{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:20:00Z","timestamp":1771960800499,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645669","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"1260-1271","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Breaking the Trilemma of Privacy, Utility, and Efficiency via Controllable Machine Unlearning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7809-4586","authenticated-orcid":false,"given":"Zheyuan","family":"Liu","sequence":"first","affiliation":[{"name":"University of Notre Dame, South Bend, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8011-9658","authenticated-orcid":false,"given":"Guangyao","family":"Dou","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4456-8410","authenticated-orcid":false,"given":"Eli","family":"Chien","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6380-3340","authenticated-orcid":false,"given":"Chunhui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Dartmouth College, Hanover, NH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2795-6080","authenticated-orcid":false,"given":"Yijun","family":"Tian","sequence":"additional","affiliation":[{"name":"University of Notre Dame, South Bend, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3990-4774","authenticated-orcid":false,"given":"Ziwei","family":"Zhu","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_2_1","volume-title":"International Conference on Machine Learning. PMLR.","author":"Balle Borja","year":"2018","unstructured":"Borja Balle and Yu-Xiang Wang. 2018. Improving the gaussian mechanism for differential privacy: Analytical calibration and optimal denoising. In International Conference on Machine Learning. PMLR."},{"key":"e_1_3_2_2_3_1","volume-title":"Influence functions in deep learning are fragile. arXiv preprint arXiv:2006.14651","author":"Basu Samyadeep","year":"2020","unstructured":"Samyadeep Basu, Philip Pope, and Soheil Feizi. 2020. Influence functions in deep learning are fragile. arXiv preprint arXiv:2006.14651 (2020)."},{"key":"e_1_3_2_2_4_1","volume-title":"Evaluating machine unlearning via epistemic uncertainty. arXiv preprint arXiv:2208.10836","author":"Becker Alexander","year":"2022","unstructured":"Alexander Becker and Thomas Liebig. 2022. Evaluating machine unlearning via epistemic uncertainty. arXiv preprint arXiv:2208.10836 (2022)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00019"},{"key":"e_1_3_2_2_6_1","unstructured":"Tom Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared D Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell et al. 2020. Language models are few-shot learners. Advances in neural information processing systems (2020)."},{"key":"e_1_3_2_2_7_1","volume-title":"Deep learning with Gaussian differential privacy. Harvard data science review","author":"Bu Zhiqi","year":"2020","unstructured":"Zhiqi Bu, Jinshuo Dong, Qi Long, and Weijie J Su. 2020. Deep learning with Gaussian differential privacy. Harvard data science review (2020)."},{"key":"e_1_3_2_2_8_1","volume-title":"The discrete gaussian for differential privacy. Advances in Neural Information Processing Systems","author":"Canonne Cl\u00e9ment L","year":"2020","unstructured":"Cl\u00e9ment L Canonne, Gautam Kamath, and Thomas Steinke. 2020. The discrete gaussian for differential privacy. Advances in Neural Information Processing Systems (2020)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.35"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"e_1_3_2_2_11_1","volume-title":"Breaking the communication-privacy-accuracy trilemma. Advances in Neural Information Processing Systems","author":"Chen Wei-Ning","year":"2020","unstructured":"Wei-Ning Chen, Peter Kairouz, and Ayfer Ozgur. 2020. Breaking the communication-privacy-accuracy trilemma. Advances in Neural Information Processing Systems (2020)."},{"key":"e_1_3_2_2_12_1","volume-title":"Differentially Private Decoupled Graph Convolutions for Multigranular Topology Protection. arXiv preprint arXiv:2307.06422","author":"Chien Eli","year":"2023","unstructured":"Eli Chien,Wei-Ning Chen, Chao Pan, Pan Li, Ayfer \u00d6zg\u00fcr, and Olgica Milenkovic. 2023. Differentially Private Decoupled Graph Convolutions for Multigranular Topology Protection. arXiv preprint arXiv:2307.06422 (2023)."},{"key":"e_1_3_2_2_13_1","volume-title":"The Eleventh International Conference on Learning Representations.","author":"Chien Eli","year":"2022","unstructured":"Eli Chien, Chao Pan, and Olgica Milenkovic. 2022. Efficient model updates for approximate unlearning of graph-structured data. In The Eleventh International Conference on Learning Representations."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25879"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3265506"},{"key":"e_1_3_2_2_16_1","volume-title":"Characterizations of an empirical influence function for detecting influential cases in regression. Technometrics","author":"Dennis Cook R","year":"1980","unstructured":"R Dennis Cook and Sanford Weisberg. 1980. Characterizations of an empirical influence function for detecting influential cases in regression. Technometrics (1980)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-71782-7_35"},{"key":"e_1_3_2_2_18_1","volume-title":"Gaussian differential privacy. arXiv preprint arXiv:1905.02383","author":"Dong Jinshuo","year":"2019","unstructured":"Jinshuo Dong, Aaron Roth, and Weijie J Su. 2019. Gaussian differential privacy. arXiv preprint arXiv:1905.02383 (2019)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science (2014).","DOI":"10.1561\/9781601988195"},{"key":"e_1_3_2_2_21_1","volume-title":"2015 IEEE 56th Annual Symposium on Foundations of Computer Science. IEEE.","author":"Smith Adam","year":"2015","unstructured":"CynthiaDwork,Adam Smith, Thomas Steinke, Jonathan Ullman, and Salil Vadhan. 2015. Robust traceability from trace amounts. In 2015 IEEE 56th Annual Symposium on Foundations of Computer Science. IEEE."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-022-01865-5"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357713.3384290"},{"key":"e_1_3_2_2_24_1","volume-title":"Differentially Private Optimization for Smooth Nonconvex ERM. arXiv preprint arXiv:2302.04972","author":"Gao Changyu","year":"2023","unstructured":"Changyu Gao and Stephen J Wright. 2023. Differentially Private Optimization for Smooth Nonconvex ERM. arXiv preprint arXiv:2302.04972 (2023)."},{"key":"e_1_3_2_2_25_1","volume-title":"Making ai forget you: Data deletion in machine learning. Advances in neural information processing systems","author":"Ginart Antonio","year":"2019","unstructured":"Antonio Ginart, Melody Guan, Gregory Valiant, and James Y Zou. 2019. Making ai forget you: Data deletion in machine learning. Advances in neural information processing systems (2019)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00085"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00932"},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings, Part XXIX 16","author":"Golatkar Aditya","year":"2020","unstructured":"Aditya Golatkar, Alessandro Achille, and Stefano Soatto. 2020. Forgetting outside the box: Scrubbing deep networks of information accessible from input-output observations. In Computer Vision--ECCV 2020: 16th European Conference, Glasgow, UK, August 23--28, 2020, Proceedings, Part XXIX 16. Springer."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i13.17371"},{"key":"e_1_3_2_2_30_1","volume-title":"International Conference on Machine Learning. PMLR.","author":"Guo Chuan","year":"2020","unstructured":"Chuan Guo, Tom Goldstein, Awni Hannun, and Laurens Van Der Maaten. 2020. Certified Data Removal from Machine Learning Models. In International Conference on Machine Learning. PMLR."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_2_2_33_1","volume-title":"Bart Van Der Sloot, and Frederik Zuiderveen Borgesius","author":"Hoofnagle Chris Jay","year":"2019","unstructured":"Chris Jay Hoofnagle, Bart Van Der Sloot, and Frederik Zuiderveen Borgesius. 2019. The European Union general data protection regulation: what it is and what it means. Information & Communications Technology Law (2019)."},{"key":"e_1_3_2_2_34_1","volume-title":"Neural tangent kernel: Convergence and generalization in neural networks. Advances in neural information processing systems 31","author":"Jacot Arthur","year":"2018","unstructured":"Arthur Jacot, Franck Gabriel, and Cl\u00e9ment Hongler. 2018. Neural tangent kernel: Convergence and generalization in neural networks. Advances in neural information processing systems 31 (2018)."},{"key":"e_1_3_2_2_35_1","volume-title":"Model sparsification can simplify machine unlearning. arXiv preprint arXiv:2304.04934","author":"Jia Jinghan","year":"2023","unstructured":"Jinghan Jia, Jiancheng Liu, Parikshit Ram, Yuguang Yao, Gaowen Liu, Yang Liu, Pranay Sharma, and Sijia Liu. 2023. Model sparsification can simplify machine unlearning. arXiv preprint arXiv:2304.04934 (2023)."},{"key":"e_1_3_2_2_36_1","volume-title":"International conference on machine learning. PMLR.","author":"Koh Pang Wei","year":"2017","unstructured":"Pang Wei Koh and Percy Liang. 2017. Understanding black-box predictions via influence functions. In International conference on machine learning. PMLR."},{"key":"e_1_3_2_2_37_1","unstructured":"Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_2_38_1","volume-title":"Optimal brain damage. Advances in neural information processing systems","author":"LeCun Yann","year":"1989","unstructured":"Yann LeCun, John Denker, and Sara Solla. 1989. Optimal brain damage. Advances in neural information processing systems (1989)."},{"key":"e_1_3_2_2_39_1","unstructured":"Xiaolong Ma Geng Yuan Xuan Shen Tianlong Chen Xuxi Chen Xiaohan Chen Ning Liu Minghai Qin Sijia Liu Zhangyang Wang et al. 2021. Sanity checks for lottery tickets: Does your winning ticket really win the jackpot? Advances in Neural Information Processing Systems (2021)."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002472.2002491"},{"key":"e_1_3_2_2_41_1","volume-title":"Pruning convolutional neural networks for resource efficient inference. arXiv preprint arXiv:1611.06440","author":"Molchanov Pavlo","year":"2016","unstructured":"Pavlo Molchanov, Stephen Tyree, Tero Karras, Timo Aila, and Jan Kautz. 2016. Pruning convolutional neural networks for resource efficient inference. arXiv preprint arXiv:1611.06440 (2016)."},{"key":"e_1_3_2_2_42_1","volume-title":"Descent-to-delete: Gradient-based methods for machine unlearning. In Algorithmic Learning Theory. PMLR.","author":"Neel Seth","year":"2021","unstructured":"Seth Neel, Aaron Roth, and Saeed Sharifi-Malvajerdi. 2021. Descent-to-delete: Gradient-based methods for machine unlearning. In Algorithmic Learning Theory. PMLR."},{"key":"e_1_3_2_2_43_1","unstructured":"Yuval Netzer Tao Wang Adam Coates Alessandro Bissacco Bo Wu and A Ng. 2018. The street view house numbers (SVHN) dataset. Technical Report. Technical report Accessed 2016-08-01.[Online]."},{"key":"e_1_3_2_2_44_1","volume-title":"Phi Le Nguyen, Alan Wee-Chung Liew, Hongzhi Yin, and Quoc Viet Hung Nguyen.","author":"Nguyen Thanh Tam","year":"2022","unstructured":"Thanh Tam Nguyen, Thanh Trung Huynh, Phi Le Nguyen, Alan Wee-Chung Liew, Hongzhi Yin, and Quoc Viet Hung Nguyen. 2022. A survey of machine unlearning. arXiv preprint arXiv:2209.02299 (2022)."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583547"},{"key":"e_1_3_2_2_46_1","volume-title":"The california consumer privacy act: Towards a europeanstyle privacy regime in the united states. J. Tech. L. & Pol'y","author":"Pardau Stuart L","year":"2018","unstructured":"Stuart L Pardau. 2018. The california consumer privacy act: Towards a europeanstyle privacy regime in the united states. J. Tech. L. & Pol'y (2018)."},{"key":"e_1_3_2_2_47_1","volume-title":"Deep learning on a data diet: Finding important examples early in training. Advances in Neural Information Processing Systems","author":"Paul Mansheej","year":"2021","unstructured":"Mansheej Paul, Surya Ganguli, and Gintare Karolina Dziugaite. 2021. Deep learning on a data diet: Finding important examples early in training. Advances in Neural Information Processing Systems (2021)."},{"key":"e_1_3_2_2_48_1","first-page":"18075","article-title":"Remember what you want to forget: Algorithms for machine unlearning","volume":"34","author":"Sekhari Ayush","year":"2021","unstructured":"Ayush Sekhari, Jayadev Acharya, Gautam Kamath, and Ananda Theertha Suresh. 2021. Remember what you want to forget: Algorithms for machine unlearning. Advances in Neural Information Processing Systems 34 (2021), 18075--18086.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_2_50_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and AndrewZisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_2_51_1","volume-title":"30th USENIX Security Symposium (USENIX Security .","author":"Song Liwei","year":"2021","unstructured":"Liwei Song and Prateek Mittal. 2021. Systematic evaluation of privacy risks of machine learning models. In 30th USENIX Security Symposium (USENIX Security ."},{"key":"e_1_3_2_2_52_1","volume-title":"Beyond neural scaling laws: beating power law scaling via data pruning. Advances in Neural Information Processing Systems","author":"Sorscher Ben","year":"2022","unstructured":"Ben Sorscher, Robert Geirhos, Shashank Shekhar, Surya Ganguli, and Ari Morcos. 2022. Beyond neural scaling laws: beating power law scaling via data pruning. Advances in Neural Information Processing Systems (2022)."},{"key":"e_1_3_2_2_53_1","volume-title":"International Conference on Machine Learning. PMLR.","author":"Tarun Ayush Kumar","year":"2023","unstructured":"Ayush Kumar Tarun, Vikram Singh Chundawat, Murari Mandal, and Mohan Kankanhalli. 2023. Deep regression unlearning. In International Conference on Machine Learning. PMLR."},{"key":"e_1_3_2_2_54_1","volume-title":"Fast yet effective machine unlearning","author":"Tarun Ayush K","year":"2023","unstructured":"Ayush K Tarun, Vikram S Chundawat, Murari Mandal, and Mohan Kankanhalli. 2023. Fast yet effective machine unlearning. IEEE Transactions on Neural Networks and Learning Systems (2023)."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2812802"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i8.26192"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i17.29875"},{"key":"e_1_3_2_2_58_1","volume-title":"KGA: A General Machine Unlearning Framework Based on Knowledge Gap Alignment. arXiv preprint arXiv:2305.06535","author":"Wang Lingzhi","year":"2023","unstructured":"Lingzhi Wang, Tong Chen, Wei Yuan, Xingshan Zeng, Kam-Fai Wong, and Hongzhi Yin. 2023. KGA: A General Machine Unlearning Framework Based on Knowledge Gap Alignment. arXiv preprint arXiv:2305.06535 (2023)."},{"key":"e_1_3_2_2_59_1","volume-title":"Machine unlearning of features and labels. arXiv preprint arXiv:2108.11577","author":"Warnecke Alexander","year":"2021","unstructured":"Alexander Warnecke, Lukas Pirch, Christian Wressnegger, and Konrad Rieck. 2021. Machine unlearning of features and labels. arXiv preprint arXiv:2108.11577 (2021)."},{"key":"e_1_3_2_2_60_1","volume-title":"Visual chatgpt: Talking, drawing and editing with visual foundation models. arXiv preprint arXiv:2303.04671","author":"Wu Chenfei","year":"2023","unstructured":"Chenfei Wu, Shengming Yin, Weizhen Qi, Xiaodong Wang, Zecheng Tang, and Nan Duan. 2023. Visual chatgpt: Talking, drawing and editing with visual foundation models. arXiv preprint arXiv:2303.04671 (2023)."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557382"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.xinn.2021.100176"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","location":"Singapore Singapore","acronym":"WWW '24","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645669","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:29:40Z","timestamp":1755822580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645669"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":62,"alternative-id":["10.1145\/3589334.3645669","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645669","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}