2022
DOI: 10.48550/arxiv.2203.07320
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining

Yi Liu,
Lei Xu,
Xingliang Yuan
et al.

Abstract: In Machine Learning, the emergence of the right to be forgotten gave birth to a paradigm named machine unlearning, which enables data holders to proactively erase their data from a trained model. Existing machine unlearning techniques focus on centralized training, where access to all holders' training data is a must for the server to conduct the unlearning process. It remains largely underexplored about how to achieve unlearning when full access to all training data becomes unavailable. One noteworthy example… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…We note that many studies focus on optimizing the performance and efficiency of standard FL training. However, this survey concentrates on FL systems from a privacy and security perspective, hence they are out of the scope of this paper, and interested readers can refer to [22], [33], [34], [35] for the state-of-the-art FL training algorithms. For convenience, the related works in this survey are classified based on their main technique used to guarantee privacy, as one PPAgg protocol may involve several supported privacy-preserving techniques to provide different properties.…”
Section: Introductionmentioning
confidence: 99%
“…We note that many studies focus on optimizing the performance and efficiency of standard FL training. However, this survey concentrates on FL systems from a privacy and security perspective, hence they are out of the scope of this paper, and interested readers can refer to [22], [33], [34], [35] for the state-of-the-art FL training algorithms. For convenience, the related works in this survey are classified based on their main technique used to guarantee privacy, as one PPAgg protocol may involve several supported privacy-preserving techniques to provide different properties.…”
Section: Introductionmentioning
confidence: 99%