable, the authors should discuss possible limitations of their approach to address problems of privacy and fairness. While the authors might fear that complete honesty about limitations might be used by reviewers as grounds for rejection, a worse outcome might be that reviewers discover limitations that aren t acknowledged in the paper. The authors should use their best judgment and recognize that individual actions in favor of transparency play an important role in developing norms that preserve the integrity of the community. Reviewers will be specifically instructed to not penalize honesty concerning limitations. 3. Theory Assumptions and Proofs Question: For each theoretical result, does the paper provide the full set of assumptions and a complete (and correct) proof? Answer: [Yes] Justification: We have stated the theorems and the assumptions in the main body and provided the proofs in the appendix. Guidelines: The answer NA means that the paper does not include theoretical results. All the theorems, formulas, and proofs in the paper should be numbered and crossreferenced. All assumptions should be clearly stated or referenced in the statement of any theorems. The proofs can either appear in the main paper or the supplemental material, but if they appear in the supplemental material, the authors are encouraged to provide a short proof sketch to provide intuition. Inversely, any informal proof provided in the core of the paper should be complemented by formal proofs provided in appendix or supplemental material. Theorems and Lemmas that the proof relies upon should be properly referenced. 4. Experimental Result Reproducibility Question: Does the paper fully disclose all the information needed to reproduce the main experimental results of the paper to the extent that it affects the main claims and/or conclusions of the paper (regardless of whether the code and data are provided or not)? Answer: [Yes] Justification: We fully disclose all the information needed to reproduce the main experimental results, but we also plan to release the code to use the methods and replicate the experiments. Guidelines: The answer NA means that the paper does not include experiments. If the paper includes experiments, a No answer to this question will not be perceived well by the reviewers: Making the paper reproducible is important, regardless of whether the code and data are provided or not. If the contribution is a dataset and/or model, the authors should describe the steps taken to make their results reproducible or verifiable. Depending on the contribution, reproducibility can be accomplished in various ways. For example, if the contribution is a novel architecture, describing the architecture fully might suffice, or if the contribution is a specific model and empirical evaluation, it may be necessary to either make it possible for others to replicate the model with the same dataset, or provide access to the model. In general. releasing code and data is often one good way to accomplish this, but reproducibility can also be provided via detailed instructions for how to replicate the results, access to a hosted model (e.g., in the case of a large language model), releasing of a model checkpoint, or other means that are appropriate to the research performed. While Neur IPS does not require releasing code, the conference does require all submissions to provide some reasonable avenue for reproducibility, which may depend on the nature of the contribution. For example (a) If the contribution is primarily a new algorithm, the paper should make it clear how to reproduce that algorithm. (b) If the contribution is primarily a new model architecture, the paper should describe the architecture clearly and fully. (c) If the contribution is a new model (e.g., a large language model), then there should either be a way to access this model for reproducing the results or a way to reproduce the model (e.g., with an open-source dataset or instructions for how to construct the dataset). (d) We recognize that reproducibility may be tricky in some cases, in which case authors are welcome to describe the particular way they provide for reproducibility. In the case of closed-source models, it may be that access to the model is limited in some way (e.g., to registered users), but it should be possible for other researchers to have some path to reproducing or verifying the results. 5. Open access to data and code Question: Does the paper provide open access to the data and code, with sufficient instructions to faithfully reproduce the main experimental results, as described in supplemental material? Answer: [Yes] Justification: We have used open-source datasets and added the references. We will also release the code with a proper readme to use the methods. Guidelines: The answer NA means that paper does not include experiments requiring code. Please see the Neur IPS code and data submission guidelines (https://nips.cc/ public/guides/Code Submission Policy) for more details. While we encourage the release of code and data, we understand that this might not be possible, so No is an acceptable answer. Papers cannot be rejected simply for not including code, unless this is central to the contribution (e.g., for a new open-source benchmark). The instructions should contain the exact command and environment needed to run to reproduce the results. See the Neur IPS code and data submission guidelines (https: //nips.cc/public/guides/Code Submission Policy) for more details. The authors should provide instructions on data access and preparation, including how to access the raw data, preprocessed data, intermediate data, and generated data, etc. The authors should provide scripts to reproduce all experimental results for the new proposed method and baselines. If only a subset of experiments are reproducible, they should state which ones are omitted from the script and why. At submission time, to preserve anonymity, the authors should release anonymized versions (if applicable). Providing as much information as possible in supplemental material (appended to the paper) is recommended, but including URLs to data and code is permitted. 6. Experimental Setting/Details Question: Does the paper specify all the training and test details (e.g., data splits, hyperparameters, how they were chosen, type of optimizer, etc.) necessary to understand the results? Answer: [Yes] Justification: [NA] Guidelines: The answer NA means that the paper does not include experiments. The experimental setting should be presented in the core of the paper to a level of detail that is necessary to appreciate the results and make sense of them. The full details can be provided either with the code, in appendix, or as supplemental material. 7. Experiment Statistical Significance Question: Does the paper report error bars suitably and correctly defined or other appropriate information about the statistical significance of the experiments? Answer: [Yes] Justification: We replicated each experiment 50 times and displayed the distribution of errors in most cases to illustrate how the errors vary within each dataset. Guidelines: The answer NA means that the paper does not include experiments. The authors should answer "Yes" if the results are accompanied by error bars, confidence intervals, or statistical significance tests, at least for the experiments that support the main claims of the paper. The factors of variability that the error bars are capturing should be clearly stated (for example, train/test split, initialization, random drawing of some parameter, or overall run with given experimental conditions). The method for calculating the error bars should be explained (closed form formula, call to a library function, bootstrap, etc.) The assumptions made should be given (e.g., Normally distributed errors). It should be clear whether the error bar is the standard deviation or the standard error of the mean. It is OK to report 1-sigma error bars, but one should state it. The authors should preferably report a 2-sigma error bar than state that they have a 96% CI, if the hypothesis of Normality of errors is not verified. For asymmetric distributions, the authors should be careful not to show in tables or figures symmetric error bars that would yield results that are out of range (e.g. negative error rates). If error bars are reported in tables or plots, The authors should explain in the text how they were calculated and reference the corresponding figures or tables in the text. 8. Experiments Compute Resources Question: For each experiment, does the paper provide sufficient information on the computer resources (type of compute workers, memory, time of execution) needed to reproduce the experiments? Answer: [Yes] Justification: We have provided in Section G the type of compute workers we used. Guidelines: The answer NA means that the paper does not include experiments. The paper should indicate the type of compute workers CPU or GPU, internal cluster, or cloud provider, including relevant memory and storage. The paper should provide the amount of compute required for each of the individual experimental runs as well as estimate the total compute. The paper should disclose whether the full research project required more compute than the experiments reported in the paper (e.g., preliminary or failed experiments that didn t make it into the paper). 9. Code Of Ethics Question: Does the research conducted in the paper conform, in every respect, with the Neur IPS Code of Ethics https://neurips.cc/public/Ethics Guidelines? Answer: [Yes] Justification: [NA] Guidelines: The answer NA means that the authors have not reviewed the Neur IPS Code of Ethics. If the authors answer No, they should explain the special circumstances that require a deviation from the Code of Ethics. The authors should make sure to preserve anonymity (e.g., if there is a special consideration due to laws or regulations in their jurisdiction). 10. Broader Impacts Question: Does the paper discuss both potential positive societal impacts and negative societal impacts of the work performed? Answer: [Yes] Justification: We discuss broader impacts in Section H. Guidelines: The answer NA means that there is no societal impact of the work performed. If the authors answer NA or No, they should explain why their work has no societal impact or why the paper does not address societal impact. Examples of negative societal impacts include potential malicious or unintended uses (e.g., disinformation, generating fake profiles, surveillance), fairness considerations (e.g., deployment of technologies that could make decisions that unfairly impact specific groups), privacy considerations, and security considerations. The conference expects that many papers will be foundational research and not tied to particular applications, let alone deployments. However, if there is a direct path to any negative applications, the authors should point it out. For example, it is legitimate to point out that an improvement in the quality of generative models could be used to generate deepfakes for disinformation. On the other hand, it is not needed to point out that a generic algorithm for optimizing neural networks could enable people to train models that generate Deepfakes faster. The authors should consider possible harms that could arise when the technology is being used as intended and functioning correctly, harms that could arise when the technology is being used as intended but gives incorrect results, and harms following from (intentional or unintentional) misuse of the technology. If there are negative societal impacts, the authors could also discuss possible mitigation strategies (e.g., gated release of models, providing defenses in addition to attacks, mechanisms for monitoring misuse, mechanisms to monitor how a system learns from feedback over time, improving the efficiency and accessibility of ML). 11. Safeguards Question: Does the paper describe safeguards that have been put in place for responsible release of data or models that have a high risk for misuse (e.g., pretrained language models, image generators, or scraped datasets)? Answer: [NA] Justification: [NA] Guidelines: The answer NA means that the paper poses no such risks. Released models that have a high risk for misuse or dual-use should be released with necessary safeguards to allow for controlled use of the model, for example by requiring that users adhere to usage guidelines or restrictions to access the model or implementing safety filters. Datasets that have been scraped from the Internet could pose safety risks. The authors should describe how they avoided releasing unsafe images. We recognize that providing effective safeguards is challenging, and many papers do not require this, but we encourage authors to take this into account and make a best faith effort. 12. Licenses for existing assets Question: Are the creators or original owners of assets (e.g., code, data, models), used in the paper, properly credited and are the license and terms of use explicitly mentioned and properly respected? Answer: [Yes] Justification: [NA] Guidelines: The answer NA means that the paper does not use existing assets. The authors should cite the original paper that produced the code package or dataset. The authors should state which version of the asset is used and, if possible, include a URL. The name of the license (e.g., CC-BY 4.0) should be included for each asset. For scraped data from a particular source (e.g., website), the copyright and terms of service of that source should be provided. If assets are released, the license, copyright information, and terms of use in the package should be provided. For popular datasets, paperswithcode.com/datasets has curated licenses for some datasets. Their licensing guide can help determine the license of a dataset. For existing datasets that are re-packaged, both the original license and the license of the derived asset (if it has changed) should be provided. If this information is not available online, the authors are encouraged to reach out to the asset s creators. 13. New Assets Question: Are new assets introduced in the paper well documented and is the documentation provided alongside the assets? Answer: [Yes] Justification: We plan to release a well-documented code. Guidelines: The answer NA means that the paper does not release new assets. Researchers should communicate the details of the dataset/code/model as part of their submissions via structured templates. This includes details about training, license, limitations, etc. The paper should discuss whether and how consent was obtained from people whose asset is used. At submission time, remember to anonymize your assets (if applicable). You can either create an anonymized URL or include an anonymized zip file. 14. Crowdsourcing and Research with Human Subjects Question: For crowdsourcing experiments and research with human subjects, does the paper include the full text of instructions given to participants and screenshots, if applicable, as well as details about compensation (if any)? Answer: [NA] Justification: [NA] Guidelines: The answer NA means that the paper does not involve crowdsourcing nor research with human subjects. Including this information in the supplemental material is fine, but if the main contribution of the paper involves human subjects, then as much detail as possible should be included in the main paper. According to the Neur IPS Code of Ethics, workers involved in data collection, curation, or other labor should be paid at least the minimum wage in the country of the data collector. 15. Institutional Review Board (IRB) Approvals or Equivalent for Research with Human Subjects Question: Does the paper describe potential risks incurred by study participants, whether such risks were disclosed to the subjects, and whether Institutional Review Board (IRB) approvals (or an equivalent approval/review based on the requirements of your country or institution) were obtained? Answer: [NA] Justification: [NA] Guidelines: The answer NA means that the paper does not involve crowdsourcing nor research with human subjects. Depending on the country in which research is conducted, IRB approval (or equivalent) may be required for any human subjects research. If you obtained IRB approval, you should clearly state this in the paper. We recognize that the procedures for this may vary significantly between institutions and locations, and we expect authors to adhere to the Neur IPS Code of Ethics and the guidelines for their institution. For initial submissions, do not include any information that would break anonymity (if applicable), such as the institution conducting the review.