A survey on machine unlearning: Techniques and new emerged privacy risks

被引:0
|
作者
Liu, Hengzhu [1 ]
Xiong, Ping [1 ]
Zhu, Tianqing [2 ]
Yu, Philip S. [3 ]
机构
[1] Zhongnan Univ Econ & Law, Wuhan 430073, Peoples R China
[2] City Univ Macau, Macau, Peoples R China
[3] Univ Illinois, Chicago, IL 60607 USA
关键词
Machine learning; Machine unlearning; Privacy leakage; Privacy preservation; Adversarial attack; ATTACKS;
D O I
10.1016/j.jisa.2025.104010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The explosive growth of machine learning has made it a critical infrastructure in the era of artificial intelligence. The extensive use of data poses a significant threat to individual privacy. Various countries have implemented corresponding laws, such as GDPR, to protect individuals' data privacy and the right to be forgotten. This has made machine unlearning a research hotspot in the field of privacy protection in recent years, with the aim of efficiently removing the contribution and impact of individual data from trained models. The research in academia on machine unlearning has continuously enriched its theoretical foundation, and many methods have been proposed, targeting different data removal requests in various application scenarios. However, recently researchers have found potential privacy leakages of various of machine unlearning approaches, making the privacy preservation on machine unlearning area a critical topic. This paper provides an overview and analysis of the existing research on machine unlearning, aiming to present the current vulnerabilities of machine unlearning approaches. We analyze privacy risks in various aspects, including definitions, implementation methods, and real-world applications. Compared to existing reviews, we analyze the new challenges posed by the latest malicious attack techniques on machine unlearning from the perspective of privacy threats. We hope that this survey can provide an initial but comprehensive discussion on this new emerging area.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] Differential Privacy Techniques for Cyber Physical Systems: A Survey
    Hassan, Muneeb Ul
    Rehmani, Mubashir Husain
    Chen, Jinjun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 746 - 789
  • [22] When Machine Learning Meets Privacy: A Survey and Outlook
    Liu, Bo
    Ding, Ming
    Shaham, Sina
    Rahayu, Wenny
    Farokhi, Farhad
    Lin, Zihuai
    ACM COMPUTING SURVEYS, 2021, 54 (02)
  • [23] Privacy Risks of Securing Machine Learning Models against Adversarial Examples
    Song, Liwei
    Shokri, Reza
    Mittal, Prateek
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 241 - 257
  • [24] Achieving cloud security solutions through machine and non-machine learning techniques: A survey
    Shyam G.K.
    Doddi S.
    Journal of Engineering Science and Technology Review, 2019, 12 (03) : 51 - 63
  • [25] Data Security and Privacy Preserving Techniques for Wearable Devices: A Survey
    Liu Q.
    Li T.
    Yu Y.
    Cai Z.
    Zhou T.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018, 55 (01): : 14 - 29
  • [26] Cryptographic Primitives in Privacy-Preserving Machine Learning: A Survey
    Qin, Hong
    He, Debiao
    Feng, Qi
    Khan, Muhammad Khurram
    Luo, Min
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (05) : 1919 - 1934
  • [27] Survey of machine learning techniques for malware analysis
    Ucci, Daniele
    Aniello, Leonardo
    Baldoni, Roberto
    COMPUTERS & SECURITY, 2019, 81 : 123 - 147
  • [28] A survey of visual analytics techniques for machine learning
    Jun Yuan
    Changjian Chen
    Weikai Yang
    Mengchen Liu
    Jiazhi Xia
    Shixia Liu
    Computational Visual Media, 2021, 7 : 3 - 36
  • [29] A survey of visual analytics techniques for machine learning
    Yuan, Jun
    Chen, Changjian
    Yang, Weikai
    Liu, Mengchen
    Xia, Jiazhi
    Liu, Shixia
    COMPUTATIONAL VISUAL MEDIA, 2021, 7 (01) : 3 - 36
  • [30] A Survey of Machine Learning Based Database Techniques
    Li G.-L.
    Zhou X.-H.
    Sun J.
    Yu X.
    Yuan H.-T.
    Liu J.-B.
    Han Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (11): : 2019 - 2049