{"id":"https://openalex.org/W7130569910","doi":"https://doi.org/10.48550/arxiv.2602.16697","title":"Protecting the Undeleted in Machine Unlearning","display_name":"Protecting the Undeleted in Machine Unlearning","publication_year":2026,"publication_date":"2026-02-18","ids":{"openalex":"https://openalex.org/W7130569910","doi":"https://doi.org/10.48550/arxiv.2602.16697"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.16697","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126361584","display_name":"Aloni Cohen","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Cohen, Aloni","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041717137","display_name":"Refael Kohen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kohen, Refael","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126386173","display_name":"Kobbi Nissim","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nissim, Kobbi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5124423320","display_name":"Uri Stemmer","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Stemmer, Uri","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5126361584"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.38600000739097595,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.38600000739097595,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.16920000314712524,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.10890000313520432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7139999866485596},{"id":"https://openalex.org/keywords/retraining","display_name":"Retraining","score":0.5576000213623047},{"id":"https://openalex.org/keywords/carry","display_name":"Carry (investment)","score":0.43970000743865967},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.3637000024318695},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.3361999988555908},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.33390000462532043},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.31119999289512634}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7439000010490417},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7139999866485596},{"id":"https://openalex.org/C2778712577","wikidata":"https://www.wikidata.org/wiki/Q3505966","display_name":"Retraining","level":2,"score":0.5576000213623047},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5325000286102295},{"id":"https://openalex.org/C2776299755","wikidata":"https://www.wikidata.org/wiki/Q432449","display_name":"Carry (investment)","level":2,"score":0.43970000743865967},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.3637000024318695},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34790000319480896},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3361999988555908},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.33390000462532043},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.31119999289512634},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.29179999232292175},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2842999994754791},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.2736999988555908},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2694999873638153},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.2522999942302704},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.25209999084472656},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.251800000667572}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.16697","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.16697","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.16697","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.16697","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7343147397041321,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Machine":[0],"unlearning":[1],"aims":[2],"to":[3,14,75,86,109,115],"remove":[4],"specific":[5],"data":[6,30,53,84,136],"points":[7,85],"from":[8],"a":[9,57,72,128],"trained":[10],"model,":[11],"often":[12],"striving":[13],"emulate":[15],"\"perfect":[16],"retraining\",":[17],"i.e.,":[18],"producing":[19],"the":[20,28,50,89,141],"model":[21],"that":[22,36,42,61,132,148],"would":[23],"have":[24],"been":[25,32],"obtained":[26],"had":[27],"deleted":[29],"never":[31],"included.":[33],"We":[34,55,97,146],"demonstrate":[35],"this":[37,124],"approach,":[38],"and":[39,160],"security":[40,130],"definitions":[41,100],"enable":[43],"it,":[44],"carry":[45],"significant":[46],"privacy":[47],"risks":[48],"for":[49,62,101],"remaining":[51],"(undeleted)":[52],"points.":[54,145],"present":[56],"reconstruction":[58],"attack":[59],"showing":[60,104],"certain":[63],"tasks,":[64],"which":[65],"can":[66],"be":[67],"computed":[68],"securely":[69],"without":[70],"deletions,":[71],"mechanism":[73],"adhering":[74],"perfect":[76],"retraining":[77],"allows":[78],"an":[79],"adversary":[80],"controlling":[81],"merely":[82,92],"$\u03c9(1)$":[83],"reconstruct":[87],"almost":[88],"entire":[90],"dataset":[91],"by":[93,140],"issuing":[94],"deletion":[95,142],"requests.":[96],"survey":[98],"existing":[99],"machine":[102],"unlearning,":[103],"they":[105],"are":[106],"either":[107],"susceptible":[108],"such":[110,155],"attacks":[111],"or":[112],"too":[113],"restrictive":[114],"support":[116],"basic":[117],"functionalities":[118],"like":[119],"exact":[120],"summation.":[121],"To":[122],"address":[123],"problem,":[125],"we":[126],"propose":[127],"new":[129],"definition":[131,150],"specifically":[133],"safeguards":[134],"undeleted":[135],"against":[137],"leakage":[138],"caused":[139],"of":[143],"other":[144],"show":[147],"our":[149],"permits":[151],"several":[152],"essential":[153],"functionalities,":[154],"as":[156],"bulletin":[157],"boards,":[158],"summations,":[159],"statistical":[161],"learning.":[162]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-20T00:00:00"}
