{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:32:32Z","timestamp":1774449152519,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100020771","name":"Natural Science Foundation for Young Scientists of Shanxi Province","doi-asserted-by":"publisher","award":["62402040"],"award-info":[{"award-number":["62402040"]}],"id":[{"id":"10.13039\/501100020771","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Postdoctoral Fellowship Program of CPSF","award":["ZB20230938"],"award-info":[{"award-number":["ZB20230938"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2024T171132"],"award-info":[{"award-number":["2024T171132"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2023M740246"],"award-info":[{"award-number":["2023M740246"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006469","name":"Fundo para o Desenvolvimento das Ci\u00eancias e da Tecnologia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006469","id-type":"DOI","asserted-by":"publisher"}]},{"name":"General R&#x0026;D Subsidy Program","award":["0038\/2022\/A"],"award-info":[{"award-number":["0038\/2022\/A"]}]},{"name":"NSFC-FDCT"},{"name":"Joint Scientific Research Project Fund","award":["0051\/2022\/AFJ"],"award-info":[{"award-number":["0051\/2022\/AFJ"]}]},{"name":"Guangzhou University Research Project","award":["RQ2021013"],"award-info":[{"award-number":["RQ2021013"]}]},{"name":"Open Foundation of Key Laboratory of Cyberspace Security"},{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["KLCS20240209"],"award-info":[{"award-number":["KLCS20240209"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472032"],"award-info":[{"award-number":["62472032"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/tmc.2025.3530529","type":"journal-article","created":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T18:51:11Z","timestamp":1739472671000},"page":"5031-5044","source":"Crossref","is-referenced-by-count":24,"title":["Feature-Based Machine Unlearning for Vertical Federated Learning in IoT Networks"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-0667-3706","authenticated-orcid":false,"given":"Zijie","family":"Pan","sequence":"first","affiliation":[{"name":"Faculty of Data Science, City University of Macau, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1658-4931","authenticated-orcid":false,"given":"Zuobin","family":"Ying","sequence":"additional","affiliation":[{"name":"Faculty of Data Science, City University of Macau, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0962-4464","authenticated-orcid":false,"given":"Yajie","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7684-8540","authenticated-orcid":false,"given":"Chuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2626-4883","authenticated-orcid":false,"given":"Weiting","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1680-2521","authenticated-orcid":false,"given":"Wanlei","family":"Zhou","sequence":"additional","affiliation":[{"name":"Faculty of Data Science, City University of Macau, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"A survey on vertical federated learning: From a layered perspective","author":"Yang","year":"2023"},{"key":"ref2","article-title":"A survey of privacy threats and defense in vertical federated learning: From model life cycle perspective","author":"Yu","year":"2024"},{"key":"ref3","article-title":"A communication efficient vertical federated learning framework","author":"Liu","year":"2019"},{"key":"ref4","article-title":"A Quasi-Newton method based vertical federated learning framework for logistic regression","author":"Yang","year":"2019"},{"key":"ref5","article-title":"Parallel distributed logistic regression for vertical federated learning without third-party coordinator","author":"Yang","year":"2019"},{"key":"ref6","article-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption","author":"Hardy","year":"2017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ecai50035.2020.9223127"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/globecom42002.2020.9347960"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3054610"},{"key":"ref10","article-title":"Practical secure aggregation for federated learning on user-held data","author":"Bonawitz","year":"2016"},{"key":"ref11","first-page":"289","article-title":"Private nearest neighbors classification in federated databases","volume-title":"IACR Cryptol. ePrint Arch.","volume":"2018","author":"Schoppmann","year":"2018"},{"key":"ref12","article-title":"A unified solution for privacy and communication efficiency in vertical federated learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Wang"},{"key":"ref13","article-title":"Privacy-preserving design of graph neural networks with applications to vertical federated learning","author":"Wu","year":"2023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3234196"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3275161"},{"key":"ref16","first-page":"2251","article-title":"GRAWA: Gradient-based weighted averaging for distributed training of deep learning models","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Dimlioglu"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ispa-bdcloud-socialcom-sustaincom59178.2023.00103"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/iccv51070.2023.01776"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/iscas51556.2021.9401521"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2024.3486028"},{"key":"ref21","article-title":"Vertical federated learning: Taxonomies, threats, and prospects","author":"Li","year":"2023"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.07.033"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2023.3333879"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2023.3279839"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2023\/418"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486872"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/iccv51070.2023.00480"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3603620"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3639304"},{"key":"ref31","article-title":"Contrastive unlearning: A contrastive approach to machine unlearning","author":"Lee","year":"2024"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2023.105885"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2015.35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484756"},{"key":"ref35","first-page":"4126","article-title":"Machine unlearning via algorithmic stability","volume-title":"Proc. Conf. Learn. Theory","author":"Ullah"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/sp40001.2021.00019"},{"key":"ref37","article-title":"Machine unlearning of federated clusters","volume-title":"Proc. 11th Int. Conf. Learn. Representations","author":"Pan"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata59044.2023.10386841"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3297905"},{"key":"ref40","article-title":"Fast model DeBias with machine unlearning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Chen"},{"key":"ref41","article-title":"Towards unbounded machine unlearning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Kurmanji"},{"key":"ref42","article-title":"Model sparsity can simplify machine unlearning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Jia"},{"key":"ref43","article-title":"Has approximate machine unlearning been evaluated properly? From auditing to side effects","author":"Wang","year":"2024"},{"key":"ref44","first-page":"4007","article-title":"On the necessity of auditable algorithmic definitions for machine unlearning","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Thudi"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3331239"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-01767-4"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3214840"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/tfuzz.2003.814861"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.03.001"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.12.020"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23119"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3603620"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3265506"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3194884"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/10990048\/10886994.pdf?arnumber=10886994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T17:41:55Z","timestamp":1746726115000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10886994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":54,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2025.3530529","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}