{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T09:23:01Z","timestamp":1754558581332,"version":"3.40.5"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2022YFB3102100"],"award-info":[{"award-number":["2022YFB3102100"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSFC-Yeqisun Science Foundation","award":["U244120033"],"award-info":[{"award-number":["U244120033"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U24A20336","62372236","62172243","62402425","62402418"],"award-info":[{"award-number":["U24A20336","62372236","62172243","62402425","62402418"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2024M762829"],"award-info":[{"award-number":["2024M762829"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Foundation of the State~Key Laboratory of Integrated Services Networks","award":["ISN24-15"],"award-info":[{"award-number":["ISN24-15"]}]},{"name":"Qing Lan Project of Jiangsu Province"},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LD24F020002"],"award-info":[{"award-number":["LD24F020002"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang Provincial Priority- Funded Postdoctoral Research Project","award":["ZJ2024001"],"award-info":[{"award-number":["ZJ2024001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3565991","type":"journal-article","created":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T23:24:32Z","timestamp":1746055472000},"page":"4844-4859","source":"Crossref","is-referenced-by-count":1,"title":["TruVRF: Toward Triple-Granularity Verification on Machine Unlearning"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0081-0946","authenticated-orcid":false,"given":"Chunyi","family":"Zhou","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5783-2172","authenticated-orcid":false,"given":"Yansong","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Software Engineering, The University of Western Australia, Perth, WA, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1632-5737","authenticated-orcid":false,"given":"Anmin","family":"Fu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5624-2987","authenticated-orcid":false,"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3604-5369","authenticated-orcid":false,"given":"Zhi","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Software Engineering, The University of Western Australia, Perth, WA, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9172-4252","authenticated-orcid":false,"given":"Minhui","family":"Xue","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Sydney, NSW, Australia"}]},{"given":"Zhiyang","family":"Dai","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4268-372X","authenticated-orcid":false,"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8306-7195","authenticated-orcid":false,"given":"Yuqing","family":"Zhang","sequence":"additional","affiliation":[{"name":"National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-022-06178-9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00019"},{"volume-title":"Personal Information Protection and Electronic Documents Act","year":"2019","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.35"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196517"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484756"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559352"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3265506"},{"key":"ref10","article-title":"SoK: Dataset copyright auditing in machine learning systems","author":"Du","year":"2024","journal-title":"arXiv:2410.16618"},{"key":"ref11","first-page":"25","article-title":"SoK: Dataset copyright auditing in machine learning systems","volume-title":"Proc. IEEE Symp. Secur. Privacy (SP)","author":"Du"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363226"},{"article-title":"Verifiable and provably secure machine unlearning","volume-title":"Proc. IEEE Conf. Secure Trustworthy Mach. Learn. (SaTML)","author":"Eisenhofer","key":"ref13"},{"key":"ref14","article-title":"Backdoor attacks and countermeasures on deep learning: A comprehensive review","author":"Gao","year":"2020","journal-title":"arXiv:2007.10760"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"ref16","first-page":"3513","article-title":"Making AI forget you: Data deletion in machine learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst., Annu. Conf. Neural Inf. Process. Syst. (NeurIPS)","volume":"32","author":"Ginart"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00932"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i13.17371"},{"key":"ref19","first-page":"3832","article-title":"Certified data removal from machine learning models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Guo"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3328269"},{"key":"ref21","first-page":"16319","article-title":"Adaptive machine unlearning","volume-title":"Proc. Neural Inf. Process. Syst. (NeurIPS)","author":"Gupta"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3523273"},{"key":"ref23","first-page":"2008","article-title":"Approximate data deletion from machine learning models","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Izzo"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00106"},{"volume-title":"Kaggle Datasets","year":"2025","key":"ref25"},{"article-title":"Learning multiple layers of features from tiny images","year":"2012","author":"Krizhevsky","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.277"},{"key":"ref28","first-page":"14900","article-title":"Anti-backdoor learning: Training clean models on poisoned data","volume-title":"Proc. NIPS","volume":"34","author":"Li"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i7.20736"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01017"},{"key":"ref31","first-page":"931","article-title":"Descent-to-delete: Gradient-based methods for machine unlearning","volume-title":"Proc. 32nd Int. Conf. Algorithmic Learn. Theory","author":"Neel"},{"volume-title":"General Data Protection Regulation","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457239"},{"key":"ref34","first-page":"18075","article-title":"Remember what you want to forget: Algorithms for machine unlearning","volume-title":"Proc. NIPS","author":"Sekhari"},{"volume-title":"Amazon Data Exchange","year":"2025","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref37","first-page":"18021","article-title":"Manipulating SGD with data ordering attacks","volume-title":"Proc. NIPS","author":"Shumailov"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0072"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330885"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033395"},{"volume-title":"California Privacy Rights Act","year":"2020","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3520863"},{"key":"ref43","first-page":"1541","article-title":"Demon in the variant: Statistical analysis of DNNs for robust backdoor contamination detection","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Tang"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP53844.2022.00027"},{"key":"ref45","first-page":"4007","article-title":"On the necessity of auditable algorithmic definitions for machine unlearning","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Thudi"},{"key":"ref46","first-page":"4126","article-title":"Machine unlearning via algorithmic stability","volume-title":"Proc. Conf. Learn. Theory","author":"Ullah"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref48","first-page":"36396","article-title":"Training with more confidence: Mitigating injected and natural backdoors during training","volume-title":"Proc. NIPS","volume":"35","author":"Wang"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23087"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3358993"},{"key":"ref51","first-page":"10355","article-title":"DeltaGrad: Rapid retraining of machine learning models","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Wu"},{"key":"ref52","article-title":"Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017","journal-title":"arXiv:1708.07747"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0046"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/556"},{"article-title":"Verification of machine unlearning is fragile","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Zhang","key":"ref55"},{"key":"ref56","first-page":"13433","article-title":"Prompt certified machine unlearning with randomized gradient smoothing and quantization","volume-title":"Proc. Neural Inf. Process. Syst. (NeurIPS)","author":"Zhang"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23171"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/10981443.pdf?arnumber=10981443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T17:31:54Z","timestamp":1747330314000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10981443\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3565991","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2025]]}}}