A survey on machine unlearning: Techniques and new emerged privacy risks

被引:0
作者
Liu, Hengzhu [1 ]
Xiong, Ping [1 ]
Zhu, Tianqing [2 ]
Yu, Philip S. [3 ]
机构
[1] Zhongnan Univ Econ & Law, Wuhan 430073, Peoples R China
[2] City Univ Macau, Macau, Peoples R China
[3] Univ Illinois, Chicago, IL 60607 USA
关键词
Machine learning; Machine unlearning; Privacy leakage; Privacy preservation; Adversarial attack; ATTACKS;
D O I
10.1016/j.jisa.2025.104010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The explosive growth of machine learning has made it a critical infrastructure in the era of artificial intelligence. The extensive use of data poses a significant threat to individual privacy. Various countries have implemented corresponding laws, such as GDPR, to protect individuals' data privacy and the right to be forgotten. This has made machine unlearning a research hotspot in the field of privacy protection in recent years, with the aim of efficiently removing the contribution and impact of individual data from trained models. The research in academia on machine unlearning has continuously enriched its theoretical foundation, and many methods have been proposed, targeting different data removal requests in various application scenarios. However, recently researchers have found potential privacy leakages of various of machine unlearning approaches, making the privacy preservation on machine unlearning area a critical topic. This paper provides an overview and analysis of the existing research on machine unlearning, aiming to present the current vulnerabilities of machine unlearning approaches. We analyze privacy risks in various aspects, including definitions, implementation methods, and real-world applications. Compared to existing reviews, we analyze the new challenges posed by the latest malicious attack techniques on machine unlearning from the perspective of privacy threats. We hope that this survey can provide an initial but comprehensive discussion on this new emerging area.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] A Survey on Tensor Techniques and Applications in Machine Learning
    Ji, Yuwang
    Wang, Qiang
    Li, Xuan
    Liu, Jie
    IEEE ACCESS, 2019, 7 : 162950 - 162990
  • [32] A Survey of PAPR Techniques Based on Machine Learning
    da Silva, Bianca S. de C.
    Souto, Victoria D. P.
    Souza, Richard D.
    Mendes, Luciano L.
    SENSORS, 2024, 24 (06)
  • [33] Survey of Machine Learning Techniques in Drug Discovery
    Stephenson, Natalie
    Shane, Emily
    Chase, Jessica
    Rowland, Jason
    Ries, David
    Justice, Nicola
    Zhang, Jie
    Chan, Leong
    Cao, Renzhi
    CURRENT DRUG METABOLISM, 2019, 20 (03) : 185 - 193
  • [34] A survey of machine learning techniques for Spam filtering
    Saad, Omar
    Darwish, Ashraf
    Faraj, Ramadan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (02): : 66 - 73
  • [35] A Survey of Machine Learning Techniques for Spam Filtering
    Saad, Omar
    Hassanien, Aboul Ella
    Darwish, Ashraf
    Faraj, Ramadan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (01): : 103 - 110
  • [36] MQTTset, a New Dataset for Machine Learning Techniques on MQTT
    Vaccari, Ivan
    Chiola, Giovanni
    Aiello, Maurizio
    Mongelli, Maurizio
    Cambiaso, Enrico
    SENSORS, 2020, 20 (22) : 1 - 17
  • [37] A Survey of Deep Learning Architectures for Privacy-Preserving Machine Learning With Fully Homomorphic Encryption
    Podschwadt, Robert
    Takabi, Daniel
    Hu, Peizhao
    Rafiei, Mohammad H. H.
    Cai, Zhipeng
    IEEE ACCESS, 2022, 10 : 117477 - 117500
  • [38] Techniques used to predict climate risks: a brief literature survey
    Nanwani, Ruchika
    Hasan, Md Mahmudul
    Cirstea, Silvia
    NATURAL HAZARDS, 2023, 118 (02) : 925 - 951
  • [39] Techniques used to predict climate risks: a brief literature survey
    Ruchika Nanwani
    Md Mahmudul Hasan
    Silvia Cirstea
    Natural Hazards, 2023, 118 : 925 - 951
  • [40] A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
    Liu, Qiang
    Li, Pan
    Zhao, Wentao
    Cai, Wei
    Yu, Shui
    Leung, Victor C. M.
    IEEE ACCESS, 2018, 6 : 12103 - 12117