A survey on machine unlearning: Techniques and new emerged privacy risks

被引:0
作者
Liu, Hengzhu [1 ]
Xiong, Ping [1 ]
Zhu, Tianqing [2 ]
Yu, Philip S. [3 ]
机构
[1] Zhongnan Univ Econ & Law, Wuhan 430073, Peoples R China
[2] City Univ Macau, Macau, Peoples R China
[3] Univ Illinois, Chicago, IL 60607 USA
关键词
Machine learning; Machine unlearning; Privacy leakage; Privacy preservation; Adversarial attack; ATTACKS;
D O I
10.1016/j.jisa.2025.104010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The explosive growth of machine learning has made it a critical infrastructure in the era of artificial intelligence. The extensive use of data poses a significant threat to individual privacy. Various countries have implemented corresponding laws, such as GDPR, to protect individuals' data privacy and the right to be forgotten. This has made machine unlearning a research hotspot in the field of privacy protection in recent years, with the aim of efficiently removing the contribution and impact of individual data from trained models. The research in academia on machine unlearning has continuously enriched its theoretical foundation, and many methods have been proposed, targeting different data removal requests in various application scenarios. However, recently researchers have found potential privacy leakages of various of machine unlearning approaches, making the privacy preservation on machine unlearning area a critical topic. This paper provides an overview and analysis of the existing research on machine unlearning, aiming to present the current vulnerabilities of machine unlearning approaches. We analyze privacy risks in various aspects, including definitions, implementation methods, and real-world applications. Compared to existing reviews, we analyze the new challenges posed by the latest malicious attack techniques on machine unlearning from the perspective of privacy threats. We hope that this survey can provide an initial but comprehensive discussion on this new emerging area.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Privacy preservation techniques through data lifecycle: A comprehensive literature survey
    Madhusudhanan, Sheema
    Jose, Arun Cyril
    Computers and Security, 2025, 155
  • [42] Survey on privacy preserving data mining techniques in health care databases
    Gal, Tamas Zoltan
    Kovacs, Gabor
    Kardkovacs, Zsolt T.
    ACTA UNIVERSITATIS SAPIENTIAE INFORMATICA, 2014, 6 (01) : 33 - 55
  • [43] A Survey of Machine and Deep Learning Methods for Privacy Protection in the Internet of Things
    Rodriguez, Eva
    Otero, Beatriz
    Canal, Ramon
    SENSORS, 2023, 23 (03)
  • [44] When Machine Learning Meets Privacy in 6G: A Survey
    Sun, Yuanyuan
    Liu, Jiajia
    Wang, Jiadai
    Cao, Yurui
    Kato, Nei
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (04): : 2694 - 2724
  • [45] A Survey on Machine Learning Based Requirement Prioritization Techniques
    Qayyum, Shamaila
    Qureshi, Ahsan
    2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS (CIIS 2018), 2018, : 51 - 55
  • [46] A survey of machine learning techniques in structural and multidisciplinary optimization
    Ramu, Palaniappan
    Thananjayan, Pugazhenthi
    Acar, Erdem
    Bayrak, Gamze
    Park, Jeong Woo
    Lee, Ikjin
    STRUCTURAL AND MULTIDISCIPLINARY OPTIMIZATION, 2022, 65 (09)
  • [47] Investigation of machine learning techniques on proteomics: A comprehensive survey
    Sonsare, Pravinkumar M.
    Gunavathi, C.
    PROGRESS IN BIOPHYSICS & MOLECULAR BIOLOGY, 2019, 149 : 54 - 69
  • [48] A Survey on Machine Learning Techniques for Heart Disease Prediction
    Priti Shinde
    Mahesh Sanghavi
    Tien Anh Tran
    SN Computer Science, 6 (4)
  • [49] Iris recognition through machine learning techniques: A survey
    De Marsico, Maria
    Petrosino, Alfredo
    Ricciardi, Stefano
    PATTERN RECOGNITION LETTERS, 2016, 82 : 106 - 115
  • [50] A Survey of Malware Detection Techniques based on Machine Learning
    El Merabet, Hoda
    Hajraoui, Abderrahmane
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (01) : 366 - 373