{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:03:53Z","timestamp":1775325833175,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFE0113200"],"award-info":[{"award-number":["2022YFE0113200"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Joint Fund of the National Natural Science Foundation of China","award":["U20A20178"],"award-info":[{"award-number":["U20A20178"]}]},{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072395 & 62206207"],"award-info":[{"award-number":["62072395 & 62206207"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670398","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"3883-3897","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5780-6898","authenticated-orcid":false,"given":"Yuke","family":"Hu","sequence":"first","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4110-2068","authenticated-orcid":false,"given":"Jian","family":"Lou","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7927-1871","authenticated-orcid":false,"given":"Jiaqi","family":"Liu","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1438-1345","authenticated-orcid":false,"given":"Wangze","family":"Ni","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University &amp; Hong Kong University of Science and Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5240-5200","authenticated-orcid":false,"given":"Feng","family":"Lin","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7872-6969","authenticated-orcid":false,"given":"Zhan","family":"Qin","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3441-6277","authenticated-orcid":false,"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon Web Services. 2018. Amazon Web Services. https:\/\/aws.amazon.com\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.297"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00019"},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Machine Learning. PMLR, 1092--1104","author":"Brophy Jonathan","year":"2021","unstructured":"Jonathan Brophy and Daniel Lowd. 2021. Machine unlearning for random forests. In International Conference on Machine Learning. PMLR, 1092--1104."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.35"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511997"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484756"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559352"},{"key":"e_1_3_2_1_9_1","first-page":"29830","article-title":"Amplifying membership exposure via data poisoning","volume":"35","author":"Chen Yufei","year":"2022","unstructured":"Yufei Chen, Chao Shen, Yun Shen, Cong Wang, and Yang Zhang. 2022. Amplifying membership exposure via data poisoning. Advances in Neural Information Processing Systems 35 (2022), 29830--29844.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_10_1","unstructured":"CNPD. 2018. The Right to Erasure (\"Right To be Forgotten\") by Commission Nationale pour la Protection des Donn\u00e9es. https:\/\/cnpd.public.lu\/en\/particuliers\/ vos-droits\/droit-oubli.html"},{"key":"e_1_3_2_1_11_1","volume-title":"Clipper: A Low-Latency Online Prediction Serving System. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017","author":"Crankshaw Daniel","year":"2017","unstructured":"Daniel Crankshaw, Xin Wang, Giulio Zhou, Michael J. Franklin, Joseph E. Gonzalez, and Ion Stoica. 2017. Clipper: A Low-Latency Online Prediction Serving System. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, Boston, MA, USA, March 27--29, 2017, Aditya Akella and Jon Howell (Eds.). USENIX Association, 613--627."},{"key":"e_1_3_2_1_12_1","volume-title":"DVABatch: Diversity-aware Multi-Entry Multi-Exit Batching for Efficient Processing of DNN Services on GPUs. In 2022 USENIX Annual Technical Conference, USENIX ATC 2022","author":"Cui Weihao","year":"2022","unstructured":"Weihao Cui, Han Zhao, Quan Chen, Hao Wei, Zirui Li, Deze Zeng, Chao Li, and Minyi Guo. 2022. DVABatch: Diversity-aware Multi-Entry Multi-Exit Batching for Efficient Processing of DNN Services on GPUs. In 2022 USENIX Annual Technical Conference, USENIX ATC 2022, Carlsbad, CA, USA, July 11--13, 2022, Jiri Schindler and Noa Zilberman (Eds.). USENIX Association, 183--198."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3476143"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_15_1","unstructured":"National Commission for Data Protection Grand-Duchy of Luxembourg. 2018. Commission Nationale pour la Protection des Donn\u00e9es (CNPD). https:\/\/cnpd. public.lu\/en\/commission-nationale.html"},{"key":"e_1_3_2_1_16_1","unstructured":"GDPR. 2016. Right to be Forgotten in GDPR. https:\/\/gdpr-info.eu\/issues\/rightto-be-forgotten\/"},{"key":"e_1_3_2_1_17_1","volume-title":"Making ai forget you: Data deletion in machine learning. Advances in neural information processing systems 32","author":"Ginart Antonio","year":"2019","unstructured":"Antonio Ginart, Melody Guan, Gregory Valiant, and James Y Zou. 2019. Making ai forget you: Data deletion in machine learning. Advances in neural information processing systems 32 (2019)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00085"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00932"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings, Part XXIX 16","author":"Golatkar Aditya","year":"2020","unstructured":"Aditya Golatkar, Alessandro Achille, and Stefano Soatto. 2020. Forgetting outside the box: Scrubbing deep networks of information accessible from input-output observations. In Computer Vision--ECCV 2020: 16th European Conference, Glasgow, UK, August 23--28, 2020, Proceedings, Part XXIX 16. Springer, 383--398."},{"key":"e_1_3_2_1_21_1","unstructured":"Google Brain Team. 2018. TensorFlow Serving for model deployment in production. https:\/\/www.tensorflow.org\/serving\/."},{"key":"e_1_3_2_1_22_1","unstructured":"Google LLC. 2018. Google Cloud. https:\/\/cloud.google.com\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i13.17371"},{"key":"e_1_3_2_1_24_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2020","author":"Gujarati Arpan","year":"2020","unstructured":"Arpan Gujarati, Reza Karimi, Safya Alzayat, Wei Hao, Antoine Kaufmann, Ymir Vigfusson, and Jonathan Mace. 2020. Serving DNNs like Clockwork: Performance Predictability from the Bottom Up. In 14th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2020, Virtual Event, November 4--6, 2020. USENIX Association, 443--462."},{"key":"e_1_3_2_1_25_1","volume-title":"Cocktail: A Multidimensional Optimization for Model Serving in Cloud. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Gunasekaran Jashwant Raj","unstructured":"Jashwant Raj Gunasekaran, Cyan Subhra Mishra, Prashanth Thinakaran, Bikash Sharma, Mahmut Taylan Kandemir, and Chita R. Das. 2022. Cocktail: A Multidimensional Optimization for Model Serving in Cloud. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). Renton, WA, 1041--1057."},{"key":"e_1_3_2_1_26_1","volume-title":"Certified data removal from machine learning models. arXiv preprint arXiv:1911.03030","author":"Guo Chuan","year":"2019","unstructured":"Chuan Guo, Tom Goldstein, Awni Hannun, and Laurens Van Der Maaten. 2019. Certified data removal from machine learning models. arXiv preprint arXiv:1911.03030 (2019)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00084"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694347"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00059"},{"key":"e_1_3_2_1_30_1","unstructured":"Jeremy Howard. 2019. Imagenette Dataset. https:\/\/github.com\/fastai\/imagenette."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560619"},{"key":"e_1_3_2_1_32_1","volume-title":"International Conference on Artificial Intelligence and Statistics. PMLR","author":"Izzo Zachary","year":"2021","unstructured":"Zachary Izzo, Mary Anne Smart, Kamalika Chaudhuri, and James Zou. 2021. Approximate data deletion from machine learning models. In International Conference on Artificial Intelligence and Statistics. PMLR, 2008--2016."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i9.16971"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SaTML54575.2023.00047"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_36_1","volume-title":"9th International Conference on Learning Representations, ICLR 2021","author":"Levine Alexander","year":"2021","unstructured":"Alexander Levine and Soheil Feizi. 2021. Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks. In 9th International Conference on Learning Representations, ICLR 2021, Virtual Event, Austria, May 3--7, 2021. OpenReview.net."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484575"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01929"},{"key":"e_1_3_2_1_39_1","volume-title":"Certified minimax unlearning with generalization rates and deletion capacity. Advances in Neural Information Processing Systems 36","author":"Liu Jiaqi","year":"2024","unstructured":"Jiaqi Liu, Jian Lou, Zhan Qin, and Kui Ren. 2024. Certified minimax unlearning with generalization rates and deletion capacity. Advances in Neural Information Processing Systems 36 (2024)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00451"},{"key":"e_1_3_2_1_41_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Liu Yugeng","year":"2022","unstructured":"Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, and Yang Zhang. 2022. {ML-Doctor}: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. In 31st USENIX Security Symposium (USENIX Security 22). 4525--4542."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560684"},{"key":"e_1_3_2_1_43_1","volume-title":"Understanding membership inferences on well-generalized learning models. arXiv preprint arXiv:1802.04889","author":"Long Yunhui","year":"2018","unstructured":"Yunhui Long, Vincent Bindschaedler, LeiWang, Diyue Bu, XiaofengWang, Haixu Tang, Carl A Gunter, and Kai Chen. 2018. Understanding membership inferences on well-generalized learning models. arXiv preprint arXiv:1802.04889 (2018)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00040"},{"key":"e_1_3_2_1_45_1","volume-title":"Certifiable machine unlearning for linear models. arXiv preprint arXiv:2106.15093","author":"Mahadevan Ananth","year":"2021","unstructured":"Ananth Mahadevan and Michael Mathioudakis. 2021. Certifiable machine unlearning for linear models. arXiv preprint arXiv:2106.15093 (2021)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2013.03.010"},{"key":"e_1_3_2_1_47_1","unstructured":"Microsoft Corporation. 2018. Microsoft Azure Cloud Computing Platform and Services. ttps:\/\/azure.microsoft.com\/en-us\/."},{"key":"e_1_3_2_1_48_1","volume-title":"Descent-to-delete: Gradient-based methods for machine unlearning. In Algorithmic Learning Theory. PMLR, 931--962.","author":"Neel Seth","year":"2021","unstructured":"Seth Neel, Aaron Roth, and Saeed Sharifi-Malvajerdi. 2021. Descent-to-delete: Gradient-based methods for machine unlearning. In Algorithmic Learning Theory. PMLR, 931--962."},{"key":"e_1_3_2_1_49_1","volume-title":"Reading Digits in Natural Images with Unsupervised Feature Learning. In NIPS Workshop on Deep Learning and Unsupervised Feature Learning","author":"Netzer Yuval","year":"2011","unstructured":"Yuval Netzer, Tao Wang, Adam Coates, Alessandro Bissacco, Bo Wu, and Andrew Y. Ng. 2011. Reading Digits in Natural Images with Unsupervised Feature Learning. In NIPS Workshop on Deep Learning and Unsupervised Feature Learning 2011."},{"key":"e_1_3_2_1_50_1","first-page":"16025","article-title":"Variational bayesian unlearning","volume":"33","author":"Nguyen Quoc Phong","year":"2020","unstructured":"Quoc Phong Nguyen, Bryan Kian Hsiang Low, and Patrick Jaillet. 2020. Variational bayesian unlearning. Advances in Neural Information Processing Systems 33 (2020), 16025--16036.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_51_1","unstructured":"NVIDIA Corporation. 2020. NVIDIA Triton Inference Server. https:\/\/github.com\/ triton-inference-server\/server."},{"key":"e_1_3_2_1_52_1","unstructured":"State of California Office of the Attorney General. 2023. California Consumer Privacy Act (CCPA). https:\/\/oag.ca.gov\/privacy\/ccpa."},{"key":"e_1_3_2_1_53_1","volume-title":"SSSE: Efficiently Erasing Samples from Trained Machine Learning Models. arXiv preprint arXiv:2107.03860","author":"Peste Alexandra","year":"2021","unstructured":"Alexandra Peste, Dan Alistarh, and Christoph H Lampert. 2021. SSSE: Efficiently Erasing Samples from Trained Machine Learning Models. arXiv preprint arXiv:2107.03860 (2021)."},{"key":"e_1_3_2_1_54_1","volume-title":"INFaaS: Automated Model-less Inference Serving. In 2021 USENIX Annual Technical Conference, USENIX ATC 2021","author":"Romero Francisco","year":"2021","unstructured":"Francisco Romero, Qian Li, Neeraja J. Yadwadkar, and Christos Kozyrakis. 2021. INFaaS: Automated Model-less Inference Serving. In 2021 USENIX Annual Technical Conference, USENIX ATC 2021, July 14--16, 2021, Irina Calciu and Geoff Kuenning (Eds.). USENIX Association, 397--411."},{"key":"e_1_3_2_1_55_1","unstructured":"SageMaker-Machine Learning at Scale. 2018. Amazon SageMaker. https:\/\/aws. amazon.com\/sagemaker."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3523-0"},{"key":"e_1_3_2_1_57_1","volume-title":"ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019","author":"Salem Ahmed","year":"2019","unstructured":"Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. 2019. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24--27, 2019. The Internet Society."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457239"},{"key":"e_1_3_2_1_59_1","first-page":"18075","article-title":"Remember what you want to forget: Algorithms for machine unlearning","volume":"34","author":"Sekhari Ayush","year":"2021","unstructured":"Ayush Sekhari, Jayadev Acharya, Gautam Kamath, and Ananda Theertha Suresh. 2021. Remember what you want to forget: Algorithms for machine unlearning. Advances in Neural Information Processing Systems 34 (2021), 18075--18086.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_60_1","first-page":"809","article-title":"Intelligent performance-based product recommendation system","volume":"7","author":"Shaya Steven A","year":"2010","unstructured":"Steven A Shaya, Neal Matheson, John Anthony Singarayar, Nikiforos Kollias, and Jeffrey Adam Bloom. 2010. Intelligent performance-based product recommendation system. US Patent 7,809,601.","journal-title":"US Patent"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_62_1","volume-title":"Communication Efficient and Provable Federated Unlearning. arXiv preprint arXiv:2401.11018","author":"Tao Youming","year":"2024","unstructured":"Youming Tao, Cheng-Long Wang, Miao Pan, Dongxiao Yu, Xiuzhen Cheng, and Di Wang. 2024. Communication Efficient and Provable Federated Unlearning. arXiv preprint arXiv:2401.11018 (2024)."},{"key":"e_1_3_2_1_63_1","volume-title":"Conference on Learning Theory. PMLR, 4126--4142","author":"Ullah Enayat","year":"2021","unstructured":"Enayat Ullah, Tung Mai, Anup Rao, Ryan A Rossi, and Raman Arora. 2021. Machine unlearning via algorithmic stability. In Conference on Learning Theory. PMLR, 4126--4142."},{"key":"e_1_3_2_1_64_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Huai Mengdi","year":"2023","unstructured":"Cheng-LongWang, Mengdi Huai, and DiWang. 2023. Inductive graph unlearning. In 32nd USENIX Security Symposium (USENIX Security 23). 3205--3222."},{"key":"e_1_3_2_1_65_1","volume-title":"International Conference on Machine Learning. PMLR, 22769--22783","author":"Wang Wenxiao","year":"2022","unstructured":"Wenxiao Wang, Alexander J Levine, and Soheil Feizi. 2022. Improved certified defenses against data poisoning with (deterministic) finite aggregation. In International Conference on Machine Learning. PMLR, 22769--22783."},{"key":"e_1_3_2_1_66_1","volume-title":"Machine unlearning of features and labels. arXiv preprint arXiv:2108.11577","author":"Warnecke Alexander","year":"2021","unstructured":"Alexander Warnecke, Lukas Pirch, Christian Wressnegger, and Konrad Rieck. 2021. Machine unlearning of features and labels. arXiv preprint arXiv:2108.11577 (2021)."},{"key":"e_1_3_2_1_67_1","volume-title":"Machine Unlearning of Features and Labels. In 30th Annual Network and Distributed System Security Symposium, NDSS 2023","author":"Warnecke Alexander","year":"2023","unstructured":"Alexander Warnecke, Lukas Pirch, Christian Wressnegger, and Konrad Rieck. 2023. Machine Unlearning of Features and Labels. In 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023. The Internet Society."},{"key":"e_1_3_2_1_68_1","volume-title":"On the Importance of Difficulty Calibration in Membership Inference Attacks. In The Tenth International Conference on Learning Representations, ICLR 2022","author":"Guo Chuan","year":"2022","unstructured":"LaurenWatson, Chuan Guo, Graham Cormode, and Alexandre Sablayrolles. 2022. On the Importance of Difficulty Calibration in Membership Inference Attacks. In The Tenth International Conference on Learning Representations, ICLR 2022, Virtual Event, April 25--29, 2022. OpenReview.net. https:\/\/openreview.net\/forum?id=3eIrli0TwQ"},{"key":"e_1_3_2_1_69_1","volume-title":"International Conference on Machine Learning. PMLR, 10355--10366","author":"Dobriban Edgar","year":"2020","unstructured":"YinjunWu, Edgar Dobriban, and Susan Davidson. 2020. Deltagrad: Rapid retraining of machine learning models. In International Conference on Machine Learning. PMLR, 10355--10366."},{"key":"e_1_3_2_1_70_1","volume-title":"SLO-Aware Machine Learning Inference Serving. In 2019 USENIX Annual Technical Conference, USENIX ATC 2019","author":"Zhang Chengliang","year":"2019","unstructured":"Chengliang Zhang, Minchen Yu, Wei Wang, and Feng Yan. 2019. MArk: Exploiting Cloud Services for Cost-Effective, SLO-Aware Machine Learning Inference Serving. In 2019 USENIX Annual Technical Conference, USENIX ATC 2019, Renton, WA, USA, July 10--12, 2019, Dahlia Malkhi and Dan Tsafrir (Eds.). USENIX Association, 1049--1062."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00477"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670398","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:01:05Z","timestamp":1755842465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670398"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":71,"alternative-id":["10.1145\/3658644.3670398","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670398","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}