{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:38:39Z","timestamp":1775068719971,"version":"3.50.1"},"reference-count":205,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Neural Netw. Learning Syst."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tnnls.2024.3486109","type":"journal-article","created":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T13:43:25Z","timestamp":1731419005000},"page":"11676-11696","source":"Crossref","is-referenced-by-count":34,"title":["Exploring the Landscape of Machine Unlearning: A Comprehensive Survey and Taxonomy"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9730-665X","authenticated-orcid":false,"given":"Thanveer","family":"Shaik","sequence":"first","affiliation":[{"name":"School of Mathematics, Physics and Computing, University of Southern Queensland, Toowoomba, Australia"}]},{"given":"Xiaohui","family":"Tao","sequence":"additional","affiliation":[{"name":"School of Mathematics, Physics and Computing, University of Southern Queensland, Toowoomba, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0965-3617","authenticated-orcid":false,"given":"Haoran","family":"Xie","sequence":"additional","affiliation":[{"name":"Division of Artificial Intelligence, School of Data Science, Lingnan University, TuenMun, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7553-6916","authenticated-orcid":false,"given":"Lin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6840-0578","authenticated-orcid":false,"given":"Xiaofeng","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3370-471X","authenticated-orcid":false,"given":"Qing","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, SAR, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00592-x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.7861\/futurehosp.6-2-94"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2023.18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-021-00475-2"},{"key":"ref5","first-page":"2008","article-title":"Approximate data deletion from machine learning models","volume-title":"Proc. 24th Int. conf. Artif. Intell. Statist.","volume":"130","author":"Izzo"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-01767-4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.35"},{"key":"ref8","article-title":"Verifiable and provably secure machine unlearning","author":"Eisenhofer","year":"2022","journal-title":"arXiv:2210.09126"},{"key":"ref9","article-title":"A survey of machine unlearning","author":"Nguyen","year":"2022","journal-title":"arXiv:2209.02299"},{"key":"ref10","first-page":"18075","article-title":"Remember what you want to forget: Algorithms for machine unlearning","volume-title":"Proc. NIPS","author":"Sekhari"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01017"},{"key":"ref12","first-page":"141","article-title":"MedRoBERTa.Nl: A language model for Dutch electronic health records","volume":"11","author":"Verkijk","year":"2021","journal-title":"Comput. Linguistics Netherlands J."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517406"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3603620"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3331239"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.59224\/bjlti.v1i1.163-186"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-023-00398-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.08.007"},{"key":"ref19","article-title":"Decision making within a cancel culture environment","author":"Fortner","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1093\/grurint\/ikaa002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3358993"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3516514"},{"key":"ref23","article-title":"Tight bounds for machine unlearning via differential privacy","author":"Huang","year":"2023","journal-title":"arXiv:2309.00886"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3474124.3474208"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00085"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17284"},{"key":"ref27","first-page":"1589","article-title":"Fawkes: Protecting privacy against unauthorized deep learning models","volume-title":"Proc. 29th USENIX Secur. Symp. (USENIX Secur.)","author":"Shan"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP53844.2022.00027"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0072"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16452-1_66"},{"key":"ref31","article-title":"Learning to unlearn: Building immunity to dataset bias in medical imaging studies","author":"Ashraf","year":"2018","journal-title":"arXiv:1812.01716"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-6115"},{"key":"ref33","first-page":"1874","article-title":"Skin deep unlearning: Artefact and instrument debiasing in the context of melanoma classification","volume-title":"Proc. Int. conf. Mach. Learn.","author":"Bevan"},{"key":"ref34","first-page":"16319","article-title":"Adaptive machine unlearning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Gupta"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3382726"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2451248.2451253"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i11.29092"},{"key":"ref38","first-page":"10355","article-title":"DeltaGrad: Rapid retraining of machine learning models","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Wu"},{"key":"ref39","article-title":"Knowledge neurons in pretrained transformers","author":"Dai","year":"2021","journal-title":"arXiv:2104.08696"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00482"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796721"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SaTML54575.2023.00047"},{"key":"ref43","article-title":"A survey of large language models","author":"Xin Zhao","year":"2023","journal-title":"arXiv:2303.18223"},{"issue":"4","key":"ref44","article-title":"\u2019right to be forgotten and re-referencing\u2019and the freedom of speech and expression: Indian resonances to Google vs. Cnil","volume":"14","author":"Kulathoor","year":"2022","journal-title":"Int. J. Early Childhood Special Educ."},{"key":"ref45","article-title":"Forget unlearning: Towards true data-deletion in machine learning","author":"Chourasia","year":"2022","journal-title":"arXiv:2210.08911"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_13"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0079"},{"key":"ref48","article-title":"Efficiently maintaining next basket recommendations under additions and deletions of baskets and items","author":"Wang","year":"2022","journal-title":"arXiv:2201.13313"},{"key":"ref49","article-title":"Making AI forget you: Data deletion in machine learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Ginart"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i7.20736"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3128646"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118101"},{"key":"ref53","article-title":"On the robustness of ensemble-based machine learning against data poisoning","author":"Anisetti","year":"2022","journal-title":"arXiv.2209.14013"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT57182.2022.9994126"},{"key":"ref55","article-title":"Bounding membership inference","author":"Thudi","year":"2022","journal-title":"arXiv:2202.12232"},{"key":"ref56","volume-title":"Statistical Tables for Biological, Agricultural and Medical Research, Edited By Ra Fisher and F. Yates","author":"Fisher","year":"1963"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1561\/2200000056"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2109382"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3265506"},{"key":"ref61","first-page":"1","article-title":"Self-adaptation for machine learning based systems","volume-title":"Proc. ECSA (Companion)","author":"Casimiro"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-022-06178-9"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00019"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom56396.2022.00077"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11071066"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107899"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512222"},{"key":"ref68","article-title":"Model sparsity can simplify machine unlearning","author":"Jia","year":"2023","journal-title":"arXiv:2304.04934"},{"key":"ref69","first-page":"12749","article-title":"Sanity checks for lottery tickets: Does your winning ticket really win the jackpot?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Ma"},{"key":"ref70","first-page":"6377","article-title":"Pruning neural networks without any data by iteratively conserving synaptic flow","volume-title":"Proc. Int. Conf. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Tanaka"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.l803.03635"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01929"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2024.3398024"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3055564"},{"key":"ref75","article-title":"Federated unlearning with knowledge distillation","author":"Wu","year":"2022","journal-title":"arXiv:2201.09441"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583305"},{"key":"ref77","article-title":"Neural attention distillation: Erasing backdoor triggers from deep neural networks","author":"Li","year":"2021","journal-title":"arXiv:2101.05930"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3328269"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359824"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i13.17371"},{"key":"ref81","article-title":"Few-shot unlearning by model inversion","author":"Yoon","year":"2022","journal-title":"arXiv:2205.15567"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2018.0083"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3310049"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3297905"},{"key":"ref85","article-title":"Subspace based federated unlearning","author":"Li","year":"2023","journal-title":"arXiv:2302.12448"},{"key":"ref86","article-title":"Machine unlearning of federated clusters","author":"Pan","year":"2022","journal-title":"arXiv:2210.16424"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC51858.2021.9593225"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/DSLW53931.2022.9820602"},{"key":"ref89","article-title":"Forgettable federated linear learning with certified data unlearning","author":"Jin","year":"2023","journal-title":"arXiv:2306.02216"},{"key":"ref90","article-title":"VeriFi: Towards verifiable federated unlearning","author":"Gao","year":"2022","journal-title":"arXiv:2205.12709"},{"key":"ref91","first-page":"6674","article-title":"Efficiently forgetting what you have learned in graph representation learning via projection","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Cong"},{"key":"ref92","article-title":"Grapheditor: An efficient graph representation learning and unlearning approach","author":"Cong","year":"2022"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599271"},{"key":"ref94","article-title":"Inductive graph unlearning","author":"Wang","year":"2023","journal-title":"arXiv:2304.03093"},{"key":"ref95","article-title":"GNNDelete: A general strategy for unlearning in graph neural networks","author":"Cheng","year":"2023","journal-title":"arXiv:2302.13406"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583547"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583521"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559352"},{"key":"ref99","article-title":"Certified graph unlearning","author":"Chien","year":"2022","journal-title":"arXiv:2206.09140"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00932"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.01.012"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25879"},{"key":"ref103","article-title":"Evaluating machine unlearning via epistemic uncertainty","author":"Becker","year":"2022","journal-title":"arXiv:2208.10836"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"key":"ref106","article-title":"FairSISA: Ensemble post-processing to improve fairness of unlearning in LLMs","author":"Kadhe","year":"2023","journal-title":"arXiv:2312.07420"},{"key":"ref107","article-title":"Relational inductive biases, deep learning, and graph networks","author":"Battaglia","year":"2018","journal-title":"arXiv:1806.01261"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3266233"},{"key":"ref109","article-title":"Unfolded self-reconstruction LSH: Towards machine unlearning in approximate nearest neighbour search","author":"Tan","year":"2023","journal-title":"arXiv:2304.02350"},{"key":"ref110","article-title":"Machine unlearning: Solutions and challenges","author":"Xu","year":"2023","journal-title":"arXiv:2308.07061"},{"key":"ref111","article-title":"ML attack models: Adversarial attacks and data poisoning attacks","author":"Lin","year":"2021","journal-title":"arXiv:2112.02797"},{"key":"ref112","first-page":"2633","article-title":"Extracting training data from large language models","volume-title":"Proc. USENIX Secur. Symp.","volume":"6","author":"Carlini"},{"key":"ref113","article-title":"Threats, attacks, and defenses in machine unlearning: A survey","author":"Liu","year":"2024","journal-title":"arXiv:2403.13682"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0072"},{"key":"ref115","article-title":"PolicyCleanse: Backdoor detection and mitigation in reinforcement learning","author":"Guo","year":"2022","journal-title":"arXiv:2202.03609"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457239"},{"key":"ref117","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref118","first-page":"10399","article-title":"Adversarial robustness via runtime masking and cleansing","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wu"},{"key":"ref119","first-page":"325","article-title":"Learning fair representations","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zemel"},{"key":"ref120","article-title":"On fairness and calibration","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Pleiss"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00390-x"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.aan6080"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/3474124.3474158"},{"key":"ref124","article-title":"AI model disgorgement: Methods and choices","author":"Achille","year":"2023","journal-title":"arXiv:2304.03545"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3517886"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23087"},{"key":"ref127","first-page":"4007","article-title":"On the necessity of auditable algorithmic definitions for machine unlearning","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Thudi"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1177\/13505076211060433"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i19.30138"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1002\/hrdq.21387"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1111\/bioe.12887"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-022-05050-z"},{"key":"ref133","article-title":"A methodology to build interpretable machine learning models in organizations","author":"Sajid","year":"2023"},{"key":"ref134","article-title":"Learning together: Adapting methods for family and community research during a pandemic","volume-title":"Proc. Joan Ganz Cooney Center at Sesame Workshop","author":"Takeuchi"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW52865.2021.00036"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.3390\/educsci12110782"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12051102"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1111\/1541-4337.13124"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3050929"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.3389\/frai.2020.561802"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11504"},{"key":"ref142","article-title":"Exit through the training data: A look into instance-attribution explanations and efficient data deletion in machine learning","author":"Brophy","year":"2020"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.3390\/make3040048"},{"key":"ref144","article-title":"TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis","author":"Sarkar","year":"2021","journal-title":"arXiv:2108.10132"},{"key":"ref145","first-page":"22479","article-title":"Variational interaction information maximization for cross-domain disentanglement","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Hwang"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3194884"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/3382507.3418813"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68107-4_20"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-022-1410-8"},{"key":"ref150","article-title":"Using pre-trained language models for toxic comment classification","author":"Zhao","year":"2022"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2022.106004"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.85"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-control-070122-102501"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3162397"},{"key":"ref155","first-page":"1092","article-title":"Machine unlearning for random forests","volume-title":"Proc. 38th Int. Conf. Mach. Learn.","author":"Brophy"},{"key":"ref156","article-title":"Deep regression unlearning","author":"Tarun","year":"2022","journal-title":"arXiv:2210.08196"},{"key":"ref157","first-page":"446","article-title":"Feature-guided black-box safety testing of deep neural networks","volume-title":"Proc. ICCV","author":"Lu"},{"key":"ref158","article-title":"A zest of lime: Towards architecture-independent model distances","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Jia"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/3397481.3450689"},{"key":"ref160","article-title":"A human-grounded evaluation benchmark for local explanations of machine learning","author":"Mohseni","year":"2018","journal-title":"arXiv:1801.05075"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1145\/3491209"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.13566"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.3390\/make5010019"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-22882-x"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2942341"},{"key":"ref166","first-page":"13433","article-title":"Prompt certified machine unlearning with randomized gradient smoothing and quantization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Zhang"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2020.2991875"},{"key":"ref168","article-title":"Theory building with big data-driven research","volume":"54","author":"Kar","year":"2020","journal-title":"Int. J. Inf. Manage."},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/3450965"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103464"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-11199-0_10"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/3571155"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-1408-9_14"},{"key":"ref174","article-title":"How transferable are features in deep neural networks?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"27","author":"Yosinski"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2020.00029"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3090019"},{"key":"ref177","article-title":"Machine unlearning via GAN","author":"Chen","year":"2021","journal-title":"arXiv:2111.11869"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570463"},{"key":"ref179","article-title":"Incremental and decremental support vector machine learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"13","author":"Cauwenberghs"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74690-4_22"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623661"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.94072"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5329-5_45"},{"key":"ref184","first-page":"1","article-title":"Hidden poison: Machine unlearning enables camouflaged poisoning attacks","volume-title":"Proc. NeurIPS ML Saf. Workshop","author":"Di"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3177752"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1016\/j.gltp.2022.04.020"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-ijcnlp.25"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i10.21386"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.295"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.09.004"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363226"},{"key":"ref192","article-title":"Machine learning unlearning for IoT anomaly detectio","author":"Fan","year":"2023"},{"key":"ref193","article-title":"Machine unlearning for image-to-image generative models","author":"Li","year":"2024","journal-title":"arXiv:2402.00351"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0186-1"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511997"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.111124"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1080\/23273798.2021.2014062"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1145\/3579995"},{"key":"ref199","article-title":"Counterfactually evaluating explanations in recommender systems","author":"Yao","year":"2022","journal-title":"arXiv:2203.01310"},{"key":"ref200","article-title":"Analyzing privacy end user information exposure digital communication environments","author":"Schnitzler","year":"2022"},{"key":"ref201","volume-title":"Intelligence As Adaptive Behavior: An Experiment in Computational Neuroethology","volume":"6","author":"Chandrasekaran","year":"2013"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i10.28996"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501998"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.11"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_3"}],"container-title":["IEEE Transactions on Neural Networks and Learning Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/5962385\/11073756\/10750906.pdf?arnumber=10750906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T23:21:01Z","timestamp":1752103261000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10750906\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":205,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tnnls.2024.3486109","relation":{},"ISSN":["2162-237X","2162-2388"],"issn-type":[{"value":"2162-237X","type":"print"},{"value":"2162-2388","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}