{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:34:18Z","timestamp":1769920458365,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819681723","type":"print"},{"value":"9789819681730","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8173-0_11","type":"book-chapter","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T11:40:29Z","timestamp":1750160429000},"page":"133-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["FedSweep: Unlearning Backdoors in\u00a0Federated Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-0223-3911","authenticated-orcid":false,"given":"Zhiheng","family":"Qiu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3736-7135","authenticated-orcid":false,"given":"Qi","family":"Zhong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0357-642X","authenticated-orcid":false,"given":"Mingfeng","family":"Qi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7608-7910","authenticated-orcid":false,"given":"Lefeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,18]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Alam, M., Lamri, H., Maniatakos, M.: Get rid of your trail: remotely erasing backdoors in federated learning. IEEE Transactions on Artificial Intelligence (2024)","DOI":"10.1109\/TAI.2024.3465441"},{"key":"11_CR2","unstructured":"Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., Shmatikov, V.: How to backdoor federated learning. In: International Conference on Artificial Intelligence and Statistics, pp. 2938\u20132948. PMLR (2020)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Bourtoule, L., et al.: Machine unlearning. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 141\u2013159. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00019"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Cao, Y., Yang, J.: Towards making systems forget with machine unlearning. In: 2015 IEEE Symposium on Security and Privacy, pp. 463\u2013480. IEEE (2015)","DOI":"10.1109\/SP.2015.35"},{"issue":"6","key":"11_CR5","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/MSP.2012.2211477","volume":"29","author":"L Deng","year":"2012","unstructured":"Deng, L.: The MNIST database of handwritten digit images for machine learning research [best of the web]. IEEE Signal Process. Mag. 29(6), 141\u2013142 (2012)","journal-title":"IEEE Signal Process. Mag."},{"key":"11_CR6","unstructured":"Fung, C., Yoon, C.J., Beschastnikh, I.: Mitigating Sybils in federated learning poisoning. arXiv preprint arXiv:1808.04866 (2018)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Golatkar, A., Achille, A., Soatto, S.: Eternal sunshine of the spotless net: selective forgetting in deep networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9304\u20139312 (2020)","DOI":"10.1109\/CVPR42600.2020.00932"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"T Gu","year":"2019","unstructured":"Gu, T., Liu, K., Dolan-Gavitt, B., Garg, S.: BadNets: evaluating backdooring attacks on deep neural networks. IEEE Access 7, 47230\u201347244 (2019)","journal-title":"IEEE Access"},{"key":"11_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125359","volume":"259","author":"Z Gu","year":"2025","unstructured":"Gu, Z., Shi, J., Yang, Y.: ANODYNE: mitigating backdoor attacks in federated learning. Expert Syst. Appl. 259, 125359 (2025)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"11_CR10","doi-asserted-by":"publisher","first-page":"1032","DOI":"10.3390\/s22031032","volume":"22","author":"E Ho","year":"2022","unstructured":"Ho, E., Rajagopalan, A., Skvortsov, A., Arulampalam, S., Piraveenan, M.: Game theory in Defence applications: a review. Sensors 22(3), 1032 (2022)","journal-title":"Sensors"},{"key":"11_CR11","unstructured":"Huang, T., Hu, S., Chow, K.H., Ilhan, F., Tekin, S., Liu, L.: Lockdown: backdoor defense for federated learning with isolated subspace training. Adv. Neural Inf. Process. Syst. 36 (2024)"},{"key":"11_CR12","unstructured":"Izzo, Z., Smart, M.A., Chaudhuri, K., Zou, J.: Approximate data deletion from machine learning models. In: International Conference on Artificial Intelligence and Statistics, pp. 2008\u20132016. PMLR (2021)"},{"key":"11_CR13","unstructured":"Jia, J., et al.: FedGame: a game-theoretic defense against backdoor attacks in federated learning. Adv. Neural Inf. Process. Syst. 36 (2024)"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"2905","DOI":"10.1007\/s10994-020-05917-0","volume":"110","author":"B Kang","year":"2021","unstructured":"Kang, B., Garcia Garcia, D., Lijffijt, J., Santos-Rodr\u00edguez, R., De Bie, T.: Conditional t-SNE: more informative t-SNE embeddings. Mach. Learn. 110, 2905\u20132940 (2021)","journal-title":"Mach. Learn."},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Kayed, M., Anter, A., Mohamed, H.: Classification of garments from fashion MNIST dataset using CNN LeNet-5 architecture. In: 2020 International Conference on Innovative Trends in Communication and Computer Engineering (ITCE), pp. 238\u2013243. IEEE (2020)","DOI":"10.1109\/ITCE48509.2020.9047776"},{"key":"11_CR16","unstructured":"Krizhevsky, A., et\u00a0al.: Learning multiple layers of features from tiny images (2009)"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Liu, G., Ma, X., Yang, Y., Wang, C., Liu, J.: FedEraser: enabling efficient client-level data removal from federated learning models. In: 2021 IEEE\/ACM 29th International Symposium on Quality of Service (IWQOS), pp. 1\u201310. IEEE (2021)","DOI":"10.1109\/IWQOS52092.2021.9521274"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Trojaning attack on neural networks. In: 25th Annual Network And Distributed System Security Symposium (NDSS 2018). Internet Soc (2018)","DOI":"10.14722\/ndss.2018.23291"},{"key":"11_CR19","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y\u00a0Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics, pp. 1273\u20131282. PMLR (2017)"},{"key":"11_CR20","unstructured":"Netzer, Y., et\u00a0al.: Reading digits in natural images with unsupervised feature learning. In: NIPS workshop on Deep Learning and Unsupervised Feature Learning. vol.\u00a02011, p.\u00a04. Granada (2011)"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/978-3-030-90567-5_24","volume-title":"Information Security and Privacy","author":"M Qi","year":"2021","unstructured":"Qi, M., et al.: A blockchain-enabled federated learning model for privacy preservation: system design. In: Baek, J., Ruj, S. (eds.) ACISP 2021. LNCS, vol. 13083, pp. 473\u2013489. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-90567-5_24"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Medical Image Computing and Computer-Assisted Intervention\u2013MICCAI 2015: 18th International Conference, Munich, Germany, October 5-9, 2015, proceedings, part III 18, pp. 234\u2013241. Springer (2015)","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"11_CR23","unstructured":"Wang, H., et al.: Attack of the tails: yes, you really can backdoor federated learning. Adv. Neural Inf. Process. Syst. 33, 16070\u201316084 (2020)"},{"key":"11_CR24","first-page":"5776","volume":"33","author":"W Wang","year":"2020","unstructured":"Wang, W., Wei, F., Dong, L., Bao, H., Yang, N., Zhou, M.: MiniLM: deep self-attention distillation for task-agnostic compression of pre-trained transformers. Adv. Neural. Inf. Process. Syst. 33, 5776\u20135788 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Wu, C., Zhu, S., Mitra, P.: Unlearning backdoor attacks in federated learning. In: ICLR 2023 Workshop on Backdoor Attacks and Defenses in Machine Learning (2023)","DOI":"10.1109\/CNS62487.2024.10735680"},{"key":"11_CR26","unstructured":"Xie, C., Huang, K., Chen, P.Y., Li, B.: DBA: distributed backdoor attacks against federated learning. In: International Conference on Learning Representations (2019)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8173-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T11:40:44Z","timestamp":1750160444000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8173-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819681723","9789819681730"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8173-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"18 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pakdd2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}