{"id":"https://openalex.org/W4307078695","doi":"https://doi.org/10.48550/arxiv.2210.11334","title":"Proof of Unlearning: Definitions and Instantiation","display_name":"Proof of Unlearning: Definitions and Instantiation","publication_year":2022,"publication_date":"2022-10-20","ids":{"openalex":"https://openalex.org/W4307078695","doi":"https://doi.org/10.48550/arxiv.2210.11334"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2210.11334","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2210.11334","pdf_url":"https://arxiv.org/pdf/2210.11334","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2210.11334","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025556550","display_name":"Jiasi Weng","orcid":"https://orcid.org/0000-0002-5876-7875"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Weng, Jiasi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067350497","display_name":"Shenglong Yao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yao, Shenglong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101004455","display_name":"Yuefeng Du","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Du, Yuefeng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081987954","display_name":"Junjie Huang","orcid":"https://orcid.org/0000-0003-2382-4443"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Huang, Junjie","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Weng, Jian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100390514","display_name":"Cong Wang","orcid":"https://orcid.org/0000-0003-0547-315X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Cong","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5025556550"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9768999814987183,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9589999914169312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8173671364784241},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6257876753807068},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38252317905426025},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.36487990617752075},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34064221382141113},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.33212000131607056}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8173671364784241},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6257876753807068},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38252317905426025},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.36487990617752075},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34064221382141113},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.33212000131607056}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2210.11334","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2210.11334","pdf_url":"https://arxiv.org/pdf/2210.11334","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"doi:10.48550/arxiv.2210.11334","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2210.11334","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2210.11334","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2210.11334","pdf_url":"https://arxiv.org/pdf/2210.11334","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4307078695.pdf","grobid_xml":"https://content.openalex.org/works/W4307078695.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1667647204","https://openalex.org/W2404647514","https://openalex.org/W4247536566","https://openalex.org/W2018477250","https://openalex.org/W3119814709","https://openalex.org/W4241418540","https://openalex.org/W1508895727","https://openalex.org/W2725786787","https://openalex.org/W4283160672","https://openalex.org/W1604988569"],"abstract_inverted_index":{"The":[0],"\"Right":[1],"to":[2,15,42,75,85,136,157,205],"be":[3,16,59],"Forgotten\"":[4],"rule":[5],"in":[6,80,93,225],"machine":[7,27,97],"learning":[8,98],"(ML)":[9],"practice":[10],"enables":[11],"some":[12],"individual":[13,46],"data":[14,47,188,203],"deleted":[17,50],"from":[18],"a":[19,36,63,73,100,105,172,191,238],"trained":[20],"model,":[21],"as":[22,99,135],"pursued":[23],"by":[24,62,88,179],"recently":[25,71],"developed":[26],"unlearning":[28,91,219],"techniques.":[29],"To":[30],"truly":[31],"comply":[32],"with":[33,154,190,210,221,237],"the":[34,45,86,90,94,127,138,149,158,166,187,196,226,231,234],"rule,":[35],"natural":[37],"and":[38,103,129,151,162,214,241],"necessary":[39],"step":[40],"is":[41],"verify":[43],"if":[44],"are":[48],"indeed":[49],"after":[51],"unlearning.":[52],"Yet,":[53],"previous":[54],"parameter-space":[55],"verification":[56,79],"metrics":[57],"may":[58],"easily":[60],"evaded":[61],"distrustful":[64],"model":[65],"trainer.":[66],"Thus,":[67],"Thudi":[68],"et":[69],"al.":[70],"present":[72,171],"call":[74],"action":[76],"on":[77,114,125],"algorithm-level":[78],"USENIX":[81],"Security'22.":[82],"We":[83,200,228],"respond":[84],"call,":[87],"reconsidering":[89],"problem":[92],"scenario":[95],"of":[96,111,132,147,198,233],"service":[101,160],"(MLaaS),":[102],"proposing":[104],"new":[106],"definition":[107,167],"framework":[108],"for":[109,185,194],"Proof":[110],"Unlearning":[112],"(PoUL)":[113],"algorithm":[115],"level.":[116],"Specifically,":[117],"our":[118],"PoUL":[119],"definitions":[120],"(i)":[121],"enforce":[122],"correctness":[123],"properties":[124],"both":[126,148],"pre":[128],"post":[130],"phases":[131],"unlearning,":[133],"so":[134],"prevent":[137],"state-of-the-art":[139],"forging":[140],"attacks;":[141],"(ii)":[142],"highlight":[143],"proper":[144],"practicality":[145],"requirements":[146],"prover":[150],"verifier":[152],"sides":[153],"minimal":[155],"invasiveness":[156],"off-the-shelf":[159],"pipeline":[161],"computational":[163],"workloads.":[164],"Under":[165],"framework,":[168],"we":[169],"subsequently":[170],"trusted":[173],"hardware-empowered":[174],"instantiation":[175,236],"using":[176],"SGX":[177],"enclave,":[178],"logically":[180],"incorporating":[181],"an":[182],"authentication":[183],"layer":[184,193],"tracing":[186],"lineage":[189],"proving":[192,217],"supporting":[195],"audit":[197],"learning.":[199],"customize":[201],"authenticated":[202],"structures":[204],"support":[206],"large":[207],"out-of-enclave":[208],"storage":[209],"simple":[211],"operation":[212],"logic,":[213],"meanwhile,":[215],"enable":[216],"complex":[218],"logic":[220],"affordable":[222],"memory":[223],"footprints":[224],"enclave.":[227],"finally":[229],"validate":[230],"feasibility":[232],"proposed":[235],"proof-of-concept":[239],"implementation":[240],"multi-dimensional":[242],"performance":[243],"evaluation.":[244]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
