{"id":"https://openalex.org/W7127602152","doi":"https://doi.org/10.48550/arxiv.2602.03567","title":"EVE: Efficient Verification of Data Erasure through Customized Perturbation in Approximate Unlearning","display_name":"EVE: Efficient Verification of Data Erasure through Customized Perturbation in Approximate Unlearning","publication_year":2026,"publication_date":"2026-02-03","ids":{"openalex":"https://openalex.org/W7127602152","doi":"https://doi.org/10.48550/arxiv.2602.03567"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.03567","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124981317","display_name":"Weiqi Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wang, Weiqi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059567156","display_name":"Zhiyi Tian","orcid":"https://orcid.org/0000-0001-8905-0941"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tian, Zhiyi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125025898","display_name":"Chenhan Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Chenhan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047315011","display_name":"Luoyu Chen","orcid":"https://orcid.org/0009-0001-5746-9817"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Luoyu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5124984262","display_name":"Shui Yu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yu, Shui","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5124981317"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8973000049591064,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8973000049591064,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12535","display_name":"Machine Learning and Data Classification","score":0.03799999877810478,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.011699999682605267,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5723999738693237},{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.5241000056266785},{"id":"https://openalex.org/keywords/speedup","display_name":"Speedup","score":0.49729999899864197},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4706999957561493},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4632999897003174},{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.40059998631477356}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7735999822616577},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5723999738693237},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.5241000056266785},{"id":"https://openalex.org/C68339613","wikidata":"https://www.wikidata.org/wiki/Q1549489","display_name":"Speedup","level":2,"score":0.49729999899864197},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4706999957561493},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4632999897003174},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4309000074863434},{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.40059998631477356},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.3799999952316284},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.36719998717308044},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3154999911785126},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3046000003814697},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.29679998755455017},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2957000136375427},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2904999852180481},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2831999957561493},{"id":"https://openalex.org/C73301696","wikidata":"https://www.wikidata.org/wiki/Q5469984","display_name":"Formalism (music)","level":3,"score":0.2565000057220459}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.03567","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.03567","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.03567","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.03567","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Verifying":[0],"whether":[1],"the":[2,33,40,70,81,86,90,107,110,117,126,131,140,152,156,169,180],"machine":[3,64,176,221],"unlearning":[4,19,65,82,98,103,127,153,177,193],"process":[5],"has":[6],"been":[7],"properly":[8],"executed":[9],"is":[10,46,78,210],"critical":[11],"but":[12],"remains":[13],"underexplored.":[14],"Some":[15],"existing":[16],"approaches":[17],"propose":[18,54],"verification":[20,57,114,194,203,219],"methods":[21,28],"based":[22],"on":[23],"backdooring":[24],"techniques.":[25],"However,":[26],"these":[27],"typically":[29],"require":[30],"participation":[31],"in":[32,69,199],"model's":[34,71,133,181],"initial":[35,72,182],"training":[36,73,183],"phase":[37],"to":[38,79,84],"backdoor":[39],"model":[41,87],"for":[42,62,161,218],"later":[43],"verification,":[44],"which":[45],"inefficient":[47],"and":[48,96,129,168],"impractical.":[49],"In":[50],"this":[51],"paper,":[52],"we":[53],"an":[55,144],"efficient":[56],"of":[58,89,109,135,158,208,220],"erasure":[59],"method":[60],"(EVE)":[61],"verifying":[63],"without":[66,178],"requiring":[67],"involvement":[68],"process.":[74],"The":[75,102,205],"core":[76],"idea":[77],"perturb":[80],"data":[83],"ensure":[85],"prediction":[88,134],"specified":[91],"samples":[92],"will":[93],"change":[94,160],"before":[95],"after":[97],"with":[99,121,155],"perturbed":[100],"data.":[101],"users":[104],"can":[105,174],"leverage":[106],"observation":[108],"changes":[111],"as":[112,143],"a":[113,215],"signal.":[115],"Specifically,":[116],"perturbations":[118],"are":[119],"designed":[120],"two":[122],"key":[123],"objectives:":[124],"ensuring":[125],"effect":[128],"altering":[130],"unlearned":[132],"target":[136,162],"samples.":[137,163],"We":[138,164],"formalize":[139],"perturbation":[141],"generation":[142],"adversarial":[145],"optimization":[146],"problem,":[147],"solving":[148],"it":[149],"by":[150],"aligning":[151],"gradient":[154,157],"boundary":[159],"conducted":[165],"extensive":[166],"experiments,":[167],"results":[170],"show":[171],"that":[172],"EVE":[173,189,209],"verify":[175],"involving":[179],"process,":[184],"unlike":[185],"backdoor-based":[186],"methods.":[187],"Moreover,":[188],"significantly":[190],"outperforms":[191],"state-of-the-art":[192],"methods,":[195],"offering":[196],"significant":[197],"speedup":[198],"efficiency":[200],"while":[201],"enhancing":[202],"accuracy.":[204],"source":[206],"code":[207],"released":[211],"at":[212],"\\uline{https://anonymous.4open.science/r/EVE-C143},":[213],"providing":[214],"novel":[216],"tool":[217],"unlearning.":[222]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-06T00:00:00"}
