{"id":"https://openalex.org/W4221145530","doi":"https://doi.org/10.56553/popets-2022-0079","title":"Deletion inference, reconstruction, and compliance in machine (un)learning","display_name":"Deletion inference, reconstruction, and compliance in machine (un)learning","publication_year":2022,"publication_date":"2022-07-01","ids":{"openalex":"https://openalex.org/W4221145530","doi":"https://doi.org/10.56553/popets-2022-0079"},"language":"en","primary_location":{"id":"doi:10.56553/popets-2022-0079","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2022-0079","pdf_url":"https://petsymposium.org/popets/2022/popets-2022-0079.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://petsymposium.org/popets/2022/popets-2022-0079.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101492873","display_name":"Ji Gao","orcid":"https://orcid.org/0000-0002-5976-2507"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ji Gao","raw_affiliation_strings":["University of Virginia","University of Virginia,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Virginia","institution_ids":["https://openalex.org/I51556381"]},{"raw_affiliation_string":"University of Virginia,","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009985076","display_name":"Sanjam Garg","orcid":"https://orcid.org/0000-0003-1330-0419"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]},{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sanjam Garg","raw_affiliation_strings":["University of California, Berkeley and NTT Research","University of California, Berkeley and NTT Research,","University of Virginia,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of California, Berkeley and NTT Research","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"University of California, Berkeley and NTT Research,","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"University of Virginia,","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070147229","display_name":"Mohammad Mahmoody","orcid":"https://orcid.org/0000-0002-6839-4697"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Mahmoody","raw_affiliation_strings":["University of Virginia","University of Virginia,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Virginia","institution_ids":["https://openalex.org/I51556381"]},{"raw_affiliation_string":"University of Virginia,","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032319697","display_name":"Prashant Nalini Vasudevan","orcid":"https://orcid.org/0000-0001-6880-795X"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Prashant Nalini Vasudevan","raw_affiliation_strings":["National University of Singapore"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101492873"],"corresponding_institution_ids":["https://openalex.org/I51556381"],"apc_list":null,"apc_paid":null,"fwci":2.6385,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.91025328,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"2022","issue":"3","first_page":"415","last_page":"436"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9664000272750854,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7742468118667603},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7671762704849243},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6831559538841248},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6584076285362244},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6327213048934937},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.4945389926433563},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.46508899331092834},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.42882800102233887},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4172566533088684},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39481353759765625},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.33319082856178284},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.23539233207702637}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7742468118667603},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7671762704849243},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6831559538841248},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6584076285362244},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6327213048934937},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.4945389926433563},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.46508899331092834},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.42882800102233887},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4172566533088684},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39481353759765625},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.33319082856178284},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.23539233207702637},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.56553/popets-2022-0079","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2022-0079","pdf_url":"https://petsymposium.org/popets/2022/popets-2022-0079.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:scholarbank.nus.edu.sg:10635/243071","is_oa":false,"landing_page_url":"https://scholarbank.nus.edu.sg/handle/10635/243071","pdf_url":null,"source":{"id":"https://openalex.org/S7407052290","display_name":"National University of Singapore","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Elements","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.56553/popets-2022-0079","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2022-0079","pdf_url":"https://petsymposium.org/popets/2022/popets-2022-0079.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7300000190734863}],"awards":[{"id":"https://openalex.org/G1523888516","display_name":null,"funder_award_id":"FA9550-","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G2086309680","display_name":"SaTC: CORE: Medium: Collaborative: New Directions in Public-Key and Identity-Based Encryption","funder_award_id":"1936826","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3265173708","display_name":null,"funder_award_id":"FA9550-19-1-0200","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G4633604497","display_name":"SaTC: CORE: Medium: Collaborative: New Directions in Public-Key and Identity-Based Encryption","funder_award_id":"1936799","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5809100787","display_name":null,"funder_award_id":"FA9550","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306151","display_name":"Alfred P. Sloan Foundation","ror":"https://ror.org/052csg198"},{"id":"https://openalex.org/F4320316375","display_name":"Visa","ror":"https://ror.org/05t1y0b59"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4221145530.pdf"},"referenced_works_count":53,"referenced_works":["https://openalex.org/W1473189865","https://openalex.org/W1499934958","https://openalex.org/W1524581953","https://openalex.org/W1616788770","https://openalex.org/W1632114991","https://openalex.org/W1981635503","https://openalex.org/W1985511977","https://openalex.org/W1992926795","https://openalex.org/W2001619934","https://openalex.org/W2029469881","https://openalex.org/W2040228409","https://openalex.org/W2046634810","https://openalex.org/W2051267297","https://openalex.org/W2063978378","https://openalex.org/W2073210531","https://openalex.org/W2095272373","https://openalex.org/W2112796928","https://openalex.org/W2120875981","https://openalex.org/W2184139426","https://openalex.org/W2194321275","https://openalex.org/W2294710185","https://openalex.org/W2512472178","https://openalex.org/W2532520288","https://openalex.org/W2535690855","https://openalex.org/W2757528734","https://openalex.org/W2778284298","https://openalex.org/W2786233556","https://openalex.org/W2795435272","https://openalex.org/W2807096445","https://openalex.org/W2811973125","https://openalex.org/W2888303200","https://openalex.org/W2893405045","https://openalex.org/W2926319231","https://openalex.org/W2946930197","https://openalex.org/W2961073278","https://openalex.org/W2963378725","https://openalex.org/W2985580374","https://openalex.org/W3007299160","https://openalex.org/W3008825770","https://openalex.org/W3014648098","https://openalex.org/W3027379683","https://openalex.org/W3029511006","https://openalex.org/W3035261884","https://openalex.org/W3035556513","https://openalex.org/W3040639636","https://openalex.org/W3046208783","https://openalex.org/W3048684575","https://openalex.org/W3118608800","https://openalex.org/W3150395569","https://openalex.org/W3163620911","https://openalex.org/W3167352803","https://openalex.org/W4210300416","https://openalex.org/W4288283361"],"related_works":["https://openalex.org/W4320018150","https://openalex.org/W2918664383","https://openalex.org/W2040808657","https://openalex.org/W3048732067","https://openalex.org/W4320855730","https://openalex.org/W106056076","https://openalex.org/W4383468834","https://openalex.org/W2135200719","https://openalex.org/W4384648009","https://openalex.org/W3206966921"],"abstract_inverted_index":{"Privacy":[0],"attacks":[1,73,176,198],"on":[2,23],"machine":[3,43,51,134,181],"learning":[4,44,182],"models":[5,25,55,183],"aim":[6],"to":[7,14,37,49,116,152,160],"identify":[8,154],"the":[9,34,90,96,100,104,111,124,149,165,204],"data":[10],"that":[11,26,196],"is":[12,157],"used":[13],"train":[15],"such":[16,186],"models.":[17,192],"Such":[18],"attacks,":[19,146],"traditionally,":[20],"are":[21,27,31,46,60],"studied":[22],"static":[24],"trained":[28],"once":[29],"and":[30,66,95,123,143,174,184,190,213],"accessible":[32],"by":[33,120],"adversary.":[35],"Motivated":[36],"meet":[38,67],"new":[39,68,81,97],"legal":[40,69],"requirements,":[41],"many":[42],"methods":[45],"recently":[47],"extended":[48],"support":[50],"unlearning,":[52],"i.e.,":[53],"updating":[54],"as":[56,187],"if":[57,203],"certain":[58],"examples":[59],"removed":[61],"from":[62],"their":[63],"training":[64],"sets,":[65],"requirements.":[70],"However,":[71],"privacy":[72,117,126,131],"could":[74,86],"potentially":[75],"become":[76],"more":[77,114],"devastating":[78],"in":[79,147],"this":[80],"setting,":[82],"since":[83],"an":[84],"attacker":[85],"now":[87],"access":[88],"both":[89],"original":[91],"model":[92,98],"before":[93],"deletion":[94,108,141,144,172,209],"after":[99],"deletion.":[101],"In":[102],"fact,":[103],"very":[105],"act":[106],"of":[107,133,180],"might":[109],"make":[110],"deleted":[112,158,166],"record":[113,156],"vulnerable":[115],"attacks.":[118],"Inspired":[119],"cryptographic":[121],"definitions":[122],"differential":[125],"framework,":[127],"we":[128,194],"formally":[129],"study":[130],"implications":[132],"unlearning.":[135],"We":[136,168],"formalize":[137],"(various":[138],"forms":[139],"of)":[140,164,208],"inference":[142,173],"reconstruction":[145,175],"which":[148,155],"adversary":[150],"aims":[151],"either":[153],"or":[159],"reconstruct":[161],"(perhaps":[162],"part":[163],"records.":[167],"then":[169],"present":[170],"successful":[171],"for":[177],"a":[178],"variety":[179],"tasks":[185],"classification,":[188],"regression,":[189],"language":[191],"Finally,":[193],"show":[195],"our":[197],"would":[199],"provably":[200],"be":[201],"precluded":[202],"schemes":[205],"satisfy":[206],"(variants":[207],"compliance":[210],"(Garg,":[211],"Goldwasser,":[212],"Vasudevan,":[214],"Eurocrypt\u201920).":[215]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":1}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
