{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T13:07:47Z","timestamp":1774530467492,"version":"3.50.1"},"reference-count":58,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.neucom.2026.133369","type":"journal-article","created":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T16:03:25Z","timestamp":1773763405000},"page":"133369","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Accurate and fast machine unlearning with hessian-guided overfitting approximation"],"prefix":"10.1016","volume":"681","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9614-4494","authenticated-orcid":false,"given":"Weidong","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Wangjun","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2439-3518","authenticated-orcid":false,"given":"Kongyang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Tiancai","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Haozhong","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yuxiong","family":"Pang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2026.133369_bib0005","doi-asserted-by":"crossref","first-page":"3222","DOI":"10.1109\/OJCOMS.2024.3454247","article-title":"Private data leakage in federated contrastive learning networks","volume":"6","author":"Chen","year":"2025","journal-title":"IEEE Open J. Commun. Soc."},{"key":"10.1016\/j.neucom.2026.133369_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2025.130422","article-title":"Advancing ensemble learning against unlearnable data","volume":"647","author":"Hapuarachchi","year":"2025","journal-title":"Neurocomputing"},{"issue":"1","key":"10.1016\/j.neucom.2026.133369_bib0015","doi-asserted-by":"crossref","DOI":"10.1093\/cybsec\/tyy001","article-title":"Forgetting personal data and revoking consent under the GDPR: challenges and proposed solutions","volume":"4","author":"Politou","year":"2018","journal-title":"J. Cybersecur."},{"key":"10.1016\/j.neucom.2026.133369_bib0020","unstructured":"Ccpa, https:\/\/oag.ca.gov\/privacy\/ccpa"},{"key":"10.1016\/j.neucom.2026.133369_bib0025","unstructured":"Pipeda, https:\/\/laws-lois.justice.gc.ca\/ENG\/ACTS\/P-8.6\/index.html"},{"key":"10.1016\/j.neucom.2026.133369_bib0030","doi-asserted-by":"crossref","first-page":"4001","DOI":"10.3390\/math12244001","article-title":"Private data protection with machine unlearning in contrastive learning networks","volume":"12","author":"Chen","year":"2024","journal-title":"Mathematics"},{"key":"10.1016\/j.neucom.2026.133369_bib0035","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2025.131110","article-title":"Feaun: feature unlearning in vertical federated learning for Iiot against feature inference attacks","volume":"652","author":"Lu","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2026.133369_bib0040","doi-asserted-by":"crossref","first-page":"3265","DOI":"10.1109\/OJCOMS.2024.3518503","article-title":"Private data protection with machine unlearning for next-generation networks","volume":"6","author":"Chen","year":"2025","journal-title":"IEEE Open J. Commun. Soc."},{"key":"10.1016\/j.neucom.2026.133369_bib0045","series-title":"IEEE Symposium on Security and Privacy","first-page":"141","article-title":"Machine unlearning","author":"Bourtoule","year":"2021"},{"key":"10.1016\/j.neucom.2026.133369_bib0050","series-title":"International Conference on Machine Learning","first-page":"1092","article-title":"Machine unlearning for random forests","author":"Brophy","year":"2021"},{"key":"10.1016\/j.neucom.2026.133369_bib0055","series-title":"Proceedings of the ACM Web Conference 2023","first-page":"651","article-title":"Gif: a general graph unlearning strategy via influence function","author":"Wu","year":"2023"},{"key":"10.1016\/j.neucom.2026.133369_bib0060","series-title":"ACM Web Conference","first-page":"2768","article-title":"Recommendation unlearning","author":"Chen","year":"2022"},{"key":"10.1016\/j.neucom.2026.133369_bib0065","author":"Guo"},{"key":"10.1016\/j.neucom.2026.133369_bib0070","author":"Warnecke"},{"key":"10.1016\/j.neucom.2026.133369_bib0075","first-page":"931","article-title":"Descent-to-delete: gradient-based methods for machine unlearning, in","author":"Neel","year":"2021","journal-title":"Algorithmic Learning Theory"},{"key":"10.1016\/j.neucom.2026.133369_bib0080","author":"Yoon"},{"key":"10.1016\/j.neucom.2026.133369_bib0085","doi-asserted-by":"crossref","first-page":"2345","DOI":"10.1109\/TIFS.2023.3265506","article-title":"Zero-shot machine unlearning","volume":"18","author":"Chundawat","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.neucom.2026.133369_bib0090","series-title":"IEEE Symposium on Security and Privacy","first-page":"463","article-title":"Towards making systems forget with machine unlearning","author":"Cao","year":"2015"},{"key":"10.1016\/j.neucom.2026.133369_bib0095","series-title":"Optimizing Federated Incremental Learning: Efficient Malicious Data Removal for Big Data Analytics","author":"Chen","year":"2026"},{"issue":"3","key":"10.1016\/j.neucom.2026.133369_bib0100","doi-asserted-by":"crossref","first-page":"2150","DOI":"10.1109\/TETCI.2024.3379240","article-title":"Machine unlearning: solutions and challenges","volume":"8","author":"Xu","year":"2024","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"10.1016\/j.neucom.2026.133369_bib0105","series-title":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","first-page":"735","article-title":"Efficient repair of polluted machine learning systems via causal unlearning","author":"Cao","year":"2018"},{"key":"10.1016\/j.neucom.2026.133369_bib0110","series-title":"2021 IEEE 31st International Workshop on Machine Learning for Signal Processing (MLSP)","first-page":"1","article-title":"A unified pac-bayesian framework for machine unlearning via information risk minimization","author":"Jose","year":"2021"},{"key":"10.1016\/j.neucom.2026.133369_bib0115","series-title":"International Workshop on Applied AI for Database Systems and Applications","article-title":"Amnesia\u2013towards machine learning models that can forget user data very fast","author":"Schelter","year":"2019"},{"key":"10.1016\/j.neucom.2026.133369_bib0120","series-title":"Conference on Learning Theory","first-page":"4126","article-title":"Machine unlearning via algorithmic stability","author":"Ullah","year":"2021"},{"key":"10.1016\/j.neucom.2026.133369_bib0125","series-title":"ACM SIGSAC Conference on Computer and Communications Security","first-page":"499","article-title":"Graph unlearning","author":"Chen","year":"2022"},{"key":"10.1016\/j.neucom.2026.133369_bib0130","series-title":"USENIX Security Symposium","first-page":"3205","article-title":"Inductive graph unlearning","author":"Wang","year":"2023"},{"key":"10.1016\/j.neucom.2026.133369_bib0135","doi-asserted-by":"crossref","DOI":"10.1016\/j.neunet.2025.107648","article-title":"Fast yet versatile machine unlearning for deep neural networks","volume":"190","author":"Chen","year":"2025","journal-title":"Neural Netw."},{"issue":"18","key":"10.1016\/j.neucom.2026.133369_bib0140","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/electronics12183845","article-title":"Fast and accurate SNN model strengthening for industrial applications","volume":"12","author":"Zhou","year":"2023","journal-title":"Electronics"},{"key":"10.1016\/j.neucom.2026.133369_bib0145","first-page":"16319","article-title":"Adaptive machine unlearning","volume":"34","author":"Gupta","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133369_bib0150","series-title":"International Conference on Artificial Intelligence and Statistics","first-page":"2008","article-title":"Approximate data deletion from machine learning models","author":"Izzo","year":"2021"},{"key":"10.1016\/j.neucom.2026.133369_bib0155","series-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"9304","article-title":"Eternal sunshine of the spotless net: selective forgetting in deep networks","author":"Golatkar","year":"2020"},{"issue":"1","key":"10.1016\/j.neucom.2026.133369_bib0160","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s12243-023-00960-z","article-title":"Privacy preserving machine unlearning for smart cities","volume":"79","author":"Chen","year":"2024","journal-title":"Ann. Telecommun."},{"key":"10.1016\/j.neucom.2026.133369_bib0165","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"7210","article-title":"Can bad teaching induce forgetting? Unlearning in deep networks using an incompetent teacher","volume":"vol. 37","author":"Chundawat","year":"2023"},{"key":"10.1016\/j.neucom.2026.133369_bib0170","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"11516","article-title":"Amnesiac machine learning","volume":"vol. 35","author":"Graves","year":"2021"},{"key":"10.1016\/j.neucom.2026.133369_bib0175","author":"Chen"},{"issue":"12","key":"10.1016\/j.neucom.2026.133369_bib0180","doi-asserted-by":"crossref","first-page":"11548","DOI":"10.1109\/TPAMI.2025.3597350","article-title":"Towards natural machine unlearning","volume":"47","author":"He","year":"2025","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.neucom.2026.133369_bib0185","series-title":"ACM Web Conference","first-page":"4635","article-title":"Towards safe machine unlearning: a paradigm that mitigates performance degradation","author":"Ye","year":"2025"},{"key":"10.1016\/j.neucom.2026.133369_bib0190","series-title":"ACM Web Conference","first-page":"3366","article-title":"Funu: boosting machine unlearning efficiency by filtering unnecessary unlearning","author":"Li","year":"2025"},{"key":"10.1016\/j.neucom.2026.133369_bib0195","series-title":"ACM International Conference on Information and Knowledge Management","first-page":"1925","article-title":"Enabling group fairness in machine unlearning via distribution correction","author":"Liu","year":"2025"},{"key":"10.1016\/j.neucom.2026.133369_bib0200","author":"Chen"},{"key":"10.1016\/j.neucom.2026.133369_bib0205","series-title":"Advances in Neural Information Processing Systems","first-page":"1106","article-title":"Imagenet classification with deep convolutional neural networks","volume":"vol. 25","author":"Krizhevsky","year":"2012"},{"issue":"11","key":"10.1016\/j.neucom.2026.133369_bib0210","doi-asserted-by":"crossref","first-page":"2278","DOI":"10.1109\/5.726791","article-title":"Gradient-based learning applied to document recognition","volume":"86","author":"LeCun","year":"2002","journal-title":"Proc. IEEE"},{"issue":"1","key":"10.1016\/j.neucom.2026.133369_bib0215","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1111\/j.2517-6161.1996.tb02080.x","article-title":"Regression shrinkage and selection via the lasso","volume":"58","author":"Tibshirani","year":"1996","journal-title":"J. R. Stat. Soc. Ser. B Stat. Methodol."},{"issue":"1","key":"10.1016\/j.neucom.2026.133369_bib0220","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1111\/j.1467-9868.2007.00627.x","article-title":"The group lasso for logistic regression","volume":"70","author":"Meier","year":"2008","journal-title":"J. R. Stat. Soc. Ser. B Stat. Methodol."},{"key":"10.1016\/j.neucom.2026.133369_bib0225","author":"Hinton"},{"key":"10.1016\/j.neucom.2026.133369_bib0230","series-title":"International Conference on Machine Learning","first-page":"1058","article-title":"Regularization of neural networks using dropconnect","author":"Wan","year":"2013"},{"key":"10.1016\/j.neucom.2026.133369_bib0235","article-title":"Concrete dropout","volume":"30","author":"Gal","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133369_bib0240","series-title":"IEEE Symposium on Security and Privacy","first-page":"3","article-title":"Membership inference attacks against machine learning models","author":"Shokri","year":"2017"},{"key":"10.1016\/j.neucom.2026.133369_bib0245","series-title":"IEEE Symposium on Security and Privacy","first-page":"1897","article-title":"Membership inference attacks from first principles","author":"Carlini","year":"2022"},{"key":"10.1016\/j.neucom.2026.133369_bib0250","doi-asserted-by":"crossref","first-page":"134981","DOI":"10.52202\/079017-4290","article-title":"Membership inference attacks against fine-tuned large language models via self-prompt calibration","volume":"37","author":"Fu","year":"2024","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133369_bib0255","series-title":"MICCAI Workshop on Deep Generative Models","first-page":"298","article-title":"Frequency-calibrated membership inference attacks on medical image diffusion models","author":"Zhao","year":"2025"},{"key":"10.1016\/j.neucom.2026.133369_bib0260","series-title":"ACM Southeast Conference","first-page":"191","article-title":"Evaluation of query-based membership inference attack on the medical data","author":"Pedarla","year":"2023"},{"key":"10.1016\/j.neucom.2026.133369_bib0265","author":"Brodzinski"},{"key":"10.1016\/j.neucom.2026.133369_bib0270","series-title":"IEEE Security and Privacy Workshops","first-page":"98","article-title":"Membership inference attacks on sequence models","author":"Rossi","year":"2025"},{"key":"10.1016\/j.neucom.2026.133369_bib0275","series-title":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1245","article-title":"Riddle me this! stealthy membership inference for retrieval-augmented generation","author":"Naseh","year":"2025"},{"key":"10.1016\/j.neucom.2026.133369_bib0280","series-title":"USENIX Security Symposium","first-page":"5465","article-title":"Enhanced label-only membership inference attacks with fewer queries","author":"Li","year":"2025"},{"key":"10.1016\/j.neucom.2026.133369_bib0285","series-title":"IOP Conference Series: Materials Science and Engineering","article-title":"Review of second-order optimization techniques in artificial neural networks backpropagation","volume":"vol. 495","author":"Tan","year":"2019"},{"key":"10.1016\/j.neucom.2026.133369_bib0290","series-title":"Advances in Neural Information Processing Systems","first-page":"3320","article-title":"How transferable are features in deep neural networks?","volume":"vol. 27","author":"Yosinski","year":"2014"}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226007666?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226007666?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T12:31:47Z","timestamp":1774528307000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231226007666"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":58,"alternative-id":["S0925231226007666"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133369","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Accurate and fast machine unlearning with hessian-guided overfitting approximation","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133369","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"133369"}}