{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:40:01Z","timestamp":1756485601696,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T00:00:00Z","timestamp":1717545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,5]]},"DOI":"10.1145\/3655693.3655697","type":"proceedings-article","created":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T18:22:10Z","timestamp":1717525330000},"page":"29-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SFTC: Machine Unlearning via Selective Fine-tuning and Targeted Confusion"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3915-9628","authenticated-orcid":false,"given":"Vasileios","family":"Perifanis","sequence":"first","affiliation":[{"name":"Democritus University of Thrace, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0714-4070","authenticated-orcid":false,"given":"Efstathios","family":"Karypidis","sequence":"additional","affiliation":[{"name":"Athena Research Centre, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6767-5641","authenticated-orcid":false,"given":"Nikos","family":"Komodakis","sequence":"additional","affiliation":[{"name":"University of Crete and Athena Research Center, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3749-0165","authenticated-orcid":false,"given":"Pavlos","family":"Efraimidis","sequence":"additional","affiliation":[{"name":"Democritus University of Thrace and Athena Research Center, Greece"}]}],"member":"320","published-online":{"date-parts":[[2024,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00019"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.35"},{"key":"e_1_3_2_1_3_1","volume-title":"Towards Machine Unlearning Benchmarks: Forgetting the Personal Identities in Facial Recognition Systems. arXiv preprint arXiv:2311.02240","author":"Choi Dasol","year":"2023","unstructured":"Dasol Choi and Dongbin Na. 2023. Towards Machine Unlearning Benchmarks: Forgetting the Personal Identities in Facial Recognition Systems. arXiv preprint arXiv:2311.02240 (2023)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25879"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_6_1","unstructured":"Antonio Ginart Melody Guan Gregory Valiant and James\u00a0Y Zou. 2019. Making AI Forget You: Data Deletion in Machine Learning. In Advances in Neural Information Processing Systems Vol.\u00a032."},{"key":"e_1_3_2_1_7_1","volume-title":"Towards adversarial evaluations for inexact machine unlearning. arXiv preprint arXiv:2201.06640","author":"Goel Shashwat","year":"2022","unstructured":"Shashwat Goel, Ameya Prabhu, Amartya Sanyal, Ser-Nam Lim, Philip Torr, and Ponnurangam Kumaraguru. 2022. Towards adversarial evaluations for inexact machine unlearning. arXiv preprint arXiv:2201.06640 (2022)."},{"key":"e_1_3_2_1_8_1","volume-title":"Eternal Sunshine of the Spotless Net: Selective Forgetting in Deep Networks. In 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 9301\u20139309","author":"Golatkar Aditya","year":"2020","unstructured":"Aditya Golatkar, Alessandro Achille, and Stefano Soatto. 2020. Eternal Sunshine of the Spotless Net: Selective Forgetting in Deep Networks. In 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 9301\u20139309."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42051-1_16"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i13.17371"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3262138"},{"key":"e_1_3_2_1_13_1","unstructured":"Alex Krizhevsky Geoffrey Hinton 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_1_14_1","volume-title":"NeurIPS","author":"Kurmanji Meghdad","year":"2023","unstructured":"Meghdad Kurmanji, Peter Triantafillou, and Eleni Triantafillou. 2023. Towards Unbounded Machine Unlearning. In NeurIPS 2023. PMLR."},{"key":"e_1_3_2_1_15_1","volume-title":"Certifiable machine unlearning for linear models. arXiv preprint arXiv:2106.15093","author":"Mahadevan Ananth","year":"2021","unstructured":"Ananth Mahadevan and Michael Mathioudakis. 2021. Certifiable machine unlearning for linear models. arXiv preprint arXiv:2106.15093 (2021)."},{"key":"e_1_3_2_1_16_1","volume-title":"Hongzhi Yin, and Quoc Viet\u00a0Hung Nguyen.","author":"Nguyen Thanh\u00a0Tam","year":"2022","unstructured":"Thanh\u00a0Tam Nguyen, Thanh\u00a0Trung Huynh, Phi\u00a0Le Nguyen, Alan Wee-Chung Liew, Hongzhi Yin, and Quoc Viet\u00a0Hung Nguyen. 2022. A survey of machine unlearning. arXiv preprint arXiv:2209.02299 (2022)."},{"key":"e_1_3_2_1_17_1","volume-title":"Article 114 (dec","author":"Paleyes Andrei","year":"2022","unstructured":"Andrei Paleyes, Raoul-Gabriel Urma, and Neil\u00a0D. Lawrence. 2022. Challenges in Deploying Machine Learning: A Survey of Case Studies. ACM Comput. Surv. 55, 6, Article 114 (dec 2022), 29\u00a0pages."},{"key":"e_1_3_2_1_18_1","volume-title":"CatBoost: unbiased boosting with categorical features. Advances in neural information processing systems 31","author":"Prokhorenkova Liudmila","year":"2018","unstructured":"Liudmila Prokhorenkova, Gleb Gusev, Aleksandr Vorobev, Anna\u00a0Veronika Dorogush, and Andrey Gulin. 2018. CatBoost: unbiased boosting with categorical features. Advances in neural information processing systems 31 (2018)."},{"key":"e_1_3_2_1_19_1","volume-title":"Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on SP. 3\u201318","author":"Shokri Reza","year":"2017","unstructured":"Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on SP. 3\u201318."},{"key":"e_1_3_2_1_20_1","volume-title":"International conference on machine learning. PMLR, 6105\u20136114","author":"Tan Mingxing","year":"2019","unstructured":"Mingxing Tan and Quoc Le. 2019. Efficientnet: Rethinking model scaling for convolutional neural networks. In International conference on machine learning. PMLR, 6105\u20136114."},{"key":"e_1_3_2_1_21_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Thudi Anvith","year":"2022","unstructured":"Anvith Thudi, Hengrui Jia, Ilia Shumailov, and Nicolas Papernot. 2022. On the necessity of auditable algorithmic definitions for machine unlearning. In 31st USENIX Security Symposium (USENIX Security 22). 4007\u20134022."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of Thirty Fourth Conference on Learning Theory. PMLR, 4126\u20134142","author":"Ullah Enayat","year":"2021","unstructured":"Enayat Ullah, Tung Mai, Anup Rao, Ryan\u00a0A. Rossi, and Raman Arora. 2021. Machine Unlearning via Algorithmic Stability. In Proceedings of Thirty Fourth Conference on Learning Theory. PMLR, 4126\u20134142."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.08.007"},{"key":"e_1_3_2_1_24_1","volume-title":"Machine Unlearning: A Survey. ACM Comput. Surv. 56, 1, Article 9 (aug","author":"Xu Heng","year":"2023","unstructured":"Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, and Philip\u00a0S. Yu. 2023. Machine Unlearning: A Survey. ACM Comput. Surv. 56, 1, Article 9 (aug 2023)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-01767-4"}],"event":{"name":"EICC 2024: European Interdisciplinary Cybersecurity Conference","acronym":"EICC 2024","location":"Xanthi Greece"},"container-title":["European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3655693.3655697","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3655693.3655697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:19:58Z","timestamp":1756484398000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3655693.3655697"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,5]]},"references-count":25,"alternative-id":["10.1145\/3655693.3655697","10.1145\/3655693"],"URL":"https:\/\/doi.org\/10.1145\/3655693.3655697","relation":{},"subject":[],"published":{"date-parts":[[2024,6,5]]},"assertion":[{"value":"2024-06-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}