{"id":"https://openalex.org/W4414360656","doi":"https://doi.org/10.24963/ijcai.2025/39","title":"Zero-Shot Machine Unlearning with Proxy Adversarial Data Generation","display_name":"Zero-Shot Machine Unlearning with Proxy Adversarial Data Generation","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4414360656","doi":"https://doi.org/10.24963/ijcai.2025/39"},"language":"en","primary_location":{"id":"doi:10.24963/ijcai.2025/39","is_oa":false,"landing_page_url":"https://doi.org/10.24963/ijcai.2025/39","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013071579","display_name":"Huiqiang Chen","orcid":"https://orcid.org/0000-0003-4811-6742"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]},{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]}],"countries":["AU","MO"],"is_corresponding":true,"raw_author_name":"Huiqiang Chen","raw_affiliation_strings":["City University of Macau","University of Technology Sydney"],"affiliations":[{"raw_affiliation_string":"City University of Macau","institution_ids":["https://openalex.org/I6469544"]},{"raw_affiliation_string":"University of Technology Sydney","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068985187","display_name":"Tianqing Zhu","orcid":"https://orcid.org/0000-0003-3592-5276"},"institutions":[{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Tianqing Zhu","raw_affiliation_strings":["City University of Macau"],"affiliations":[{"raw_affiliation_string":"City University of Macau","institution_ids":["https://openalex.org/I6469544"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003076238","display_name":"Xin Yu","orcid":"https://orcid.org/0000-0002-0269-5649"},"institutions":[{"id":"https://openalex.org/I165143802","display_name":"University of Queensland","ror":"https://ror.org/00rqy9422","country_code":"AU","type":"education","lineage":["https://openalex.org/I165143802"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xin Yu","raw_affiliation_strings":["University of Queensland"],"affiliations":[{"raw_affiliation_string":"University of Queensland","institution_ids":["https://openalex.org/I165143802"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051406984","display_name":"Wanlei Zhou","orcid":"https://orcid.org/0000-0002-1680-2521"},"institutions":[{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Wanlei Zhou","raw_affiliation_strings":["City University of Macau"],"affiliations":[{"raw_affiliation_string":"City University of Macau","institution_ids":["https://openalex.org/I6469544"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5013071579"],"corresponding_institution_ids":["https://openalex.org/I114017466","https://openalex.org/I6469544"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1401207,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"339","last_page":"347"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9772999882698059,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9772999882698059,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12549","display_name":"Image and Object Detection Techniques","score":0.9020000100135803,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7878000140190125},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6644999980926514},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6050999760627747},{"id":"https://openalex.org/keywords/subspace-topology","display_name":"Subspace topology","score":0.5968000292778015},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.436599999666214}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7878000140190125},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7565000057220459},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6644999980926514},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6050999760627747},{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.5968000292778015},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5022000074386597},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.47450000047683716},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4498000144958496},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.436599999666214},{"id":"https://openalex.org/C2781170535","wikidata":"https://www.wikidata.org/wiki/Q30587856","display_name":"Noisy data","level":2,"score":0.2849999964237213},{"id":"https://openalex.org/C2780440489","wikidata":"https://www.wikidata.org/wiki/Q5227278","display_name":"Data-driven","level":2,"score":0.2842000126838684},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.25459998846054077}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.24963/ijcai.2025/39","is_oa":false,"landing_page_url":"https://doi.org/10.24963/ijcai.2025/39","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Machine":[0],"unlearning":[1,41,66,114,132],"aims":[2],"to":[3,33,48,80,111],"remove":[4],"the":[5,23,27,34,37,45,65,93,103,113,120,128,131,135,151,169],"influence":[6,129],"of":[7,130,173],"specific":[8,109],"samples":[9,67,137],"from":[10],"a":[11,59,76,108,145,160],"trained":[12],"model.":[13],"A":[14],"key":[15,88],"challenge":[16],"in":[17,36,58,119],"this":[18,50,82],"process":[19,133],"is":[20],"over-unlearning,":[21],"where":[22,63],"model's":[24,38,152],"performance":[25,153],"on":[26,44,134,165],"remaining":[28,46,95,136],"data":[29,47,96],"significantly":[30],"drops":[31],"due":[32],"change":[35],"parameters.":[39],"Existing":[40],"algorithms":[42],"depend":[43],"prevent":[49],"issue.":[51],"As":[52,144],"such,":[53],"these":[54],"methods":[55],"are":[56,68],"inapplicable":[57],"more":[60],"practical":[61],"scenario,":[62],"only":[64],"available":[69],"(i.e.,":[70],"zero-shot":[71,122],"unlearning).":[72],"This":[73],"paper":[74],"presents":[75],"novel":[77],"framework,":[78],"ZS-PAG,":[79],"fill":[81],"gap.":[83],"Our":[84],"approach":[85],"offers":[86],"three":[87],"innovations:":[89],"(1)":[90],"we":[91,106,126],"approximate":[92],"inaccessible":[94],"by":[97],"generating":[98],"adversarial":[99],"samples;":[100],"(2)":[101],"leveraging":[102],"generated":[104],"samples,":[105],"pinpoint":[107],"subspace":[110],"perform":[112],"process,":[115],"therefore":[116],"preventing":[117],"over-unlearning":[118],"challenging":[121],"scenario;":[123],"and":[124,138,163,171],"(3)":[125],"consider":[127],"design":[139],"an":[140],"influence-based":[141],"pseudo-labeling":[142],"strategy.":[143],"result,":[146],"our":[147,174],"method":[148,158,176],"further":[149],"improves":[150],"after":[154],"unlearning.":[155],"The":[156],"proposed":[157,175],"holds":[159],"theoretical":[161],"guarantee,":[162],"experiments":[164],"various":[166],"benchmarks":[167],"validate":[168],"effectiveness":[170],"superiority":[172],"over":[177],"several":[178],"baselines.":[179]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
