A THEORY OF UsABLE INFORMATION UNDER COMPUTATIONAL CONSTRAINTS
Yilun Xu
CFCS, Peking University
Shengjia Zhao
Stanford University
Jiaming Song
Stanford University
Russell Stewart
Stefano Ermon
Stanford University
ABSTRACT
We propose a new framework for reasoning about information in complex systems. Our foundation is based on a variational extension of Shannon's information theory that takes into account the modeling power and computational constraints of the observer. The resulting predictive $\mathcal{V}$ -information encompasses mutual information and other notions of informativeness such as the coefficient of determination. Unlike Shannon's mutual information and in violation of the data processing inequality, $\mathcal{V}$ -information can be created through computation. This is consistent with deep neural networks extracting hierarchies of progressively more informative features in representation learning. Additionally, we show that by incorporating computational constraints, $\mathcal{V}$ -information can be reliably estimated from data even in high dimensions with PAC-style guarantees. Empirically, we demonstrate predictive $\mathcal{V}$ -information is more effective than mutual information for structure learning and fair representation learning.
1 INTRODUCTION
Extracting actionable information from noisy, possibly redundant, and high-dimensional data sources is a key computational and statistical challenge at the core of AI and machine learning. Information theory, which lies at the foundation of AI and machine learning, provides a conceptual framework to characterize information in a mathematically rigorous sense (Shannon & Weaver, 1948; Cover & Thomas, 1991). However, important computational aspects are not considered in information theory. To illustrate this, consider a dataset of encrypted messages intercepted from an opponent. According to information theory, these encrypted messages have high mutual information with the opponent's plans. Indeed, with infinite computation, the messages can be decrypted and the plans revealed. Modern cryptography originated from this observation by Shannon that perfect secrecy is (essentially) impossible if the adversary is computationally unbounded (Shannon & Weaver, 1948). This motivated cryptographers to consider restricted classes of adversaries that have access to limited computational resources (Pass & Shelat, 2010). More generally, it is known that information theoretic quantities can be expressed in terms of betting games (Cover & Thomas, 1991). For example, the (conditional) entropy of a random variable $X$ is directly related to how predictable $X$ is in a certain betting game, where an agent is rewarded for correct guesses. Yet, the standard definition unrealistically assumes agents are computationally unbounded, i.e., they can employ arbitrarily complex prediction schemes.
Leveraging modern ideas from variational inference and learning (Ranganath et al., 2013; Kingma & Welling, 2013; LeCun et al., 2015), we propose an alternative formulation based on realistic computational constraints that is in many ways closer to our intuitive notion of information, which we term predictive $\mathcal{V}$ -information. Without constraints, predictive $\mathcal{V}$ -information specializes to classic mutual information. Under natural restrictions, $\mathcal{V}$ -information specializes to other well-known notions of predictiveness, such as the coefficient of determination $(R^2)$ . A consequence of this new formulation is that computation can "create usable information" (e.g., by decrypting the intercepted messages), invalidating the famous data processing inequality. This generalizes the idea that clever
feature extraction enables prediction with extremely simple (e.g., linear) classifiers, a key notion in modern representation and deep learning (LeCun et al., 2015).
As an additional benefit, we show that predictive $\nu$ -information can be estimated with statistical guarantees using the Probably Approximately Correct framework (Valiant, 1984). This is in sharp contrast with Shannon information, which is well known to be difficult to estimate for high dimensional or continuous random variables (Battiti, 1994). Theoretically we show that the statistical guarantees of estimating $\nu$ information translate to statistical guarantees for a variant of the Chow-Liu algorithm for structure learning. In practice, when the observer employs deep neural networks as a prediction scheme, $\nu$ -information outperforms methods that approximate Shannon information in various applications, including Chow-Liu tree contraction in high dimension and gene regulatory network inference.
2 DEFINITIONS AND NOTATIONS
To formally define the predictive $\mathcal{V}$ -information, we begin with a formal model of a computationally bounded agent trying to predict the outcome of a real-valued random variable $Y$ ; the agent is either provided another real-valued random variable $X$ as side information, or provided no side information $\varnothing$ . We use $\mathcal{X}$ and $\mathcal{Y}$ to denote the samples spaces of $X$ and $Y$ respectively (while assuming they are separable), and use $\mathcal{P}(\mathcal{X})$ to denote the set of all probability measures over the Borel algebra on $\mathcal{X}$ ( $\mathcal{P}(\mathcal{Y})$ similarly defined for $\mathcal{Y}$ ).
Definition 1 (Predictive Family). Let $\Omega = {f:\mathcal{X}\cup {\varnothing } \to \mathcal{P}(\mathcal{Y})}$ . We say that $\mathcal{V}\subseteq \Omega$ is a predictive family if it satisfies
A predictive family is a set of predictive models the agent is allowed to use, e.g., due to computational or statistical constraints. We refer to the additional condition in Eq.(1) as optional ignorance. Intuitively, it means that the agent can, in the context of the prediction game we define next, ignore the side information if she chooses to.
Definition 2 (Predictive conditional $\mathcal{V}$ -entropy). Let $X, Y$ be two random variables taking values in $\mathcal{X} \times \mathcal{Y}$ , and $\mathcal{V}$ be a predictive family. Then the predictive conditional $\mathcal{V}$ -entropy is defined as
We additionally call $H_{\mathcal{V}}(Y|\varnothing)$ the $\mathcal{V}$ -entropy, and also denote it as $H_{\mathcal{V}}(Y)$ .
In our notation $f$ is a function $\mathcal{X} \cup {\varnothing} \to \mathcal{P}(\mathcal{Y})$ , so $f[x] \in \mathcal{P}(\mathcal{Y})$ is a probability measure on $\mathcal{Y}$ chosen based on the received side information $x$ (we use $f[\cdot]$ instead of the more conventional $f(\cdot)$ ); and $fx \in \mathbb{R}$ is the value of the density evaluated at $y \in \mathcal{Y}$ . Intuitively, $\mathcal{V}$ (conditional) entropy is the smallest expected negative log-likelihood that can be achieved predicting $Y$ given observation (side information) $X$ (or no side information $\varnothing$ ), using models from $\mathcal{V}$ . Eq.(1) means that whenever the agent can use $P$ to predict $\mathcal{V}$ 's outcomes, it has the option to ignore the input, and use $P$ no matter whether $X$ is observed or not.
Definition 2 generalizes several known definitions of uncertainty. For example, as shown in proposition 2, if the $\mathcal{V}$ is the largest possible predictive family that includes all possible models, i.e. $\mathcal{V} = \Omega$ , then Definition 2 reduces to Shannon entropy: $H_{\Omega}(Y|X) = H(Y|X)$ and $H_{\mathcal{V}}(Y|\emptyset) = H_{\Omega}(Y) = H(Y)$ . By choosing more restrictive families $\mathcal{V}$ , we recover several other notions of uncertainty such as trace of covariance, as will be shown in Proposition 1.
Shannon mutual information is a measure of changes in entropy when conditioning on new variables:
Here, we will use predictive $\nu$ -entropy to define an analogous quantity, $I_{\nu}(X \to Y)$ , to represent the change in predictability of an output variable $Y$ when given side information $X$ .
Definition 3 (Predictive $\mathcal{V}$ -information). Let $X, Y$ be two random variables taking values in $\mathcal{X} \times \mathcal{Y}$ , and $\mathcal{V}$ be a predictive family. The predictive $\mathcal{V}$ -information from $X$ to $Y$ is defined as
2.1 IMPORTANT SPECIAL CASES
Several important notions of uncertainty and predictiveness are special cases of our definition. Note that when we are defining $\nu$ -entropy of a random variable $Y$ in sample space $\mathcal{V} \in \mathbb{R}^d$ (without side information), out of convenience we can assume $\mathcal{X}$ is empty $\mathcal{X} = \emptyset$ (this does not violate our requirement that $\emptyset \notin \mathcal{X}$ .
Proposition 1. For $\mathcal{V}$ -entropy and $\mathcal{V}$ -information, we have
- Let $\Omega$ be as in Def. 1. Then $H_{\Omega}(Y)$ is the Shannon entropy, $H_{\Omega}(Y \mid X)$ is the Shannon conditional entropy, and $I_{\Omega}(Y \rightarrow X)$ is the Shannon mutual information.
- Let $\mathcal{V} = \mathbb{R}^d$ and $\mathcal{V} = {f:{\varnothing } \to P_{\mu}\mid \mu \in \mathbb{R}^{d}}$ , where $P_{\mu}$ is the distribution with density $y\mapsto \frac{1}{Z} e^{-| y - \mu | _2}$ where $Z = \int e^{-| y - \mu | _2}dy$ , then the $\mathcal{V}$ -entropy of a random variable $Y$ equals its mean absolute deviation, up to an additive constant.
- Let $\mathcal{V} = \mathbb{R}^d$ and $\mathcal{V} = {f:{\emptyset } \to \mathcal{N}(\mu ,\Sigma)\mid \mu \in \mathbb{R}^d,\Sigma = 1 / 2I_{d\times d}}$ , then the $\mathcal{V}$ -entropy of a random variable $Y$ equals the trace of its covariance $\operatorname {tr}\left(\operatorname {Cov}(Y)\right)$ , up to an additive constant.
- Let $\mathcal{V} = {f:{\varnothing } \to Q_{\mathbf{t},\theta},\theta \in \Theta }$ , where $Q_{\mathbf{t},\theta}$ is a distribution in a minimal exponential family with sufficient statistics $\mathbf{t}:\mathcal{V}\rightarrow \mathbb{R}^d$ and set of natural parameters $\Theta$ . For a random variable $Y$ with expected sufficient statistics $\mu_Y = \mathbb{E}[\mathbf{t}(Y)]$ , the $\mathcal{V}$ -entropy of $Y$ is the maximum Shannon entropy over all random variables $\hat{Y}$ with identical expected sufficient statistics, i.e. $\mathbb{E}[\mathbf{t}(\hat{Y})] = \mu_Y$ .
- Let $\mathcal{V} = \mathbb{R}^d$ , $\mathcal{X}$ be any vector space, and $\mathcal{V} = {f : x \mapsto \mathcal{N}(\phi(x), \Sigma), x \in \mathcal{X}; \emptyset \mapsto \mathcal{N}(\mu, \Sigma) | \mu \in \mathbb{R}^d; \Sigma = 1/2I_{d \times d}, \phi \in \Phi}$ , where $\Phi$ is the set of linear functions ${\phi : \mathcal{X} \to \mathbb{R}^d}$ , then $\mathcal{V}$ -information $I_{\mathcal{V}}(X \to Y)$ equals the (unnormized) maximum coefficient of determination $R^2 \cdot \operatorname{tr}(\operatorname{Cov}(Y))$ for linear regression.
The trace of covariance represents a natural notion of uncertainty β for example, a random variable with zero variance (when $d = 1$ , tr $(\operatorname{Cov}(Y)) = \operatorname{Var}(Y))$ ) is trivial to predict. Proposition 1.3 shows that the trace of covariance corresponds to a notion of surprise (in the Shannon sense) for an agent restricted to make predictions using certain Gaussian models. More broadly, a similar analogy can be drawn for other exponential families of distributions. In the same spirit, the coefficient of determination, also known as the fraction of variance explained, represents a natural notion of informativeness for computationally bounded agents. Also note that in the case of Proposition 1.4, the $\nu$ -entropy is invariant if the expected sufficient statistics remain the same.
3 PROPERTIES OF $\nu$ -INFORMATION
3.1 ELEMENTARY PROPERTIES
We first show several elementary properties of $\nu$ -entropy and $\nu$ -information. In particular, $\nu$ -information preserves many properties of Shannon information that are desirable in a machine learning context. For example, mutual information (and $\nu$ -information) should be non-negative as conditioning on additional side information $X$ should not reduce an agent's ability to predict $Y$ .
Proposition 2. Let $Y$ and $X$ be any random variables on $\mathcal{V}$ and $\mathcal{X}$ , and $\mathcal{V}$ and $\mathcal{U}$ be any predictive families, then we have
- Monotonicity: If $\mathcal{V} \subseteq \mathcal{U}$ , then $H_{\mathcal{V}}(Y) \geq H_{\mathcal{U}}(Y)$ , $H_{\mathcal{V}}(Y \mid X) \geq H_{\mathcal{U}}(Y \mid X)$ .
- Non-Negativity: $I_{\mathcal{V}}(X \to Y) \geq 0$ .
- Independence: If $X$ is independent of $Y$ , $I_{\mathcal{V}}(X \to Y) = I_{\mathcal{V}}(Y \to X) = 0$ .
The optional ignorance requirement in Eq.(1) is a technical condition needed for these properties to hold. Intuitively, it guarantees that conditioning on side information does not restrict the class of densities the agent can use to predict $Y$ . This property is satisfied by many existing machine learning models, often by setting some weights to zero so that an input is effectively ignored.
3.2 ON THE PRODUCTION OF INFORMATION THROUGH PREPROCESSING
The Data Processing Inequality guarantees that computing on data cannot increase its mutual information with other random variables. Formally, letting $t: \mathcal{X} \to \mathcal{X}$ be any function, $t(X)$ cannot have higher mutual information with $Y$ than $X$ : $I(t(X);Y) \leq I(X;Y)$ . But is this property desirable? In analyzing optimal communication, yes - it demonstrates a fundamental limit to the number of bits that can be transmitted through a communication channel. However, we argue that in machine learning settings this property is less appropriate.
Consider an RSA encryption scheme where the public key is known. Given plain text and its corresponding encrypted text $X$ , if we have infinite computation, we can perfectly compute one from the other. Therefore, the plain text and the encrypted text should have identical Shannon mutual information with respect to any label $Y$ we want to predict. However, to any human (or machine learning algorithm), it is certainly easier to predict the label from the plain text than the encrypted text. In other words, decryption increases a human's ability to predict the label: processing increases the "usable information". More formally, denoting $t$ as the decryption algorithm and $\mathcal{V}$ as a class of natural language processing functions, we have that: $I_{\mathcal{V}}(t(X) \to Y) > I_{\mathcal{V}}(X \to Y) \approx 0$ .
As another example, consider the mutual information between an image's pixels and its label. Due to data processing inequality, we cannot expect to use a function to map raw pixels to "features" that have higher mutual information with the label. However, the fundamental principle of representation learning is precisely the ability to learn predictive features β functions of the raw inputs that enable predictions with higher accuracy. Because of this key difference between $\nu$ -information and Shannon information, machine learning practices such as representation learning can be justified in the information theoretic context.
3.3 ON THE ASYMMETRY OF PREDICTIVE $\nu$ -INFORMATION
$\mathcal{V}$ -information also captures the intuition that sometimes, it is easy to predict $Y$ from $X$ but not vice versa. In fact, modern cryptography is founded on the assumption that certain functions $h: \mathcal{X} \to \mathcal{Y}$ are one-way, meaning that there exists a polynomial algorithm to compute $h(x)$ but no polynomial algorithm to compute $h^{-1}(y)$ . This means that if $\mathcal{V}$ contains all polynomial-time computable functions, then $I_{\mathcal{V}}(X \to h(X)) \gg I_{\mathcal{V}}(h(X) \to X)$ .
This property is also reasonable in the machine learning context. For example, several important methods for causal discovery (Peters et al., 2017) rely on this asymmetry: if $X$ causes $Y$ , then usually it is easier to predict $Y$ from $X$ than vice versa; another commonly used assumption is that $Y|X$ can be accurately modeled by a Gaussian distribution, while $X|Y$ cannot (Pearl, 2000).
4 PAC GUARANTEES FOR $\nu$ -INFORMATION ESTIMATION
For many practical applications of mutual information (e.g., structure learning), we do not know the joint distribution of $X, Y$ , so cannot directly compute the mutual information. Instead we only have samples ${(x_i, y_i)}_{i=1}^N \sim X, Y$ and need to estimate mutual information from data.
Shannon information is notoriously difficult to estimate for high dimensional random variables. Although non-parametric estimators of mutual information exist (Kriskov et al., 2004; Darbellay & Vajda, 1999; Gao et al., 2017), these estimators do not scale to high dimensions. Several variational estimators for Shannon information have been recently proposed (van den Oord et al., 2018; Nguyen et al., 2010; Belghazi et al., 2018), but have two shortcomings: due to their variational assumptions, their bias/variance tradeoffs are poorly understood and they are still not efficient enough for high dimensional problems. For example, the CPC estimator suffers from large bias, since its estimates saturate at $\log N$ where $N$ is the batch size (van den Oord et al., 2018; Poole et al., 2019); the NWJ estimator suffers from large variance that grows at least exponentially in the ground-truth mutual information (Song & Ermon, 2019). Please see Appendix B for more details and proofs.
On the other hand, $\nu$ -information is explicit about the assumptions (as a feature instead of a bug). $\nu$ -information is also easy to estimate with guarantees if we can bound the complexity of $\nu$ (such as its Radamacher or covering number complexity) As we will show, bounds on the complexity of $\nu$ directly translate to PAC (Valiant, 1984) bounds for $\nu$ -information estimation. In practice, we can efficiently optimize over $\nu$ , e.g., via gradient descent. In this paper we will present the Rademacher complexity version; other complexity measures (such as covering number) can be derived similarly.
Definition 4 (Empirical $\mathcal{V}$ -information). Let $X, Y$ be two random variables taking values in $\mathcal{X}, \mathcal{Y}$ and $\mathcal{D} = {(x_i, y_i)}_{i=1}^N \sim X, Y$ denotes the set of samples drawn from the joint distribution over $\mathcal{X}$ and $\mathcal{Y}$ . $\mathcal{V}$ is a predictive family. The empirical $\mathcal{V}$ -information (under $\mathcal{D}$ ) is the following $\mathcal{V}$ -information under the empirical distribution defined via $\mathcal{D}$ :
Then we have the following PAC bound over the empirical $\mathcal{V}$ -information:
Theorem 1. Assume $\forall f \in \mathcal{V}, x \in \mathcal{X}, y \in \mathcal{Y}, \log fx \in [-B, B]$ . Then for any $\delta \in (0, 0.5)$ with probability at least $1 - 2\delta$ , we have:
where we define the function family $\mathcal{G}_{\mathcal{V}} = {g|g(x,y) = \log fx,f\in \mathcal{V}}$ , and $\Re_N(\mathcal{G})$ denotes the Rademacher complexity of $\mathcal{G}$ with sample number $N$ .
Typically, the Rademacher complexity term satisfies $\Re_{|\mathcal{D}|}(\mathcal{G}_{\mathcal{V}}) = \mathcal{O}(|\mathcal{D}|^{-\frac{1}{2}})$ (Bartlett & Mendelson, 2001; Gao & Zhou, 2016). It's worth noticing that a complex function family $\mathcal{V}$ (i.e., with large Rademacher complexity) could lead to overfitting. On the other hand, an overly-simple $\mathcal{V}$ may not be expressive enough to capture the relationship between $X$ and $Y$ . As an example of the theorem, we provide a concrete estimation bound when $\mathcal{V}$ is chosen to be linear functions mapping $\mathcal{X}$ to the mean of a Gaussian distribution. This was shown in Proposition 1 to lead to the coefficient of determination.
Corollary 1.1. Assume $\mathcal{X} = {x\in \mathbb{R}^{d_x},| x| _2\leq k_x}$ and $\mathcal{Y} = {y\in \mathbb{R}^{d_y},| y| _2\leq k_y}$ . If
Denote $M = (k_{x} + k_{y})^{2} + \log 2\pi$ , then $\forall \delta \in (0,0.5)$ , with probability at least $1 - 2\delta$ :
Similar results can be obtained using other classes of machine learning models with known (Rademacher) complexity.
5 STRUCTURE LEARNING WITH V-INFORMATION
Among many possible applications of $\nu$ -information, we show how to use it to perform structure learning with provable guarantees. The goal of structure learning is to learn a directed graphical model (Bayesian network) or undirected graphical model (Markov network) that best captures the (conditional) independence structure of an underlying data generating process. Structure learning is difficult in general, but if we restrict ourselves to certain set of graphs $G$ , there are efficient algorithms. In particular, the Chow-Liu algorithm (Chow & Liu, 1968) can efficiently learn tree graphs (i.e. $G$ is the set of trees). Chow & Liu (1968) show that the problem can be reduced to:
where $I(X_{i},X_{j})$ is the Shannon mutual information between variables $X_{i}$ and $X_{j}$ . In other words, it suffices to construct the maximal weighted spanning tree where the weight between two vertices is
their Shannon mutual information. Chow & Wagner (1973) show that the Chow-Liu algorithm is consistent, i.e., it recovers the true solution as the dataset size goes to infinity. However, the finite sample behavior of the Chow-Liu algorithm for high dimensional problems is much less studied, due to the difficulty of estimating mutual information. In fact, we show in our experiments that the empirical performance is often poor, even with state-of-the-art estimators. Additionally, methods based on mutual information cannot take advantage of intrinsically asymmetric relationships, which are common for example in gene regulatory networks (Meyer et al., 2007).
To address these issues, we propose a new structure learning algorithm based on $\nu$ -information instead of Shannon information. The idea is that we can associate to each directed edge in $G$ (i.e., each pair of variables) a suitable predictive family $\mathcal{V}_{i,j}$ (cf. Def 1). The main challenge is that we cannot simply replace mutual information with $\nu$ -information in Eq. 6 because $\nu$ -information is asymmetric - we now have to optimize over directed trees:
where $G_{\mathrm{d - tree}}$ is the set of directed trees, and $t(g): \mathbb{N} \to \mathbb{N}$ is the function mapping each non-root node of directed tree $g$ to its parent, and $\mathcal{V}{i,j}$ is the predictive family for random variables $X{i}$ and $X_{j}$ . After estimating $\mathcal{V}$ -information on each edge, we use the Chu-Liu algorithm (Chu & Liu, 1965) to construct the maximal directed spanning tree. This allows us to solve (7) exactly, even though there is a combinatorially large number of trees to consider. Pseudocode is summarized in Algorithm 1 in Appendix. Denote $C(g) = \sum_{i=2}^{m} I_{\mathcal{V}{t(g)(i),i}}(X{t(g)(i)} \to X_i)$ , we show in the following theorem that unlike the original Chow-Liu algorithm, our algorithm has guarantees in the finite samples regime, even in continuous settings:
Theorem 2. Let ${X_i}{i=1}^m$ be the set of $m$ random variables, $\mathcal{D}{i,j}$ (resp. $\mathcal{D}_j$ ) be the set of samples drawn from $P(X_i, X_j)$ (resp. $P(X_j)$ ). Denote the optimal directed tree with maximum expected edge weights sum $C(g)$ as $g^*$ and the optimal directed tree constructed on the dataset $\mathcal{D}$ as $\hat{g}$ . Then with the assumption in theorem 1, for any $\delta \in (0, \frac{1}{2m(m-1)})$ , with probability at least $1 - 2m(m-1)\delta$ , we have:
Theorem 2 shows that the total edge weights of the maximal directed spanning tree constructed by algorithm 1 would be close to the optimal total edge weights if the Rademacher term is small. Although larger $C(g)$ does not necessarily lead to better Chow-Liu trees, empirically we find that the optimal tree in the sense of equation (7) is consistent with the optimal tree in equation (6) under commonly used $\mathcal{V}$ .
6 EXPERIMENTAL RESULTS
6.1 STRUCTURE LEARNING WITH CONTINUOUS HIGH-DIMENSIONAL DATA
We generate synthetic data using various ground-truth tree structures $g^{*}$ with between 7 and 20 variables, where each variable is 10-dimensional. We use Gaussians, Exponentials, and Uniforms as ground truth edge-conditionals. We use $\mathcal{V}$ -information(Gaussian) and $\mathcal{V}$ -information(Logistic) to denote Algorithm 1 with two different $\mathcal{V}$ families. Please refer to Appendix D.1 for more details. We compare with the original Chow-Liu algorithm equipped with state-of-the-art mutual information estimators: CPC (van den Oord et al., 2018), NWJ (Nguyen et al., 2010) and MINE (Belghazi et al., 2018), with the same neural network architecture as the $\mathcal{V}$ -families for fair comparison. All the experiments are repeated for 10 times. As a performance metric, we use the wrong-edges-ratio (the ratio of edges that are different from ground truth) as a function of the amount of training data.
We show two illustrative experiments in figure 1a; please refer to Appendix D.1 for all simulations. We can see that although the two $\nu$ -families used are misspecified with respect to the true underlying (conditional) distributions, the estimated Chow-Liu trees are much more accurate across all data regimes, with CPC (blue) being the best alternative. Surprisingly, $\nu$ -information(Gaussian) works consistently well in all cases and only requires about 100 samples to recover the ground-truth Chow-Liu tree in simulation-A.

(a) Chow-Liu tree Construction

(c) $\mathcal{V}$ -information of frames
Figure 1: (a) The expected wrong-edges-ratio of algorithm 1 with different $\mathcal{V}$ and other mutual information estimators-based algorithms from sample size 10 to $5\times 10^{3}$ . (b) AUC curve for gene regulatory network inference. (c) The predictive $\mathcal{V}$ -information versus frame distance.
6.2 GENE REGULATORY NETWORK INFERENCE
Mutual information between pairs of gene expressions is often used to construct gene regulatory networks. We evaluate $\nu$ -information on the in-silico dataset from the DREAM5 challenge (Marbach et al., 2012) and use the setup of Gao et al. (2017), where 20 genes with 660 datapoints are utilized to evaluate all methods. We compare with state-of-the-art non-parametric Shannon mutual information estimators in this low dimensional setting: KDE, the traditional kernel density estimator; the KSG estimator (Kriskov et al., 2004); the Mixed KSG estimator (Gao et al., 2017) and Partitioning, an adaptive partitioning estimator (Darbellay & Vajda, 1999) implemented by SzabΓ³ (2014). For fair comparison with these low dimensional estimators, we select $\mathcal{V} = {f : f[x] = \mathcal{N}(g(x), \frac{1}{2}), x \in \mathcal{X}; f[\emptyset] = \mathcal{N}(\mu, \frac{1}{2}) | \mu \in \mathrm{range}(g)}$ , where $g$ is a 3-rd order polynomial.
The task is to predict whether a directed edge between genes exists in the ground-truth gene network. We use the estimated mutual information and $\mathcal{V}$ -information for gene pairs as the test statistic to obtain the AUC for various methods. As shown in Figure 1b, our method outperforms all other methods in network inference under different fractions of data used for estimation. The natural information measure in this task is asymmetry since the goal is to find the pairs of genes $(A_{i},B_{i})$ s in which $A_{i}$ regulates $B_{i}$ , thus $\mathcal{V}$ -information is more suitable for such case than mutual information.
6.3 RECOVERING THE ORDER OF VIDEO FRAMES
Let $X_{1}, \dots, X_{20}$ be random variables each representing a frame in videos from the Moving-MNIST dataset, which contains 10,000 sequences each of length 20 showing two digits moving with stochastic dynamics. Can Algorithm 1 be used to recover the natural (causal) order of the frames? Intuitively, predictability should be inversely related with frame distance, thus enabling structure learning. Using a conditional PixelCNN++ (Salimans et al., 2017) as predictive family $\mathcal{V}$ , we shown in Figure 1c that predictive $\mathcal{V}$ -information does indeed decrease with frame distance, despite some fluctuations when the frame distances are large. Using Algorithm 1 to construct a Chow-Liu tree, we find that the tree perfectly recovers the relative order of the frames.
We also generate a Deterministic-Moving-MNIST dataset, where digits move according to deterministic dynamics. From the perspective of Shannon mutual information, every pair of frames has the same mutual information. Hence, standard Chow-Liu tree learning algorithm would fail to discover the natural ordering of the frames (causal structure). In contrast, once we constrain the observer to $\mathrm{PixelCNN}++$ models, algorithm 1 with predictive $\mathcal{V}$ -information can still recover the order of different frames when the frame distances are relatively small (less than 9). Compared to the stochastic dynamics case, $\mathcal{V}$ -information is more irregular with increasing frame distance, since the $\mathrm{PixelCNN}++$ tends to overfit.
6.4 INFORMATION THEORETIC APPROACHES TO FAIRNESS
The goal of fair representation learning is to map inputs $X \in \mathcal{X}$ to a feature space $Z \in \mathcal{Z}$ such that the mutual information between $Z$ and some sensitive attribute $U \in \mathcal{U}$ (such as race or gender) is minimized. The motivation is that using $Z$ (instead of $X$ ) as input we can no longer use the sensitive attributes $U$ to make decisions, thus ensuring some notion of fairness. Existing methods obtain fair representations by optimizing against an "adversarial" discriminator so that the discriminator cannot predict $U$ from $Z$ (Edwards & Storkey, 2015; Louizos et al., 2015; Madras et al., 2018; Song et al., 2018). Under some assumptions on $U$ and $\mathcal{V}$ , we show in Appendix D.2 that these works actually use $\mathcal{V}$ -information minimization as part of their objective, where $\mathcal{V}$ depends on the functional form of the discriminator.
However, it is clear from the $\mathcal{V}$ -information perspective that features trained with $\mathcal{V}_A$ -information minimization might not generalize to $\mathcal{V}_B$ -information and vice versa. To illustrate this, we use a function family $\mathcal{V}j$ as the attacker to extract information from features trained with $I{\mathcal{V}_i}(Z \to U)$ minimization, where all the $\mathcal{V}$ s are neural nets. On three datasets commonly used in the fairness literature (Adult, German, Heritage), previous methods work well at preventing information "leak" against the class of adversary they've been trained on, but fail when we consider different ones. As shown in Figure 3b in Appendix, the diagonal elements in the matrix are usually the smallest in rows, indicating that the attacker function family $\mathcal{V}i$ extracts more information on featured trained with $\mathcal{V}{j(j \neq i)}$ -information minimization. This challenges the generalizability of fair representations in previous works. Please refer to Appendix D.2 for details.
7 RELATED WORK
Alternative definitions of Information Several alternative definitions of mutual information are available in the literature. Renyi entropy and Renyi mutual information (Lenzi et al., 2000) extend Shannon information by replacing KL divergence with $f$ -divergences. However, they have the same difficulty when applied to high dimensional problems as Shannon information.
The line of work most related to ours is the $H$ entropy and $H$ mutual information (DeGroot et al., 1962; GrΓΌnwald et al., 2004), which associate a definition of entropy to every prediction loss. However, there are two key differences. First, literatures in $H$ entropy only consider a few special types of prediction functions that serve unique theoretical purposes; for example, (Duchi et al., 2018) considers the set of all functions on a feature space to prove surrogate risk consistency, and (GrΓΌnwald et al., 2004) only considers the $H$ entropy to prove the duality between maximum entropy and worst-case loss minimization. In contrast, our definition takes a completely different perspective β emphasizing bounded computation and intuitive properties of "usable" information. Furthermore $H$ entropy still suffers from difficulty of estimation in high dimension because the definitions do not restrict to functions with small complexity (e.g. Rademacher complexity).
Mutual information estimation The estimation of mutual information in the machine learning field is often on the continuous underlying distribution. For non-parametric mutual information estimators, many methods have exploited the $3H$ principle to calculate the mutual information, such as the Kernel density estimator (Paninski & Yajima, 2008), k-Nearest-Neighbor estimator and the KSG estimator (Kriskov et al., 2004). However, these non-parametric estimators usually aren't scalable to high dimension. Recently, several works utilize the variational lower bounds of MI to design MI estimator based on deep neural network in order to estimate MI of high dimension continuous random variables (Nguyen et al., 2010; van den Oord et al., 2018; Belghazi et al., 2018).
8 CONCLUSION
We defined and investigated $\nu$ -information, a variational extension to classic mutual information that incorporates computational constraints. Unlike Shannon mutual information, $\nu$ -information attempts to capture usable information, and has very different properties, such as invalidating the data processing inequality. In addition, $\nu$ -information can be provably estimated, and can thus be more effective for structure learning and fair representation learning.
ACKNOWLEDGEMENTS
This research was supported by AFOSR (FA9550-19-1-0024), NSF (#1651565, #1522054, #1733686), ONR, and FLI.
REFERENCES
Peter L. Bartlett and Shahar Mendelson. Rademacher and gaussian complexities: Risk bounds and structural results. J. Mach. Learn. Res., 3:463-482, 2001.
Roberto Battiti. Using mutual information for selecting features in supervised neural net learning. IEEE Transactions on neural networks, 5(4):537-550, 1994.
Mohamed Ishmael Belghazi, Aristide Baratin, Sai Rajeshwar, Sherjil Ozair, Yoshua Bengio, R. Devon Hjelm, and Aaron C. Courville. Mutual information neural estimation. In ICML, 2018.
C Chow and Cong Liu. Approximating discrete probability distributions with dependence trees. IEEE transactions on Information Theory, 14(3):462-467, 1968.
C. K. Chow and Terry J. Wagner. Consistency of an estimate of tree-dependent probability distributions (corresp.). IEEE Trans. Information Theory, 19:369-371, 1973.
Yau Chu and T. Liu. On the shortest arborescence of a directed graph. Scientia Sinica, 14:1396-1400, 1965.
Thomas M. Cover and Joy A. Thomas. Elements of information theory. 1991.
Georges A. Darbellay and Igor Vajda. Estimation of the information by an adaptive partitioning of the observation space. IEEE Trans. Information Theory, 45:1315-1321, 1999.
Morris H DeGroot et al. Uncertainty, information, and sequential experiments. The Annals of Mathematical Statistics, 33(2):404-419, 1962.
John Duchi, Khashayar Khosravi, Feng Ruan, et al. Multiclass classification, information, divergence and surrogate risk. The Annals of Statistics, 46(6B):3246-3275, 2018.
Harrison A Edwards and Amos J. Storkey. Censoring representations with an adversary. CoRR, abs/1511.05897, 2015.
Wei Gao and Zhi-Hua Zhou. Dropout rademacher complexity of deep neural networks. Science China Information Sciences, 59(7):072104, 2016.
Weihao Gao, Sreeram Kannan, Sewoong Oh, and Pramod Viswanath. Estimating mutual information for discrete-continuous mixtures. In NIPS, 2017.
Peter D GrΓΌnwald, A Philip Dawid, et al. Game theory, maximum entropy, minimum discrepancy and robust bayesian decision theory. the Annals of Statistics, 32(4):1367-1433, 2004.
Edwin T Jaynes. On the rationale of maximum-entropy methods. Proceedings of the IEEE, 70(9): 939-952, 1982.
Sham M. Kakade, Karthik Sridharan, and Ambuj Tewari. On the complexity of linear prediction: Risk bounds, margin bounds, and regularization. In NIPS, 2008.
Diederik P. Kingma and Max Welling. Auto-encoding variational bayes. CoRR, abs/1312.6114, 2013.
Alexander Kraskov, Harald StΓΆgbauer, and Peter Grassberger. Estimating mutual information. Phys. Rev. E, 69:066138, Jun 2004. doi: 10.1103/PhysRevE.69.066138. URL https://link.aps.org/doi/10.1103/PhysRevE.69.066138.
Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. Deep learning. Nature, 521:436-444, 2015.
Michel Ledoux and Michel Talagrand. Probability in Banach Spaces: isoperimetry and processes. Springer Science & Business Media, 2013.
EK Lenzi, RS Mendes, and LR Da Silva. Statistical mechanics based on renyi entropy. Physica A: Statistical Mechanics and its Applications, 280(3-4):337-345, 2000.
Christos Louizos, Kevin Swersky, Yujia Li, Max Welling, and Richard S. Zemel. The variational fair autoencoder. CoRR, abs/1511.00830, 2015.
David Madras, Elliot Creager, Toniann Pitassi, and Richard S. Zemel. Learning adversarially fair and transferable representations. ArXiv, abs/1802.06309, 2018.
Daniel Marbach, James C. Costello, Robert KΓΌffner, N. Vega, Robert J. Prill, Diogo M Camacho, Kyle R. Allison, Manolis Kellis, James J. Collins, and Gustavo Stolovitzky. Wisdom of crowds for robust gene network inference. In Nature Methods, 2012.
Patrick E. Meyer, Kevin Kontos, FrΓ©dΓ©ric Lafitte, and Gianluca Bontempi. Information-theoretic inference of large transcriptional regulatory networks. In EURASIP J. Bioinformatics and Systems Biology, 2007.
XuanLong Nguyen, Martin J. Wainwright, and Michael I. Jordan. Estimating divergence functionals and the likelihood ratio by convex risk minimization. IEEE Transactions on Information Theory, 56:5847-5861, 2010.
Liam Paninski and Masanao Yajima. Undersmoothed kernel entropy estimators. IEEE Transactions on Information Theory, 54:4384-4388, 2008.
Rafael Pass and Abhi Shelat. A course in cryptography. 2010.
Judea Pearl. Causality: Models, reasoning, and inference. 2000.
Jonas Peters, Dominik Janzing, and Bernhard SchΓΆlkopf. Elements of causal inference: foundations and learning algorithms. MIT press, 2017.
Ben Poole, Sherjil Ozair, Aaron van den Oord, Alexander A Alemi, and George Tucker. On variational bounds of mutual information. arXiv preprint arXiv:1905.06922, 2019.
Rajesh Ranganath, Sean Gerrish, and David M. Blei. Black box variational inference. In AISTATS, 2013.
Tim Salimans, Andrej Karpathy, Xi Chen, and Diederik P. Kingma. PixelCNN++: Improving the pixel-cnn with discretized logistic mixture likelihood and other modifications. ArXiv, abs/1701.05517, 2017.
Claude E. Shannon and Warren Weaver. The mathematical theory of communication. 1948.
Jiaming Song and Stefano Ermon. Understanding the limitations of variational mutual information estimators. arXiv preprint arXiv:1910.06222, 2019.
Jiaming Song, Pratyusha Kalluri, Aditya Grover, Shengjia Zhao, and Stefano Ermon. Learning controllable fair representations. In AISTATS, 2018.
ZoltΓ‘n SzabΓ³. Information theoretical estimators toolbox. J. Mach. Learn. Res., 15:283-287, 2014.
Leslie G Valiant. A theory of the learnable. Communications of the ACM, 27(11):1134-1142, 1984.
AΓ€ron van den Oord, Yazhe Li, and Oriol Vinyals. Representation learning with contrastive predictive coding. ArXiv, abs/1807.03748, 2018.
Martin J Wainwright, Michael I Jordan, et al. Graphical models, exponential families, and variational inference. Foundations and Trends in Machine Learning, 1(1-2):1-305, 2008.
A PROOFS
A.1 PROOF OF PROPOSITION 1
Proposition 1. For $\mathcal{V}$ -entropy and $\mathcal{V}$ -information, we have
- Let $\Omega$ be as in Def. 1. Then $H_{\Omega}(Y)$ is the Shannon entropy, $H_{\Omega}(Y \mid X)$ is the Shannon conditional entropy, and $I_{\Omega}(Y \rightarrow X)$ is the Shannon mutual information.
- Let $\mathcal{V} = \mathbb{R}^d$ and $\mathcal{V} = {f:{\varnothing } \to P_{\mu}\mid \mu \in \mathbb{R}^{d}}$ , where $P_{\mu}$ is the distribution with density $y\mapsto \frac{1}{Z} e^{-| y - \mu | _2}$ where $Z = \int e^{-| y - \mu | _2}dy$ , then the $\mathcal{V}$ -entropy of a random variable $Y$ equals its mean absolute deviation, up to an additive constant.
- Let $\mathcal{V} = \mathbb{R}^d$ and $\mathcal{V} = {f:{\emptyset } \to \mathcal{N}(\mu ,\Sigma)\mid \mu \in \mathbb{R}^d,\Sigma = 1 / 2I_{d\times d}}$ , then the $\mathcal{V}$ -entropy of a random variable $Y$ equals the trace of its covariance $\operatorname {tr}(\operatorname {Cov}(Y))$ , up to an additive constant.
- Let $\mathcal{V} = {f:{\varnothing } \to Q_{\mathbf{t},\theta},\theta \in \Theta }$ , where $Q_{\mathbf{t},\theta}$ is a distribution in a minimal exponential family with sufficient statistics $\mathbf{t}:\mathcal{V}\rightarrow \mathbb{R}^d$ and set of natural parameters $\Theta$ . For a random variable $Y$ with expected sufficient statistics $\mu_Y = \mathbb{E}[\mathbf{t}(Y)]$ , the $\mathcal{V}$ -entropy of $Y$ is the maximum Shannon entropy over all random variables $\hat{Y}$ with identical expected sufficient statistics, i.e. $\mathbb{E}[\mathbf{t}(\hat{Y})] = \mu_Y$ .
- Let $\mathcal{V} = \mathbb{R}^d$ , $\mathcal{X}$ be any vector space, and $\mathcal{V} = {f : x \mapsto \mathcal{N}(\phi(x), \Sigma), x \in \mathcal{X}; \emptyset \mapsto \mathcal{N}(\mu, \Sigma) | \mu \in \mathbb{R}^d; \Sigma = 1/2I_{d \times d}, \phi \in \Phi}$ , where $\Phi$ is the set of linear functions ${\phi : \mathcal{X} \to \mathbb{R}^d}$ , then $\mathcal{V}$ -information $I_{\mathcal{V}}(X \to Y)$ equals the (unnormized) maximum coefficient of determination $R^2 \cdot \operatorname{tr}(\operatorname{Cov}(Y))$ for linear regression.
Proof. (1)
Let $P_{Y|x}$ denote the density function of random variable $Y$ conditioned on $X = x$ (we denote this random variable as $Y \mid x$ ).
where infimum is achieved for $f$ where $f[x] = P_{Y|x}$ and $H$ is the Shannon (conditional) entropy. The same proof technique can be used to show that $H_{\Omega}(Y) = H(Y)$ , with the infimum achieved by $f$ where $f[\varnothing] = P_{Y}$ . Hence we have
(2)
where MAD denotes mean absolute deviation $\mathbb{E}_{y\sim Y}\left[| y - \mathbb{E}[Y]| _2\right]$
(3)
(4) The density function of an exponential family distribution with sufficient statistics $\mathbf{t}$ is $y\mapsto$ $\exp (\theta \cdot \mathbf{t}(y) - A(\theta))$ where $A(\theta)$ is the partition function.
where $A^{*}$ is the Fenchel dual of the log-partition function $A(\theta)$ . Under mild conditions (Wainwright et al., 2008)
where $P_{\mu}$ is the maximum entropy distribution out of all distributions satisfying $\mathbb{E}{y\sim P{\mu}}[\mathbf{t}(y)] = \mu$ (Jaynes, 1982), and $H(\cdot)$ is the Shannon entropy.
(5) Assume random variable $Y \in \mathbb{R}^d$ , $\mathcal{V} = {f : x \mapsto \mathcal{N}(\phi(x), \Sigma), x \in \mathcal{X}; \emptyset \mapsto \mathcal{N}(\mu, \Sigma) | \mu \in \mathbb{R}^d; \Sigma = \frac{1}{2} I_{d \times d}; \phi \in \Phi}$ . Then the $\mathcal{V}$ -information from $X$ to $Y$ is
A.2 PROOF OF PROPOSITION 2
Proposition 2. Let $Y$ and $X$ be any random variables on $\mathcal{V}$ and $\mathcal{X}$ , and $\mathcal{V}$ and $\mathcal{U}$ be any predictive families, then we have
- Monotonicity: If $\mathcal{V} \subseteq \mathcal{U}$ , then $H_{\mathcal{V}}(Y) \geq H_{\mathcal{U}}(Y)$ , $H_{\mathcal{V}}(Y \mid X) \geq H_{\mathcal{U}}(Y \mid X)$ .
- Non-Negativity: $I_{\mathcal{V}}(X \to Y) \geq 0$ .
- Independence: If $X$ is independent of $Y$ , $I_{\mathcal{V}}(X \to Y) = I_{\mathcal{V}}(Y \to X) = 0$ .
Proof. (1)
The inequalities (14) and (15) are because we are taking the infimum over a larger set.
(2)
Denote $\mathcal{V}_{\emptyset} \subset \mathcal{V}$ as the subset of $f$ that satisfy $f[x] = f[\emptyset], \forall x \in \mathcal{X}$ .
Therefore
(3)
Denote $\mathcal{V}_{\emptyset} \subset \mathcal{V}$ as the subset of $f$ that satisfy $f[x] = f[\emptyset], \forall x \in \mathcal{X}$ .
Therefore $I_{\mathcal{V}}(Y \to X) = H_{\mathcal{V}}(Y) - H_{\mathcal{V}}(Y|X) \leq 0$ . Combined with the Proposition 2.2 that $I_{\mathcal{V}}(X \to Y)$ must be non-negative, $I_{\mathcal{V}}(X \to Y)$ must be 0.
A.3 PROOF OF THEOREM 1
Theorem 1. Assume $\forall f \in \mathcal{V}, x \in \mathcal{X}, y \in \mathcal{Y}, \log fx \in [-B, B]$ . Then for any $\delta \in (0, 0.5)$ with probability at least $1 - 2\delta$ , we have:
where we define the function family $\mathcal{G}_{\mathcal{V}} = {g|g(x,y) = \log fx,f\in \mathcal{V}}$ , and $\Re_N(\mathcal{G})$ denotes the Rademacher complexity of $\mathcal{G}$ with sample number $N$ .
Before proving theorem 1, we introduce two lemmas. Proofs for these Lemmas follow the same strategy as theorem 8 in Bartlett & Mendelson (2001):
Lemma 3. Let $X, Y$ be two random variables taking values in $\mathcal{X}, \mathcal{Y}$ and $\mathcal{D}$ denotes the set of samples drawn from the joint distribution over $\mathcal{X} \times \mathcal{Y}$ . Assume $\forall f \in \mathcal{V}, x \in \mathcal{X}, y \in \mathcal{Y}, \log fx \in [-B, B]$ . Take $\hat{f} = \operatorname*{arg\min}{f \in \mathcal{V}} \frac{1}{|\mathcal{D}|} \sum{x_i, y_i \in \mathcal{D}} -\log fx_i$ , then $\forall \delta \in (0, 1)$ , with probability at least $1 - \delta$ , we have:
Proof. We apply McDiarmid's inequality to the function $\Phi$ defined for any sample $\mathcal{D}$ by
Let $\mathcal{D}$ and $\mathcal{D}'$ be two samples differing by exactly one point, then since the difference of suprema does not exceed the supremum of the difference and $\forall f \in \mathcal{V}, x \in \mathcal{X}, y \in \mathcal{Y}, \log fx \in [-B, B]$ , we have:
then by McDiarmid's inequality, for any $\delta \in (0,1)$ , with probability at least $1 - \delta$ , the following holds:
Then we bound the $\mathbb{E}_{\mathcal{D}}[\Phi (\mathcal{D})]$ term:
where $\sigma_{i}$ s are Rademacher variables that is uniform in ${-1, + 1}$ . Inequality (22) follows from the convexity of sup, inequality (24) follows from the symmetrization argument for $\ell_1$ norm for Rademacher random variables (Ledoux & Talagrand (2013), Section 6.1), inequality (21) follows from the convexity of $|x - c|$ . (27) follows from the definition of $\mathcal{G}$ and Rademacher complexity.
Finally, combining inequality (18) and (27) yields for all $f \in \mathcal{V}$ , with probability at least $1 - \delta$
In particular, the inequality holds for $\hat{f} = \arg \min_{f\in \mathcal{V}}\frac{1}{|\mathcal{D}|}\sum_{x_i,y_i\in \mathcal{D}} - \log fx_i$ and $\tilde{f} = \arg \min_{f\in \mathcal{V}}\mathbb{E}_{x,y\sim X,Y}\left[-\log fx\right]$ . Then we have:
Hence the bound (16) holds.
Similar bounds can be derived for $H_{\mathcal{V}}(Y)$ when we choose the domain of $x$ to be $\mathcal{X} = {\varnothing}$ :
Lemma 4. Let $Y$ be a random variable taking values in $\mathcal{V}$ and $\mathcal{D}$ denotes the set of samples drawn from the underlying distribution $P(Y)$ . Assume $\forall f \in \mathcal{V}, y \in \mathcal{V}, \log f\varnothing \in [-B, B]$ . Take $\hat{f} = \arg \min_{f \in \mathcal{V}} \frac{1}{|\mathcal{D}|} \sum_{x_i, y_i \in \mathcal{D}} -\log f\varnothing$ , then for any $\delta \in (0, 1)$ , with probability at least $1 - \delta$ , we have:
where $\mathcal{G}_{\mathcal{V}^{\emptyset}} = {g|g(y) = \log f\emptyset,f\in \mathcal{V}}$
Proof. The first inequality (29) can be derived similarly as Lemma 3. Since $\mathcal{V}$ is a predictive family, hence there exists a function $h:\mathcal{V}\to \mathcal{V}$ , such that $h(f) = f^{\prime}$ and $\forall x\in \mathcal{X},f^{\prime}[x] = f[\varnothing ]$
The inequality (31) holds because of $h(\mathcal{V}) \subseteq \mathcal{V}$ .
Now we prove theorem 1:
Theorem 1. Assume $\forall f \in \mathcal{V}, x \in \mathcal{X}, y \in \mathcal{Y}, \log fx \in [-B, B]$ , for any $\delta \in (0, 0.5)$ , with probability at least $1 - 2\delta$ , we have:
Proof. Define $\hat{f} = \underset{f\in \mathcal{V}}{\arg \min}\sum_{x_i,y_i\in \mathcal{D}} - \log fx_i$ and $\hat{f}{\emptyset} = \underset{f\in \mathcal{V}}{\arg \min}\sum{y_i\in \mathcal{D}} - \log f\emptyset$ . Using the triangular inequality we have:
For simplicity let
and
With inequality (32), Lemma 3 and Lemma 4, we have:
Hence we have:
which completes the proof.
A.4 PROOF OF COROLLARY 1.1
Corollary 1.1. Assume $\mathcal{X} = {x\in \mathbb{R}^{d_x},| x| _2\leq k_x}$ and $\mathcal{V} = {y\in \mathbb{R}^{d_y},| y| _2\leq k_y}$ . If
Denote $M = (k_{x} + k_{y})^{2} + \log 2\pi$ , then $\forall \delta \in (0, 0.5)$ , with probability at least $1 - 2\delta$ :
The proof is an adaptation of the proof for theorem 3 in Kakade et al. (2008).
Proof. From theorem 1 we have:
In the following $| (W,b)| _2$ is the matrix 2-norm of $(W,b)$ , then the Rademacher term can be bounded as follows:
The second term in RHS can be bounded as follows:
The first term in RHS can be bounded as follows:
The inequalities (36) and (35) follow the same proof in (34).
Hence we have:
In this example, we can bound the upper bound of functions $g \in \mathcal{G}_{\mathcal{V}}$ by
Combining inequality (38) we arrive at the theorem.
A.5 PROOF OF THEOREM 2
Theorem 2. Let ${X_i}{i=1}^m$ be the set of $m$ random variables, $\mathcal{D}{i,j}$ (resp. $\mathcal{D}_j$ ) be the set of samples drawn from $P(X_i, X_j)$ (resp. $P(X_j)$ ). Denote the optimal directed tree with maximum expected edge weights sum $C(g)$ as $g^*$ and the optimal directed tree constructed on the dataset $\mathcal{D}$ as $\hat{g}$ . Then with the assumption in theorem 1, for any $\delta \in (0, \frac{1}{2m(m-1)})$ , with probability at least $1 - 2m(m-1)\delta$ , we have:
Proof. Let $C_{\mathcal{D}}(g^{})$ be the estimated sum of edge weights on dataset $\mathcal{D}$ of the tree $g^{}$ , i.e.,
where $t(g):\mathbb{N}\to \mathbb{N}$ is the function mapping each non-root node of directed tree $g$ to its parent. The same notation for tree $\hat{g}$ . Let
be the maximum absolute estimation error of single edge weight. By the definition of $\epsilon$ we have $\forall g, |C(\hat{g}) - C_D(\hat{g})| \leq (m - 1)\epsilon$ , then:
From lemma 4 and lemma 3 we have:
Hence
Then combining inequality (39) and (40) we arrive at the result.
B ANALYSIS OF APPROXIMATE ESTIMATORS FOR SHANNON INFORMATION
We consider two approximate estimators for Shannon information. The first is the CPC (or InfoNCE in Poole et al. (2019)) estimator $(I_{\mathrm{CPC}})$ proposed by van den Oord et al. (2018):
where the expectation is over $\mathbf{N}$ independent samples form the joint distribution $\prod_{i} p(x_{i}, y_{i})$ .
The second is the NWJ estimator $(I_{\mathrm{NWJ}})$ proposed by Nguyen et al. (2010):
In both cases, $f_{\theta}$ is a parameterized function, and the objectives are to maximize these lower bounds parameterized by $\theta$ to approximate mutual information. Ideally, with sufficiently flexible models and data, we would be able recover the true mutual information. However, these ideal cases does not carry over to practical scenarios.
For $I_{\mathrm{CPC}}$ , van den Oord et al. (2018) show that $I_{\mathrm{CPC}}$ is no larger than $\log N$ , where $N$ is the batch size. This means that the $I_{\mathrm{CPC}}$ estimator will incur large bias when $I(X;Y) \geq \log N$ . We provide a proof for completeness as follows.
Proposition 3. $\forall f_{\theta}:\mathcal{X}\times \mathcal{Y}\to \mathbb{R}^{+},$
Proof. We have:
which completes the proof.
For NWJ, we note that the $I_{\mathrm{NWJ}}$ involves a term denoted as $\mathbb{E}{x,y\sim p(x)p(y)}\left[e^{f{\theta}(x,y)}\right] / e$ , which could be dominated by rare data-points that have high $f_{\theta}$ values. Intuitively, this would make it a poor mutual information estimator by optimizing $\theta$ . The NWJ estimator may suffer from high variance when the estimator is optimal (Song & Ermon, 2019), this is also empirically observed in Poole et al. (2019). We provide a proof for completeness as follows.
Proposition 4. Assume that $f_{\theta}$ achieves the optimum value for $I_{\mathrm{NWJ}}$ . Then the variance of the empirical NWJ estimator satisfies $\operatorname{Var}\left(\hat{I}_{\mathrm{NWJ}}\right) \geq \frac{e^{I(X;Y)} - 1}{N}$ , where
is the empirical NWJ estimator with $N$ i.i.d. samples ${(x_i, y_i)}_{i=1}^N$ from $p(x, y)$ and $N$ i.i.d. samples ${(\bar{x}_i, \bar{y}i)}{i=1}^N$ from $p(x)p(y)$ .
Proof. Let us denote $z_{i} = \frac{p(x_{i},y_{i})}{p(x_{i})p(y_{i})}$ . Clearly $\mathbb{E}_{p(x)p(y)}[z_i] = 1$ . Then we have:
where we use Jensen's inequality for $\log$ at the last step.
From Nguyen et al. (2010), we have:
for all $x, y$ . Since ${(x_i, y_i)}_{i=1}^N$ (resp. ${(\bar{x}_i, \bar{y}i)}{i=1}^N$ ) are $N$ datapoints independently sampled from the distribution $p(x, y)$ (resp. $p(x)p(y)$ ), we have
which completes the proof.
Algorithm 1 Construct Chow-Liu Trees with $\mathcal{V}$ -Information
Require: $\mathcal{D} = {\hat{X}i}{i=1}^m$ , with each $\hat{X}i$ being a set of datapoints sampled from the underlying distribution of random variable $X_i$ . The set of function families ${\mathcal{V}{i,j}}{i,j=1,i \neq j}$ between all the nodes.
1: for $i = 1, \ldots, m$ do
2: for $j = 1, \ldots, m$ do
3: if $i \neq j$ then
4: Calculate the edge weight: $e{i \rightarrow j} = \hat{I}{\mathcal{V}{i,j}}(X_i \rightarrow X_j; {\hat{X}i, \hat{X}j})$ .
5: end if
6: end for
7: end for
8: Construct the fully connected graph $G = (V, E)$ , with node set $V = (X_1, \ldots, X_m)$ and edge set $E = {e{i \rightarrow j}}{i,j=1,i \neq j}$ .
9: Construct the maximal directed spanning tree $g$ on $G$ by Chow-Liu algorithm, where mutual information is replaced by $\mathcal{V}$ -information.
10: return $g$
C THE NEW ALGORITHM FOR CHU-LIU TREE CONSTRUCTION
See Algorithm 1; $\hat{I}{\mathcal{V}{i,j}}(X_i\to X_j;{\hat{X}_i,\hat{X}_j})$ denotes the empirical $\nu$ -information.
D DETAILED EXPERIMENTS SETUP
D.1 CHU-LIUTREECONSTRUCTION
Figure 2 shows the Chu-Liu tree construction of Simulation-1~Simulation-6. The Simulation-A and Simulation-B in the main body correspond to Simulation-1 and Simulation-4.
Simulation-1 $\sim$ Simulation-3
The ground-truth Chu-Liu tree is a star tree (i.e. all random variables are conditionally independent given $X_{1}$ ). We conduct all experiments for 10 times, each time with random simulated orthogonal matrices ${W_i}{i=2}^{20}$ . Simulation-1: $X{1} \sim \mathcal{U}(0,10)$ and $X_{i} \mid X_{1} \sim \mathcal{N}(W_{i}X_{1},6I), (2 \leq i \leq 20)$ ; Simulation-2: $X_{1} \sim \mathcal{U}(0,10)$ and $X_{i} \mid X_{1} \sim W_{i}\mathcal{E}(X_{1} + \epsilon_{i}), (2 \leq i \leq 20), \epsilon_{i} \sim \mathcal{E}(0.1)$ ; Simulation-3 is a mixed version: $X_{1} \sim \mathcal{U}(0,10), X_{i} \mid X_{1} \sim \frac{1}{2}\mathcal{N}(W_{i}X_{1},6I) + \frac{1}{2}W_{i}\mathcal{E}(X_{1} + \epsilon_{1}), (2 \leq i \leq 20)$ .
Simulation-4 $\sim$ Simulation-6 :
The ground-truth Chu-Liu tree is a tree of depth two. We conduct all experiments for 10 times, each time with random simulated orthogonal matrices ${W_i}_{i=2}^7$ . Simulation-4: $X_1 \sim \mathcal{U}(0,10)$ , $X_i \mid X_1 \sim \mathcal{N}(W_iX_1,2I)(i = 2,3)$ , $X_i \mid X_2 \sim \mathcal{N}(W_iX_2,2I)(i = 4,5)$ , $X_i \mid X_3 \sim \mathcal{N}(W_iX_3,2I)(i = 6,7)$ ; Simulation-5: $X_1 \sim \mathcal{U}(0,10)$ , $X_i \mid X_1 \sim \mathcal{E}(X_1 + \epsilon_i)(i = 2,3)$ , $X_i \mid X_2 \sim W_i\mathcal{E}(X_2 + \epsilon_i)(i = 4,5)$ , $X_i \mid X_3 \sim W_i\mathcal{E}(X_3 + \epsilon_i)(i = 6,7)$ , $\epsilon_i \sim \mathcal{E}(0.1)$ ; Simulation-6 is a mixed version: $X_1 \sim \mathcal{U}(0,10)$ , $X_i \mid X_1 \sim W_i\mathcal{E}(X_1 + \epsilon_i)(i = 2,3)$ , $X_i \mid X_2 \sim \mathcal{N}(W_iX_2,2I)(i = 4,5)$ , $X_i \mid X_3 \sim \mathcal{N}(W_iX_3,2I)(i = 6,7)$ , $\epsilon_i \sim \mathcal{E}(0.1)$ .
D.2 FAIRNESS
We can adapt the $\mathcal{V}$ -information perspective to fairness. Denote the random variable that represents sensitive data and the representation as $U$ and $Z$ respectively. Assume $U$ is discrete and $\mathcal{V}$ belongs to predictive family 1. Then we have $H_{\mathcal{V}}(U) = H(U)$ as long as $\mathcal{V}$ has softmax on the top and belongs to predictive family. In this case, minimizing $I_{\mathcal{V}}(Z \to U)$ equals to minimize $-H_{\mathcal{V}}(Y|X)$ . Let the joint distribution of $Z$ and $U$ be parameterized by $\phi$ . Hence the final objective is:
In Edwards & Storkey (2015); Madras et al. (2018); Louizos et al. (2015); Song et al. (2018), functions in $\mathcal{V}$ are parameterized by a discriminator.
Figure 2: Chu-Liu Tree Construction: The expected wrong-edges-ratio of algorithm 1 with different $\mathcal{V}$ and other mutual information estimators-based algorithms from sample size 10 to $5\times 10^{3}$ .
--- 1-information(Gaussian) --- 1-information(Laplacican) MINE CPC NWJ
For the $(F_i, F_j)$ elements described in the main body, please refer to figure 3b. The three datasets are: the UCI Adult dataset2 which has gender as the sensitive attribute; the UCI German credit dataset3 which has age as the sensitive attribute and the Heritage Health dataset4 which has the 18 configurations of ages and gender as the sensitive attribute.
The models in the figure are:
$\mathcal{V}A = {f:\mathcal{Z}\to \mathcal{P}(\mathcal{U})|fz = \sum{(z_i,u_i)\in \mathcal{D}}\frac{e^{|z_i - z|2^2 / h}}{\sum{(z_i,u_i)\in\mathcal{D}}e^{|z_i - z|_2^2 / h}}*\mathbb{I}(u_i = u),h\in \mathbb{R}}$ where $\mathcal{D}$ is the training set.
$\mathcal{V}_B = {f:f[z] = \mathrm{softmax}(g(z))}$ , where $g$ is a two-layer MLP with Relu as the activation function.
$\mathcal{V}_C = {f:f[z] = \mathrm{softmax}(g(z))}$ , where $g$ is a three-layer MLP with LeakyRelu as the activation function.
We further visualize a special case of the $(\mathcal{V}A,\mathcal{V}B)$ pair in figure 3a, where the $\mathcal{V}i = {f:\mathcal{Z}\to$ $\mathcal{P}(\mathcal{U})|fz = \sum{(z_i,u_i)\in \mathcal{D}}\frac{e^{|z_i - z|2^2 / h}}{\sum{(z_i,u_i)\in\mathcal{D}}e^{|z_i - z|2^2 /h}}*\mathbb{I}(u_i = u),h\in \mathbb{R}}$ explicitly makes the features of different sensitivity attributes more evenly spread, and functions in $\nu{B}$ is a simple two layers MLP with softmax at the top. The leaned features by $\nu{A}$ -information minimization appear more evenly spread as expected, however, the attacker functions in $\nu{B}$ can still achieve a high AUC of 0.857.
The $(i,j)$ elements of tables in Figure 3b stand for using function family $\mathcal{V}_i$ to attack features trained with $\mathcal{V}_j$ -information minimization. The diagonal elements in the matrix are usually the smallest in rows, indicating that the attacker function family $\mathcal{V}i$ extracts more information on featured trained with $\mathcal{V}{j(j\neq i)}$ -information minimization.

(b) AUC of predicted sensitive attribute

Figure 3: T-SNE Visualization and AUC of predicted sensitive attribute
E MINIMALITY OF PREDICTIVE FAMILY
Define $\mathcal{V}{\mathcal{X}\to \mathcal{P}(\mathcal{Y})} = {g:\mathcal{X}\to \mathcal{P}(\mathcal{Y})|\exists f\in \mathcal{V},\forall x\in \mathcal{X},g[x] = f[x]}$ . Similarly define $\mathcal{V}{\emptyset \to \mathcal{P}(\mathcal{Y})} = {g:\emptyset \to \mathcal{P}(\mathcal{Y})|\exists f\in \mathcal{V},g[\emptyset ] = f[\emptyset ]}$ . Intuitively, $\mathcal{V}{\mathcal{X}\to \mathcal{P}(\mathcal{Y})}$ (resp. $\mathcal{V}{\emptyset \to \mathcal{P}(\mathcal{Y})}$ ) restricts the domain of functions in $\mathcal{V}$ to $\mathcal{X}$ (resp. $\emptyset$ ).
Non-Negativity As we demonstrated in Proposition 2, optional-ignorance guarantees that information will be non-negative for any $X$ and $Y$ . Conversely, given any discrete $X$ , $Z$ , $\mathcal{V}{\emptyset \to \mathcal{P}(\mathcal{Y})}$ , $\mathcal{V}{\mathcal{X} \to \mathcal{P}(\mathcal{Y})}$ that does not satisfy optional-ignorance, there exists distribution $X$ , $Y$ such that $I_{\mathcal{V}}(X \to Y) < 0$ . Choose $Y \sim f^{}[\emptyset]$ where $f^{}$ is the function that has no corresponding $g \in \mathcal{V}{\mathcal{X} \to \mathcal{P}(\mathcal{Y})}$ that can ignore its inputs. Pick $X$ as the uniform distribution, and note that for all $g \in G$ , there exists some measurable subset $X' \subset X$ on which $g$ will produce a distribution unequal to $f^{*}[\emptyset]$ , and therefore having higher cross entropy. The expected cross entropy expressed in $H{\mathcal{V}{\emptyset \to \mathcal{P}(\mathcal{Y})}}(Y|X)$ is thus higher than in $H{\mathcal{V}{\emptyset \to \mathcal{P}(\mathcal{Y})}}(Y)$ , and $I{\mathcal{V}}(X \to Y) < 0$ . Thus, if the function class does not satisfy optional ignorance, then the $\mathcal{V}$ -information could be negative.
Independence Given any discrete $X, Y$ , $\mathcal{V}{\emptyset \to \mathcal{P}(\mathcal{Y})}$ , $\mathcal{V}{\mathcal{X} \to \mathcal{P}(\mathcal{Y})}$ that does not satisfy optional-ignorance, there exists an independent $X, Y$ such that $I_{\mathcal{V}}(X \to Y) > 0$ . Choose $Y$ such that the distribution $P_{Y}$ can be expressed as $g[x]$ for some $x \in X$ , $g \in \mathcal{V}{\mathcal{X} \to \mathcal{P}(\mathcal{Y})}$ , but cannot be expressed by any $f \in \mathcal{V}{\emptyset \to \mathcal{P}(\mathcal{Y})}$ . Let $X$ be the distribution with all its mass on $x$ ; note that the cross entropy of $P_{Y}$ with $g[x]$ will be zero, and is less than that of the function $f[\emptyset]$ (because $f[\emptyset]$ and $P_{Y}$ differs on a measurable subset, the cross entropy will be positive). Thus, if the function class does not satisfy optional ignorance, then the $\mathcal{V}$ -information does not take value 0 when the two distributions are independent.
F LIMITATIONS AND FUTURE WORK
$\nu$ -information is empirically useful, has several intuitive theoretical properties, but exhibits certain limitations. For example, Shannon information can be manipulated with certain additive algebra (e.g. $H(X,Y) = H(X) + H(Y \mid X)$ ), while the same does not hold true for general $\nu$ -Information. However, this could be possible if we choose $\nu$ to be a mathematically simple set, such as the set of polynomial time computable functions. It would be interesting to find special classes of $\nu$ -Information where additional theoretical development is possible.
Another interesting direction is better integration of $\nu$ -Information with machine learning. The production of usable information (representation learning), acquisition of usable information (active learning) and exploitation of usable information (classification and reinforcement learning) could potentially be framed in a similar $\nu$ -information-theoretic manner. It is interesting to see whether fruitful theories can arise from these analyses.


















