{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T05:56:34Z","timestamp":1766728594447,"version":"3.48.0"},"reference-count":107,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62572502"],"award-info":[{"award-number":["62572502"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302539"],"award-info":[{"award-number":["62302539"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62402029"],"award-info":[{"award-number":["62402029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62506362"],"award-info":[{"award-number":["62506362"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Natural Science Foundation","award":["L251041"],"award-info":[{"award-number":["L251041"]}]},{"name":"National Cryptologic Science Fund of China","award":["2025NCSF02030"],"award-info":[{"award-number":["2025NCSF02030"]}]},{"name":"Hainan Provincial Natural Science Foundation Lingshui Li&#x0027;an International Education Innovation Experimental Zone Joint Project","award":["624LALH005"],"award-info":[{"award-number":["624LALH005"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tnse.2025.3637602","type":"journal-article","created":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T19:05:20Z","timestamp":1764183920000},"page":"4138-4154","source":"Crossref","is-referenced-by-count":0,"title":["LVFUS: Vertical Federated Unlearning for Intelligent Network Security via Adaptive Optimizer Switching"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5511-0720","authenticated-orcid":false,"given":"Xiangyun","family":"Tang","sequence":"first","affiliation":[{"name":"School of Information Engineering, Minzu University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7147-4182","authenticated-orcid":false,"given":"Xinxin","family":"Hong","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Minzu University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2163-2475","authenticated-orcid":false,"given":"Minggang","family":"Gan","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Minzu University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2702-7679","authenticated-orcid":false,"given":"Yijing","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3366-7640","authenticated-orcid":false,"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0218-6924","authenticated-orcid":false,"given":"Junxian","family":"Duan","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing Institute of Technology, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3232755.3234555"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3215919"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2100338"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3555308"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2196\/46700"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103351"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2025.3585344"},{"key":"ref9","first-page":"8757","article-title":"Spectral co-distillation for personalized federated learning","volume-title":"Proc. 37th Conf. Neural Inf. Process. Syst.","author":"Chen","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1561\/9781680837896"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.005.2300481"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106854"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-022-01647-y"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000215"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106775"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3178443"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i08.7021"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17301"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.3275571","article-title":"A guide to the California consumer privacy act of 2018","author":"de la Torre","year":"2018"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.05.015"},{"key":"ref21","first-page":"61213","article-title":"A3FL: Adversarially adaptive backdoor attacks to federated learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"36","author":"Zhang","year":"2024"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3720539"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3600884"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2024.3478334"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3679014"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12143182"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-78169-8_23"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2025.3536312"},{"article-title":"Forgetting any data at any time: A theoretically certified unlearning framework for vertical federated learning","year":"2025","author":"Wang","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2025-0048"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3657290"},{"key":"ref32","first-page":"18261","article-title":"An improved analysis of stochastic gradient descent with momentum","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Liu","year":"2020"},{"article-title":"On the variance of the adaptive learning rate and beyond","year":"2019","author":"Liu","key":"ref33"},{"article-title":"A few-shot label unlearning in vertical federated learning","year":"2024","author":"Gu","key":"ref34"},{"article-title":"ESA science programme missions: Contributions and exploitationintegral observing time proposals","year":"2024","author":"Kuulkers","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3530529"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2025.131110"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-025-07310-x"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3382321"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3352628"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2024.3393492"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2024.3399396"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i19.34246"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2024.3439709"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"issue":"226","key":"ref46","first-page":"1","article-title":"FATE: An industrial grade platform for collaborative learning with data protection","volume":"22","author":"Liu","year":"2021","journal-title":"J. Mach. Learn. Res."},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2021.3082561"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-020-00323-1"},{"article-title":"Security of homomorphic encryption","year":"2017","author":"Chase","key":"ref49"},{"article-title":"Simple encrypted arithmetic library 2.3. 1","year":"2017","author":"Laine","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100567"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"article-title":"Machine learning classification over encrypted data","year":"2014","author":"Bost","key":"ref53"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3013541"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-025-02356-y"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.109276"},{"key":"ref57","first-page":"1397","article-title":"Label inference attacks against vertical federated learning","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Fu","year":"2022"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0045"},{"key":"ref59","first-page":"8160","article-title":"Label leakage in vertical federated learning: A survey","volume-title":"Proc. 33rd Int. Joint Conf. Artif. Intell.","author":"Liu","year":"2024"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00023"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.240046"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1017\/9781108966559.020"},{"article-title":"Flexible differentially private vertical federated learning with adaptive feature embeddings","year":"2023","author":"Mi","key":"ref63"},{"journal-title":"J. Privacy Confidentiality","article-title":"Differentially private vertical federated learning primitives","author":"Cohen-Addad","key":"ref64"},{"key":"ref65","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","author":"McMahan","year":"2017"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2025.3571462"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796721"},{"key":"ref68","first-page":"3457","article-title":"SIFU: Sequential informed federated unlearning for efficient and provable client unlearning in federated optimization","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Fraboni","year":"2024"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00019"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3520614"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS52092.2021.9521274"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1017\/9781108966559.019"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570463"},{"article-title":"Knowledge distillation for federated learning: A practical guide","year":"2022","author":"Mora","key":"ref74"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3540463"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS62655.2024.00094"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.52202\/079017-1228"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3555868"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/SaTML64287.2025.00033"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512222"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3321594"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i19.34181"},{"article-title":"Federated unlearning: How to efficiently erase a client in FL","year":"2022","author":"Halimi","key":"ref83"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-77688-5_36"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICECDS.2017.8389935"},{"article-title":"Multi-participant multi-class vertical federated learning","year":"2020","author":"Feng","key":"ref86"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.14778\/3603581.3603588"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3288122"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-024-00933-6"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC54236.2022.00050"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3445600"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3569158"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3333879"},{"article-title":"Label leakage and protection from forward embedding in vertical federated learning","year":"2022","author":"Sun","key":"ref94"},{"key":"ref95","article-title":"Adam: A method for stochastic optimization","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Kingma","year":"2015"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3574740"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.10.016"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.003.2300475"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3502493"},{"article-title":"UCI machine learning repository","year":"2019","author":"Dua","key":"ref100"},{"article-title":"Musk (version 2)","year":"2019","author":"Dua","key":"ref101"},{"article-title":"Spambase","year":"1999","author":"Hopkins","key":"ref102"},{"article-title":"Heart disease","year":"1989","author":"Janosi","key":"ref103"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"ref104"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2024\/446"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/11264281\/11269670.pdf?arnumber=11269670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T05:55:27Z","timestamp":1766728527000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11269670\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":107,"URL":"https:\/\/doi.org\/10.1109\/tnse.2025.3637602","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"type":"electronic","value":"2327-4697"},{"type":"electronic","value":"2334-329X"}],"subject":[],"published":{"date-parts":[[2026]]}}}