{"id":"https://openalex.org/W7133351073","doi":"https://doi.org/10.48550/arxiv.2603.00436","title":"ROKA: Robust Knowledge Unlearning against Adversaries","display_name":"ROKA: Robust Knowledge Unlearning against Adversaries","publication_year":2026,"publication_date":"2026-02-28","ids":{"openalex":"https://openalex.org/W7133351073","doi":"https://doi.org/10.48550/arxiv.2603.00436"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.00436","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.00436","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.00436","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023643663","display_name":"Jinmyeong Shin","orcid":"https://orcid.org/0000-0001-8580-6887"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shin, Jinmyeong","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128031304","display_name":"Joshua Tapia","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tapia, Joshua","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128017975","display_name":"Nicholas Ferreira","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ferreira, Nicholas","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127905473","display_name":"Gabriel Diaz","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Diaz, Gabriel","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084299681","display_name":"Moayed Daneshyari","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daneshyari, Moayed","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5081531196","display_name":"Hyeran Jeon","orcid":"https://orcid.org/0000-0002-1767-8198"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jeon, Hyeran","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5023643663"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9384999871253967,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9384999871253967,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.013899999670684338,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.006300000008195639,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.82669997215271},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5134000182151794},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4681999981403351},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4650000035762787},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4505000114440918}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.82669997215271},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7128000259399414},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5564000010490417},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5134000182151794},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4681999981403351},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4650000035762787},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4505000114440918},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3345000147819519},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.28290000557899475},{"id":"https://openalex.org/C13606891","wikidata":"https://www.wikidata.org/wiki/Q2623243","display_name":"Conceptual model","level":2,"score":0.28110000491142273},{"id":"https://openalex.org/C207685749","wikidata":"https://www.wikidata.org/wiki/Q2088941","display_name":"Domain knowledge","level":2,"score":0.25540000200271606}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.00436","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.00436","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.00436","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.00436","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.543067455291748}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"need":[1],"for":[2,7,33,159],"machine":[3],"unlearning":[4,28,43,64,112,120,198],"is":[5,151],"critical":[6],"data":[8,70,137],"privacy,":[9],"yet":[10],"existing":[11],"methods":[12,121],"often":[13],"cause":[14],"Knowledge":[15,102],"Contamination":[16],"by":[17,131],"unintentionally":[18],"damaging":[19],"related":[20],"knowledge.":[21],"Such":[22],"a":[23,57,93,110,156],"degraded":[24],"model":[25,82,130],"performance":[26],"after":[27],"has":[29],"been":[30],"recently":[31],"leveraged":[32],"new":[34,58],"inference":[35],"and":[36,174],"backdoor":[37],"attacks.":[38,199],"Most":[39],"studies":[40],"design":[41],"adversarial":[42],"requests":[44],"that":[45,96,122,179],"require":[46,69],"poisoning":[47],"or":[48,186],"duplicating":[49],"training":[50],"data.":[51],"In":[52],"this":[53,89],"study,":[54],"we":[55,91,107],"introduce":[56,92],"unlearning-induced":[59],"attack":[60],"model,":[61],"namely":[62],"indirect":[63,197],"attack,":[65,90],"which":[66],"does":[67],"not":[68],"manipulation":[71],"but":[72],"exploits":[73],"the":[74,81,129,133,144,152,189,196],"consequence":[75],"of":[76,135,146,191],"knowledge":[77,160],"contamination":[78],"to":[79,154],"perturb":[80],"accuracy":[83,190],"on":[84,105,115,165],"security-critical":[85],"predictions.":[86],"To":[87,143],"mitigate":[88],"theoretical":[94,157],"framework":[95],"models":[97],"neural":[98],"networks":[99],"as":[100],"Neural":[101,116],"Systems.":[103],"Based":[104],"this,":[106],"propose":[108],"ROKA,":[109],"robust":[111],"strategy":[113],"centered":[114],"Healing.":[117],"Unlike":[118],"conventional":[119],"only":[123],"destroy":[124],"information,":[125],"ROKA":[126,180],"constructively":[127],"rebalances":[128],"nullifying":[132],"influence":[134],"forgotten":[136],"while":[138,184],"strengthening":[139],"its":[140],"conceptual":[141],"neighbors.":[142],"best":[145],"our":[147,149],"knowledge,":[148],"work":[150],"first":[153],"provide":[155],"guarantee":[158],"preservation":[161],"during":[162],"unlearning.":[163],"Evaluations":[164],"various":[166],"large":[167,175],"models,":[168,173,177],"including":[169],"vision":[170],"transformers,":[171],"multi-modal":[172],"language":[176],"show":[178],"effectively":[181],"unlearns":[182],"targets":[183],"preserving,":[185],"even":[187],"enhancing,":[188],"retained":[192],"data,":[193],"thereby":[194],"mitigating":[195]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-03-04T00:00:00"}
