{"id":"https://openalex.org/W7123447464","doi":"https://doi.org/10.48550/arxiv.2601.07214","title":"BlindU: Blind Machine Unlearning without Revealing Erasing Data","display_name":"BlindU: Blind Machine Unlearning without Revealing Erasing Data","publication_year":2026,"publication_date":"2026-01-12","ids":{"openalex":"https://openalex.org/W7123447464","doi":"https://doi.org/10.48550/arxiv.2601.07214"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.07214","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.07214","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.07214","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122918856","display_name":"Weiqi Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wang, Weiqi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059567156","display_name":"Zhiyi Tian","orcid":"https://orcid.org/0000-0001-8905-0941"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tian, Zhiyi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061304518","display_name":"Chenhan Zhang","orcid":"https://orcid.org/0000-0002-2352-0485"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Chenhan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5122914402","display_name":"Shui Yu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yu, Shui","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5122918856"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8621000051498413,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8621000051498413,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.0272000003606081,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.01549999974668026,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5835000276565552},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.48170000314712524},{"id":"https://openalex.org/keywords/forgetting","display_name":"Forgetting","score":0.4399999976158142},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.3919999897480011},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.38519999384880066},{"id":"https://openalex.org/keywords/information-bottleneck-method","display_name":"Information bottleneck method","score":0.38510000705718994},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.3619999885559082},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.35280001163482666}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8227999806404114},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5835000276565552},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.48170000314712524},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4767000079154968},{"id":"https://openalex.org/C7149132","wikidata":"https://www.wikidata.org/wiki/Q1377840","display_name":"Forgetting","level":2,"score":0.4399999976158142},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.3919999897480011},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.38519999384880066},{"id":"https://openalex.org/C60008888","wikidata":"https://www.wikidata.org/wiki/Q6031013","display_name":"Information bottleneck method","level":3,"score":0.38510000705718994},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3619999885559082},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.35280001163482666},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3427000045776367},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3255000114440918},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.3190999925136566},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.31349998712539673},{"id":"https://openalex.org/C154556556","wikidata":"https://www.wikidata.org/wiki/Q192969","display_name":"Computer multitasking","level":2,"score":0.2904999852180481},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.2696000039577484},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.26159998774528503},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.2549999952316284},{"id":"https://openalex.org/C2988416141","wikidata":"https://www.wikidata.org/wiki/Q6031139","display_name":"Information loss","level":2,"score":0.25279998779296875}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.07214","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.07214","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.07214","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.07214","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.7805023193359375,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Machine":[0],"unlearning":[1,26,30,74,95,110,122,168,176,246,254],"enables":[2],"data":[3,36,83,228],"holders":[4],"to":[5,16,32,37,72,84,161,190,207,222],"remove":[6],"the":[7,29,38,76,81,85,106,109,112,119,131,137,145,210,225,238,250],"contribution":[8],"of":[9,78,100,144,205,240],"their":[10,18,35,128],"specified":[11],"samples":[12],"from":[13,57,156],"trained":[14],"models":[15,182],"protect":[17],"privacy.":[19],"However,":[20],"it":[21],"is":[22],"paradoxical":[23],"that":[24,151],"most":[25],"methods":[27,46],"require":[28],"requesters":[31],"firstly":[33],"upload":[34],"server":[39,107,120],"as":[40,62],"a":[41,185,215],"prerequisite":[42],"for":[43,180,202],"unlearning.":[44],"These":[45],"are":[47,55],"infeasible":[48],"in":[49,242],"many":[50],"privacy-preserving":[51,116,253],"scenarios":[52],"where":[53],"servers":[54],"prohibited":[56],"accessing":[58],"users'":[59],"data,":[60],"such":[61],"federated":[63],"learning":[64],"(FL).":[65],"In":[66],"this":[67],"paper,":[68],"we":[69,135,213],"explore":[70],"how":[71],"implement":[73],"under":[75],"condition":[77],"not":[79],"uncovering":[80],"erasing":[82,227],"server.":[86],"We":[87],"propose":[88],"\\textbf{Blind":[89],"Unlearning":[90],"(BlindU)},":[91],"which":[92],"carries":[93],"out":[94],"using":[96,169],"compressed":[97,163,170],"representations":[98,126,150,164],"instead":[99],"original":[101],"inputs.":[102],"BlindU":[103,172,241],"only":[104],"involves":[105],"and":[108,118,127,183,193,233,245],"user:":[111],"user":[113],"locally":[114],"generates":[115],"representations,":[117],"performs":[121],"solely":[123],"on":[124],"these":[125],"labels.":[129],"For":[130,166],"FL":[132,147,159],"model":[133,148],"training,":[134],"employ":[136],"information":[138,155,204],"bottleneck":[139],"(IB)":[140],"mechanism.":[141],"The":[142],"encoder":[143],"IB-based":[146,181],"learns":[149],"distort":[152],"maximum":[153],"task-irrelevant":[154,203],"inputs,":[157,206],"allowing":[158],"users":[160],"generate":[162],"locally.":[165],"effective":[167],"representation,":[171],"integrates":[173],"two":[174],"dedicated":[175],"modules":[177],"tailored":[178],"explicitly":[179],"uses":[184],"multiple":[186],"gradient":[187],"descent":[188],"algorithm":[189],"balance":[191],"forgetting":[192],"utility":[194],"retaining.":[195],"While":[196],"IB":[197],"compression":[198],"already":[199],"provides":[200],"protection":[201,244],"further":[208],"enhance":[209],"privacy":[211,218,243],"protection,":[212],"introduce":[214],"noise-free":[216],"differential":[217],"(DP)":[219],"masking":[220],"method":[221],"deal":[223],"with":[224,249],"raw":[226],"before":[229],"compressing.":[230],"Theoretical":[231],"analysis":[232],"extensive":[234],"experimental":[235],"results":[236],"illustrate":[237],"superiority":[239],"effectiveness":[247],"compared":[248],"best":[251],"existing":[252],"benchmarks.":[255]},"counts_by_year":[],"updated_date":"2026-01-14T23:44:37.837170","created_date":"2026-01-14T00:00:00"}
