{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T09:50:49Z","timestamp":1768902649050,"version":"3.49.0"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Scientific Research Funds at China University of Geosciences","award":["2025022"],"award-info":[{"award-number":["2025022"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272183"],"award-info":[{"award-number":["62272183"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61977064"],"award-info":[{"award-number":["61977064"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171189"],"award-info":[{"award-number":["62171189"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62071192"],"award-info":[{"award-number":["62071192"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2024YFE0103800"],"award-info":[{"award-number":["2024YFE0103800"]}]},{"name":"Key Research and Development Program of Hubei Province","award":["2024BAA008"],"award-info":[{"award-number":["2024BAA008"]}]},{"name":"Key Research and Development Program of Hubei Province","award":["2024BAA011"],"award-info":[{"award-number":["2024BAA011"]}]},{"name":"Key Research and Development Program of Hubei Province","award":["2024BAB016"],"award-info":[{"award-number":["2024BAB016"]}]},{"name":"Key Research and Development Program of Hubei Province","award":["2024BAB031"],"award-info":[{"award-number":["2024BAB031"]}]},{"name":"Key Research and Development Program of Hubei Province","award":["2023BAB074"],"award-info":[{"award-number":["2023BAB074"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Neural Netw. Learning Syst."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tnnls.2025.3553821","type":"journal-article","created":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T16:17:34Z","timestamp":1743783454000},"page":"15851-15865","source":"Crossref","is-referenced-by-count":2,"title":["Unlearning Attacks for Regression Learning"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-1958-8128","authenticated-orcid":false,"given":"Jian","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Computer Science, China University of Geosciences, Wuhan, China"}]},{"given":"Wenlong","family":"Shi","sequence":"additional","affiliation":[{"name":"Hubei Key Laboratory of Internet of Intelligence, School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7328-8039","authenticated-orcid":false,"given":"Wanyu","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1963-4954","authenticated-orcid":false,"given":"Chen","family":"Wang","sequence":"additional","affiliation":[{"name":"Hubei Key Laboratory of Internet of Intelligence, School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2187-8125","authenticated-orcid":false,"given":"Wei","family":"Liu","sequence":"additional","affiliation":[{"name":"Hubei Key Laboratory of Internet of Intelligence, School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7654-5574","authenticated-orcid":false,"given":"Hailong","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Software, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2566-9360","authenticated-orcid":false,"given":"Gaoyang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computing Science, Simon Fraser University, Burnaby, BC, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3331239"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3265506"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01929"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-ijcnlp.25"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363226"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00482"},{"key":"ref7","first-page":"1","article-title":"Understanding closed-box predictions via influence functions","volume-title":"Proc. ICML","author":"Koh"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3603620"},{"key":"ref9","article-title":"Certifiable machine unlearning for linear models","author":"Mahadevan","year":"2021","journal-title":"arXiv:2106.15093"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00451"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591989"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/556"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.35"},{"key":"ref15","first-page":"33921","article-title":"Deep regression unlearning","volume-title":"Proc. ICML","author":"Tarun"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25879"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00750"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i13.17371"},{"key":"ref19","first-page":"10355","article-title":"DeltaGrad: Rapid retraining of machine learning models","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Wu"},{"key":"ref20","first-page":"1","article-title":"Model sparsity can simplify machine unlearning","volume-title":"Proc. NeurIPS","author":"Jia"},{"key":"ref21","first-page":"1","article-title":"Hidden poison: Machine unlearning enables camouflaged poisoning attacks","volume-title":"Proc. NeurIPS ML Saf. Workshop","author":"Di"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24252"},{"key":"ref23","first-page":"1","article-title":"Static and sequential malicious attacks in the context of selective forgetting","volume-title":"Proc. NeurIPS","author":"Zhao"},{"key":"ref24","first-page":"1932","article-title":"Towards understanding and enhancing robustness of deep learning models against malicious unlearning attacks","volume-title":"Proc. SIGKDD","author":"Qian"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i7.20736"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00248"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i13.29321"},{"key":"ref28","first-page":"4211","article-title":"UBA-Inf: Unlearning activated backdoor attack with influence-driven camouflage","volume-title":"Proc. USENIX Secur. Symp.","author":"Huang"},{"key":"ref29","first-page":"60927","article-title":"Rethinking adversarial robustness in the context of the right to be forgotten","volume-title":"Proc. ICML","author":"Zhao"},{"key":"ref30","first-page":"1","article-title":"Resolving training biases via influence-based data relabeling","volume-title":"Proc. ICLR","author":"Kong"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01931"},{"key":"ref32","first-page":"1","article-title":"Understanding influence functions and data models via harmonic analysis","volume-title":"Proc. ICLR","author":"Saunshi"},{"key":"ref33","first-page":"34469","article-title":"Representer point selection for explaining regularized high-dimensional models","volume-title":"Proc. ICML","author":"Tsai"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i8.16871"},{"key":"ref35","first-page":"2347","article-title":"Rethinking glass-box watermarks on deep learning models under neural structural obfuscation","volume-title":"Proc. USENIX Secur.","author":"Yan"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3242737"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i13.26797"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25948"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3175958"},{"key":"ref41","first-page":"1576","article-title":"Distributionally robust logistic regression","volume-title":"Proc. NeurIPS","volume":"28","author":"Shafieezadeh-Abadeh"},{"key":"ref42","first-page":"2110","article-title":"Consistent robust regression","volume-title":"Proc. NeurIPS","volume":"30","author":"Bhatia"},{"key":"ref43","first-page":"3832","article-title":"Certified data removal from machine learning models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Guo"},{"key":"ref44","first-page":"1063","article-title":"A multi-batch L-BFGS method for machine learning","volume-title":"Proc. NeurIPS","volume":"29","author":"Berahas"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref46","article-title":"Differential privacy overview and fundamental techniques","author":"Fioretto","year":"2024","journal-title":"arXiv:2411.04710"}],"container-title":["IEEE Transactions on Neural Networks and Learning Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/5962385\/11151745\/10949502.pdf?arnumber=10949502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T18:24:51Z","timestamp":1757096691000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10949502\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":46,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tnnls.2025.3553821","relation":{},"ISSN":["2162-237X","2162-2388"],"issn-type":[{"value":"2162-237X","type":"print"},{"value":"2162-2388","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}