{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:40:07Z","timestamp":1770918007673,"version":"3.50.1"},"reference-count":155,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T00:00:00Z","timestamp":1699056000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T00:00:00Z","timestamp":1699056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"ENU Development Trust","award":["LH Oct19'"],"award-info":[{"award-number":["LH Oct19'"]}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/M026981\/1"],"award-info":[{"award-number":["EP\/M026981\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/T021063\/1"],"award-info":[{"award-number":["EP\/T021063\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/T024917\/1"],"award-info":[{"award-number":["EP\/T024917\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Comput"],"DOI":"10.1007\/s12559-023-10219-3","type":"journal-article","created":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T04:13:02Z","timestamp":1699071182000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Machine Un-learning: An Overview of Techniques, Applications, and Future Directions"],"prefix":"10.1007","author":[{"given":"Siva","family":"Sai","sequence":"first","affiliation":[]},{"given":"Uday","family":"Mittal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6730-3060","authenticated-orcid":false,"given":"Vinay","family":"Chamola","sequence":"additional","affiliation":[]},{"given":"Kaizhu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Indro","family":"Spinelli","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Scardapane","sequence":"additional","affiliation":[]},{"given":"Zhiyuan","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,4]]},"reference":[{"key":"10219_CR1","doi-asserted-by":"crossref","unstructured":"Goldsteen A, Ezov G, Shmelkin R, Moffie M, Farkash A. Data minimization for gdpr compliance in machine learning models. AI and Ethics. 2021;1\u201315.","DOI":"10.1007\/s43681-021-00095-8"},{"key":"10219_CR2","doi-asserted-by":"crossref","unstructured":"Mourby M, Cathaoir KO\u00b4, Collin\u00a0CB. Transparency of machine-learning in healthcare: The gdpr & european health law.\u00a0Comput Law Secur Rev.\u00a02021;43:105611.","DOI":"10.1016\/j.clsr.2021.105611"},{"key":"10219_CR3","unstructured":"General data protection regulation (gdpr) \u2013 official legal text.\u00a0https:\/\/gdpr-info.eu\/. Accessed 23 Jun 2023."},{"key":"10219_CR4","unstructured":"Everything you need to know about the right to be forgotten - gdpr.eu.\u00a0https:\/\/gdpr.eu\/right-to-be-forgotten\/. Accessed 23 Jun 2023."},{"key":"10219_CR5","unstructured":"Is the \u2018right to be forgotten\u2019 a fundamental right? https:\/\/timesofindia.indiatimes.com\/readersblog\/myblogpost\/is-the-right-to-be-forgotten-a-fundamental-right-52529\/. Accessed 23 Jun 2023."},{"key":"10219_CR6","doi-asserted-by":"crossref","unstructured":"Voigt P, Von A, dem Bussche, The EU general data protection regulation (gdpr), A Practical Guide, 1st Ed., Cham: Springer Inter- national Publishing.\u00a02017;10(3152676):10\u20135555.","DOI":"10.1007\/978-3-319-57959-7_1"},{"key":"10219_CR7","unstructured":"Strobel M, Aspects of transparency in machine learning, in Proceed- ings of the 18th International Conference on Autonomous Agents and MultiAgent Systems.\u00a02019;2449\u20132451."},{"key":"10219_CR8","doi-asserted-by":"crossref","unstructured":"Lu\u00a8 L, Medo M, Yeung CH, Zhang Y-C, Zhang Z-K, Zhou T. Recommender systems. Phys Rep.\u00a02012;519(1):1\u201349.","DOI":"10.1016\/j.physrep.2012.02.006"},{"issue":"3","key":"10219_CR9","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/245108.245121","volume":"40","author":"P Resnick","year":"1997","unstructured":"Resnick P, Varian HR. Recommender systems. Communica- tions of the ACM. 1997;40(3):56\u20138.","journal-title":"Communica- tions of the ACM"},{"key":"10219_CR10","doi-asserted-by":"crossref","unstructured":"Kaelbling LP, Littman ML, Moore AW. Reinforcement learning: a survey. J Art Intell Res. 1996;4:237\u201385.","DOI":"10.1613\/jair.301"},{"issue":"1","key":"10219_CR11","doi-asserted-by":"crossref","first-page":"129","DOI":"10.2307\/2538489","volume":"8","author":"RH Ullman","year":"1983","unstructured":"Ullman RH. Redefining security. Int Secur. 1983;8(1):129\u201353.","journal-title":"Int Secur"},{"key":"10219_CR12","unstructured":"Westin AF. Privacy and freedom. Washington and Lee Law Rev. 1968;25(1):166."},{"key":"10219_CR13","unstructured":"Jordan PW. An introduction to usability. Crc Press. 1998."},{"key":"10219_CR14","unstructured":"Facebook sued over Cambridge analytica data scandal - bbc news.\u00a0https:\/\/www.bbc.com\/news\/technology-54722362. Accessed 23 Jun 2023."},{"key":"10219_CR15","unstructured":"Google faces mass legal action in uk over data snooping - bbc news.\u00a0https:\/\/www.bbc.com\/news\/technology-42166089. Accessed 23 Jun 2023."},{"key":"10219_CR16","unstructured":"California consumer privacy act (CCPA) \u2014 state of California - Department of Justice - Office of the attorney general, https:\/\/oag.ca.gov\/privacy\/ccpa. Accessed 8 Jul 2023."},{"key":"10219_CR17","unstructured":"World investment report 2020 \u2014 unctad.\u00a0https:\/\/unctad.org\/publication\/world-investment-report-2020. Accessed 23 Jun 2023."},{"key":"10219_CR18","unstructured":"Mutual legal assistance treaties \u2014 department of legal affairs, mol &j, goi.\u00a0https:\/\/legalaffairs.gov.in\/documents\/mlat. Accessed 23 Jun 2023."},{"key":"10219_CR19","unstructured":"Data protection committee report.pdf.\u00a0https:\/\/www.meity.gov.in\/writereaddata\/files\/DataProtectionommitteeReport.pdf. Accessed 23 Jun 2023."},{"key":"10219_CR20","unstructured":"4173ls(pre).p65.\u00a0http:\/\/164.100.47.4\/BillsTexts\/LSBillTexts\/Asintroduced\/3732019LSEng.pdf. Accessed 23 Jun 2023."},{"key":"10219_CR21","doi-asserted-by":"crossref","unstructured":"Explained: Indian government makes user data collection mandatory for vpns \u2014 business insider\u00a0India. https:\/\/www.businessinsider.in\/tech\/news\/. Continual lifelong learning with neural networks: A review. Neural Networks. 2019:113; 54\u201371.","DOI":"10.1016\/j.neunet.2019.01.012"},{"key":"10219_CR22","unstructured":"Mercuri S, Khraishi R, Okhrati R, Batra D, Hamill C, Ghasem- pour T, Nowlan A. An introduction to machine unlearning. arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2209.00939. 2022."},{"issue":"2","key":"10219_CR23","first-page":"33","volume":"8","author":"R Ayyagari","year":"2012","unstructured":"Ayyagari R. An exploratory analysis of data breaches from 2005\u20132011: trends and insights. J Inf Priv Secur. 2012;8(2):33\u201356.","journal-title":"J Inf Priv Secur"},{"key":"10219_CR24","doi-asserted-by":"crossref","first-page":"8176","DOI":"10.1016\/j.egyr.2021.08.126","volume":"7","author":"Y Li","year":"2021","unstructured":"Li Y, Liu Q. A comprehensive review study of cyber-attacks and cyber security; emerging trends and recent developments. Energy Rep. 2021;7:8176\u201386.","journal-title":"Energy Rep"},{"issue":"1","key":"10219_CR25","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s10916-019-1489-9","volume":"44","author":"SC Sethuraman","year":"2020","unstructured":"Sethuraman SC, Vijayakumar V, Walczak S. Cyber attacks on healthcare devices using unmanned aerial vehicles. J Med Syst. 2020;44(1):29.","journal-title":"J Med Syst"},{"key":"10219_CR26","unstructured":"Right to privacy as a fundamental right.pdf.\u00a0https:\/\/loksabhadocs.nic.in\/Refinput\/NewReferenceNotes\/English\/Right%20to%20Privacy%20as%20a%20fundamental%20Right.pdf. Accessed 23 Jun 2023."},{"issue":"6","key":"10219_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3457607","volume":"54","author":"N Mehrabi","year":"2021","unstructured":"Mehrabi N, Morstatter F, Saxena N, Lerman K, Galstyan A. A survey on bias and fairness in machine learning. ACM Computing Surveys (CSUR). 2021;54(6):1\u201335.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10219_CR28","unstructured":"Hellstro\u00a8m T, Dignum V, Bensch S. Bias in machine learning\u2013 what is it good for? arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2004.00686. 2020."},{"key":"10219_CR29","unstructured":"Study finds a potential risk with self-driving cars: failure to detect dark-skinned pedestrians - vox.\u00a0https:\/\/www.vox.com\/future-perfect\/2019\/3\/5\/18251924\/self-driving-car-racial-bias-study-autonomous-vehicle-dark-skin. Accessed 23 Jun 2023."},{"key":"10219_CR30","doi-asserted-by":"crossref","unstructured":"Grover H, Alladi T, Chamola V, Singh D, Choo KK.\u00a0Edge computing and deep learning enabled secure multitier network for internet of vehicles. IEEE Internet Things J. 2021;8(19):14787\u201314796.","DOI":"10.1109\/JIOT.2021.3071362"},{"key":"10219_CR31","doi-asserted-by":"crossref","unstructured":"Zhou Z-H, Machine learning. Springer Nature. 2021.","DOI":"10.1007\/978-981-15-1967-3"},{"key":"10219_CR32","unstructured":"Mitchell TM, et al.\u00a0Machine learning. McGraw-hill New York. 2007;1."},{"key":"10219_CR33","doi-asserted-by":"crossref","unstructured":"El Naqa I, Murphy MJ.\u00a0What is machine learning? Springer. 2015.","DOI":"10.1007\/978-3-319-18305-3_1"},{"key":"10219_CR34","doi-asserted-by":"crossref","unstructured":"Bottou L. Stochastic gradient descent tricks. Neural Networks: Tricks of the Trade: Second Edition. 2012;421\u2013436.","DOI":"10.1007\/978-3-642-35289-8_25"},{"issue":"1","key":"10219_CR35","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1093\/elt\/ccv055","volume":"70","author":"P Kerr","year":"2016","unstructured":"Kerr P. Adaptive learning. ELT J. 2016;70(1):88\u201393.","journal-title":"ELT J"},{"key":"10219_CR36","unstructured":"Gupta V, Jung C, Neel S, Roth A, Sharifi-Malvajerdi S, Waites C. Adaptive machine unlearning.\u00a0Adv Neural Inf Process Sys. 2021;34:16319\u201316 330."},{"key":"10219_CR37","unstructured":"Ruder S. An overview of gradient descent optimization algorithms.\u00a0arXiv preprint.http:\/\/arxiv.org\/abs\/1609.04747. 2016."},{"key":"10219_CR38","unstructured":"Melnikov Y. Influence functions and matrices. CRC Press. 1998;119."},{"key":"10219_CR39","doi-asserted-by":"crossref","unstructured":"Ketkar N, Ketkar N. Stochastic gradient descent. Deep learning with Python: a hands-on introduction.\u00a02017;113\u2013132.","DOI":"10.1007\/978-1-4842-2766-4_8"},{"key":"10219_CR40","doi-asserted-by":"publisher","unstructured":"Tahiliani A, Hassija V, Chamola V, Guizani M. Machine unlearning: its need and implementation strategies, in 2021 Thirteenth International Conference on Contemporary Computing (IC3\u20132021), ser. IC3 \u201921. New York, NY, USA: association for computing machinery. 2021;241\u2013246. [Online]. Available:\u00a0https:\/\/doi.org\/10.1145\/3474124.3474158.","DOI":"10.1145\/3474124.3474158"},{"key":"10219_CR41","unstructured":"Sekhari A, Acharya J, Kamath G, Suresh AT. Remember what you want to forget: algorithms for machine unlearning. Advances in Neural Information Processing Systems. 2021;34: 18075\u201318086."},{"key":"10219_CR42","doi-asserted-by":"crossref","unstructured":"Gill PE, Murray W, Wright MH. Practical optimization. SIAM. 2019.","DOI":"10.1137\/1.9781611975604"},{"key":"10219_CR43","first-page":"141","volume":"2021","author":"L Bourtoule","year":"2021","unstructured":"Bourtoule L, Chandrasekaran V, Choquette-Choo CA, Jia H, Travers A, Zhang B, Lie D, Papernot N, Machine unlearning, in,. IEEE Symposium on Security and Privacy (SP). IEEE. 2021;2021:141\u201359.","journal-title":"IEEE"},{"key":"10219_CR44","unstructured":"Warnecke A, Pirch L, Wressnegger C, Rieck K. Machine unlearning of features and labels. arXiv preprint. http:\/\/arxiv.org\/abs\/2108.11577.\u00a02021."},{"key":"10219_CR45","doi-asserted-by":"crossref","unstructured":"Welsch RE. Influence functions and regression diagnostics, in Modern data analysis. Elsevier. 1982;149\u2013169.","DOI":"10.1016\/B978-0-12-438180-3.50014-1"},{"key":"10219_CR46","unstructured":"Covert I, Lundberg S, Lee S-I. Feature removal is a unifying principle for model explanation methods.\u00a0arXiv preprint. http:\/\/arxiv.org\/abs\/2011.03623.\u00a02020."},{"key":"10219_CR47","doi-asserted-by":"crossref","unstructured":"Van Dyk DA, Meng X-L. The art of data augmentation. J Comput Graph Stat. 2001;10(1):1\u201350.","DOI":"10.1198\/10618600152418584"},{"key":"10219_CR48","unstructured":"Parisi GI, Kemker R, Part JL, Kanan C, Wermter S. https:\/\/www.businessinsider.in\/tech\/news\/it-ministry-orders-vpn-providers-to-store-user-data-for-fiveyears-tech-news\/articleshow\/91334830.cms.\u00a0Accessed 23 Jun 2023."},{"key":"10219_CR49","doi-asserted-by":"crossref","unstructured":"Allison B, Guthrie D, Guthrie L. Another look at the data sparsity problem. InText, Speech and Dialogue: 9th International Conference, TSD 2006, Brno, Czech Republic, September 11-15, 2006.\u00a0Proceedings 9. Springer. 2006;327\u201334.","DOI":"10.1007\/11846406_41"},{"issue":"1","key":"10219_CR50","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1093\/nsr\/nwx105","volume":"5","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Yang Q. An overview of multi-task learning. Natl Sci Rev. 2018;5(1):30\u201343.","journal-title":"Natl Sci Rev"},{"key":"10219_CR51","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/j.sbspro.2011.12.073","volume":"31","author":"M Laal","year":"2012","unstructured":"Laal M, Salamati P. Lifelong learning; why do we need it? Procedia Soc Behav Sci. 2012;31:399\u2013403.","journal-title":"Procedia Soc Behav Sci"},{"key":"10219_CR52","unstructured":"Liu B, Liu Q, Stone P. Continual learning and private unlearning.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2203.12817. 2022."},{"key":"10219_CR53","unstructured":"Nguyen TT, Duong CT, Weidlich M, Yin H, Nguyen\u00a0QVH. Retaining data from streams of social platforms with minimal regret, in Twenty-sixth International Joint Conference on Artificial Intelligence, no. CONF. 2017."},{"key":"10219_CR54","unstructured":"Huang H, Ma X, Erfani SM, Bailey J, Wang Y. Unlearnable examples: making personal data unexploitable.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2101.04898. 2021."},{"key":"10219_CR55","unstructured":"Chundawat VS, Tarun AK, Mandal M, Kankanhalli M. Zeroshot machine unlearning.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2201.05629. 2022."},{"key":"10219_CR56","unstructured":"Guo C, Goldstein T, Hannun A, Van Der Maaten L. Certified data removal from machine learning models.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/1911.03030. 2019."},{"key":"10219_CR57","unstructured":"Ginart A, Guan M, Valiant G, Zou JY. Making AI forget you: data deletion in machine learning.\u00a0Adv Neural Inf Process Sys. 2019;32."},{"key":"10219_CR58","unstructured":"Brophy J, Lowd D. Machine unlearning for random forests, in International Conference on Machine Learning. PMLR. 2021;1092\u20131104."},{"key":"10219_CR59","first-page":"303","volume":"2022","author":"A Thudi","year":"2022","unstructured":"Thudi A, Deza G, Chandrasekaran V, Papernot N, Unrolling sgd: understanding factors influencing machine unlearning, in,. IEEE 7th European Symposium on Security and Privacy (EuroS&P). IEEE. 2022;2022:303\u201319.","journal-title":"IEEE"},{"key":"10219_CR60","unstructured":"Neel S, Roth A, Sharifi-Malvajerdi S. Descent-to-delete: gradient-based methods for machine unlearning, in Algorithmic Learning Theory. PMLR. 2021;931\u2013962."},{"key":"10219_CR61","doi-asserted-by":"crossref","unstructured":"Graves L, Nagisetty V, Ganesh V. Amnesiac machine learning, in Proceedings of the AAAI Conference on Artificial Intelligence. 2021;35(13):11516\u201311524.","DOI":"10.1609\/aaai.v35i13.17371"},{"key":"10219_CR62","doi-asserted-by":"crossref","unstructured":"Dwork C, Differential privacy: a survey of results, in International conference on theory and applications of models of computation. Springer. 2008;1\u201319.","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"10219_CR63","first-page":"463","volume":"2015","author":"Y Cao","year":"2015","unstructured":"Cao Y, Yang J, Towards making systems forget with machine unlearning, in,. IEEE Symposium on Security and Privacy. IEEE. 2015;2015:463\u201380.","journal-title":"IEEE"},{"key":"10219_CR64","unstructured":"Cauwenberghs G, Poggio T. Incremental and decremental support vector machine learning.\u00a0Adv Neural Inf Process Sys. 2000;13."},{"issue":"3","key":"10219_CR65","doi-asserted-by":"crossref","first-page":"7435","DOI":"10.1007\/s10586-018-1772-4","volume":"22","author":"Y Chen","year":"2019","unstructured":"Chen Y, Xiong J, Xu W, Zuo J. A novel online incremental and decremental learning algorithm based on variable support vector machine. Clust Comput. 2019;22(3):7435\u201345.","journal-title":"Clust Comput"},{"key":"10219_CR66","unstructured":"Chundawat VS, Tarun AK, Mandal M, Kankanhalli M. Can bad teaching induce forgetting? Unlearning in deep networks using an incompetent teacher.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2205.08096. 2022."},{"key":"10219_CR67","doi-asserted-by":"crossref","unstructured":"Schelter S, Grafberger S, Dunning T, Hedgecut: maintaining randomised trees for low-latency machine unlearning, in Proceedings of the 2021 International Conference on Management of Data.\u00a02021;1545\u20131557.","DOI":"10.1145\/3448016.3457239"},{"issue":"1","key":"10219_CR68","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10994-006-6226-1","volume":"63","author":"P Geurts","year":"2006","unstructured":"Geurts P, Ernst D, Wehenkel L. Extremely randomized trees. Mach Learn. 2006;63(1):3\u201342.","journal-title":"Mach Learn"},{"key":"10219_CR69","doi-asserted-by":"crossref","unstructured":"Golatkar A, Achille A, Soatto S. Forgetting outside the box: scrubbing deep networks of information accessible from input-output observations, in European Conference on Computer Vision. Springer. 2020; 383\u2013398.","DOI":"10.1007\/978-3-030-58526-6_23"},{"key":"10219_CR70","doi-asserted-by":"crossref","unstructured":"Golatkar A, Achille A, Ravichandran A, Polito M, Soatto S. Mixed-privacy forgetting in deep networks, in Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition.\u00a02021;792\u2013801.","DOI":"10.1109\/CVPR46437.2021.00085"},{"key":"10219_CR71","unstructured":"Baumhauer T, Scho\u00a8ttle P, Zeppelzauer M. Machine unlearning: linear filtration for logit-based classifiers.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2002.02730. 2020."},{"key":"10219_CR72","doi-asserted-by":"crossref","unstructured":"Koch K, Soll M. No matter how you slice it: machine unlearning with sisa comes at the expense of minority classes, in 2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML). IEEE. 2023;622\u2013637.","DOI":"10.1109\/SaTML54575.2023.00047"},{"issue":"2","key":"10219_CR73","first-page":"85","volume":"3","author":"MS Mahmud","year":"2020","unstructured":"Mahmud MS, Huang JZ, Salloum S, Emara TZ. and K. Sadat- diynov, A survey of data partitioning and sampling methods to support big data analysis, Big Data Mining and Analytics. 2020;3(2):85\u2013101.","journal-title":"Sadat- diynov, A survey of data partitioning and sampling methods to support big data analysis, Big Data Mining and Analytics"},{"issue":"2","key":"10219_CR74","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1080\/00031305.1990.10475704","volume":"44","author":"RR Picard","year":"1990","unstructured":"Picard RR, Berk KN. Data splitting. The American Statisti- cian. 1990;44(2):140\u20137.","journal-title":"The American Statisti- cian"},{"key":"10219_CR75","doi-asserted-by":"crossref","unstructured":"Feng SY, Gangal V, Wei J, Chandar S, Vosoughi S, Mitamura T, Hovy E. A survey of data augmentation approaches for nlp.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2105.03075. 2021.","DOI":"10.18653\/v1\/2021.findings-acl.84"},{"key":"10219_CR76","doi-asserted-by":"crossref","unstructured":"Ul Hassan M, Rehmani MH, Rehan M, Chen J. Differential privacy in cognitive radio networks: a comprehensive survey. Cognitive Computation. 2022;1\u201336.","DOI":"10.1007\/s12559-021-09969-9"},{"key":"10219_CR77","doi-asserted-by":"crossref","unstructured":"Szo\u00a8re\u00b4nyi B. Characterizing statistical query learning: simplified notions and proofs, in International Conference on Algorithmic Learning Theory. Springer. 2009;186\u2013200.","DOI":"10.1007\/978-3-642-04414-4_18"},{"issue":"4","key":"10219_CR78","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/j.jcss.2004.10.003","volume":"70","author":"K Yang","year":"2005","unstructured":"Yang K. New lower bounds for statistical query learning. J Comput Syst Sci. 2005;70(4):485\u2013509.","journal-title":"J Comput Syst Sci"},{"key":"10219_CR79","doi-asserted-by":"crossref","unstructured":"Zhou Y, Huang K, Cheng C, Wang X, Hussain A, Liu X. Fastadabelief: improving convergence rate for belief-based adaptive optimizers by exploiting strong convexity. IEEE Transactions on Neural Networks and Learning Systems.\u00a02022.","DOI":"10.1109\/TNNLS.2022.3143554"},{"issue":"11","key":"10219_CR80","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1016\/0167-8655(95)00075-R","volume":"16","author":"H Ralambondrainy","year":"1995","unstructured":"Ralambondrainy H. A conceptual version of the k-means algorithm. Pattern Recogn Lett. 1995;16(11):1147\u201357.","journal-title":"Pattern Recogn Lett"},{"issue":"7","key":"10219_CR81","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/TNN.2010.2048039","volume":"21","author":"M Karasuyama","year":"2010","unstructured":"Karasuyama M, Takeuchi I. Multiple incremental decremental learning of support vector machines. IEEE Trans Neural Networks. 2010;21(7):1048\u201359.","journal-title":"IEEE Trans Neural Networks"},{"key":"10219_CR82","doi-asserted-by":"crossref","unstructured":"Joyce JM. Kullback-leibler divergence, in International encyclope- dia of statistical science. Springer. 2011;720\u2013722.","DOI":"10.1007\/978-3-642-04898-2_327"},{"key":"10219_CR83","doi-asserted-by":"crossref","unstructured":"Clark\u00a0LA, Pregibon D. Tree-based models, in Statistical models in S. Routledge. 2017;377\u2013419.","DOI":"10.1201\/9780203738535-9"},{"issue":"6","key":"10219_CR84","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1002\/cem.873","volume":"18","author":"AJ Myles","year":"2004","unstructured":"Myles AJ, Feudale RN, Liu Y, Woody NA, Brown SD. An introduction to decision tree modeling. Journal of Chemometrics: A Journal of the Chemometrics Society. 2004;18(6):275\u201385.","journal-title":"Journal of Chemometrics: A Journal of the Chemometrics Society"},{"key":"10219_CR85","unstructured":"Spinelli I, Scardapane S, Hussain A, Uncini A. Biased edge dropout for enhancing fairness in graph representation learning.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2104.14210. 2021."},{"issue":"6","key":"10219_CR86","doi-asserted-by":"crossref","first-page":"1564","DOI":"10.1007\/s12559-021-09912-y","volume":"13","author":"Q Zhang","year":"2021","unstructured":"Zhang Q, Zhong G, Dong J. A graph-based semi-supervised multi-label learning method based on label correlation consistency. Cogn Comput. 2021;13(6):1564\u201373.","journal-title":"Cogn Comput"},{"key":"10219_CR87","doi-asserted-by":"crossref","unstructured":"Miikkulainen R, Liang J, Meyerson E, Rawal A, Fink D, Fran- con O, Raju B, Shahrzad H, Navruzyan A, Duffy\u00a0N, et al.\u00a0Evolving deep neural networks, in Artificial intelligence in the age of neural networks and brain computing. Elsevier. 2019;293\u2013312.","DOI":"10.1016\/B978-0-12-815480-9.00015-3"},{"key":"10219_CR88","unstructured":"Agostinelli F, Hoffman M, Sadowski P, Baldi P. Learning activation functions to improve deep neural networks.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/1412.6830. 2014."},{"issue":"6","key":"10219_CR89","doi-asserted-by":"crossref","first-page":"4448","DOI":"10.1109\/JIOT.2020.3027095","volume":"8","author":"P Chhikara","year":"2020","unstructured":"Chhikara P, Tekchandani R, Kumar N, Chamola V, Guizani M. Dcnn-ga: a deep neural net architecture for navigation of uav in indoor environment. IEEE Internet Things J. 2020;8(6):4448\u201360.","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"10219_CR90","doi-asserted-by":"crossref","first-page":"2063","DOI":"10.1109\/TNNLS.2018.2790388","volume":"29","author":"M Mahmud","year":"2018","unstructured":"Mahmud M, Kaiser MS, Hussain A, Vassanelli S. Applications of deep learning and reinforcement learning to biological data. IEEE transactions on neural networks and learning systems. 2018;29(6):2063\u201379.","journal-title":"IEEE transactions on neural networks and learning systems"},{"key":"10219_CR91","doi-asserted-by":"crossref","unstructured":"Boyd SP, Vandenberghe L.\u00a0Convex optimization. Cambridge university press. 2004.","DOI":"10.1017\/CBO9780511804441"},{"key":"10219_CR92","unstructured":"Gao B, Pavel L. On the properties of the softmax function with application in game theory and reinforcement learning.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/1704.00805. 2017."},{"issue":"2","key":"10219_CR93","first-page":"139","volume":"6","author":"F Freese","year":"1960","unstructured":"Freese F, et al. Testing accuracy. Forest Sci. 1960;6(2):139\u201345.","journal-title":"Forest Sci"},{"key":"10219_CR94","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jebo.2017.09.001","volume":"143","author":"J Hagenbach","year":"2017","unstructured":"Hagenbach J, Koessler F. The Streisand effect: signaling and partial sophistication. J Econ Behav Organ. 2017;143:1\u20138.","journal-title":"J Econ Behav Organ"},{"key":"10219_CR95","unstructured":"Swiler LP, Paez TL, Mayes RL. Epistemic uncertainty quantification tutorial, in Proceedings of the 27th International Modal Analysis Conference.\u00a02009."},{"key":"10219_CR96","unstructured":"Carlini N, Chien S, Nasr M, Song S, Terzis A, Trame`r F, Membership inference attacks from first principles, CoRR, vol. abs\/2112.03570, 2021. [Online]. Available:\u00a0https:\/\/arxiv.org\/abs\/2112.03570."},{"key":"10219_CR97","unstructured":"Shokri R, Stronati M, Shmatikov V. Membership inference attacks against machine learning models, CoRR, vol. abs\/1610.05820, 2016. [Online]. Available:\u00a0http:\/\/arxiv.org\/abs\/1610.05820."},{"key":"10219_CR98","doi-asserted-by":"crossref","unstructured":"Shuvo\u00a0MSR, Alhadidi D. Membership inference attacks: analysis and mitigation, in 2020 IEEE 19th International Conference on Trust. Security and Privacy in Computing and Communications (TrustCom).\u00a02020;1410\u20131419.","DOI":"10.1109\/TrustCom50675.2020.00190"},{"key":"10219_CR99","doi-asserted-by":"crossref","first-page":"4566","DOI":"10.1109\/ACCESS.2020.3045078","volume":"9","author":"X Liu","year":"2020","unstructured":"Liu X, Xie L, Wang Y, Zou J, Xiong J, Ying Z, Vasilakos AV. Privacy and security issues in deep learning: a survey. IEEE Access. 2020;9:4566\u201393.","journal-title":"IEEE Access"},{"key":"10219_CR100","doi-asserted-by":"crossref","unstructured":"Chundawat VS, Tarun AK, Mandal M, Kankanhalli M. Zeroshot machine unlearning. IEEE Transactions on Information Forensics and Security.\u00a02023.","DOI":"10.1109\/TIFS.2023.3265506"},{"key":"10219_CR101","unstructured":"Wang K, Fu Y, Li K, Khisti A, Zemel RS, Makhzani A. Variational model inversion attacks, CoRR, vol. abs\/2201.10787, 2022. [Online]. Available:\u00a0https:\/\/arxiv.org\/abs\/2201.10787."},{"key":"10219_CR102","doi-asserted-by":"publisher","unstructured":"Fredrikson M. Jha S, Ristenpart T. Model inversion attacks that exploit confidence information and basic countermeasures, in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, ser. CCS \u201915. New York, NY, USA: Association for Computing Machinery. 2015;1322\u20131333. [Online]. Available:\u00a0https:\/\/doi.org\/10.1145\/2810103.2813677.","DOI":"10.1145\/2810103.2813677"},{"issue":"9","key":"10219_CR103","doi-asserted-by":"crossref","first-page":"2251","DOI":"10.1109\/TPAMI.2018.2857768","volume":"41","author":"Y Xian","year":"2018","unstructured":"Xian Y, Lampert CH, Schiele B, Akata Z. Zero-shot learning\u2014a comprehensive evaluation of the good, the bad and the ugly. IEEE Trans Pattern Anal Mach Intell. 2018;41(9):2251\u201365.","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10219_CR104","doi-asserted-by":"crossref","unstructured":"Golatkar A, Achille A, Soatto S. Eternal sunshine of the spotless net: Selective forgetting in deep networks, in Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition.\u00a02020;9304\u20139312.","DOI":"10.1109\/CVPR42600.2020.00932"},{"key":"10219_CR105","unstructured":"Tarun AK, Chundawat VS, Mandal M, Kankanhalli M. Fast yet effective machine unlearning.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2111.08947. 2021."},{"key":"10219_CR106","unstructured":"Becker\u00a0A, Liebig T. Evaluating machine unlearning via epistemic uncertainty.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2208.10836. 2022."},{"issue":"2008","key":"10219_CR107","first-page":"1","volume":"1","author":"T Wiedmann","year":"2008","unstructured":"Wiedmann T, Minx J. A definition of \u2018carbon footprint.\u2019 Eco- logical economics research trends. 2008;1(2008):1\u201311.","journal-title":"Eco- logical economics research trends"},{"key":"10219_CR108","unstructured":"Henderson P, Hu J, Romoff J, Brunskill E, Jurafsky D, Pineau\u00a0J. Towards the systematic reporting of the energy and carbon footprints of machine learning.\u00a0J Mach Learn Res. 2020;21(1):10039\u201310081."},{"key":"10219_CR109","unstructured":"L. F. W. Anthony, B. Kanding, and R. Selvan, Carbontracker: tracking and predicting the carbon footprint of training deep learning models. arXiv preprint.\u00a0http:\/\/arXiv:2007.03051. 2020."},{"key":"10219_CR110","doi-asserted-by":"crossref","unstructured":"T. Alladi, B. Gera, A. Agrawal, V. Chamola, and F. R. Yu, Deepadv: a deep neural network framework for anomaly detection in vanets. IEEE Transactions on Vehicular Technology. 2021;70(11):12013\u201312023.","DOI":"10.1109\/TVT.2021.3113807"},{"key":"10219_CR111","first-page":"3","volume":"2017","author":"R Shokri","year":"2017","unstructured":"Shokri R, Stronati M, Song C, Shmatikov V, Membership inference attacks against machine learning models, in,. IEEE symposium on security and privacy (SP). IEEE. 2017;2017:3\u201318.","journal-title":"IEEE"},{"key":"10219_CR112","volume":"216","author":"C Zhang","year":"2021","unstructured":"Zhang C, Xie Y, Bai H, Yu B, Li W, Gao Y. A survey on federated learning. Knowl-Based Syst. 2021;216: 106775.","journal-title":"Knowl-Based Syst"},{"key":"10219_CR113","volume":"149","author":"L Li","year":"2020","unstructured":"Li L, Fan Y, Tse M, Lin K-Y. A review of applications in federated learning. Comput Ind Eng. 2020;149: 106854.","journal-title":"Comput Ind Eng"},{"issue":"3","key":"10219_CR114","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","volume":"37","author":"T Li","year":"2020","unstructured":"Li T, Sahu AK, Talwalkar A, Smith V. Federated learning: challenges, methods, and future directions. IEEE Signal Process Mag. 2020;37(3):50\u201360.","journal-title":"IEEE Signal Process Mag"},{"issue":"1","key":"10219_CR115","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1080\/026013700293421","volume":"19","author":"DN Aspin","year":"2000","unstructured":"Aspin DN, Chapman JD. Lifelong learning: concepts and conceptions. Int J Lifelong Educ. 2000;19(1):2\u201319.","journal-title":"Int J Lifelong Educ"},{"key":"10219_CR116","first-page":"181","volume":"8","author":"S Thrun","year":"1998","unstructured":"Thrun S. Lifelong learning algorithms Learning to learn. 1998;8:181\u2013209.","journal-title":"Lifelong learning algorithms Learning to learn"},{"key":"10219_CR117","unstructured":"L.a. is suing ibm for illegally gathering and selling user data through its weather channel app - Los Angeles Times.\u00a0https:\/\/www.latimes.com\/business\/technology\/la-fi-tn-city-attorney-weather-app-20190104-story.html. Accessed 27 Jun 2023."},{"key":"10219_CR118","doi-asserted-by":"crossref","unstructured":"Yapo A, Weiss J. Ethical implications of bias in machine learning, 2018.","DOI":"10.24251\/HICSS.2018.668"},{"key":"10219_CR119","doi-asserted-by":"crossref","unstructured":"Roscher R, Bohn B, Duarte MF, Garcke J. Explainable machine learning for scientific insights and discoveries.\u00a0Ieee Access.\u00a02020;8:42200\u201342216.","DOI":"10.1109\/ACCESS.2020.2976199"},{"key":"10219_CR120","doi-asserted-by":"crossref","unstructured":"Belle\u00a0V, Papantonis I. Principles and practice of explainable machine learning. Frontiers in big Data.\u00a02021;39.","DOI":"10.3389\/fdata.2021.688969"},{"key":"10219_CR121","unstructured":"Lundberg\u00a0SM, Lee S-I. A unified approach to interpreting model predictions, in Advances in Neural Information Processing Systems 30, I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett, Eds. Curran Associates, Inc., 2017;4765\u20134774. [Online]. Available:\u00a0http:\/\/papers.nips.cc\/paper\/7062-a-unified-approach-to-interpreting-model-predictions.pdf."},{"key":"10219_CR122","doi-asserted-by":"crossref","unstructured":"Ribeiro MT, Singh S, Guestrin C. Why should I trust you?: explaining the predictions of any classifier, in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, August. 2016;1135\u20131144.","DOI":"10.1145\/2939672.2939778"},{"key":"10219_CR123","doi-asserted-by":"crossref","unstructured":"Strubell E, Ganesh A, McCallum A. Energy and policy considerations for deep learning in nlp.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/1906.02243. 2019.","DOI":"10.18653\/v1\/P19-1355"},{"issue":"12","key":"10219_CR124","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/3381831","volume":"63","author":"R Schwartz","year":"2020","unstructured":"Schwartz R, Dodge J, Smith NA, Etzioni O. Green AI. Commun ACM. 2020;63(12):54\u201363.","journal-title":"Commun ACM"},{"key":"10219_CR125","unstructured":"Patterson D, Gonzalez J, Le Q, Liang C, Munguia L-M, Rothchild D, So D, Texier M, Dean J. Carbon emissions and large neural network training.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2104.10350, 2021."},{"key":"10219_CR126","unstructured":"Adiwardana D, Luong M-T, So DR, Hall J, Fiedel N, Thop- pilan R, Yang Z, Kulshreshtha A, Nemade G, Lu\u00a0Y,\u00a0et al.\u00a0Towards a human-like open-domain chatbot. arXiv\u00a0preprint. http:\/\/arxiv.org\/abs\/2001.09977.\u00a02020."},{"key":"10219_CR127","first-page":"1877","volume":"33","author":"T Brown","year":"2020","unstructured":"Brown T, Mann B, Ryder N, Subbiah M, Kaplan JD, Dhariwal P, Neelakantan A, Shyam P, Sastry G, Askell A, et al. Language models are few-shot learners. Adv Neural Inf Process Syst. 2020;33:1877\u2013901.","journal-title":"Adv Neural Inf Process Syst"},{"issue":"140","key":"10219_CR128","first-page":"1","volume":"21","author":"C Raffel","year":"2020","unstructured":"Raffel C, Shazeer N, Roberts A, Lee K, Narang S, Matena M, Zhou Y, Li W, Liu PJ, et al. Exploring the limits of transfer learning with a unified text-to-text transformer. J Mach Learn Res. 2020;21(140):1\u201367.","journal-title":"J Mach Learn Res"},{"key":"10219_CR129","unstructured":"Fedus W, Zoph B, Shazeer\u00a0N. Switch transformers: scaling to trillion parameter models with simple and efficient sparsity. 2021."},{"key":"10219_CR130","unstructured":"Lepikhin D, Lee H, Xu Y, Chen D, Firat O, Huang Y, Krikun M, Shazeer N, Chen Z. Gshard: Scaling giant models with conditional computation and automatic sharding.\u00a0arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2006.16668. 2020."},{"key":"10219_CR131","unstructured":"Apte C, The role of machine learning in business optimization, in Proceedings of the 27th International Conference on Machine Learning (ICML-10). Citeseer. 2010;1\u20132."},{"issue":"1","key":"10219_CR132","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/JIOT.2021.3098051","volume":"9","author":"S Singh","year":"2021","unstructured":"Singh S, Sulthana R, Shewale T, Chamola V, Benslimane A, Sikdar B. Machine-learning-assisted security and privacy provisioning for edge computing: a survey. IEEE Internet Things J. 2021;9(1):236\u201360.","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"10219_CR133","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3465171","volume":"54","author":"Y Miao","year":"2021","unstructured":"Miao Y, Chen C, Pan L, Han Q-L, Zhang J, Xiang Y. Machine learning\u2013based cyber attacks targeting on controlled information: a survey. ACM Computing Surveys (CSUR). 2021;54(7):1\u201336.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"3","key":"10219_CR134","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.icte.2022.04.007","volume":"8","author":"M Wazid","year":"2022","unstructured":"Wazid M, Das AK, Chamola V, Park Y. Uniting cyber security and machine learning: advantages, challenges and future research. ICT Express. 2022;8(3):313\u201321.","journal-title":"ICT Express"},{"key":"10219_CR135","doi-asserted-by":"crossref","unstructured":"Chamola V, Goyal A, Sharma P, Hassija V, Binh HTT, Saxena V. Artificial intelligence-assisted blockchain-based framework for smart and secure emr management. Neural Computing and Appli- cations. 2022;1\u201311.","DOI":"10.1007\/s00521-022-07087-7"},{"key":"10219_CR136","doi-asserted-by":"crossref","unstructured":"Isinkaye FO, Folajimi YO, Ojokoh BA. Recommendation systems: principles, methods and evaluation.\u00a0Egypt Inform J. 2015;16(3):261\u201373.","DOI":"10.1016\/j.eij.2015.06.005"},{"key":"10219_CR137","doi-asserted-by":"crossref","unstructured":"Pavithra D. Jayanthi A. A study on machine learning algorithm in medical diagnosis.\u00a0Int J Adv Res Comput Sci. 2018;9(4).","DOI":"10.26483\/ijarcs.v9i4.6281"},{"key":"10219_CR138","doi-asserted-by":"crossref","unstructured":"Rohmetra H, Raghunath N, Narang P, Chamola V, Guizani M, Lakkaniga NR. AI-enabled remote monitoring of vital signs for covid-19: methods, prospects and challenges. Computing. 2021;1\u201327.","DOI":"10.1007\/s00607-021-00937-7"},{"issue":"7","key":"10219_CR139","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1049\/iet-ipr.2019.1164","volume":"14","author":"G Bansal","year":"2020","unstructured":"Bansal G, Chamola V, Narang P, Kumar S, Raman S. Deep3dscan: deep residual network and morphological descriptor based framework forlung cancer classification and 3d segmentation. IET Image Proc. 2020;14(7):1240\u20137.","journal-title":"IET Image Proc"},{"key":"10219_CR140","doi-asserted-by":"crossref","unstructured":"Delgado-Rodriguez\u00a0M, Llorca Bias J.\u00a0Journal of Epidemiology & Community Health.\u00a02004;58(8):635\u2013641.","DOI":"10.1136\/jech.2003.008466"},{"issue":"2017","key":"10219_CR141","first-page":"4691","volume":"17","author":"D Danks","year":"2017","unstructured":"Danks D, London AJ. Algorithmic bias in autonomous systems. Ijcai. 2017;17(2017):4691\u20137.","journal-title":"Ijcai"},{"key":"10219_CR142","doi-asserted-by":"crossref","unstructured":"Malerba D, Esposito F, Lanza A, Lisi FA. Machine learning for information extraction from topographic maps. Geographic data mining and knowledge discovery. 2001;291\u2013314.","DOI":"10.4324\/9780203468029_chapter_12"},{"key":"10219_CR143","unstructured":"Hutchins WJ, Machine translation: past, present, future. Ellis Horwood Chichester. 1986."},{"key":"10219_CR144","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.comcom.2014.07.013","volume":"54","author":"LA Grieco","year":"2014","unstructured":"Grieco LA, Rizzo A, Colucci S, Sicari S, Piro G, Di Paola D, Boggia G. IoT-aided robotics applications: technological implications, target domains and open issues. Comput Commun. 2014;54:32\u201347.","journal-title":"Comput Commun"},{"key":"10219_CR145","doi-asserted-by":"crossref","unstructured":"Roy Chowdhury A, Iot and robotics: a synergy. PeerJ Preprints. 2017;5:e2760v1.","DOI":"10.7287\/peerj.preprints.2760v1"},{"issue":"4","key":"10219_CR146","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1145\/954339.954342","volume":"35","author":"W Zhao","year":"2003","unstructured":"Zhao W, Chellappa R, Phillips PJ, Rosenfeld A. Face recognition: a literature survey. ACM computing surveys (CSUR). 2003;35(4):399\u2013458.","journal-title":"ACM computing surveys (CSUR)"},{"key":"10219_CR147","unstructured":"Hernandez G, Arias O, Buentello D, Jin Y, Smart nest thermostat: a smart spy in your home. Black Hat USA. no. 2015, 2014."},{"key":"10219_CR148","doi-asserted-by":"crossref","unstructured":"Gogate M, Dashtipour K, Hussain A, Towards robust real-time audio-visual speech enhancement. arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2112.09060. 2021.","DOI":"10.21437\/SPSC.2022-2"},{"key":"10219_CR149","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.inffus.2020.04.001","volume":"63","author":"M Gogate","year":"2020","unstructured":"Gogate M, Dashtipour K, Adeel A, Hussain A. Cochleanet: a robust language-independent audio-visual model for real-time speech enhancement. Information Fusion. 2020;63:273\u201385.","journal-title":"Information Fusion"},{"key":"10219_CR150","unstructured":"Hussain T, M. Gogate, K. Dashtipour, and A. Hussain, Towards intelligibility-oriented audio-visual speech enhancement. arXiv preprint.\u00a0http:\/\/arxiv.org\/abs\/2111.09642. 2021."},{"key":"10219_CR151","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.inffus.2019.08.008","volume":"59","author":"A Adeel","year":"2020","unstructured":"Adeel A, Gogate M, Hussain A. Contextual deep learning- based audio-visual switching for speech enhancement in real-world environments. Information Fusion. 2020;59:163\u201370.","journal-title":"Information Fusion"},{"key":"10219_CR152","doi-asserted-by":"crossref","unstructured":"Alladi T, Kohli V, Chamola V, Yu FR, Securing the internet of vehicles: a deep learning based classification framework. IEEE Networking Letters. 2021.","DOI":"10.1109\/LNET.2021.3058292"},{"issue":"2","key":"10219_CR153","first-page":"1","volume":"10","author":"W Wang","year":"2019","unstructured":"Wang W, Zheng VW, Yu H, Miao C. A survey of zero-shot learning: settings, methods, and applications. ACM Transactions on Intelligent Systems and Technology (TIST). 2019;10(2):1\u201337.","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"issue":"3","key":"10219_CR154","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3386252","volume":"53","author":"Y Wang","year":"2020","unstructured":"Wang Y, Yao Q, Kwok JT, Ni LM. Generalizing from a few examples: a survey on few-shot learning. ACM computing surveys (csur). 2020;53(3):1\u201334.","journal-title":"ACM computing surveys (csur)"},{"issue":"11","key":"10219_CR155","doi-asserted-by":"crossref","first-page":"5652","DOI":"10.1109\/TIP.2018.2861573","volume":"27","author":"S Rahman","year":"2018","unstructured":"Rahman S, Khan S, Porikli F. A unified approach for conventional zero-shot, generalized zero-shot, and few-shot learning. IEEE Trans Image Process. 2018;27(11):5652\u201367.","journal-title":"IEEE Trans Image Process"}],"container-title":["Cognitive Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-023-10219-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12559-023-10219-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-023-10219-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T16:04:48Z","timestamp":1712073888000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12559-023-10219-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,4]]},"references-count":155,"alternative-id":["10219"],"URL":"https:\/\/doi.org\/10.1007\/s12559-023-10219-3","relation":{},"ISSN":["1866-9956","1866-9964"],"issn-type":[{"value":"1866-9956","type":"print"},{"value":"1866-9964","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,4]]},"assertion":[{"value":"13 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article contains no studies with human participants or animals performed by authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}