{"id":"https://openalex.org/W7138268724","doi":"https://doi.org/10.1609/aaai.v40i7.37426","title":"ROVER: Robust Generative Continual Identity Unlearning Against Relearning Attacks","display_name":"ROVER: Robust Generative Continual Identity Unlearning Against Relearning Attacks","publication_year":2026,"publication_date":"2026-03-14","ids":{"openalex":"https://openalex.org/W7138268724","doi":"https://doi.org/10.1609/aaai.v40i7.37426"},"language":null,"primary_location":{"id":"doi:10.1609/aaai.v40i7.37426","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i7.37426","pdf_url":null,"source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1609/aaai.v40i7.37426","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129677352","display_name":"Tairan Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tairan Huang","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129681754","display_name":"Qiang Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiang Chen","raw_affiliation_strings":["Big Data Institute, Central South University, Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Big Data Institute, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103683922","display_name":"Beibei Hu","orcid":"https://orcid.org/0000-0001-7764-5972"},"institutions":[{"id":"https://openalex.org/I4210111982","display_name":"Textile Research Institute","ror":"https://ror.org/023k5b089","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210111982"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Beibei Hu","raw_affiliation_strings":["College of Textile and Fashion, Hunan Institute of Engineering, Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Textile and Fashion, Hunan Institute of Engineering, Changsha, China","institution_ids":["https://openalex.org/I4210111982"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129721481","display_name":"Yunlong Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunlong Zhao","raw_affiliation_strings":["School of Electronics and Information Engineering, Central South University, Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129712150","display_name":"Hongyan Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongyan Xu","raw_affiliation_strings":["Big Data Institute, Central South University, Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Big Data Institute, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129735209","display_name":"Zhiyuan Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Zhiyuan Chen","raw_affiliation_strings":["Institute of Data Science, University of Hong Kong, Hong Kong, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Data Science, University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129740410","display_name":"Yi Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I2800531931","display_name":"Hong Kong College of Technology","ror":"https://ror.org/014w0p014","country_code":"CN","type":"education","lineage":["https://openalex.org/I2800531931"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Yi Chen","raw_affiliation_strings":["School of Engineering, HKUST, Hong Kong, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Engineering, HKUST, Hong Kong, China","institution_ids":["https://openalex.org/I2800531931","https://openalex.org/I889458895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129742312","display_name":"Xiu Su","orcid":null},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiu Su","raw_affiliation_strings":["Big Data Institute, Central South University, Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Big Data Institute, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5129677352"],"corresponding_institution_ids":["https://openalex.org/I139660479"],"apc_list":null,"apc_paid":null,"fwci":21.3265,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.9770225,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"40","issue":"7","first_page":"5122","last_page":"5130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.86080002784729,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.86080002784729,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.05480000004172325,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.008700000122189522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6403999924659729},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5687999725341797},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.4553999900817871},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.4422999918460846},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.3327000141143799},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.3285999894142151},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.31709998846054077}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6478999853134155},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6403999924659729},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5687999725341797},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4580000042915344},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.4553999900817871},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.4422999918460846},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34869998693466187},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.3327000141143799},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.3285999894142151},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.31709998846054077},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.30169999599456787},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.2849999964237213},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.27880001068115234},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.2694999873638153},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.25940001010894775},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.2517000138759613},{"id":"https://openalex.org/C197115733","wikidata":"https://www.wikidata.org/wiki/Q1003136","display_name":"Forcing (mathematics)","level":2,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1609/aaai.v40i7.37426","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i7.37426","pdf_url":null,"source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1609/aaai.v40i7.37426","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i7.37426","pdf_url":null,"source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.741792619228363,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Recent":[0],"generative":[1,18],"unlearning":[2,13,20,50,82,105,112,122,187],"models":[3],"synthesize":[4],"high":[5],"quality":[6],"samples":[7],"while":[8],"protecting":[9,84],"private":[10],"information":[11],"by":[12,162],"the":[14,38,48,73,139,154,182],"identity.":[15],"However,":[16],"existing":[17],"identity":[19,29,77,104,128,136,168],"methods":[21],"face":[22],"two":[23],"challenges":[24],"in":[25,37,138,147],"multi-identity":[26,70,186],"unlearning:":[27],"1)":[28],"conflicts,":[30],"which":[31],"cause":[32],"conflicts":[33,78,137],"of":[34,41,75,142,184],"model":[35],"parameters":[36],"continuous":[39,140],"erasure":[40,141],"multiple":[42,143],"identities;":[43],"2)":[44],"fragile":[45],"unlearning,":[46,71],"where":[47],"model's":[49],"ability":[51],"deteriorates":[52],"or":[53],"fails":[54],"under":[55],"malicious":[56,86,124,160],"attacks.":[57,190],"In":[58],"this":[59],"paper,":[60],"we":[61,96,152],"introduce":[62,153],"a":[63,98],"critical":[64],"yet":[65],"under-explored":[66],"task":[67,183],"called":[68],"robust":[69,90,185],"with":[72,114],"goals":[74],"resolving":[76],"to":[79,88,126,158],"achieve":[80,89],"interference-free":[81],"and":[83],"against":[85,106,188],"attacks":[87,108,125,161],"unlearning.":[91,150,169],"To":[92],"satisfy":[93],"these":[94],"goals,":[95],"propose":[97],"novel":[99],"framework,":[100],"RObust":[101],"generatiVE":[102],"continual":[103,149],"Relearning":[107],"(ROVER).":[109],"By":[110],"filtering":[111],"requests":[113],"latent":[115],"similarity,":[116],"our":[117,175],"method":[118,177],"effectively":[119],"isolates":[120],"benign":[121,148],"from":[123],"preserve":[127],"removal":[129],"integrity.":[130],"Meanwhile,":[131],"residual":[132],"orthogonal":[133],"resonator":[134],"resolves":[135],"identities,":[144],"preserving":[145],"stability":[146],"Moreover,":[151],"phantom":[155],"guard":[156],"network":[157],"block":[159],"absorbing":[163],"adversarial":[164],"gradients,":[165],"ensuring":[166],"irreversible":[167],"The":[170],"extensive":[171],"experiments":[172],"demonstrate":[173],"that":[174],"proposed":[176],"achieves":[178],"state-of-the-art":[179],"performance":[180],"on":[181],"relearning":[189]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2026-03-18T00:00:00"}
