{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T21:13:49Z","timestamp":1774646029429,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["9227010114, U21B2026"],"award-info":[{"award-number":["9227010114, U21B2026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CCCD Key Lab of Ministry of Culture and Tourism"},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020AAA0106000"],"award-info":[{"award-number":["2020AAA0106000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583521","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:25Z","timestamp":1682551825000},"page":"651-661","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["GIF: A General Graph Unlearning Strategy via Influence Function"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6941-5218","authenticated-orcid":false,"given":"Jiancan","family":"Wu","sequence":"first","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5687-7819","authenticated-orcid":false,"given":"Yi","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4135-6823","authenticated-orcid":false,"given":"Yuchun","family":"Qian","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4492-147X","authenticated-orcid":false,"given":"Yongduo","family":"Sui","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1317-9567","authenticated-orcid":false,"given":"Xiang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7231-594X","authenticated-orcid":false,"given":"Xiangnan","family":"He","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3090019"},{"key":"e_1_3_2_1_2_1","unstructured":"Samyadeep Basu Phillip Pope and Soheil Feizi. 2021. Influence Functions in Deep Learning Are Fragile. In ICLR."},{"key":"e_1_3_2_1_3_1","volume-title":"Machine Unlearning. In IEEE Symposium on Security and Privacy. 141\u2013159","author":"Bourtoule Lucas","year":"2021","unstructured":"Lucas Bourtoule, Varun Chandrasekaran, Christopher\u00a0A. Choquette-Choo, Hengrui Jia, Adelin Travers, Baiwu Zhang, David Lie, and Nicolas Papernot. 2021. Machine Unlearning. In IEEE Symposium on Security and Privacy. 141\u2013159."},{"key":"e_1_3_2_1_4_1","volume-title":"Towards Making Systems Forget with Machine Unlearning. In IEEE Symposium on Security and Privacy. 463\u2013480","author":"Cao Yinzhi","year":"2015","unstructured":"Yinzhi Cao and Junfeng Yang. 2015. Towards Making Systems Forget with Machine Unlearning. In IEEE Symposium on Security and Privacy. 463\u2013480."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Chong Chen Fei Sun Min Zhang and Bolin Ding. 2022. Recommendation Unlearning. In WWW. 2768\u20132777.","DOI":"10.1145\/3485447.3511997"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Min Chen Zhikun Zhang Tianhao Wang Michael Backes Mathias Humbert and Yang Zhang. 2022. Graph Unlearning. In SIGSAC.","DOI":"10.1145\/3548606.3559352"},{"key":"e_1_3_2_1_7_1","volume-title":"Characterizing the Influence of Graph Elements. CoRR abs\/2210.07441","author":"Chen Zizhang","year":"2022","unstructured":"Zizhang Chen, Peizhao Li, Hongfu Liu, and Pengyu Hong. 2022. Characterizing the Influence of Graph Elements. CoRR abs\/2210.07441 (2022)."},{"key":"e_1_3_2_1_8_1","volume-title":"Certified Graph Unlearning. CoRR abs\/2206.09140","author":"Chien Eli","year":"2022","unstructured":"Eli Chien, Chao Pan, and Olgica Milenkovic. 2022. Certified Graph Unlearning. CoRR abs\/2206.09140 (2022)."},{"key":"e_1_3_2_1_9_1","volume-title":"GRAPHEDITOR: An Efficient Graph Representation Learning and Unlearning Approach.","author":"Cong Weilin","year":"2022","unstructured":"Weilin Cong and Mehrdad Mahdavi. 2022. GRAPHEDITOR: An Efficient Graph Representation Learning and Unlearning Approach. (2022)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1980.10486199"},{"key":"e_1_3_2_1_11_1","volume-title":"Encyclopedia of Cryptography and Security","author":"Dwork Cynthia","unstructured":"Cynthia Dwork. 2011. Differential Privacy. In Encyclopedia of Cryptography and Security, 2nd Ed. 338\u2013340.","edition":"2"},{"key":"e_1_3_2_1_12_1","unstructured":"Antonio Ginart Melody\u00a0Y. Guan Gregory Valiant and James Zou. 2019. Making AI Forget You: Data Deletion in Machine Learning. In NeurIPS. 3513\u20133526."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Aditya Golatkar Alessandro Achille and Stefano Soatto. 2020. Eternal Sunshine of the Spotless Net: Selective Forgetting in Deep Networks. In CVPR. 9301\u20139309.","DOI":"10.1109\/CVPR42600.2020.00932"},{"key":"e_1_3_2_1_14_1","unstructured":"Chuan Guo Tom Goldstein Awni\u00a0Y. Hannun and Laurens van\u00a0der Maaten. 2020. Certified Data Removal from Machine Learning Models. In ICML Vol.\u00a0119. 3832\u20133842."},{"key":"e_1_3_2_1_15_1","unstructured":"William\u00a0L. Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive Representation Learning on Large Graphs. In NIPS. 1024\u20131034."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Xiangnan He Kuan Deng Xiang Wang Yan Li Yong-Dong Zhang and Meng Wang. 2020. LightGCN: Simplifying and Powering Graph Convolution Network for Recommendation. In SIGIR. 639\u2013648.","DOI":"10.1145\/3397271.3401063"},{"key":"e_1_3_2_1_17_1","volume-title":"The 24th International Conference on Artificial Intelligence and Statistics, AISTATS 2021","author":"Izzo Zachary","year":"2021","unstructured":"Zachary Izzo, Mary\u00a0Anne Smart, Kamalika Chaudhuri, and James Zou. 2021. Approximate Data Deletion from Machine Learning Models. In The 24th International Conference on Artificial Intelligence and Statistics, AISTATS 2021, April 13-15, 2021, Virtual Event. 2008\u20132016."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2010.2048039"},{"key":"e_1_3_2_1_19_1","volume-title":"Kipf and Max Welling","author":"N.","year":"2017","unstructured":"Thomas\u00a0N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR (Poster)."},{"key":"e_1_3_2_1_20_1","unstructured":"Pang\u00a0Wei Koh and Percy Liang. 2017. Understanding Black-box Predictions via Influence Functions. In ICML Vol.\u00a070. 1885\u20131894."},{"key":"e_1_3_2_1_21_1","volume-title":"Let Machines Unlearn - Machine Unlearning and the Right to be Forgotten","author":"Kwak Chanhee","unstructured":"Chanhee Kwak, Junyeong Lee, Kyuhong Park, and Heeseok Lee. 2017. Let Machines Unlearn - Machine Unlearning and the Right to be Forgotten. In AMCIS. Association for Information Systems."},{"key":"e_1_3_2_1_22_1","unstructured":"Sihang Li Xiang Wang An Zhang Yingxin Wu Xiangnan He and Tat-Seng Chua. 2022. Let Invariant Rationale Discovery Inspire Graph Contrastive Learning. In ICML Vol.\u00a0162. 13052\u201313065."},{"key":"e_1_3_2_1_23_1","volume-title":"Hard to Forget: Poisoning Attacks on Certified Machine Unlearning. CoRR abs\/2109.08266","author":"Marchant G.","year":"2021","unstructured":"Neil\u00a0G. Marchant, Benjamin I.\u00a0P. Rubinstein, and Scott Alfeld. 2021. Hard to Forget: Poisoning Attacks on Certified Machine Unlearning. CoRR abs\/2109.08266 (2021)."},{"key":"e_1_3_2_1_24_1","volume-title":"Descent-to-Delete: Gradient-Based Methods for Machine Unlearning. CoRR abs\/2007.02923","author":"Neel Seth","year":"2020","unstructured":"Seth Neel, Aaron Roth, and Saeed Sharifi-Malvajerdi. 2020. Descent-to-Delete: Gradient-Based Methods for Machine Unlearning. CoRR abs\/2007.02923 (2020)."},{"key":"e_1_3_2_1_25_1","volume-title":"Recorrupted-to-Recorrupted: Unsupervised Deep Learning for Image Denoising","author":"Pang Tongyao","year":"2043","unstructured":"Tongyao Pang, Huan Zheng, Yuhui Quan, and Hui Ji. 2021. Recorrupted-to-Recorrupted: Unsupervised Deep Learning for Image Denoising. In CVPR. Computer Vision Foundation \/ IEEE, 2043\u20132052."},{"key":"e_1_3_2_1_26_1","volume-title":"The California consumer privacy act: Towards a European-style privacy regime in the United States. J. Tech. L. & Pol\u2019y 23","author":"Pardau L","year":"2018","unstructured":"Stuart\u00a0L Pardau. 2018. The California consumer privacy act: Towards a European-style privacy regime in the United States. J. Tech. L. & Pol\u2019y 23 (2018), 68."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1994.6.1.147"},{"key":"e_1_3_2_1_28_1","volume-title":"General data protection regulation. Intouch 25","author":"Regulation Protection","year":"2018","unstructured":"Protection Regulation. 2018. General data protection regulation. Intouch 25 (2018)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644895"},{"key":"e_1_3_2_1_30_1","volume-title":"Machine Unlearning via Algorithmic Stability. CoRR abs\/2102.13179","author":"Ullah Enayat","year":"2021","unstructured":"Enayat Ullah, Tung Mai, Anup Rao, Ryan\u00a0A. Rossi, and Raman Arora. 2021. Machine Unlearning via Algorithmic Stability. CoRR abs\/2102.13179 (2021)."},{"key":"e_1_3_2_1_31_1","volume-title":"Graph Convolutional Matrix Completion. CoRR abs\/1706.02263","author":"van\u00a0den Berg Rianne","year":"2017","unstructured":"Rianne van\u00a0den Berg, Thomas\u00a0N. Kipf, and Max Welling. 2017. Graph Convolutional Matrix Completion. CoRR abs\/1706.02263 (2017)."},{"key":"e_1_3_2_1_32_1","volume-title":"Graph Attention Networks. CoRR abs\/1710.10903","author":"Velickovic Petar","year":"2017","unstructured":"Petar Velickovic, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2017. Graph Attention Networks. CoRR abs\/1710.10903 (2017)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Wenjie Wang Xinyu Lin Fuli Feng Xiangnan He Min Lin and Tat-Seng Chua. 2022. Causal Representation Learning for Out-of-Distribution Recommendation. In WWW. ACM 3562\u20133571.","DOI":"10.1145\/3485447.3512251"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Xiang Wang Xiangnan He Meng Wang Fuli Feng and Tat-Seng Chua. 2019. Neural Graph Collaborative Filtering. In SIGIR. ACM 165\u2013174.","DOI":"10.1145\/3331184.3331267"},{"key":"e_1_3_2_1_35_1","unstructured":"Felix Wu Amauri H.\u00a0Souza Jr. Tianyi Zhang Christopher Fifty Tao Yu and Kilian\u00a0Q. Weinberger. 2019. Simplifying Graph Convolutional Networks. In ICML. 6861\u20136871."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Jiancan Wu Xiang Wang Fuli Feng Xiangnan He Liang Chen Jianxun Lian and Xing Xie. 2021. Self-supervised Graph Learning for Recommendation. In SIGIR. ACM 726\u2013735.","DOI":"10.1145\/3404835.3462862"},{"key":"e_1_3_2_1_37_1","volume-title":"On the Effectiveness of Sampled Softmax Loss for Item Recommendation. CoRR abs\/2201.02327","author":"Wu Jiancan","year":"2022","unstructured":"Jiancan Wu, Xiang Wang, Xingyu Gao, Jiawei Chen, Hongcheng Fu, Tianyu Qiu, and Xiangnan He. 2022. On the Effectiveness of Sampled Softmax Loss for Item Recommendation. CoRR abs\/2201.02327 (2022)."},{"key":"e_1_3_2_1_38_1","unstructured":"Yingxin Wu Xiang Wang An Zhang Xiangnan He and Tat-Seng Chua. 2022. Discovering Invariant Rationales for Graph Neural Networks. In ICLR."},{"key":"e_1_3_2_1_39_1","unstructured":"Keyulu Xu Weihua Hu Jure Leskovec and Stefanie Jegelka. 2019. How Powerful are Graph Neural Networks?. In ICLR. OpenReview.net."},{"key":"e_1_3_2_1_40_1","unstructured":"Keyulu Xu Chengtao Li Yonglong Tian Tomohiro Sonobe Ken-ichi Kawarabayashi and Stefanie Jegelka. 2018. Representation Learning on Graphs with Jumping Knowledge Networks. In ICML Vol.\u00a080. 5449\u20135458."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Rex Ying Ruining He Kaifeng Chen Pong Eksombatchai William\u00a0L. Hamilton and Jure Leskovec. 2018. Graph Convolutional Neural Networks for Web-Scale Recommender Systems. In KDD. ACM 974\u2013983.","DOI":"10.1145\/3219819.3219890"},{"key":"e_1_3_2_1_42_1","unstructured":"An Zhang Wenchang Ma Xiang Wang and Tat-Seng Chua. 2022. Incorporating Bias-aware Margins into Contrastive Loss for Collaborative Filtering. In NeurIPS."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3201472"}],"event":{"name":"WWW '23: The ACM Web Conference 2023","location":"Austin TX USA","acronym":"WWW '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583521","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:02Z","timestamp":1750178822000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583521"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":43,"alternative-id":["10.1145\/3543507.3583521","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583521","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}