{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T21:13:01Z","timestamp":1770153181130,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":48,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819564187","type":"print"},{"value":"9789819564194","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6419-4_18","type":"book-chapter","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:16Z","timestamp":1770109096000},"page":"314-332","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Feature Machine Unlearning in\u00a0Diffusion Models"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-1732-2328","authenticated-orcid":false,"given":"Linlin","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3411-7947","authenticated-orcid":false,"given":"Tianqing","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6534-0193","authenticated-orcid":false,"given":"Laiqiao","family":"Qin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8829-4442","authenticated-orcid":false,"given":"Lihua","family":"Yin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1680-2521","authenticated-orcid":false,"given":"Wanlei","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,4]]},"reference":[{"key":"18_CR1","unstructured":"Bao, F., Li, C., Sun, J., Zhu, J.: Why are conditional generative models better than unconditional ones? arXiv preprint arXiv:2212.00362 (2022)"},{"key":"18_CR2","unstructured":"Batzolis, G., Stanczuk, J., Sch\u00f6nlieb, C.B., Etmann, C.: Conditional image generation with score-based diffusion models. arXiv preprint arXiv:2111.13606 (2021)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Cao, Y., Yang, J.: Towards making systems forget with machine unlearning. In: 2015 IEEE Symposium on Security and Privacy, pp. 463\u2013480. IEEE (2015)","DOI":"10.1109\/SP.2015.35"},{"key":"18_CR4","unstructured":"Carlini, N., et al.: Extracting training data from diffusion models. In: 32nd USENIX Security Symposium (USENIX Security 2023), pp. 5253\u20135270 (2023)"},{"key":"18_CR5","unstructured":"Castro, D.C., Tan, J., Kainz, B., Konukoglu, E., Glocker, B.: Morpho-MNIST: quantitative assessment and diagnostics for representation learning. J. Mach. Learn. Res. 20(178) (2019)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Chen, W., Song, D., Li, B.: Trojdiff: Trojan attacks on diffusion models with diverse targets. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4035\u20134044 (2023)","DOI":"10.1109\/CVPR52729.2023.00393"},{"key":"18_CR7","unstructured":"Chen, Y., Ma, X., Zou, D., Jiang, Y.G.: Extracting training data from unconditional diffusion models. arXiv preprint arXiv:2406.12752 (2024)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Chou, S.Y., Chen, P.Y., Ho, T.Y.: How to backdoor diffusion models? In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4015\u20134024 (2023)","DOI":"10.1109\/CVPR52729.2023.00391"},{"key":"18_CR9","first-page":"8780","volume":"34","author":"P Dhariwal","year":"2021","unstructured":"Dhariwal, P., Nichol, A.: Diffusion models beat GANs on image synthesis. Adv. Neural. Inf. Process. Syst. 34, 8780\u20138794 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"18_CR10","unstructured":"Duan, J., Kong, F., Wang, S., Shi, X., Xu, K.: Are diffusion models vulnerable to membership inference attacks? In: International Conference on Machine Learning, pp. 8717\u20138730. PMLR (2023)"},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s12599-020-00650-3","volume":"62","author":"S Feuerriegel","year":"2020","unstructured":"Feuerriegel, S., Dolata, M., Schwabe, G.: Fair AI: challenges and opportunities. Bus. Inf. Syst. Eng. 62, 379\u2013384 (2020)","journal-title":"Bus. Inf. Syst. Eng."},{"key":"18_CR12","unstructured":"Friedrich, F., et al.: Fair diffusion: instructing text-to-image generation models on fairness. arXiv preprint arXiv:2302.10893 (2023)"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Gandikota, R., Materzynska, J., Fiotto-Kaufman, J., Bau, D.: Erasing concepts from diffusion models. arXiv preprint arXiv:2303.07345 (2023)","DOI":"10.1109\/ICCV51070.2023.00230"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Golatkar, A., Achille, A., Soatto, S.: Eternal sunshine of the spotless net: selective forgetting in deep networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9304\u20139312 (2020)","DOI":"10.1109\/CVPR42600.2020.00932"},{"key":"18_CR15","unstructured":"Gong, S., Li, M., Feng, J., Wu, Z., Kong, L.: Diffuseq: sequence to sequence text generation with diffusion models. arXiv preprint arXiv:2210.08933 (2022)"},{"key":"18_CR16","unstructured":"Guo, T., Guo, S., Zhang, J., Xu, W., Wang, J.: Efficient attribute unlearning: Towards selective removal of input attributes from feature representations. arXiv preprint arXiv:2202.13295 (2022)"},{"key":"18_CR17","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local nash equilibrium. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"18_CR18","first-page":"6840","volume":"33","author":"J Ho","year":"2020","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. Adv. Neural. Inf. Process. Syst. 33, 6840\u20136851 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"18_CR19","unstructured":"Ho, J., Salimans, T.: Classifier-free diffusion guidance. arXiv preprint arXiv:2207.12598 (2022)"},{"key":"18_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1007\/978-3-319-46475-6_43","volume-title":"Computer Vision \u2013 ECCV 2016","author":"J Johnson","year":"2016","unstructured":"Johnson, J., Alahi, A., Fei-Fei, L.: Perceptual losses for real-time style transfer and super-resolution. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9906, pp. 694\u2013711. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46475-6_43"},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TIFS.2022.3140687","volume":"17","author":"M Khosravy","year":"2022","unstructured":"Khosravy, M., Nakamura, K., Hirose, Y., Nitta, N., Babaguchi, N.: Model inversion attack by integration of deep generative models: privacy-sensitive face generation from a face recognition system. IEEE Trans. Inf. Forensics Secur. 17, 357\u2013372 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Kumari, N., Zhang, B., Wang, S.Y., Shechtman, E., Zhang, R., Zhu, J.Y.: Ablating concepts in text-to-image diffusion models. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 22691\u201322702 (2023)","DOI":"10.1109\/ICCV51070.2023.02074"},{"issue":"11","key":"18_CR23","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"18_CR24","unstructured":"Li, G., Hsu, H., Marculescu, R., et\u00a0al.: Machine unlearning for image-to-image generative models. arXiv preprint arXiv:2402.00351 (2024)"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Limnios, S., Selvaraj, P., Cucuringu, M., Maple, C., Reinert, G., Elliott, A.: Sagess: sampling graph denoising diffusion model for scalable graph generation. arXiv preprint arXiv:2306.16827 (2023)","DOI":"10.3233\/FAIA240834"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Liu, H., Xiong, P., Zhu, T., Yu, P.S.: A survey on machine unlearning: techniques and new emerged privacy risks. arXiv preprint arXiv:2406.06186 (2024)","DOI":"10.1016\/j.jisa.2025.104010"},{"key":"18_CR27","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Large-scale celebfaces attributes (celeba) dataset. Retrieved August 15(2018), 11 (2018)"},{"issue":"3","key":"18_CR28","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.clsr.2013.03.010","volume":"29","author":"A Mantelero","year":"2013","unstructured":"Mantelero, A.: The EU proposal for a general data protection regulation and the roots of the \u2018right to be forgotten\u2019. Comput. Law Secur. Rev. 29(3), 229\u2013235 (2013)","journal-title":"Comput. Law Secur. Rev."},{"key":"18_CR29","unstructured":"Moon, S., Cho, S., Kim, D.: Feature unlearning for generative models via implicit feedback. arXiv preprint arXiv:2303.05699 (2023)"},{"key":"18_CR30","unstructured":"Nguyen, T.T., Huynh, T.T., Nguyen, P.L., Liew, A.W.C., Yin, H., Nguyen, Q.V.H.: A survey of machine unlearning. arXiv preprint arXiv:2209.02299 (2022)"},{"key":"18_CR31","first-page":"68","volume":"23","author":"SL Pardau","year":"2018","unstructured":"Pardau, S.L.: The California consumer privacy act: towards a European-style privacy regime in the united states. J. Tech. L. Pol\u2019y 23, 68 (2018)","journal-title":"J. Tech. L. Pol\u2019y"},{"key":"18_CR32","unstructured":"Regulation, P.: Regulation (EU) 2016\/679 of the European parliament and of the council. Regulation (EU) 679, 2016 (2016)"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Rombach, R., Blattmann, A., Lorenz, D., Esser, P., Ommer, B.: High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10684\u201310695 (2022)","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"18_CR34","unstructured":"Salimans, T., Goodfellow, I., Zaremba, W., Cheung, V., Radford, A., Chen, X.: Improved techniques for training GANs. Adv. Neural Inf. Process. Syst. 29 (2016)"},{"key":"18_CR35","unstructured":"Song, J., Meng, C., Ermon, S.: Denoising diffusion implicit models. arXiv preprint arXiv:2010.02502 (2020)"},{"key":"18_CR36","unstructured":"Song, Y., Dhariwal, P., Chen, M., Sutskever, I.: Consistency models (2023)"},{"key":"18_CR37","first-page":"24804","volume":"34","author":"Y Tashiro","year":"2021","unstructured":"Tashiro, Y., Song, J., Song, Y., Ermon, S.: CSDI: conditional score-based diffusion models for probabilistic time series imputation. Adv. Neural. Inf. Process. Syst. 34, 24804\u201324816 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"18_CR38","doi-asserted-by":"crossref","unstructured":"Thudi, A., Deza, G., Chandrasekaran, V., Papernot, N.: Unrolling SGD: understanding factors influencing machine unlearning. In: 2022 IEEE 7th European Symposium on Security and Privacy (EuroS &P), pp. 303\u2013319. IEEE (2022)","DOI":"10.1109\/EuroSP53844.2022.00027"},{"key":"18_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102902","volume":"122","author":"H Tian","year":"2022","unstructured":"Tian, H., Zhu, T., Zhou, W.: Fairness and privacy preservation for facial images: GAN-based methods. Comput. Secur. 122, 102902 (2022)","journal-title":"Comput. Secur."},{"issue":"2","key":"18_CR40","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.clsr.2017.08.007","volume":"34","author":"EF Villaronga","year":"2018","unstructured":"Villaronga, E.F., Kieseberg, P., Li, T.: Humans forget, machines remember: artificial intelligence and the right to be forgotten. Comput. Law Secur. Rev. 34(2), 304\u2013313 (2018)","journal-title":"Comput. Law Secur. Rev."},{"key":"18_CR41","unstructured":"Warnecke, A., Pirch, L., Wressnegger, C., Rieck, K.: Machine unlearning of features and labels. arXiv preprint arXiv:2108.11577 (2021)"},{"key":"18_CR42","doi-asserted-by":"crossref","unstructured":"Wu, J., Le, T., Hayat, M., Harandi, M.: Erasediff: erasing data influence in diffusion models. arXiv preprint arXiv:2401.05779 (2024)","DOI":"10.1109\/CVPR52734.2025.02632"},{"issue":"1","key":"18_CR43","first-page":"1","volume":"56","author":"H Xu","year":"2023","unstructured":"Xu, H., Zhu, T., Zhang, L., Zhou, W., Yu, P.S.: Machine unlearning: a survey. ACM Comput. Surv. 56(1), 1\u201336 (2023)","journal-title":"ACM Comput. Surv."},{"key":"18_CR44","doi-asserted-by":"crossref","unstructured":"Yang, D., et al.: Diffsound: discrete diffusion model for text-to-sound generation. IEEE\/ACM Trans. Audio Speech Lang. Process. (2023)","DOI":"10.1109\/TASLP.2023.3268730"},{"key":"18_CR45","unstructured":"Yang, L., et al.: Diffusion models: a comprehensive survey of methods and applications. ACM Comput. Surv. (2022)"},{"key":"18_CR46","doi-asserted-by":"crossref","unstructured":"Zhang, E., Wang, K., Xu, X., Wang, Z., Shi, H.: Forget-me-not: learning to forget in text-to-image diffusion models. arXiv preprint arXiv:2303.17591 (2023)","DOI":"10.1109\/CVPRW63382.2024.00182"},{"key":"18_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/978-3-319-46487-9_40","volume-title":"Computer Vision \u2013 ECCV 2016","author":"R Zhang","year":"2016","unstructured":"Zhang, R., Isola, P., Efros, A.A.: Colorful image colorization. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9907, pp. 649\u2013666. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46487-9_40"},{"issue":"1","key":"18_CR48","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/TCI.2016.2644865","volume":"3","author":"H Zhao","year":"2016","unstructured":"Zhao, H., Gallo, O., Frosio, I., Kautz, J.: Loss functions for image restoration with neural networks. IEEE Trans. Comput. Imaging 3(1), 47\u201357 (2016)","journal-title":"IEEE Trans. Comput. Imaging"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6419-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:25Z","timestamp":1770109105000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6419-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819564187","9789819564194"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6419-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"4 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/nss-socialsec2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}