{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:25:21Z","timestamp":1772645121493,"version":"3.50.1"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031916717","type":"print"},{"value":"9783031916724","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-91672-4_1","type":"book-chapter","created":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T15:23:44Z","timestamp":1747754624000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["DeepClean: Machine Unlearning on\u00a0the\u00a0Cheap by\u00a0Resetting Privacy Sensitive Weights Using the\u00a0Fisher Diagonal"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0029-2597","authenticated-orcid":false,"given":"Jialei","family":"Shi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9270-1036","authenticated-orcid":false,"given":"Kostis","family":"Gourgoulias","sequence":"additional","affiliation":[]},{"given":"John F","family":"Buford","sequence":"additional","affiliation":[]},{"given":"Sean J","family":"Moran","sequence":"additional","affiliation":[]},{"given":"Najah","family":"Ghalyan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,12]]},"reference":[{"key":"1_CR1","unstructured":"Afonja, T., Bourtoule, L., Chandrasekaran, V., Oore, S., Papernot, N.: Generative extraction of audio classifiers for speaker identification. arXiv preprint arXiv:2207.12816 (2022)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Cao, Y., Yang, J.: Towards making systems forget with machine unlearning. In: 2015 IEEE Symposium on Security and Privacy, pp. 463\u2013480. IEEE (2015)","DOI":"10.1109\/SP.2015.35"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Chundawat, V.S., Tarun, A.K., Mandal, M., Kankanhalli, M.: Can bad teaching induce forgetting? unlearning in deep networks using an incompetent teacher. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a037, pp. 7210\u20137217 (2023)","DOI":"10.1609\/aaai.v37i6.25879"},{"key":"1_CR4","unstructured":"Cummings, R., Desai, D.: The role of differential privacy in gdpr compliance. In: FAT\u201918: Proceedings of the Conference on Fairness, Accountability, and Transparency (2018)"},{"issue":"6","key":"1_CR5","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/MSP.2012.2211477","volume":"29","author":"L Deng","year":"2012","unstructured":"Deng, L.: The mnist database of handwritten digit images for machine learning research. IEEE Signal Process. Mag. 29(6), 141\u2013142 (2012)","journal-title":"IEEE Signal Process. Mag."},{"key":"1_CR6","unstructured":"Dosovitskiy, A., et al.: An image is worth 16x16 words: transformers for image recognition at scale (2021). https:\/\/arxiv.org\/abs\/2010.11929"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Dwork, C., Roth, A., et\u00a0al.: The algorithmic foundations of differential privacy. Found. Trends\u00ae Theor. Comput. Sci. 9(3-4), 211\u2013407 (2014)","DOI":"10.1561\/0400000042"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Dwork, C., Smith, A., Steinke, T., Ullman, J., Vadhan, S.: Robust traceability from trace amounts. In: 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, pp. 650\u2013669. IEEE (2015)","DOI":"10.1109\/FOCS.2015.46"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Golatkar, A., Achille, A., Ravichandran, A., Polito, M., Soatto, S.: Mixed-privacy forgetting in deep networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 792\u2013801. IEEE\/CVF (2021)","DOI":"10.1109\/CVPR46437.2021.00085"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Golatkar, A., Achille, A., Soatto, S.: Eternal sunshine of the spotless net: selective forgetting in deep networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9304\u20139312. IEEE\/CVF (2020)","DOI":"10.1109\/CVPR42600.2020.00932"},{"key":"1_CR11","unstructured":"Guo, T., Guo, S., Zhang, J., Xu, W., Wang, J.: Efficient attribute unlearning: towards selective removal of input attributes from feature representations. arXiv preprint arXiv:2202.13295 (2022)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition (2015)","DOI":"10.1109\/CVPR.2016.90"},{"issue":"8","key":"1_CR13","doi-asserted-by":"publisher","first-page":"e1000167","DOI":"10.1371\/journal.pgen.1000167","volume":"4","author":"N Homer","year":"2008","unstructured":"Homer, N., et al.: Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays. PLoS Genet. 4(8), e1000167 (2008)","journal-title":"PLoS Genet."},{"key":"1_CR14","unstructured":"Jia, J., et al.: Model sparsity can simplify machine unlearning (2024)"},{"key":"1_CR15","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"issue":"13","key":"1_CR16","doi-asserted-by":"publisher","first-page":"3521","DOI":"10.1073\/pnas.1611835114","volume":"114","author":"J Kirkpatrick","year":"2017","unstructured":"Kirkpatrick, J., et al.: Overcoming catastrophic forgetting in neural networks. Proc. Natl. Acad. Sci. 114(13), 3521\u20133526 (2017). https:\/\/doi.org\/10.1073\/pnas.1611835114","journal-title":"Proc. Natl. Acad. Sci."},{"key":"1_CR17","unstructured":"Koh, P.W., Liang, P.: Understanding black-box predictions via influence functions. In: International Conference on Machine Learning, pp. 1885\u20131894. PMLR (2017)"},{"key":"1_CR18","unstructured":"Koh, P.W., Liang, P.: Understanding black-box predictions via influence functions. In: Precup, D., Teh, Y.W. (eds.) Proceedings of the 34th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol.\u00a070, pp. 1885\u20131894. PMLR, 06\u201311 August 2017. https:\/\/proceedings.mlr.press\/v70\/koh17a.html"},{"key":"1_CR19","unstructured":"Krizhevsky, A.: Learning multiple layers of features from tiny images, pp. 32\u201333 (2009). https:\/\/www.cs.toronto.edu\/~kriz\/learning-features-2009-TR.pdf"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Lin, S., Zhang, X., Chen, C., Chen, X., Susilo, W.: Erm-ktp: knowledge-level machine unlearning via knowledge transfer. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 20147\u201320155, June 2023","DOI":"10.1109\/CVPR52729.2023.01929"},{"key":"1_CR21","unstructured":"Liu, Y., Sun, C., Wu, Y., Zhou, A.: Unlearning with fisher masking. arXiv preprint arXiv:2310.05331 (2023)"},{"key":"1_CR22","doi-asserted-by":"publisher","unstructured":"Mehta, R., Pal, S., Singh, V., Ravi, S.: Deep unlearning via randomized conditionally independent hessians. Proc IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit. 2022, 10412\u201310421 (2022). https:\/\/doi.org\/10.1109\/cvpr52688.2022.01017, epub 2022 Sep 27. PMID: 37441105; PMCID: PMC10337718","DOI":"10.1109\/cvpr52688.2022.01017"},{"key":"1_CR23","unstructured":"Mercuri, S., et al.: An introduction to machine unlearning. arXiv preprint arXiv:2209.00939 (2022)"},{"key":"1_CR24","unstructured":"Nguyen, T.T., et al.: A survey of machine unlearning. arXiv preprint arXiv:2209.02299 (2022)"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Shaik, T., Tao, X., Xie, H., Li, L., Zhu, X., Li, Q.: Exploring the landscape of machine unlearning: a survey and taxonomy. arXiv preprint arXiv:2305.06360 (2023)","DOI":"10.1109\/TNNLS.2024.3486109"},{"key":"1_CR26","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. CoRR abs\/1409.1556 (2014), http:\/\/arxiv.org\/abs\/1409.1556"},{"key":"1_CR27","unstructured":"Tarun, A.K., Chundawat, V.S., Mandal, M., Kankanhalli, M.: Deep regression unlearning. In: International Conference on Machine Learning, pp. 33921\u201333939. PMLR (2023)"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Tarun, A.K., Chundawat, V.S., Mandal, M., Kankanhalli, M.: Fast yet effective machine unlearning. IEEE Trans. Neural Netw. Learn. Syst. (2023)","DOI":"10.1109\/TIFS.2023.3265506"},{"key":"1_CR29","unstructured":"Thudi, A., Jia, H., Shumailov, I., Papernot, N.: On the necessity of auditable algorithmic definitions for machine unlearning. In: USENIX Security Symposium (2021). https:\/\/api.semanticscholar.org\/CorpusID:239616091"},{"key":"1_CR30","unstructured":"Wu, Y., Dobriban, E., Davidson, S.: DeltaGrad: rapid retraining of machine learning models. In: III, H.D., Singh, A. (eds.) Proceedings of the 37th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol.\u00a0119, pp. 10355\u201310366. PMLR, 13\u201318 July 2020. https:\/\/proceedings.mlr.press\/v119\/wu20b.html"},{"issue":"1","key":"1_CR31","first-page":"1","volume":"56","author":"H Xu","year":"2023","unstructured":"Xu, H., Zhu, T., Zhang, L., Zhou, W., Yu, P.S.: Machine unlearning: a survey. ACM Comput. Surv. 56(1), 1\u201336 (2023)","journal-title":"ACM Comput. Surv."},{"key":"1_CR32","unstructured":"Xu, J., Wu, Z., Wang, C., Jia, X.: Machine unlearning: solutions and challenges. arXiv:2308.07061v1, https:\/\/doi.org\/10.48550\/arXiv.2308.07061 (2023)"},{"key":"1_CR33","doi-asserted-by":"publisher","unstructured":"Yan, H., Li, X., Guo, Z., Li, H., Li, F., Lin, X.: Arcane: an efficient architecture for exact machine unlearning. In: Raedt, L.D. (ed.) Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22, pp. 4006\u20134013. International Joint Conferences on Artificial Intelligence Organization, July 2022. https:\/\/doi.org\/10.24963\/ijcai.2022\/556, main Track","DOI":"10.24963\/ijcai.2022\/556"},{"issue":"8","key":"1_CR34","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/JBHI.2020.2980262","volume":"24","author":"J Yoon","year":"2020","unstructured":"Yoon, J., Drumright, L.N., van der Schaar, M.: Anonymization through data synthesis using generative adversarial networks (ads-gan). IEEE J. Biomed. Health Inform. 24(8), 2378\u20132388 (2020). https:\/\/doi.org\/10.1109\/JBHI.2020.2980262","journal-title":"IEEE J. Biomed. Health Inform."}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-91672-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T15:23:57Z","timestamp":1747754637000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-91672-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031916717","9783031916724"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-91672-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"12 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}