{"id":"https://openalex.org/W4413822089","doi":"https://doi.org/10.1109/tdsc.2025.3598987","title":"A2E: Black-Box Anti-Adversarial Example Based Watermarking to Verify Federated Unlearning","display_name":"A2E: Black-Box Anti-Adversarial Example Based Watermarking to Verify Federated Unlearning","publication_year":2025,"publication_date":"2025-08-29","ids":{"openalex":"https://openalex.org/W4413822089","doi":"https://doi.org/10.1109/tdsc.2025.3598987"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3598987","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3598987","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045161763","display_name":"Xiangshan Gao","orcid":"https://orcid.org/0000-0001-8335-2746"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangshan Gao","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100319491","display_name":"Jingyi Wang","orcid":"https://orcid.org/0000-0001-7113-7635"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingyi Wang","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100746182","display_name":"Zhikun Zhang","orcid":"https://orcid.org/0000-0001-7208-3392"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhikun Zhang","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101864441","display_name":"Jialuo Chen","orcid":"https://orcid.org/0000-0003-4322-4285"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jialuo Chen","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051951845","display_name":"Peng Cheng","orcid":"https://orcid.org/0000-0002-4221-2162"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Cheng","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100726041","display_name":"Jiming Chen","orcid":"https://orcid.org/0000-0003-3155-3145"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiming Chen","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5045161763"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21153553,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"1","first_page":"66","last_page":"81"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8262576460838318},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7951765060424805},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7551146745681763},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.7141913771629333},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38483741879463196},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37004196643829346},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.342590868473053},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33486807346343994},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32615864276885986},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.13050925731658936}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8262576460838318},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7951765060424805},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7551146745681763},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.7141913771629333},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38483741879463196},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37004196643829346},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.342590868473053},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33486807346343994},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32615864276885986},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.13050925731658936}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3598987","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3598987","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Zero hunger","id":"https://metadata.un.org/sdg/2"}],"awards":[{"id":"https://openalex.org/G4513079086","display_name":null,"funder_award_id":"62293511","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6562299470","display_name":null,"funder_award_id":"62441618","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1488996941","https://openalex.org/W1655958391","https://openalex.org/W2051267297","https://openalex.org/W2052384514","https://openalex.org/W2064675550","https://openalex.org/W2103012681","https://openalex.org/W2103647628","https://openalex.org/W2108598243","https://openalex.org/W2112796928","https://openalex.org/W2194775991","https://openalex.org/W2473418344","https://openalex.org/W2535690855","https://openalex.org/W2795435272","https://openalex.org/W2946363484","https://openalex.org/W2963456518","https://openalex.org/W2963542245","https://openalex.org/W2963839617","https://openalex.org/W2963857521","https://openalex.org/W2963952467","https://openalex.org/W2964076740","https://openalex.org/W2971641579","https://openalex.org/W3008443627","https://openalex.org/W3023153742","https://openalex.org/W3029511006","https://openalex.org/W3154155772","https://openalex.org/W3174532363","https://openalex.org/W3197363474","https://openalex.org/W3199974954","https://openalex.org/W3202838631","https://openalex.org/W3204946808","https://openalex.org/W4283208007","https://openalex.org/W4286256876","https://openalex.org/W4378679033","https://openalex.org/W4393252682","https://openalex.org/W4394595144","https://openalex.org/W4410609060"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W2361629745","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W2107922825","https://openalex.org/W3094285444","https://openalex.org/W1568204688","https://openalex.org/W2381262728","https://openalex.org/W3009622996"],"abstract_inverted_index":{"Machine":[0],"unlearning":[1,38,109,141,204,257],"is":[2,19,66,156,267],"the":[3,9,31,50,93,120,163,169,174,179,182,189,194,198,208,214,221,250,274],"primary":[4],"way":[5],"to":[6,11,53,89,107,137,150,157,161,213],"fight":[7],"for":[8,49,69],"\u201cright":[10],"be":[12,43,54,87],"forgotten\u201d":[13],"in":[14,39,110,254],"machine":[15,37],"learning":[16,41,71],"field,":[17],"which":[18,142],"promoted":[20],"among":[21],"multiple":[22,270],"privacy":[23],"legislations,":[24],"such":[25],"as":[26,63,95,178],"GDPR":[27],"and":[28,91,146,236,238,245,277],"CCPA.":[29],"However,":[30,98],"latest":[32],"work":[33],"has":[34,59,191],"shown":[35],"that":[36,56,265],"deep":[40],"cannot":[42],"easily":[44],"verified,":[45],"making":[46],"it":[47],"challenging":[48],"data":[51,58],"owners":[52],"convinced":[55],"their":[57],"indeed":[60,192],"been":[61],"deleted":[62],"claimed.":[64],"This":[65],"especially":[67],"problematic":[68],"federated":[70,140,256],"(FL),":[72],"where":[73],"a":[74,80,104,128,133,259],"number":[75],"of":[76,103,173,181,203,220,252],"participants":[77],"jointly":[78],"train":[79],"global":[81,210],"model":[82,171,239],"while":[83],"each":[84],"participant":[85],"should":[86],"free":[88],"join":[90],"leave":[92],"federation":[94],"they":[96],"wish.":[97],"<italic":[99],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[100],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">the":[101],"lack":[102],"reliable":[105],"approach":[106],"verify":[108,187],"FL":[111],"will":[112],"no":[113,147],"doubt":[114],"discourage":[115],"certain":[116],"users":[117],"from":[118,132,273],"joining":[119],"federation.</i>":[121],"In":[122],"this":[123],"work,":[124],"we":[125,186],"propose":[126],"A2E,":[127],"black-box":[129],"watermarking":[130],"scheme":[131],"leaving":[134,183],"participant's":[135],"perspective":[136],"realize":[138],"verifiable":[139],"incurs":[143],"minimum":[144],"impact":[145],"security":[148],"threats":[149],"vanilla":[151],"FL.":[152],"The":[153,247],"key":[154],"idea":[155],"leverage":[158],"adversarial":[159,218,275],"training":[160],"inject":[162],"anti-adversarial":[164],"example":[165],"(A2E)":[166],"characteristic":[167],"into":[168],"uploaded":[170],"updates":[172],"last":[175],"contribution":[176],"round":[177],"watermark":[180],"participant.":[184],"Then,":[185],"whether":[188],"server":[190,276],"executed":[193],"effective":[195],"unlearning,":[196],"with":[197,258],"newly":[199],"developed":[200],"probabilistic":[201],"quantification":[202],"confidence,":[205],"by":[206],"checking":[207],"unlearned":[209],"model's":[211],"resistance":[212],"specially":[215],"generated":[216],"watermark-dependent":[217],"examples":[219],"leaver.":[222],"We":[223,262],"conducted":[224],"large-scale":[225],"experiments":[226],"on":[227],"various":[228],"popular":[229],"datasets":[230],"(including":[231,241],"natural":[232],"images,":[233,235],"medical":[234],"speech)":[237],"structures":[240],"LeNet,":[242],"ResNet,":[243],"VGG,":[244],"LSTM).":[246],"results":[248],"confirm":[249],"effectiveness":[251],"A2E":[253,266],"verifying":[255],"high":[260],"confidence.":[261],"also":[263],"show":[264],"robust":[268],"against":[269],"adaptive":[271],"strategies":[272],"participants.":[278]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
