{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T20:38:52Z","timestamp":1773175132590,"version":"3.50.1"},"reference-count":61,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1109\/sp40001.2021.00019","type":"proceedings-article","created":{"date-parts":[[2021,8,26]],"date-time":"2021-08-26T21:03:31Z","timestamp":1630011811000},"page":"141-159","source":"Crossref","is-referenced-by-count":518,"title":["Machine Unlearning"],"prefix":"10.1109","author":[{"given":"Lucas","family":"Bourtoule","sequence":"first","affiliation":[{"name":"University of Toronto"}]},{"given":"Varun","family":"Chandrasekaran","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison"}]},{"given":"Christopher A.","family":"Choquette-Choo","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Hengrui","family":"Jia","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Adelin","family":"Travers","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Baiwu","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"David","family":"Lie","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Nicolas","family":"Papernot","sequence":"additional","affiliation":[{"name":"University of Toronto"}]}],"member":"263","reference":[{"key":"ref13","first-page":"1069","article-title":"Differentially private empirical risk minimization","volume":"12","author":"chaudhuri","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref57","article-title":"Active learning for convolutional neural networks: A core-set approach","author":"sener","year":"2017"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Foundations and Trends\ufffd in Theoretical Computer Science"},{"key":"ref56","article-title":"Data-dependent coresets for compressing neural networks with applications to generalization bounds","volume":"abs 1804 5345","author":"baykal","year":"2018","journal-title":"CoRR"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.35"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133984"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132760"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015178"},{"key":"ref52","first-page":"1401","article-title":"A brief introduction to boosting","volume":"99","author":"schapire","year":"1999","journal-title":"IJCAI"},{"key":"ref11","article-title":"The secret sharer: Evaluating and testing unintended memorization in neural networks","author":"carlini","year":"2019","journal-title":"Proceedings of the 28th USENIX Conference on Security Symposium"},{"key":"ref55","first-page":"892","article-title":"Active learning by querying informative and representative examples","author":"huang","year":"2010","journal-title":"Advances in neural information processing systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref54","article-title":"Active learning literature survey","author":"settles","year":"2009","journal-title":"University of Wisconsin-Madison Department of Computer Sciences Tech Rep"},{"key":"ref17","article-title":"Exploiting machine learning to subvert your spam filter","author":"nelson","year":"2008","journal-title":"Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293351"},{"key":"ref19","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"2012"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644895"},{"key":"ref51","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009"},{"key":"ref50","article-title":"Reading digits in natural images with unsupervised feature learning","author":"netzer","year":"2011","journal-title":"NIPS"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1613\/jair.614"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref48","first-page":"3630","article-title":"Matching networks for one shot learning","author":"vinyals","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref42","first-page":"4077","article-title":"Prototypical networks for few-shot learning","author":"snell","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref41","article-title":"Outrageously large neural networks: The sparsely-gated mixture-of-experts layer","author":"shazeer","year":"2017"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3523-0"},{"key":"ref8","article-title":"The seven sins of personal-data processing systems under gdpr","author":"shastri","year":"2019","journal-title":"USENIX HotCloud"},{"key":"ref7","article-title":"Announcement: Privacy commissioner seeks federal court determination on key issue for canadians&#x2019; online reputation","year":"2018"},{"key":"ref9","article-title":"Lex access to european union law","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1561\/2200000018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2648584.2648589"},{"key":"ref6","article-title":"Bill text","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2013.03.010"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-010-0420-4"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00932"},{"key":"ref34","article-title":"Certified data removal from machine learning models","author":"guo","year":"2019"},{"key":"ref37","article-title":"Large scale distributed deep networks","author":"dean","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref36","article-title":"Making AI forget you: Data deletion in machine learning","volume":"abs 1907 5012","author":"ginart","year":"2019","journal-title":"CoRR"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"ref30","article-title":"The bayesian case model: A generative approach for case-based reasoning and prototype classification","author":"kim","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref33","first-page":"289","article-title":"Privacy-preserving logistic regression","author":"chaudhuri","year":"2009","journal-title":"Advances in neural information processing systems"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330723"},{"key":"ref1","article-title":"Detecting cancer metastases on gigapixel pathology images","author":"liu","year":"2017","journal-title":"Tech Rep"},{"key":"ref39","first-page":"1","article-title":"Ensemble methods in machine learning","author":"dietterich","year":"2000","journal-title":"International Workshop on Multiple Classifier Systems"},{"key":"ref38","first-page":"65","article-title":"Demystifying parallel and distributed deep learning: An in-depth concurrency analysis","volume":"52","author":"ben-nun","year":"2019","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107298019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/800057.808710"},{"key":"ref20","first-page":"105","article-title":"Thoughts on hypothesis boosting","volume":"45","author":"kearns","year":"1988","journal-title":"Unpublished manuscript"},{"key":"ref22","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354208"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1980.10486199"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"ref29","first-page":"1885","article-title":"Understanding black-box predictions via influence functions","author":"koh","year":"0"},{"key":"ref60","first-page":"17","article-title":"Making argument systems for outsourced computation practical (sometimes)","volume":"1","author":"setty","year":"2012","journal-title":"NDSS"},{"key":"ref61","year":"0"}],"event":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2021,5,24]]},"end":{"date-parts":[[2021,5,27]]}},"container-title":["2021 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9519381\/9519382\/09519428.pdf?arnumber=9519428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:12:08Z","timestamp":1699485128000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9519428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/sp40001.2021.00019","relation":{},"subject":[],"published":{"date-parts":[[2021,5]]}}}