{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T21:16:28Z","timestamp":1768425388768,"version":"3.49.0"},"publisher-location":"Cham","reference-count":67,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031732317","type":"print"},{"value":"9783031732324","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73232-4_1","type":"book-chapter","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T06:01:53Z","timestamp":1727589713000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Is Retain Set All You Need in\u00a0Machine Unlearning? Restoring Performance of\u00a0Unlearned Models with\u00a0Out-of-Distribution Images"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6751-3407","authenticated-orcid":false,"given":"Jacopo","family":"Bonato","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7950-7370","authenticated-orcid":false,"given":"Marco","family":"Cotogni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0865-5891","authenticated-orcid":false,"given":"Luigi","family":"Sabetta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"1_CR1","unstructured":"Image captioning dataset, random images. https:\/\/www.kaggle.com\/datasets\/shamsaddin97\/image-captioning-dataset-random-images\/data. Accessed 14 Feb 2024"},{"key":"1_CR2","first-page":"1179","volume":"34","author":"K Bibas","year":"2021","unstructured":"Bibas, K., Feder, M., Hassner, T.: Single layer predictive normalized maximum likelihood for out-of-distribution detection. Adv. Neural. Inf. Process. Syst. 34, 1179\u20131191 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Bourtoule, L., et al.: Machine unlearning. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 141\u2013159. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00019"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Chen, M., Gao, W., Liu, G., Peng, K., Wang, C.: Boundary unlearning: rapid forgetting of deep networks via shifting the decision boundary. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 7766\u20137775, June 2023","DOI":"10.1109\/CVPR52729.2023.00750"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Chen, S., Kahla, M., Jia, R., Qi, G.J.: Knowledge-enriched distributional model inversion attacks, pp. 16158\u201316167 (2021). https:\/\/doi.org\/10.1109\/ICCV48922.2021.01587","DOI":"10.1109\/ICCV48922.2021.01587"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Chen, Y., Wiesel, A., Eldar, Y.C., Hero, A.O.: Shrinkage algorithms for MMSE covariance estimation. IEEE Trans. Signal Process. 58, 5016\u20135029 (2009). https:\/\/api.semanticscholar.org\/CorpusID:12616083","DOI":"10.1109\/TSP.2010.2053029"},{"key":"1_CR7","unstructured":"Cheng, J., Amiri, H.: Multimodal machine unlearning. arXiv preprint arXiv:2311.12047 (2023)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Chundawat, V.S., Tarun, A.K., Mandal, M., Kankanhalli, M.: Can bad teaching induce forgetting? Unlearning in deep networks using an incompetent teacher. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a037, pp. 7210\u20137217 (2023)","DOI":"10.1609\/aaai.v37i6.25879"},{"key":"1_CR9","unstructured":"Cotogni, M., Bonato, J., Sabetta, L., Pelosin, F., Nicolosi, A.: DUCK: distance-based unlearning via centroid kinematics. arXiv preprint arXiv:2312.02052 (2023)"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"De Lange, M., Tuytelaars, T.: Continual prototype evolution: learning online from non-stationary data streams (2021). https:\/\/doi.org\/10.1109\/ICCV48922.2021.00814","DOI":"10.1109\/ICCV48922.2021.00814"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"issue":"4","key":"1_CR12","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MIS.2020.3000681","volume":"36","author":"M Du","year":"2021","unstructured":"Du, M., Yang, F., Zou, N., Hu, X.: Fairness in deep learning: a computational perspective. IEEE Intell. Syst. 36(4), 25\u201334 (2021). https:\/\/doi.org\/10.1109\/MIS.2020.3000681","journal-title":"IEEE Intell. Syst."},{"key":"1_CR13","unstructured":"Fang, G., et al.: Mosaicking to Distill: knowledge distillation from out-of-domain data. In: Ranzato, M., Beygelzimer, A., Dauphin, Y., Liang, P., Vaughan, J.W. (eds.) Advances in Neural Information Processing Systems, vol.\u00a034, pp. 11920\u201311932. Curran Associates, Inc. (2021). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2021\/file\/63dc7ed1010d3c3b8269faf0ba7491d4-Paper.pdf"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Felps, D.L., et al.: Class Clown: data redaction in machine unlearning at enterprise scale. arXiv preprint arXiv:2012.04699 (2020)","DOI":"10.5220\/0010419600070014"},{"key":"1_CR15","first-page":"7068","volume":"34","author":"S Fort","year":"2021","unstructured":"Fort, S., Ren, J., Lakshminarayanan, B.: Exploring the limits of out-of-distribution detection. Adv. Neural. Inf. Process. Syst. 34, 7068\u20137081 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (2015). https:\/\/api.semanticscholar.org\/CorpusID:207229839","DOI":"10.1145\/2810103.2813677"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Golatkar, A., Achille, A., Soatto, S.: Eternal sunshine of the spotless net: selective forgetting in deep networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9304\u20139312 (2020)","DOI":"10.1109\/CVPR42600.2020.00932"},{"key":"1_CR18","doi-asserted-by":"publisher","unstructured":"Golatkar, A., Achille, A., Soatto, S.: Forgetting outside the box: scrubbing deep networks of information accessible from input-output observations. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.M. (eds.) Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, 23\u201328 August 2020, Proceedings, Part XXIX 16, pp. 383\u2013398. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58526-6_23","DOI":"10.1007\/978-3-030-58526-6_23"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Graves, L., Nagisetty, V., Ganesh, V.: Amnesiac machine learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a035, pp. 11516\u201311524 (2021)","DOI":"10.1609\/aaai.v35i13.17371"},{"key":"1_CR20","unstructured":"Guo, C., Goldstein, T., Hannun, A., Van Der\u00a0Maaten, L.: Certified data removal from machine learning models. In: Proceedings of the 37th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol.\u00a0119, pp. 3832\u20133842. PMLR (2020)"},{"key":"1_CR21","unstructured":"Guo, C., Pleiss, G., Sun, Y., Weinberger, K.Q.: On calibration of modern neural networks. In: International Conference on Machine Learning, pp. 1321\u20131330. PMLR (2017)"},{"key":"1_CR22","doi-asserted-by":"publisher","unstructured":"Han, X., et al.: Continual relation learning via episodic memory activation and reconsolidation (2020). https:\/\/doi.org\/10.18653\/v1\/2020.acl-main.573, https:\/\/aclanthology.org\/2020.acl-main.573","DOI":"10.18653\/v1\/2020.acl-main.573"},{"key":"1_CR23","unstructured":"Hayase, T., Yasutomi, S., Katoh, T.: Selective forgetting of deep networks at a finer level than samples. arXiv preprint arXiv:2012.11849 (2020)"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"1_CR25","unstructured":"Hendrycks, D., Gimpel, K.: A baseline for detecting misclassified and out-of-distribution examples in neural networks. In: International Conference on Learning Representations (2017). https:\/\/openreview.net\/forum?id=Hkg4TI9xl"},{"key":"1_CR26","unstructured":"Hinton, G., Vinyals, O., Dean, J.: Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 (2015)"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Hsu, Y.C., Shen, Y., Jin, H., Kira, Z.: Generalized ODIN: detecting out-of-distribution image without learning from out-of-distribution data. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10951\u201310960 (2020)","DOI":"10.1109\/CVPR42600.2020.01096"},{"key":"1_CR28","unstructured":"Jia, J., et al.: Model sparsity can simplify machine unlearning. In: Annual Conference on Neural Information Processing Systems (2023)"},{"key":"1_CR29","doi-asserted-by":"publisher","unstructured":"Kahla, M., Chen, S., Just, H.A., Jia, R.: Label-only model inversion attacks via boundary repulsion. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 15025\u201315033 (2022). https:\/\/doi.org\/10.1109\/CVPR52688.2022.01462","DOI":"10.1109\/CVPR52688.2022.01462"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Kim, J., Woo, S.S.: Efficient two-stage model retraining for machine unlearning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4361\u20134369 (2022)","DOI":"10.1109\/CVPRW56347.2022.00482"},{"key":"1_CR31","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images (2009)"},{"key":"1_CR32","unstructured":"Kurmanji, M., Triantafillou, P., Hayes, J., Triantafillou, E.: Towards unbounded machine unlearning. In: Thirty-Seventh Conference on Neural Information Processing Systems (2023). https:\/\/openreview.net\/forum?id=OveBaTtUAT"},{"key":"1_CR33","unstructured":"Le, Y., Yang, X.: Tiny ImageNet visual recognition challenge. CS 231N 7(7), 3 (2015)"},{"issue":"1","key":"1_CR34","doi-asserted-by":"publisher","first-page":"17816","DOI":"10.1038\/s41598-017-17876-z","volume":"7","author":"C Leibig","year":"2017","unstructured":"Leibig, C., Allken, V., Ayhan, M.S., Berens, P., Wahl, S.: Leveraging uncertainty information from deep neural networks for disease detection. Sci. Rep. 7(1), 17816 (2017)","journal-title":"Sci. Rep."},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Lin, S., Zhang, X., Chen, C., Chen, X., Susilo, W.: ERM-KTP: knowledge-level machine unlearning via knowledge transfer. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20147\u201320155 (2023)","DOI":"10.1109\/CVPR52729.2023.01929"},{"key":"1_CR36","doi-asserted-by":"publisher","unstructured":"Lin, T.Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) Computer Vision\u2013ECCV 2014: 13th European Conference, Zurich, Switzerland, 6\u201312 September 2014, Proceedings, Part V 13, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Liu, J., Xue, M., Lou, J., Zhang, X., Xiong, L., Qin, Z.: MUter: machine unlearning on adversarially trained models. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 4892\u20134902, October 2023","DOI":"10.1109\/ICCV51070.2023.00451"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Liu, X., et al.: Privacy and security issues in deep learning: a survey. IEEE Access 9, 4566\u20134593 (2021). https:\/\/api.semanticscholar.org\/CorpusID:231423554","DOI":"10.1109\/ACCESS.2020.3045078"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Magdziarczyk, M.: Right to be forgotten in light of regulation (EU) 2016\/679 of the European Parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC. In: 6th International Multidisciplinary Scientific Conference on Social Sciences and Art SGEM 2019, pp. 177\u2013184 (2019)","DOI":"10.5593\/sgemsocial2019V\/1.1\/S02.022"},{"issue":"253","key":"1_CR40","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1080\/01621459.1951.10500769","volume":"46","author":"FJ Massey Jr","year":"1951","unstructured":"Massey, F.J., Jr.: The Kolmogorov-Smirnov test for goodness of fit. J. Am. Stat. Assoc. 46(253), 68\u201378 (1951)","journal-title":"J. Am. Stat. Assoc."},{"key":"1_CR41","unstructured":"Mercuri, S., et al.: An introduction to machine unlearning. arXiv preprint arXiv:2209.00939 (2022)"},{"key":"1_CR42","unstructured":"Neel, S., Roth, A., Sharifi-Malvajerdi, S.: Descent-to-delete: gradient-based methods for machine unlearning. In: Algorithmic Learning Theory, pp. 931\u2013962. PMLR (2021)"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Nguyen, A., Yosinski, J., Clune, J.: Deep neural networks are easily fooled: high confidence predictions for unrecognizable images. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 427\u2013436 (2015)","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"1_CR44","unstructured":"Nguyen, T.T., Huynh, T.T., Nguyen, P.L., Liew, A.W.C., Yin, H., Nguyen, Q.V.H.: A survey of machine unlearning. arXiv preprint arXiv:2209.02299 (2022)"},{"key":"1_CR45","first-page":"68","volume":"23","author":"SL Pardau","year":"2018","unstructured":"Pardau, S.L.: The California consumer privacy act: towards a European-style privacy regime in the United States. J. Tech. L. & Pol\u2019y 23, 68 (2018)","journal-title":"J. Tech. L. & Pol\u2019y"},{"key":"1_CR46","unstructured":"Poppi, S., Poppi, T., Cocchi, F., Cornia, M., Baraldi, L., Cucchiara, R.: Removing NSFW concepts from vision-and-language models for text-to-image retrieval and generation. arXiv preprint arXiv:2311.16254 (2023)"},{"key":"1_CR47","doi-asserted-by":"publisher","unstructured":"Rebuffi, S.A., Kolesnikov, A., Sperl, G., Lampert, C.H.: iCaRL: incremental classifier and representation learning (2017). https:\/\/doi.org\/10.1109\/CVPR.2017.587","DOI":"10.1109\/CVPR.2017.587"},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Rigaki, M., Garcia, S.: A survey of privacy attacks in machine learning. ACM Comput. Surv. 56(4), 1\u201334 (2023)","DOI":"10.1145\/3624010"},{"key":"1_CR49","doi-asserted-by":"crossref","unstructured":"Salem, A., Zhang, Y., Humbert, M., Berrang, P., Fritz, M., Backes, M.: ML-Leaks: model and data independent membership inference attacks and defenses on machine learning models. In: Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS) (2019)","DOI":"10.14722\/ndss.2019.23119"},{"key":"1_CR50","first-page":"18556","volume":"35","author":"A Setlur","year":"2022","unstructured":"Setlur, A., Eysenbach, B., Smith, V., Levine, S.: Adversarial unlearning: reducing confidence along adversarial directions. Adv. Neural. Inf. Process. Syst. 35, 18556\u201318570 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1_CR51","doi-asserted-by":"crossref","unstructured":"Shaik, T.B., Tao, X., Xie, H., Li, L., Zhu, X., Li, Q.: Exploring the landscape of machine unlearning: a comprehensive survey and taxonomy. CoRR (2023)","DOI":"10.1109\/TNNLS.2024.3486109"},{"key":"1_CR52","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318 (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"1_CR53","unstructured":"Sommer, D.M., Song, L., Wagh, S., Mittal, P.: Towards probabilistic verification of machine unlearning. arXiv preprint arXiv:2003.04247 (2020)"},{"key":"1_CR54","unstructured":"Song, L., Mittal, P.: Systematic evaluation of privacy risks of machine learning models (2020)"},{"key":"1_CR55","doi-asserted-by":"crossref","unstructured":"Song, L., Shokri, R., Mittal, P.: Privacy risks of securing machine learning models against adversarial examples. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (2019). https:\/\/api.semanticscholar.org\/CorpusID:165163934","DOI":"10.1145\/3319535.3354211"},{"key":"1_CR56","doi-asserted-by":"crossref","unstructured":"Tarun, A.K., Chundawat, V.S., Mandal, M., Kankanhalli, M.: Fast yet effective machine unlearning. IEEE Trans. Neural Netw. Learn. Syst. (2023)","DOI":"10.1109\/TIFS.2023.3265506"},{"key":"1_CR57","unstructured":"Tiwary, P., Guha, A., Panda, S., et\u00a0al.: Adapt then unlearn: exploiting parameter space semantics for unlearning in generative adversarial networks. arXiv preprint arXiv:2309.14054 (2023)"},{"key":"1_CR58","unstructured":"Tukey, J.W.: Exploratory Data Analysis. Addison-Wesley, London (1977)"},{"key":"1_CR59","unstructured":"Wang, K.C., Fu, Y., Li, K., Khisti, A., Zemel, R., Makhzani, A.: Variational model inversion attacks. Adv. Neural Inf. Process. Syst. 34, 9706\u20139719 (2021). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2021\/file\/50a074e6a8da4662ae0a29edde722179-Paper.pdf"},{"key":"1_CR60","doi-asserted-by":"crossref","unstructured":"Wu, G., Hashemi, M., Srinivasa, C.: PUMA: performance unchanged model augmentation for training data removal. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 8675\u20138682 (2022)","DOI":"10.1609\/aaai.v36i8.20846"},{"key":"1_CR61","unstructured":"Wu, Y., Dobriban, E., Davidson, S.: DeltaGrad: rapid retraining of machine learning models. In: International Conference on Machine Learning, pp. 10355\u201310366. PMLR (2020)"},{"key":"1_CR62","unstructured":"Xu, J., Wu, Z., Wang, C., Jia, X.: Machine unlearning: solutions and challenges. arXiv preprint arXiv:2308.07061 (2023)"},{"key":"1_CR63","doi-asserted-by":"publisher","unstructured":"Yang, Z., Zhang, J., Chang, E.C., Liang, Z.: Neural network inversion in adversarial setting via background knowledge alignment. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 225\u2013240 (2019). https:\/\/doi.org\/10.1145\/3319535.3354261","DOI":"10.1145\/3319535.3354261"},{"key":"1_CR64","doi-asserted-by":"crossref","unstructured":"Yeom, S., Giacomelli, I., Fredrikson, M., Jha, S.: Privacy risk in machine learning: analyzing the connection to overfitting. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), pp. 268\u2013282 (2017). https:\/\/api.semanticscholar.org\/CorpusID:2656445","DOI":"10.1109\/CSF.2018.00027"},{"key":"1_CR65","unstructured":"Yin, Z., Xing, E., Shen, Z.: Squeeze, recover and relabel: dataset condensation at ImageNet scale from a new perspective. In: Advances in Neural Information Processing Systems, vol. 36 (2024)"},{"key":"1_CR66","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Jia, R., Pei, H., Wang, W., Li, B., Song, D.: The secret revealer: generative model-inversion attacks against deep neural networks. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 250\u2013258, June 2020. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00033, https:\/\/doi.ieeecomputersociety.org\/10.1109\/CVPR42600.2020.00033","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"1_CR67","doi-asserted-by":"publisher","unstructured":"Zhao, X., Zhang, W., Xiao, X., Lim, B.: Exploiting explanations for model inversion attacks. In: 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 662\u2013672, October 2021. https:\/\/doi.org\/10.1109\/ICCV48922.2021.00072, https:\/\/doi.ieeecomputersociety.org\/10.1109\/ICCV48922.2021.00072","DOI":"10.1109\/ICCV48922.2021.00072"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73232-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T21:14:48Z","timestamp":1732828488000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73232-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"ISBN":["9783031732317","9783031732324"],"references-count":67,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73232-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"30 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}