Key Takeaway

AI black boxes refer to invisible systems with internal workings, such as machine learning. These systems have algorithms, training data, and models, which can be hidden or obscured to protect intellectual property. Explainable AI is working to develop algorithms that can be better understood by humans. Black box machine-learning algorithms and models can be dangerous, as they can reveal sensitive information about decisions and security, while allowing for reverse engineering.


For some people, the term “black box” brings to mind the recording devices in airplanes that are valuable for postmortem analyses if the unthinkable happens. For others it evokes small, minimally outfitted theaters. But black box is also an important term in the world of artificial intelligence. 

AI black boxes refer to AI systems with internal workings that are invisible to the user. You can feed them input and get output, but you cannot examine the system’s code or the logic that produced the output. 

Machine learning is the dominant subset of artificial intelligence. It underlies generative AI systems like ChatGPT and DALL-E 2. There are three components to machine learning: an algorithm or a set of algorithms, training data and a model. An algorithm is a set of procedures. In machine learning, an algorithm learns to identify patterns after being trained on a large set of examples – the training data. Once a machine-learning algorithm has been trained, the result is a machine-learning model. The model is what people use. 

For example, a machine-learning algorithm could be designed to identify patterns in images, and training data could be images of dogs. The resulting machine-learning model would be a dog spotter. You would feed it an image as input and get as output whether and where in the image a set of pixels represents a dog.

Any of the three components of a machine-learning system can be hidden, or in a black box. As is often the case, the algorithm is publicly known, which makes putting it in a black box less effective. So to protect their intellectual property, AI developers often put the model in a black box. Another approach software developers take is to obscure the data used to train the model – in other words, put the training data in a black box.Black box algorithms make it very difficult to understand how AIs work, but the situation isn’t quite black and white.

The opposite of a black box is sometimes referred to as a glass box. An AI glass box is a system whose algorithms, training data and model are all available for anyone to see. But researchers sometimes characterize aspects of even these as black box. 

That’s because researchers don’t fully understand how machine-learning algorithms, particularly deep-learning algorithms, operate. The field of explainable AI is working to develop algorithms that, while not necessarily glass box, can be better understood by humans.

Why AI black boxes matter

In many cases, there is good reason to be wary of black box machine-learning algorithms and models. Suppose a machine-learning model has made a diagnosis about your health. Would you want the model to be black box or glass box? What about the physician prescribing your course of treatment? Perhaps she would like to know how the model arrived at its decision. 

What if a machine-learning model that determines whether you qualify for a business loan from a bank turns you down? Wouldn’t you like to know why? If you did, you could more effectively appeal the decision, or change your situation to increase your chances of getting a loan the next time.

Black boxes also have important implications for software system security. For years, many people in the computing field thought that keeping software in a black box would prevent hackers from examining it and therefore it would be secure. This assumption has largely been proved wrong because hackers can reverse-engineer software – that is, build a facsimile by closely observing how a piece of software works – and discover vulnerabilities to exploit. 

If software is in a glass box, then software testers and well-intentioned hackers can examine it and inform the creators of weaknesses, thereby minimizing cyberattacks.

Contributor

Recently Published

Key Takeaway: Scientists are decoding the mysteries of dinosaurs by examining their lives, movements, and interactions. Advances in technology are revealing new insights into their colors, patterns, and social structures. Electron microscopes have allowed scientists to reconstruct the coloration of certain feathered dinosaurs, revealing details about their appearance and behavior. CT scans are being used […]

Top Picks

Key Takeaway: Research suggests that sleep disturbances are more than just a side effect of mental health disorders; they are an integral part of the puzzle, influencing the nature of mental illness and addiction itself. Disrupted sleep can intensify symptoms of mental illness, making it harder to stay on treatment. Neuroscientists are beginning to uncover […]
Key Takeaway: Lightning, a powerful electrical discharge, may be triggering a hidden cosmic phenomenon, shaking loose high-energy electrons from space. Under the right conditions, a shower of electrons cascading into Earth’s atmosphere can be caused by electromagnetic waves produced by lightning. This groundbreaking finding sheds new light on how Earth’s storms interact with space weather, […]
Key Takeaway: Love is a crucial aspect of life, defining relationships, identity, and self-worth. The popular belief that self-love is necessary for romantic love is often questioned, as some philosophers argue that excessive focus on oneself can lead to narcissism. However, the absence of self-love can manifest as a fundamental lack of self-worth, leaving individuals […]

Trending

I highly recommend reading the McKinsey Global Institute’s new report, “Reskilling China: Transforming The World’s Largest Workforce Into Lifelong Learners”, which focuses on the country’s biggest employment challenge, re-training its workforce and the adoption of practices such as lifelong learning to address the growing digital transformation of its productive fabric. How to transform the country […]

Join our Newsletter

Get our monthly recap with the latest news, articles and resources.

Login

Welcome to Empirics

We are glad you have decided to join our mission of gathering the collective knowledge of Asia!
Join Empirics