A Survey on Federated Unlearning: Challenges, Methods, and Future Directions

Ziyao Liu [email protected] Digital Trust Center, Nanyang Technological UniversitySingapore Yu Jiang [email protected] Jiyuan Shen [email protected] Minyi Peng [email protected] School of Computer Science and Engineering, Nanyang Technological UniversitySingapore Kwok-Yan Lam [email protected] School of Computer Science and Engineering and Digital Trust Center, Nanyang Technological UniversitySingapore Xingliang Yuan [email protected] Faculty of Information Technology, Monash UniversityAustralia  and  Xiaoning Liu [email protected] School of Computing Technologies, RMIT UniversityAustralia
(2023; 20 November 2023; 20 November 2023; 20 November 2023)
Abstract.

In recent years, the notion of “the right to be forgotten” (RTBF) has become a crucial aspect of data privacy, requiring the provision of mechanisms that support the removal of personal data of individuals upon their requests. Consequently, given the extensive adoption of data-intensive machine learning (ML) algorithms and increasing concerns for personal data privacy protection, the concept of machine unlearning (MU) has gained considerable attention. MU empowers an ML model to selectively eliminate identifiable information. Evolving from the foundational principles of MU, federated unlearning (FU) has emerged to confront the challenge of data erasure within federated learning (FL) settings. This empowers the FL model to unlearn an FL client or identifiable information pertaining to the client. Nevertheless, unlike traditional MU, the distinctive attributes of federated learning introduce specific challenges for FU techniques. These challenges necessitate a tailored design when develo** FU algorithms. While various concepts and numerous federated unlearning schemes exist in this field, the unified workflow and tailored design of FU are not yet well understood. Therefore, this comprehensive survey delves into the techniques, methodologies, and recent advancements in federated unlearning. It provides an overview of fundamental concepts and principles, evaluates existing federated unlearning algorithms, and reviews optimizations tailored to federated learning. Additionally, it discusses practical applications and assesses their limitations. Finally, it outlines promising directions for future research.

Federated Unlearning, Machine Unlearning, Federated Learning.
copyright: acmcopyrightjournalyear: 2023doi: XXXXXXX.XXXXXXXccs: Security and privacy Human and societal aspects of security and privacyccs: Computing methodologies Distributed computing methodologiesccs: General and reference Surveys and overviews

1. Introduction

With increasing concerns for personal data privacy protection, governments and legislators around the world have enacted rigorous data privacy regulations, such as GDPR (Regulation, 2018), APPI (Iwase, 2019) and CCPA (Goldman, 2020). Typically, as digital service providers capture personal data from their users or data owners for service development, such regulations require them to grant users the right to be forgotten (RTBF), with the provision of mechanisms that allow them to request the removal of their personal data from digital records. Consequently, given the extensive adoption of data-intensive machine learning (ML) algorithms, RTBF enables users to purge their data, including the influence of these data, from both the training dataset and the trained ML model. This is where machine unlearning (MU) (Xu et al., 2023b; Bourtoule et al., 2021; Huynh et al., 2024; Hu et al., 2024b; Chen et al., 2021; Han et al., 2024; Hu et al., 2024a; Nguyen et al., 2022; Liu et al., 2023a, 2024a; Hu et al., 2023a; Wang et al., 2023f) steps in as a critical facilitator of this process, ensuring that personal data is effectively and responsibly removed, further strengthening data privacy and ethical data handling. As depicted in Figure 1, the primary objective of unlearning is to remove the impact of specific data points from a trained model, while preserving the overall performance of the model.

Refer to caption
Figure 1. Machine unlearning. Naive retraining, discarding the trained model and starting training from scratch with remaining data after unlearned data removal, is computationally intensive. Conversely, machine unlearning, which resumes training from the trained model through an unlearning process, is much more cost-effective. The objective of MU is to ensure that the unlearned model achieves a performance level on par with that of the retrained model.
Refer to caption
Figure 2. Federated unlearning. In contrast to machine unlearning algorithms, which are typically executed by a single entity, FU systems involve multiple entities, including the unlearned client, remaining clients, and the central server, any of whom can act as the unlearner, responsible for executing the unlearning algorithm. Furthermore, the unlearning target may encompass either an entire client or specific partial data from a target client.

Building upon the core principles of MU and the concept of RTBF, federated unlearning (FU) (Cao et al., 2023; Liu et al., 2022c; Ding et al., 2024; Tao et al., 2024; Wang et al., 2024c; Jiang et al., 2024; Guo et al., 2023; Romandini et al., 2024; Qiu et al., 2023; Wang et al., 2023c; Yuan et al., 2024) has emerged to confront the challenge of data erasure within the domain of federated learning (FL) settings (Kairouz et al., 2021; McMahan et al., 2017; Yang et al., 2019; Zhang et al., 2023a; Wu et al., 2024). In a typical FL system, multiple clients locally train their machine learning models, which are subsequently aggregated to construct a global model. Then the server distributes the updated global model to all clients for training in the subsequent FL round. These sequential steps continue to recur until the global model reaches convergence. (see Section 3.2 for more details). As a result, the objective of FU is to enable the FL model to remove the impact of an FL client or identifiable information associated with a client’s partial data, while maintaining the privacy guarantees of the decentralized learning process, as illustrated in Figure 2. A formal definition of FU is provided in Section 3.3.

However, in contrast to traditional machine unlearning, the unique characteristics of federated learning introduce new targets and challenges. (see Section 2 for more details). Therefore, this survey delves into techniques, methodologies, and recent advancements in federated unlearning. We provide an overview of fundamental concepts and principles in FU design, evaluate existing FU algorithms, present a taxonomy, and review optimizations of FU tailored to federated learning settings.

Comparison with related surveys. Currently, there are some works that have been conducted to summarize machine unlearning (Nguyen et al., 2022; Xu et al., 2023c, b; Shaik et al., 2023b; Qu et al., 2023; Liu et al., 2024f; Wang et al., 2024d). However, few existing surveys perceive the construction of federated unlearning. In (Wu et al., 2023a), the concept of knowledge editing throughout the entire lifecycle of federated learning is explored. This survey categorizes relevant works based on the principles of exact learning and approximate learning. These categories, as described in previous machine unlearning taxonomies like those in (Xu et al., 2023c, b), are not specifically designed for a federated setting and thus may not fully capture the unique characteristics inherent in FU designs. The survey conducted in (Wang et al., 2023b) focuses on an analysis of only privacy and security threats within FU systems, with extensive discussions on potential attacks and defensive measures. It pays particular attention to the issue of privacy leakage stemming from distinctions between the trained model and the unlearned model, specifically examining their vulnerability to membership inference attacks. (Yang and Zhao, 2023) provides a brief survey on federated unlearning, focusing on the level of data erasure, similar to the ”unlearn-what” aspect discussed in our work. The works most closely related to ours are (Romandini et al., 2024) and (Jeong et al., 2024), which provide comprehensive surveys on existing federated unlearning literature. However, (Romandini et al., 2024) lacks an investigation into FL-tailored optimization and the limitations of existing approaches, while (Jeong et al., 2024) lacks a formal definition of federated unlearning. Additionally, both (Romandini et al., 2024) and (Jeong et al., 2024) do not describe the unlearning workflow, which is important for readers to understand how unlearning integrates with Machine Learning as a Service (MLaaS). Furthermore, they do not specifically focus on security and privacy issues in federated unlearning systems.

While various concepts and numerous federated unlearning schemes exist in this field, the design and implementation of FU are still not fully explored. Furthermore, the methodology and principles for extending machine unlearning approaches to federated unlearning remain relatively unclear. The unified workflow of FU, particularly regarding security and privacy issues, is not yet well understood. This lack of comprehensive resources serves as the primary motivation for our effort in delivering this survey, which offers a deep and thorough insight into current FU research. A detailed comparison of related FU surveys is summarized in Table 1.

Ref. Def. Taxonomy Review Insight

Target Formalization

Summary of Challenges

Unlearning Workflow

Who-unlearn

Unlearn-what

Who-verify

Comprehensive Review

Principle Analysis

Security & Privacy

Proof of Unlearning

FL-tailored optimization

Limitation

Experimental Evaluation

Future Directions

Wang et al. (Wang et al., 2023b) - - - - - - - - - - -
Wu et al. (Wu et al., 2023a) - - - - - - - -
Yang and Zhao (Yang and Zhao, 2023) - - - - - - -
Nicolò et al. (Romandini et al., 2024) - - - - -
Jeong et al. (Jeong et al., 2024) - - - - -
Ours -
Table 1. Comparison of related FU surveys.

Summary of contributions. The main contributions of this survey are listed as follows.

  1. (1)

    We present a unified federated unlearning workflow, on the basis of which we offer a novel taxonomy of existing FU techniques.

  2. (2)

    Utilizing the proposed taxonomy and considering factors including (i) who-unlearn and (ii) unlearn-what, we conduct a comprehensive summary of existing federated unlearning methods, and highlight their distinctions, advantages, and constraints.

  3. (3)

    We conduct a comprehensive examination of optimizations of FU techniques specifically tailored for federated learning, along with an assessment of their limitations.

  4. (4)

    We delve deeply into critical discussions concerning the existing challenges in federated unlearning, and identify promising directions for future research.

Organization of the paper. The rest of this paper is organized as follows. Section 2 summarizes the targets, challenges, and characteristics of federated unlearning, and discusses their alignment. Section 3 describes the principles employed to achieve machine unlearning and provides an overview of the fundamentals of federated learning and unlearning. Section 4 presents different constructions of existing FU algorithms, followed by reviews of various optimizations tailored to federated learning and a critical examination of their limitations in Section 5. Section 6 offers discussions and outlines future research directions. Finally, Section 7 summarizes and concludes the paper. An illustrative organization of the paper is provided in Figure 3.

Refer to caption
Figure 3. Illustrative organization of the paper.

2. Targets and Challenges of Federated Unlearning

In this section, we will explore the targets of federated unlearning and the associated challenges compared to traditional machine unlearning. The insights gained will serve as a guideline for the taxonomy presented in Section 4.

2.1. Targets of Federated Unlearning

We now specify the targets of the unlearning process within an FL setting, for which the formal definitions are provided in Section 3.3.

Target 1.

(Model consistency) The unlearned model must exhibit performance akin to a retrained model, ensuring the unlearning process neither diminishes its accuracy nor reliability. Achieving this consistency is crucial, as it demonstrates the effectiveness of the unlearning algorithm in removing specific data while maintaining the model’s overall quality.

Target 2.

(Unlearning efficiency) As retraining in an FL system involves starting the training process from scratch, which is often inefficient, the target related to unlearning efficiency is to ensure that the cost of unlearning is significantly lower than that of obtaining a retrained model. These costs encompass various factors such as runtime, the number of participating clients, and communication overhead.

Target 3.

(Privacy preservation) FL is designed to offer privacy assurances by allowing access only to the locally trained model rather than the local data. Therefore, unlearning in a federated context must also ensure the preservation of clients’ local data privacy. This approach ensures that while unlearning processes are implemented, the fundamental privacy guarantees of FL are maintained, safeguarding the privacy of clients’ local data.

Target 4.

(Certified removal) The capability to verify the removal of either an entire FL client or partial data from a target client is essential. This process of certified removal should align with the unlearning request made by an FL participant. In other words, if the unlearning request is raised by an FL client, this client must be allowed to verify if its data has been unlearned and its impact on the FL model has been removed. Similarly, if the server raises the unlearning request, the server must also be able to monitor and verify the unlearning process. This verification process must be robust and reliable, ensuring that the removal adheres strictly to the specified unlearning request, thereby maintaining the trustworthiness of the federated unlearning system.

2.2. Challenges of Federated Unlearning

In contrast to traditional machine unlearning, the unique characteristics of federated learning introduce certain challenges to the unlearning technique, as outlined below.

Challenge 1.

(Knowledge Permeation) When a client’s data needs to be unlearned, its information has already spread throughout all participants in the FL system. This occurs because, during each FL round, the server aggregates the gradients from all clients and updates the global model. This updated model is then distributed to all clients, on which all clients conduct the subsequent round of FL training. As a result, the knowledge from the targeted client for unlearning permeates through to the other clients via the FL training process. Consequently, knowledge permeation complicates the achievement of model consistency (Target 1) in FU, compared to data-centralized MU schemes. Furthermore, implementing unlearning in a federated setting requires the involvement of all impacted clients, which significantly increases associated costs and impacts the target of unlearning efficiency (Target 2).

Challenge 2.

(Data Isolation) Since every client individually maintains its dataset and conducts local model training, which is a key advantage of FL in terms of privacy preservation, only gradients or global models are publicly shared in an FL system. This aspect might hinder adapting existing MU algorithms, which rely on direct data access to be unlearned, within the FL context, aligning with the privacy preservation target (Target 3). Moreover, the absence of direct access to the unlearned data poses challenges in creating efficient FU algorithms, leading to concerns about unlearning efficiency (Target 2), compared to more efficient MU algorithms that directly utilize the unlearned data.

Challenge 3.

(Who-Unlearn) Different from machine unlearning algorithms, which are typically executed by a single client, FU systems involve multiple participants, including (i) the unlearned client or target client111We use unlearned client and target client interchangeably., (ii) remaining clients, and (iii) the central server, any of whom can act as the unlearner, responsible for executing the unlearning algorithm. Therefore, the FU algorithm selected by the unlearner depends on the degree of access to information about the data to be unlearned, consistent with the target of privacy preservation (Target 3). For example, when unlearning partial data of a target client, the target client possesses direct access to both the unlearned and remaining data, while the server’s access is limited to historical data in the form of global models and gradients. Furthermore, when a client initiates a request for unlearning, it has the option to either participate in the unlearning process or simply exit the system. In cases where the target client chooses to leave, the unlearning process can be executed either on the server, the remaining clients, or both. Additionally, the entity responsible for unlearning also influences the need to verify that the unlearning process has been executed in accordance with the unlearner’s request, contributing to the target of certified removal (Target 4).

Challenge 4.

(Unlearn-What) In an FU system, the initiation of an unlearning request can stem from either the unlearned client or the server for different purposes. Concurrently, it’s essential to consider that the unlearning target can be either (i) an entire target client or (ii) specific partial data from a target client. Considering the “unlearn-what” aspect, the unlearning principles of FU algorithms differ significantly. For example, when unlearning an entire target client, methods like local retraining, fine-tuning, and multi-task unlearning are no longer applicable (see Section 3.1.1 for more details). This is because these FU algorithms rely on direct access to the unlearned data and the remaining data of the target client, which becomes inaccessible when the entire client needs to be removed, in accordance with the target of privacy preservation removal (Target 3). The variation in designing FU algorithms for different unlearning targets also impacts the performance in achieving model consistency (Target 1), unlearning efficiency (Target 2), and certified removal (Target 4).

Challenge 5.

(Who-Verify) As an FU system involves multiple participants, unlearning requests may be raised by FL clients or the FL server. For a more compatible scenario with the RTBF regulations, where unlearning services are provided by MLaaS infrastructures, clients must be allowed to verify if their data has been unlearned and its impact on the FL model has been removed. Similarly, robust and provable proof of unlearning should be conducted on the server side if the request is raised by the server. However, implementing these verification processes presents significant challenges, including ensuring the efficiency (Target 2) and reliability (Target 4) of verification methods, maintaining system performance, and addressing potential security vulnerabilities. Only when data removal adheres strictly to the specified unlearning request can the trustworthiness of the federated unlearning system be maintained.

In addition to the primary distinctions and challenges highlighted above in FU in comparison to MU, several other factors may impede the effectiveness of federated unlearning. These factors arise from the unique characteristics of FL systems and are outlined as follows. Table 2 summarizes the alignment between these targets, challenges, and characteristics.

  1. (1)

    Constrained Resources: In federated learning, devices or nodes that engage in the process often contend with constraints on their computing power, communication capabilities (such as limited network bandwidth), and storage capacities (like constrained memory). These limitations can affect their capacity to execute intricate model training tasks, facilitate efficient sharing and reception of updates, as well as manage the storage and processing of large machine learning models, datasets, or supplementary information. Consequently, resource-intensive MU algorithms may no longer be practical or scalable within the context of federated learning.

  2. (2)

    Participant Heterogeneity: In FL systems, clients exhibit heterogeneity in various aspects, including their training capabilities related to factors such as data structure and distributions, e.g., vertical partitioned features and non-identically distributed data (Non-IID) data. This diversity necessitates the development of heterogeneity-aware FU approaches.

  3. (3)

    Client Dynamics: In each FL round, clients are randomly chosen to participate in the model aggregation process. Besides, there may be a large number of dropped clients and newly-joined clients. The unlearner faces significant challenges in recalling past clients for unlearning operations, let alone retraining the model from scratch. These dynamic client behaviors can exert an influence on the effectiveness of machine unlearning algorithms, which were initially tailored for scenarios involving a single client in MU settings.

  4. (4)

    Security and Privacy Threats: In FU settings, malicious attacks and information leakage are more intricate compared to a single-client MU scenario. Threat models become increasingly complex, taking into account factors like adversaries, their capabilities, and the potential for collusion.

Target Challenge Characteristic

Knowledge Permeation

Data Isolation

Who-Unlearn

Unlearn-What

Who-Verify

Constrained Resources

Participant Heterogeneity

Client Dynamics

Security & Privacy

Model Consistency
Unlearning Efficiency
Privacy Preservation
Certified Removal
Table 2. Alignment between targets, challenges and characteristics of federated unlearning.

3. Preliminaries and Backgrounds

In this section, we will first provide an overview of machine unlearning and summarize the principles of unlearning algorithms and metrics for the verification of unlearning. Then, we will provide an overview and formalization of federated learning and federated unlearning. Since attacks on machine learning models can be used for the verification of unlearning, an additional subsection is included to introduce attacks on ML models for completeness.

3.1. Machine Unlearning

In the MU system, the training dataset D𝐷Ditalic_D consists of two components: Dusubscript𝐷𝑢D_{u}italic_D start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT, representing the data samples to be forgotten, and Drsubscript𝐷𝑟D_{r}italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT, representing the remaining data samples, where Dr=D\Dusubscript𝐷𝑟\𝐷subscript𝐷𝑢D_{r}=D\backslash D_{u}italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT = italic_D \ italic_D start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT. We then consider (D)𝐷\mathcal{M}(D)caligraphic_M ( italic_D ) as the final model trained on dataset D𝐷Ditalic_D.

3.1.1. Unlearning principles

Existing MU research papers predominantly rely on the following unlearning principles to make the distribution of the model (D)𝐷\mathcal{M}(D)caligraphic_M ( italic_D ) identical to the distribution of the model (Dr)subscript𝐷𝑟\mathcal{M}(D_{r})caligraphic_M ( italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ) (Bourtoule et al., 2021).

Retraining. is a process training from a model free from the influence of data from Dusubscript𝐷𝑢D_{u}italic_D start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT on the dataset Drsubscript𝐷𝑟D_{r}italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT, essentially starting from scratch. In this method, a newly trained model (Dr)subscript𝐷𝑟\mathcal{M}(D_{r})caligraphic_M ( italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ) does not have any information about Dusubscript𝐷𝑢D_{u}italic_D start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT. However, this process is both time-consuming and resource-intensive because it discards the model (D)𝐷\mathcal{M}(D)caligraphic_M ( italic_D ) on D𝐷Ditalic_D containing the contribution of Drsubscript𝐷𝑟D_{r}italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT dataset.

Fine-tuning. uses the remaining dataset Drsubscript𝐷𝑟D_{r}italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT to optimize the model (D)𝐷\mathcal{M}(D)caligraphic_M ( italic_D ) and reduce the impact of data from Dusubscript𝐷𝑢D_{u}italic_D start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT. However, this process involves multiple iterations, leading to increased computational and communication costs.

Gradient ascent. represents a reverse learning process. In machine learning, the model (D)𝐷\mathcal{M}(D)caligraphic_M ( italic_D ) is trained by minimizing the loss using gradient descent. Conversely, the unlearning process involves the application of gradient ascent to maximize the loss. However, this method can easily lead to catastrophic forgetting. As a result, many studies introduce constraints to preserve memory.

Multi-task unlearning seeks to not only eliminate the influence of Dusubscript𝐷𝑢D_{u}italic_D start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT but also to reinforce the acquisition of knowledge from the remaining data Drsubscript𝐷𝑟D_{r}italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT. In the course of these endeavors, most studies aim to strike a balance between the erasure effect and the retention effect.

Model scrubbing. applies a “scrubbing” transformation \mathscr{H}script_H to the model (D)𝐷\mathcal{M}(D)caligraphic_M ( italic_D ) to ensure that the unlearned model closely approximates the perfectly retrained model with only Drsubscript𝐷𝑟D_{r}italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT, as expressed by ((D))(Dr)𝐷subscript𝐷𝑟\mathscr{H}(\mathcal{M}(D))\approx\mathcal{M}(D_{r})script_H ( caligraphic_M ( italic_D ) ) ≈ caligraphic_M ( italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ) (Ginart et al., 2019). When defining the scrubbing method \mathscr{H}script_H, most approaches rely on a quadratic approximation of the loss function. Specifically, for model parameters θ𝜃\thetaitalic_θ and ϕitalic-ϕ\phiitalic_ϕ, the gradient of the loss function of a given data point Dxsubscript𝐷𝑥D_{x}italic_D start_POSTSUBSCRIPT italic_x end_POSTSUBSCRIPT satisfies

fDx(ϕ)=fDx(θ)+Dx(θ)(ϕθ),subscript𝑓subscript𝐷𝑥italic-ϕsubscript𝑓subscript𝐷𝑥𝜃subscriptsubscript𝐷𝑥𝜃italic-ϕ𝜃\nabla f_{D_{x}}(\phi)=\nabla f_{D_{x}}(\theta)+\mathcal{H}_{D_{x}}(\theta)(% \phi-\theta),∇ italic_f start_POSTSUBSCRIPT italic_D start_POSTSUBSCRIPT italic_x end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( italic_ϕ ) = ∇ italic_f start_POSTSUBSCRIPT italic_D start_POSTSUBSCRIPT italic_x end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( italic_θ ) + caligraphic_H start_POSTSUBSCRIPT italic_D start_POSTSUBSCRIPT italic_x end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( italic_θ ) ( italic_ϕ - italic_θ ) ,

where Dx(θ)subscriptsubscript𝐷𝑥𝜃\mathcal{H}_{D_{x}}(\theta)caligraphic_H start_POSTSUBSCRIPT italic_D start_POSTSUBSCRIPT italic_x end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( italic_θ ) is positive semi-define. The scrubbed model becomes the new optimum by setting fDr(Dr(θ))=0subscript𝑓subscript𝐷𝑟subscriptsubscript𝐷𝑟𝜃0\nabla f_{D_{r}}(\mathscr{H}_{D_{r}}(\theta))=0∇ italic_f start_POSTSUBSCRIPT italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( script_H start_POSTSUBSCRIPT italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( italic_θ ) ) = 0, yielding the equation:

Dr(θ)=θDr1(θ)fDr(θ).subscriptsubscript𝐷𝑟𝜃𝜃superscriptsubscriptsubscript𝐷𝑟1𝜃subscript𝑓subscript𝐷𝑟𝜃\mathscr{H}_{D_{r}}(\theta)=\theta-\mathcal{H}_{D_{r}}^{-1}(\theta)\nabla f_{D% _{r}}(\theta).script_H start_POSTSUBSCRIPT italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( italic_θ ) = italic_θ - caligraphic_H start_POSTSUBSCRIPT italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ( italic_θ ) ∇ italic_f start_POSTSUBSCRIPT italic_D start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( italic_θ ) .

\mathscr{H}script_H can perform a Newton step and can be derived under various theoretical assumptions (Fraboni et al., 2022) (Golatkar et al., 2020). However, the challenge of this method lies in computing the Hessian matrix, which is infeasible for high-dimensional models. Therefore, some approaches aim to compute an approximation of the Hessian.

Synthetic data. is a method that replaces certain data with synthetic data to help the model ”forget” specific information. An example of this approach involves generating synthetic labels for the data within Dusubscript𝐷𝑢D_{u}italic_D start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT and then combining them with the data in Dusubscript𝐷𝑢D_{u}italic_D start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT for training to accomplish unlearning. This method disentangles the impact of certain data from the model, hel** to eliminate the influence of specific information while retaining the model’s overall performance.

3.1.2. Verification

Verification methods aim to confirm whether data intended for deletion has indeed been effectively unlearned. Currently, these methods can be classified as outlined below:

Model performance. The most straightforward approach is to evaluate the model performance on the target client’s data and test data to assess how effectively the data has been unlearned and how robustly the unlearned model is maintained. The evaluation metrics encompass accuracy, loss, and statistical errors.

Model discrepancy. Another approach to assess unlearning performance is by evaluating the discrepancy between the trained model and the unlearned model. This discrepancy can be measured using metrics such as Euclidean distance, KL-divergence, L2 distance, Wasserstein distance, and angle-based distance.

Execution efficiency. In addition, the time taken for the unlearning process, measured in terms of rounds, runtime, or speed-up ratio compared to a baseline, as well as memory consumption, can be used to evaluate the efficiency of the unlearning algorithm.

Attack performance. As introduced in Section 3.4, membership inference attacks can be used to determine whether a particular data was used during the training of a model. Therefore, by executing MIA on the unlearned model over unlearned data, the attack success rate (ASR) can be used to evaluate how effectively the data has been unlearned. Poorer performance by the MIA indicates that the influence of the unlearned data on the global model has diminished. Similarly, in the context of backdoor attacks, by injecting backdoors into the unlearned data and following the unlearning procedure, effective unlearning should disrupt the relationship between the trigger pattern and the backdoor class. The ASR can also be used to evaluate how effectively the backdoor is removed by unlearning. An empirical study on these metrics can be referred to in (Nguyen et al., 2024).

3.2. Federated Learning

3.2.1. Overview of federated learning

The participants involved in federated learning (Kairouz et al., 2021; McMahan et al., 2017; Yang et al., 2019) can be categorized into two categories: (i) a set of n𝑛nitalic_n clients denoted as 𝒰=u1,u2,,un𝒰subscript𝑢1subscript𝑢2subscript𝑢𝑛\mathcal{U}={u_{1},u_{2},\dots,u_{n}}caligraphic_U = italic_u start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_u start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_u start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT, where each client ui𝒰subscript𝑢𝑖𝒰u_{i}\in\mathcal{U}italic_u start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ caligraphic_U possesses its local dataset 𝒟isubscript𝒟𝑖\mathcal{D}_{i}caligraphic_D start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, and (ii) a central server represented as S𝑆Sitalic_S. A typical FL scheme works by repeating the following steps until training is stopped (Kairouz et al., 2021). (i) Local model training: each FL client uisubscript𝑢𝑖u_{i}italic_u start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT trains its model isubscript𝑖\mathcal{M}_{i}caligraphic_M start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT using the local dataset 𝒟isubscript𝒟𝑖\mathcal{D}_{i}caligraphic_D start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT. (ii) Model uploading: each FL client uisubscript𝑢𝑖u_{i}italic_u start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT uploads its locally trained model isubscript𝑖\mathcal{M}_{i}caligraphic_M start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT to the central server S𝑆Sitalic_S. (iii) Model aggregation: the central server S𝑆Sitalic_S collects and aggregates clients’ models to update the global model \mathcal{M}caligraphic_M. (iv) Model updating: the central server S𝑆Sitalic_S updates the global model \mathcal{M}caligraphic_M and distributes it to all FL clients.

3.2.2. Security and privacy threats in federated learning

The revelation of a participant’s local model poses a direct threat to the fundamental privacy guarantee of standard federated learning (Zhu et al., 2019). Thus, privacy-preserving aggregation protocols (Bell et al., 2020; Guo et al., 2021; Bonawitz et al., 2017; Liu et al., 2023b) are essential to maintain the security and privacy of the model aggregation process in Step iii of FL. Additionally, FL is susceptible to poisoning attacks (Lyu et al., 2020) (see Section 3.4 for more details). In these attacks, malicious clients manipulate the global model by sending poisoned model updates to the server during Step ii, to affect global model performance or inject backdoors. Therefore, malicious-client detection mechanisms (Li et al., 2020a; Cao et al., 2021; Zhang et al., 2022a; Shen et al., 2016) are imperative to differentiate between malicious and benign clients.

3.3. Federated Unlearning

In an FU system, the set of FL clients is represented as U𝑈Uitalic_U, where each client uiUsubscript𝑢𝑖𝑈u_{i}\in Uitalic_u start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ italic_U possesses a local dataset Disubscript𝐷𝑖D_{i}italic_D start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT. This set is categorized into two distinct subsets: Uusubscript𝑈𝑢U_{u}italic_U start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT, which includes clients designated for unlearning (either entirely or partially), and Ursubscript𝑈𝑟U_{r}italic_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT, comprising the remaining clients, with the relationship U=UrUu𝑈subscript𝑈𝑟subscript𝑈𝑢U=U_{r}\cup U_{u}italic_U = italic_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ∪ italic_U start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT. More specifically, for any client ujUusubscript𝑢𝑗subscript𝑈𝑢u_{j}\in U_{u}italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ italic_U start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT, D¯jsubscript¯𝐷𝑗\bar{D}_{j}over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT represents the data of ujsubscript𝑢𝑗u_{j}italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT to be unlearned, hence D¯j=Djsubscript¯𝐷𝑗subscript𝐷𝑗\bar{D}_{j}=D_{j}over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = italic_D start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT signifies unlearning of the entire client ujsubscript𝑢𝑗u_{j}italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT, and D¯jDjsubscript¯𝐷𝑗subscript𝐷𝑗\bar{D}_{j}\subset D_{j}over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ⊂ italic_D start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT indicates unlearning partial data of the client ujsubscript𝑢𝑗u_{j}italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT. Now, we give the definition of federated unlearning.

Definition 0.

(Federated Unlearning) A federated unlearning process FU(M,U,Uu,Ur)M¯FUMUsubscriptUusubscriptUr¯MFU(M,U,U_{u},U_{r})\rightarrow\bar{M}italic_F italic_U ( italic_M , italic_U , italic_U start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT , italic_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ) → over¯ start_ARG italic_M end_ARG is defined as a function from a global model MMMitalic_M obtained through FL FL(U)FLUFL(U)italic_F italic_L ( italic_U ) trained by a set of FL clients UUUitalic_U to an unlearned model M¯¯M\bar{M}over¯ start_ARG italic_M end_ARG. This function considers two subsets of UUUitalic_U including the set of unlearned client UuUsubscriptUuUU_{u}\subset Uitalic_U start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT ⊂ italic_U where each ujUusubscriptujsubscriptUuu_{j}\in U_{u}italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ italic_U start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT posses its unlearned dataset D¯jsubscript¯Dj\bar{D}_{j}over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT, and the set of remaining client UrUsubscriptUrUU_{r}\subset Uitalic_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ⊂ italic_U. The goal is to ensure that the unlearned global model M¯¯M\bar{M}over¯ start_ARG italic_M end_ARG maintains performance comparable to a retrained model M^^M\hat{M}over^ start_ARG italic_M end_ARG trained by UrUusubscriptUrsubscriptUuU_{r}\cup U_{u}italic_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ∪ italic_U start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT where each uiUrsubscriptuisubscriptUru_{i}\in U_{r}italic_u start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ italic_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT posses DisubscriptDiD_{i}italic_D start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and each ujUusubscriptujsubscriptUuu_{j}\in U_{u}italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ italic_U start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT posses Dj\D¯j\subscriptDjsubscript¯DjD_{j}\backslash\bar{D}_{j}italic_D start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT \ over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT.

Building on the definition of federated unlearning outlined above, we specify the targets of the unlearning process within an FL setting as follows.

Definition 0.

(Model consistency) For a given set of samples XXXitalic_X, let Y¯¯Y\bar{Y}over¯ start_ARG italic_Y end_ARG be the predicted results produced from the unlearned global FL model M¯¯M\bar{M}over¯ start_ARG italic_M end_ARG, and Y^^Y\hat{Y}over^ start_ARG italic_Y end_ARG be the predicted results from a retrained global FL model M^^M\hat{M}over^ start_ARG italic_M end_ARG. Then, the unlearning process FU(M,U,Uu,Ur)FUMUsubscriptUusubscriptUrFU(M,U,U_{u},U_{r})italic_F italic_U ( italic_M , italic_U , italic_U start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT , italic_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ) is considered to provide full consistency if Y¯=Y^¯Y^Y\bar{Y}=\hat{Y}over¯ start_ARG italic_Y end_ARG = over^ start_ARG italic_Y end_ARG. The target regarding model consistency is to make the performance of the unlearned model M¯¯M\bar{M}over¯ start_ARG italic_M end_ARG as much as similar to that of M^^M\hat{M}over^ start_ARG italic_M end_ARG.

Definition 0.

(Unlearning efficiency) For a retrained model M^^M\hat{M}over^ start_ARG italic_M end_ARG and an unlearned model M¯¯M\bar{M}over¯ start_ARG italic_M end_ARG obtained from FU(M,U,Uu,Ur)FUMUsubscriptUusubscriptUrFU(M,U,U_{u},U_{r})italic_F italic_U ( italic_M , italic_U , italic_U start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT , italic_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ) with full consistency, the target regarding unlearning efficiency is to make the cost of FU(M,U,Uu,Ur)FUMUsubscriptUusubscriptUrFU(M,U,U_{u},U_{r})italic_F italic_U ( italic_M , italic_U , italic_U start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT , italic_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ) as much less than the cost of obtaining the retrained model M^^M\hat{M}over^ start_ARG italic_M end_ARG.

Definition 0.

(Privacy preservation) For a federated learning process FL(U)FLUFL(U)italic_F italic_L ( italic_U ) followed by a federated unlearning process FU(M,U,Uu,Ur)FUMUsubscriptUusubscriptUrFU(M,U,U_{u},U_{r})italic_F italic_U ( italic_M , italic_U , italic_U start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT , italic_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ), the target regarding privacy preservation is to ensure that the additional information leakage caused by FU(M,U,Uu,Ur)FUMUsubscriptUusubscriptUrFU(M,U,U_{u},U_{r})italic_F italic_U ( italic_M , italic_U , italic_U start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT , italic_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ), beyond what is leaked through FL(U)FLUFL(U)italic_F italic_L ( italic_U ), is kept as minimal as possible.

Definition 0.

(Certified removal) For any participant, whether an FL client or server, initiating the unlearning request, the target regarding certified removal is to establish a function V()VV(\cdot)italic_V ( ⋅ ), which serves to confirm that the unlearning process FU(M,U,Uu,Ur)FUMUsubscriptUusubscriptUrFU(M,U,U_{u},U_{r})italic_F italic_U ( italic_M , italic_U , italic_U start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT , italic_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ) has been carried out in accordance with the request made by that participant.

3.4. Attacks to ML Models

As mentioned earlier, attacks on ML models can serve as a means to verify the effectiveness of unlearning. Specifically, these attacks can help determine whether the data related to the target client has been successfully unlearned. In this section, we will primarily introduce the two most widely adopted attack methods that are utilized for unlearning verification:

3.4.1. Membership inference attacks (MIA)

First proposed by Shokri et al. (Shokri et al., 2017), the fundamental idea behind MIA is to determine whether a particular record was used during the training of a target model. This is predicated on the observation that data samples present in the training set will lead the model to produce outputs with higher confidence scores. Consequently, an adversary can train a separate model for binary classification, designating outputs as either “member” (indicating that the data was part of the training set) or “non-member” (indicating that the data was not part of the training set). This potential to distinguish between member and non-member records poses a threat to data privacy. Remarkably, MIA does not require knowledge of the target model’s specific architecture or the distribution of its training data. Relying on the shadow models, a series of shadow training datasets D1,,Dksubscriptsuperscript𝐷1subscriptsuperscript𝐷𝑘D^{\prime}_{1},\cdots,D^{\prime}_{k}italic_D start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , ⋯ , italic_D start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT and disjointed shadow test datasets T1,,Tksubscriptsuperscript𝑇1subscriptsuperscript𝑇𝑘T^{\prime}_{1},\cdots,T^{\prime}_{k}italic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , ⋯ , italic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT can be synthesized to mimic the behavior of the target model so as to train the attack model. Evaluating the unlearning effectiveness can be achieved by performing MIA on the unlearned model with the unlearned data. The ASR serves as an indicator of how well the data has been unlearned. A decrease in the MIA’s performance suggests that the influence of the unlearned data on the global model has been successfully reduced.

3.4.2. Backdoor attacks (BA)

Backdoor attacks embed a distinct pattern or “trigger” into portions of the training data (Li et al., 2022). The trigger can be a small patch or sticker that is visible to humans (Gu et al., 2017; Liu et al., 2018), or the value perturbation of benign samples indistinguishable from human inspection (Li et al., 2020b; Bagdasaryan and Shmatikov, 2021; Saha et al., 2020). When the model is subsequently trained or fine-tuned on this, its behavior remains typical for standard inputs. Yet, upon detecting an input that contains this covert trigger, the model will yield malicious behaviors that align with the attacker’s intentions. Backdoor attacks are particularly concerning because they can remain dormant and undetected until the attacker chooses to exploit them. In the context of unlearning, injecting backdoors into the unlearned data and then applying the unlearning procedure should effectively disrupt the relationship between the trigger pattern and the backdoor class. The ASR can be utilized to assess the effectiveness of the unlearning process in removing the backdoor. A lower ASR would indicate that the backdoor has been successfully eliminated.

4. Federated Unlearning Methods

Refer to caption
Figure 4. An unified federated unlearning workflow. This workflow outlines the timeline for learning, unlearning, and verification. When the FU system receives an unlearning request, it can follow either the passive unlearning approach, where the target client exits the system immediately, or the “Active unlearning” approach, where the target client chooses to stay and participate in the unlearning process. Unlearning requests can be initiated by either the unlearned client or the server for various purposes. Furthermore, the unlearning and verification roles can be performed by the server, the target clients, the remaining clients, or a combination of both.

In this section, we introduce a unified federated unlearning workflow, as illustrated in Figure 4, serving as the basis for a novel taxonomy of existing FU techniques. This workflow defines the timeline for learning, unlearning, and verification. When the FU system receives an unlearning request, it can either allow the target client to exit the system immediately, referred to as “Passive unlearning,” or the target client can choose to stay and participate in the unlearning process, referred to as “Active unlearning.” Note that some unlearned clients may simultaneously initiate the unlearning request and transmit information to the server, while others may not engage in the unlearning process but remain solely for verification. We categorize these FU schemes as passive unlearning as well. The taxonomy can be found in Figure 5 and the summary of the existing FU works can be found in Table 3.

Refer to caption
Figure 5. Taxonomy of federated unlearning schemes.

4.1. Passive unlearning

Passive unlearning signifies that the target client does not stay within the FU system to participate in the unlearning process, which typically involves a series of computational iterations. Instead, the remaining participants, including the central server, the remaining FL clients, or both, carry out the unlearning algorithms. In this case, passive unlearning unlearns the entire client instead of partial data. In the scenario of (i) server-standalone unlearning, historical information such as gradients and global models is stored, enabling the server to eliminate the influence of the unlearned client using various methods. In the scenario of (ii) client-aided unlearning, the standard FL workflow is followed, with iterative refinements of the global model achieved by aggregating improved information from the remaining clients. Note that for passive unlearning, methods like local retraining, local fine-tuning, and multi-task unlearning are no longer applicable. This is because these FU algorithms rely on direct access to both the unlearned data and the remaining data of the target client, which becomes inaccessible when the entire client must be removed.

4.1.1. Server-standalone unlearning

As previously mentioned, standalone server unlearning typically depends on the utilization of stored historical data, which may include gradients, global models (Wu et al., 2023d, 2022b; Zhang et al., 2023e; Guo et al., 2023; Jiang et al., 2024; Huynh et al., 2024), contribution information (Zhang et al., 2023e), or intermediate information necessary for constructing a random forest (Liu et al., 2021a). This category necessitates a significant amount of memory on the server, potentially limiting its practical application in large-scale FL systems with complex ML models.

In the case of FedRecovery (Zhang et al., 2023e), the server retains historical data from all clients and quantifies their contributions in each round based on gradient residuals. When a target client requests to leave, the server systematically removes its contributions from all FL rounds through a fine-tuning process. Based on FedRecovery (Zhang et al., 2023e), Crab (Jiang et al., 2024) achieves a more efficient recovery based on (i) selective historical information rather than all historical information and (ii) a historical model that has not been significantly affected by malicious clients rather than the initial model. Additional constraints can be introduced to further guide the recovery process, such as a penalty term based on projected gradients (Shao et al., 2024; Fu et al., 2024), randomly initialized degradation models (Zhao et al., 2023), and estimated skew (Huynh et al., 2024). The approach of eliminating the contribution of the target client is more straightforward in (Wu et al., 2023d, 2022b), where the server directly averages the models of the remaining clients. Strategic retraining based on the change of sampling probability is adopted for fast and efficient recovery (Tao et al., 2024). To mitigate the potential decrease in accuracy due to the averaging process in the averaged model, knowledge distillation is employed. This technique facilitates the transfer of information from the trained model to the unlearned model, hel** to preserve performance. Consequently, these designs adhere to a multi-task unlearning approach. In VERIFI (Gao et al., 2022b), after receiving the gradients from all clients, including those from the target client, are uploaded to the server. The server then amplifies the gradients from the remaining clients and diminishes the gradients of the target client, to reduce the impact of target clients, hence achieving unlearning.

Refer to caption
Figure 6. An illustration of RevFRF (Liu et al., 2021a). To remove a target client, the server first identifies nodes affected by the target client and subsequently eliminates these affected nodes until reaching the leaf node. Following this, the server reconstructs the affected branches through a retraining process, based on previously stored intermediate information.

Apart from the above-mentioned works, RevFRF (Liu et al., 2021a), as shown in Figure 6, focuses on federated random forest training. To remove a client, the server first identifies nodes affected by the target client and subsequently eliminates these affected nodes until reaching the leaf node. Subsequently, the server reconstructs the affected branches using previously stored intermediate information, rather than instructing the remaining clients to undergo retraining. In particular, in the worst-case scenario where the revoked node is the root node, the server has to reconstruct the entire random decision tree. Unlearning within a federated clustering setting is explored in SCMA (Pan et al., 2022), where each client maintains a vector to denote its local clustering result. These vectors are then aggregated by the server to form a global clustering outcome. Eliminating a client is straightforward by assigning a zero vector to the unlearned client and then re-aggregating all vectors.

Limitations. Server-standalone unlearning, which relies on historical data stored on the server, lacks real-time input from remaining clients during the unlearning process. This limitation may result in slightly lower unlearning performance compared to client-aided unlearning. This characteristic could impede the applicability of server-standalone unlearning in complex ML models or Non-IID FL settings, where there is a notable bias, affecting the overall efficacy of the unlearning process. Furthermore, server-standalone unlearning may lack responsiveness to changes in data and client behavior, as it solely relies on historical information. This can limit its adaptability in dynamic environments where real-time data and client interactions are crucial.

4.1.2. Client-aided unlearning

Unlearning performed by the server and remaining clients typically offers greater potential compared to standalone server unlearning. This is because the remaining clients contribute valuable information about the remaining data, which enables the server to enhance its unlearning process. In this context, the server may or may not have access to historical information.

Refer to caption
Figure 7. An illustration of FedEraser (Liu et al., 2021b). The server stores clients’ gradients at intervals of every ΔtΔ𝑡\Delta troman_Δ italic_t rounds. Using an iterative approach, for a given round tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, the server computes calibrated gradients Gtisuperscriptsubscript𝐺subscript𝑡𝑖G_{t_{i}}^{\prime}italic_G start_POSTSUBSCRIPT italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT based on historical gradients Gtisubscript𝐺subscript𝑡𝑖G_{t_{i}}italic_G start_POSTSUBSCRIPT italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT and the calibrated model Mti1superscriptsubscript𝑀subscript𝑡𝑖1M_{t_{i-1}}^{\prime}italic_M start_POSTSUBSCRIPT italic_t start_POSTSUBSCRIPT italic_i - 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT.

This research direction is arguably pioneered by the design of FedEraser (Liu et al., 2021b), as shown in Figure 7. The core concept of FedEraser is that the current global model can be reconstructed using only the initial model and historical clients’ gradients at each round. Consequently, unlearning boils down to eliminating the influence of the target client on the historical gradients, i.e., calibrating historical gradients. To achieve this goal, for a historical FL round i𝑖iitalic_i with the stored gradients Gisubscript𝐺𝑖G_{i}italic_G start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and a calibrated global model Mi1subscript𝑀𝑖1M_{i-1}italic_M start_POSTSUBSCRIPT italic_i - 1 end_POSTSUBSCRIPT for the previous round, each remaining client ujsubscript𝑢𝑗u_{j}italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT calculates a local calibration direction cijsuperscriptsubscript𝑐𝑖𝑗c_{i}^{j}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_j end_POSTSUPERSCRIPT based on its local data Djsubscript𝐷𝑗D_{j}italic_D start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT and Mi1subscript𝑀𝑖1M_{i-1}italic_M start_POSTSUBSCRIPT italic_i - 1 end_POSTSUBSCRIPT. The local calibration directions are then aggregated by the server to derive a global calibration direction cisubscript𝑐𝑖c_{i}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, which enables the server to calculate calibrated historical gradients Gisuperscriptsubscript𝐺𝑖G_{i}^{\prime}italic_G start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT and to obtain a calibrated global model Misubscript𝑀𝑖M_{i}italic_M start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT via Gisuperscriptsubscript𝐺𝑖G_{i}^{\prime}italic_G start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. This iterative process continues round-by-round until all historical gradients are successfully calibrated, resulting in the server obtaining a final calibrated global model, eliminating the influence of the target client. To enhance unlearning efficiency, the server stores clients’ gradients at intervals of every ΔtΔ𝑡\Delta troman_Δ italic_t rounds, leading to a trade-off between unlearning performance and resource consumption in terms of memory and computation. Improve upon FedEraser, Crab (Jiang et al., 2024) and Fast-FedUL (Huynh et al., 2024) optimize storage efficiency by selectively storing important gradients, while Sharding Eraser (Lin et al., 2024a) compress storage using coding-based techniques. A similar idea is adopted in (Wang et al., 2024b) focusing on ranking tasks instead of classification tasks. Building upon the unlearning concept introduced in FedEraser, an efficiency-enhancing technique is employed in FRU (Yuan et al., 2023) for federated recommendations. In FRU, only the important updates to clients’ item embeddings are stored. In line with FedEraser (Liu et al., 2021b) and FRU (Yuan et al., 2023), FedRecover (Cao et al., 2023) also entails the storage of historical gradients and global models. In FedRecover, to prevent the remaining clients from computing exact model updates for fine-tuning, which can lead to significant computational overhead, the server calculates updates for the remaining clients using historical gradients and global models, as described below:

𝒈ti=𝒈¯ti+𝐇ti(𝒘^t𝒘¯t)superscriptsubscript𝒈𝑡𝑖superscriptsubscript¯𝒈𝑡𝑖superscriptsubscript𝐇𝑡𝑖subscript^𝒘𝑡subscript¯𝒘𝑡\boldsymbol{g}_{t}^{i}=\overline{\boldsymbol{g}}_{t}^{i}+\mathbf{H}_{t}^{i}% \left(\hat{\boldsymbol{w}}_{t}-\overline{\boldsymbol{w}}_{t}\right)bold_italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT = over¯ start_ARG bold_italic_g end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT + bold_H start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT ( over^ start_ARG bold_italic_w end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT - over¯ start_ARG bold_italic_w end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT )

where 𝐇ti=01𝐇(𝒘¯t+z(𝒘^t𝒘¯t))𝑑zsuperscriptsubscript𝐇𝑡𝑖superscriptsubscript01𝐇subscript¯𝒘𝑡𝑧subscript^𝒘𝑡subscript¯𝒘𝑡differential-d𝑧\mathbf{H}_{t}^{i}=\int_{0}^{1}\mathbf{H}\left(\overline{\boldsymbol{w}}_{t}+z% \left(\hat{\boldsymbol{w}}_{t}-\overline{\boldsymbol{w}}_{t}\right)\right)dzbold_H start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT = ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 1 end_POSTSUPERSCRIPT bold_H ( over¯ start_ARG bold_italic_w end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT + italic_z ( over^ start_ARG bold_italic_w end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT - over¯ start_ARG bold_italic_w end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) ) italic_d italic_z is an integrated Hessian matrix for the i𝑖iitalic_ith client in the t𝑡titalic_tth round. Denote the global-model difference in the t𝑡titalic_tth round as Δ𝒘t=𝒘^t𝒘¯tΔsubscript𝒘𝑡subscript^𝒘𝑡subscript¯𝒘𝑡\Delta\boldsymbol{w}_{t}=\hat{\boldsymbol{w}}_{t}-\overline{\boldsymbol{w}}_{t}roman_Δ bold_italic_w start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = over^ start_ARG bold_italic_w end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT - over¯ start_ARG bold_italic_w end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT and the model-update difference of the i𝑖iitalic_ith client in the t𝑡titalic_tth round as Δ𝒈ti=𝒈ti𝒈¯tiΔsuperscriptsubscript𝒈𝑡𝑖superscriptsubscript𝒈𝑡𝑖superscriptsubscript¯𝒈𝑡𝑖\Delta\boldsymbol{g}_{t}^{i}=\boldsymbol{g}_{t}^{i}-\overline{\boldsymbol{g}}_% {t}^{i}roman_Δ bold_italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT = bold_italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT - over¯ start_ARG bold_italic_g end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT. The Hessian matrix 𝑯~tisuperscriptsubscript~𝑯𝑡𝑖\tilde{\boldsymbol{H}}_{t}^{i}over~ start_ARG bold_italic_H end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT for the i𝑖iitalic_ith client in the t𝑡titalic_tth round can be approximated as

𝑯~ti=L-BFGS(Δ𝑾t,Δ𝑮ti)superscriptsubscript~𝑯𝑡𝑖L-BFGSΔsubscript𝑾𝑡Δsuperscriptsubscript𝑮𝑡𝑖\tilde{\boldsymbol{H}}_{t}^{i}=\text{L-BFGS}\left(\Delta\boldsymbol{W}_{t},% \Delta\boldsymbol{G}_{t}^{i}\right)over~ start_ARG bold_italic_H end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT = L-BFGS ( roman_Δ bold_italic_W start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , roman_Δ bold_italic_G start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT )

where Δ𝑾t=[Δ𝒘b1,Δ𝒘b2,,Δ𝒘bs]Δsubscript𝑾𝑡Δsubscript𝒘subscript𝑏1Δsubscript𝒘subscript𝑏2Δsubscript𝒘subscript𝑏𝑠\Delta\boldsymbol{W}_{t}=\left[\Delta\boldsymbol{w}_{b_{1}},\Delta\boldsymbol{% w}_{b_{2}},\cdots,\Delta\boldsymbol{w}_{b_{s}}\right]roman_Δ bold_italic_W start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = [ roman_Δ bold_italic_w start_POSTSUBSCRIPT italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , roman_Δ bold_italic_w start_POSTSUBSCRIPT italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , ⋯ , roman_Δ bold_italic_w start_POSTSUBSCRIPT italic_b start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT end_POSTSUBSCRIPT ] and Δ𝑮ti=[Δ𝒈b1i,Δ𝒈b2i,,Δ𝒈bsi]Δsuperscriptsubscript𝑮𝑡𝑖Δsuperscriptsubscript𝒈subscript𝑏1𝑖Δsuperscriptsubscript𝒈subscript𝑏2𝑖Δsuperscriptsubscript𝒈subscript𝑏𝑠𝑖\Delta\boldsymbol{G}_{t}^{i}=\left[\Delta\boldsymbol{g}_{b_{1}}^{i},\Delta% \boldsymbol{g}_{b_{2}}^{i},\cdots,\Delta\boldsymbol{g}_{b_{s}}^{i}\right]roman_Δ bold_italic_G start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT = [ roman_Δ bold_italic_g start_POSTSUBSCRIPT italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT , roman_Δ bold_italic_g start_POSTSUBSCRIPT italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT , ⋯ , roman_Δ bold_italic_g start_POSTSUBSCRIPT italic_b start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT ] are L-BFGS buffers (Nocedal, 1980) maintained by the server. Nonetheless, these approximations introduce estimation errors over rounds. Therefore, the remaining clients are periodically tasked with computing their exact model updates to correct these approximations, based on an adaptive abnormality threshold. A more straightforward retraining-based method is employed in SIFU (Fraboni et al., 2022). In SIFU, the fundamental concept of unlearning is to identify the most recent global model using a bounded sensitivity metric calculated from historical contributions. Subsequently, the remaining clients retrain based on the identified model.

Refer to caption
Figure 8. An illustration of HDUS (Ye et al., 2023). Operating without a central server, each client possesses their own neighboring distilled models, referred to as seed models. When a client requests to leave, the adjacent clients simply delete the seed model of the unlearned client. For predictions, an ensemble learning method is employed to combine the outputs of the primary model with those of the seed models.

Other approaches concentrate on unlearning without reliance on historical updates. In SFU (Li et al., 2023d), upon receiving an unlearning request, the server refines the global model using gradient information provided by the target client and representation matrix information provided by other clients. In KNOT (Su and Li, 2023), clients are grouped into clusters based on their training time and model sparsity. Clients within the same cluster collectively aggregate and update the global model asynchronously. When a client requests to leave, only clients within the same cluster require retraining. A similar structure is adopted in FedCIO (Qiu et al., 2023) where clients are clustered according to their data distribution. Differing from conventional FL systems, HDUS (Ye et al., 2023) operates without a central server, as shown in Figure 8. Instead, each client possesses their own neighboring distilled models, referred to as seed models. When a client requests to leave, the adjacent clients simply delete the seed model of the unlearned client. For predictions, an ensemble learning method is employed to combine the outputs of the primary model with those of the seed models. Incentive mechanisms along with game theoretical analysis in FU systems is presented in (Ding et al., 2023; lin2024incentive,ding2023strategic).

Table 3. A Summary of Passive FU schemes
Ref. Who-Unlearn Unlearn-What Principle Method Verifier Verify Method
Passive Unlearning (Zhang et al., 2023e)
(Jiang et al., 2024) Server Target Client Fine-tuning Iteratively remove the contributions of the target client evaluated based on its historical gradient residuals. NA Accuracy-based metrics, unlearning time, MIA
(Cao et al., 2023) Server & Remaining clients Target client Model scrubbing The server scrubs the model iteratively based on the estimation over historical gradients and global models, while the remaining clients periodically participate to eliminate accumulated estimation errors. NA Test error rate, backdoor attack, average computation/communication costs saving
(Liu et al., 2021a) Server Target client Retraining Remove nodes affected by the target client until reaching the leaf node. Then reconstruct the affected branches based on previously stored intermediate information. NA Accuracy-based metrics
(Wu et al., 2023d) (Wu et al., 2022b) Server Target client Multi-task unlearning Unlearn by directly averaging the models of remaining clients, while avoiding forgetting by optimizing the knowledge distillation loss between unlearned model and previous global model. NA Accuracy-based metrics, backdoor attack
(Su and Li, 2023) Sever & Target client & Some remaining clients Target client Retraining Divide clients into clusters for asynchronous aggregation. To unlearn some data, only clients in the same cluster are retrained. Sever Validation accuracy, deviation across recent validation accuracies
(Li et al., 2023d) Server & All clients Target client Gradient ascent The server refines the global model with gradient ascent in a subspace based on the gradient provided by the target client and the representation matrix provided by the remaining clients. NA Backdoor attack
(Fraboni et al., 2022) Server & Remaining clients Target client Retraining Find a historical global model based on a bounded sensitivity metric calculated based on clients’ historical contributions, from where the remaining clients retrain. NA Number of retraining rounds, accuracy-based metrics
Table 4. A Summary of Passive FU schemes (continued).
Ref. Who-Unlearn Unlearn-What Principle Method Verifier Verify Method
Passive Unlearning (Yuan et al., 2023) Server & Remaining clients Target client Fine-tuning Iteratively and selectively calibrate historical gradients to reconstruct the calibrated global model. NA Backdoor attack
(Ye et al., 2023) Remaining clients Target Client Model scrubbing Each client retains neighboring distilled models, and predictions are obtained through an ensemble of the main model and seed model. To unlearn a target client, simply delete the seed model associated with that target client. NA Accuracy-based metrics
(Liu et al., 2021b) Server & Remaining clients Target client Fine-tuning Iteratively calibrate historical gradients to reconstruct the calibrated global model. NA Metrics, parameter deviation, MIA
(Pan et al., 2022) Server Target client Fine-tuning Server aggregate the vectors from remaining clients representing their local clustering result. Server Global model convergence
(Gao et al., 2022b) Server Target client Fine-tuning The server then amplifies the gradients from the remaining clients and reduces the gradients of the target client. Target client Accuracy-based metrics
(Lin et al., 2024a) Server & Remaining clients Target client Retraining Retraining based on isolated shard and coded computing NA Accuracy, time, storage, MIA
(Wang et al., 2024b) Remaining clients Target client Fine-tuning Iteratively calibrate historical gradients to reconstruct the calibrated global model. NA Backdoor attack
(Shao et al., 2024)
(Fu et al., 2024) Server Target client Fine-tuning Calibrate historical gradients with penalty term based on projected gradients. NA Accuracy-based metrics, backdoor attack
(Guo et al., 2023) Server Target client Fine-tuning Fine-tuning the model by subtracting target model updates. NA Accuracy-based metrics, time, CPU usage, memory
(Huynh et al., 2024) Server Target client Fine-tuning Calibrate historical gradients with guidance of estimated skew. NA Accuracy, backdoor attack
(Tao et al., 2024) Server Target client & Partial data Retraining Strategic retraining based on the change of sampling probability. NA Accuracy, time, MIA

Client-aided unlearning inherently depends on the involvement of remaining clients and their updates, which can be a vulnerability in dynamic environments where client participation fluctuates. Additionally, this unlearning method can be slow, as it relies on all remaining clients, often resource-constrained devices, and is limited by the bandwidth of the FL system. This could lead to inefficiencies, particularly in cross-device scenarios with frequent client turnover or limited system resources.

4.2. Active unlearning

“Active unlearning” denotes that the target client actively engages in the unlearning process and then has the option to either stay or leave, with or without verification (see Section 4.3 for more details on verification mechanisms). Given the direct access the target client possesses to the data to be unlearned, this approach exhibits greater potential as indicated by existing research.

4.2.1. Unlearn partial data

To unlearn the partial data of the target client, retraining is the most straightforward approach. To mitigate the computational cost of starting from scratch with retraining, one solution is to roll back the global model to a state where it has not been significantly influenced by the target client. From this point, all FL clients can conduct the retraining process. For instance, in Exact-Fun (Xiong et al., [n. d.]), where FL models are quantized, when a client requests to leave, the client calculates a new model based on the remaining data. If the original model matches the new quantized model, signifying that the removal has no impact, the FL model remains unchanged. Otherwise, retraining is required to eliminate the influence of the unlearned data. In ViFLa (Fan et al., 2022), which is essentially a machine unlearning scheme, training samples are segmented into different groups, with each group representing an FL client. Hence, ViFLa can simulate an FU process in this context. The local model is trained using ring-based SQ-learning for LSTM, and weighted aggregation is determined by KL-attention scores. The historical model parameters represented by states over a ring are stored. To unlearn partial data, each client removes unlearned data and computes the new updates. Based on these new updates, the server identifies a previous state from which the remaining clients continue their training. A similar concept of identifying the optimal previous state for retraining is also present in SIFU (Fraboni et al., 2022), as discussed earlier in Section 4.1.2. In SCMA (Pan et al., 2022), a straightforward approach to unlearning partial data involves naive retraining. Each client maintains a vector representing its local clustering result, and these vectors are aggregated by the server to create a global clustering outcome. To unlearn partial data, SCMA entails each client calculating a new local vector, i.e., retraining, and then re-aggregating all vectors.

Fine-tuning and multi-task learning are popular approaches for FU as well. As an example, in FRAMU (Shaik et al., 2023a), the server aggregates fine-tuned local models and attention scores. Using these scores, it filters out irrelevant data points and updates the global model. The attention scores are acquired through local reinforcement learning applied to dynamic data. In FedLU (Zhu et al., 2023), designed for FL over knowledge graphs where embeddings are aggregated instead of gradients as in standard FL, the unlearning of partial data is accomplished through iterative optimization of local embeddings. This process follows the multi-task unlearning concept, involving unlearning over the local model and learning over the global model. In FedME2 (Xia et al., 2023), clients engage in multi-task learning to optimize the loss of the local model, the loss from an MIA-like evaluation model, and a penalty term that accounts for the difference between the local model and the global model. In (Wang et al., 2024e), unlearning is conducted by optimizing model performance on the remaining dataset while considering bias caused by the unlearned data.

Model scrubbing-based methods are commonly employed for unlearning partial data. In (Liu et al., 2022c), the model scrubbing technique is applied to the target client to locally unlearn the partial data, involving Hessian matrix computations, with enhanced computational efficiency through an approximate diagonal empirical Fisher Information Matrix (FIM). In Forsaken (Liu et al., [n. d.]), dummy gradients are computed to align the confidence vector of the unlearned model with that of a perfectly unlearned model. Forsaken+ (Ma et al., 2022) minimizes the distance between the posteriors of the data to be forgotten and those of non-member data for unlearning. FedAU (Gu et al., 2024b) relies on the linear combination to approximate the unlearned model utilizing a pre-computed auxiliary model during the learning process. (Gu et al., 2024a) focus on feature unlearning by minimizing local feature sensitivity through model scrubbing. A similar approach of local unlearning followed by aggregation is described in CONFUSE (Meerza et al., 2024) for multi-task unlearning at different levels. FFMU (Che et al., 2023) treats data removals as perturbations on the dataset, employing random smoothing (RS) (Cohen et al., 2019) to obtain a smoother model to simulate an unlearning process. In particular, FFMU aligns with the fundamental idea presented in PCMU (Zhang et al., 2022b), which involves randomized gradient smoothing combined with gradient quantization as follows.

S(G¯)=argmaxc{1,0,1}𝒟(Q(G¯+ε)=c)𝑆¯𝐺𝑐101argmax𝒟𝑄¯𝐺𝜀𝑐S(\bar{G})=\underset{c\in\{-1,0,1\}}{\operatorname{argmax}}\underset{\mathcal{% D}}{\mathbb{P}}(Q(\bar{G}+\varepsilon)=c)italic_S ( over¯ start_ARG italic_G end_ARG ) = start_UNDERACCENT italic_c ∈ { - 1 , 0 , 1 } end_UNDERACCENT start_ARG roman_argmax end_ARG undercaligraphic_D start_ARG blackboard_P end_ARG ( italic_Q ( over¯ start_ARG italic_G end_ARG + italic_ε ) = italic_c )

where 𝒟=𝒩(0,σ2I)𝒟𝒩0superscript𝜎2𝐼\mathcal{D}=\mathcal{N}\left(0,\sigma^{2}I\right)caligraphic_D = caligraphic_N ( 0 , italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_I ) is a Gaussian distribution, Q𝑄Qitalic_Q is a gradient quantization to map each dimension of the continuous gradient G(x,y)T𝐺𝑥𝑦superscript𝑇G(x,y)\in\mathbb{R}^{T}italic_G ( italic_x , italic_y ) ∈ blackboard_R start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT over a discrete three-class space {1,0,1}101\{-1,0,1\}{ - 1 , 0 , 1 }, for mimicking the classification in the randomized smoothing for certified robustness. S𝑆Sitalic_S is a smooth version of Q𝑄Qitalic_Q, and returns whichever gradient classes Qtsuperscript𝑄𝑡Q^{t}italic_Q start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT is most likely to return when G¯¯𝐺\bar{G}over¯ start_ARG italic_G end_ARG is perturbed by noise ε𝜀\varepsilonitalic_ε. Extending FFMU from PCMU poses a challenge due to FL’s privacy requirements, limiting server access to clients’ local training data and affecting the certified data removal radius and budget in the global model. Therefore, by leveraging the theory of nonlinear functional analysis, the local MU models g(x;q)𝑔𝑥𝑞g(x;q)italic_g ( italic_x ; italic_q ) in FFMU are reformulated as output functions of a Nemytskii operator O(q)(x)𝑂𝑞𝑥O(q)(x)italic_O ( italic_q ) ( italic_x ) where q=Q(G¯)+ε𝑞𝑄¯𝐺𝜀q=Q(\bar{G})+\varepsilonitalic_q = italic_Q ( over¯ start_ARG italic_G end_ARG ) + italic_ε. In this way, the global unlearned model with bounded errors can maintain the certified radius and budget of data removals of the local unlearned models within a distance (K1)Cd2πKδ𝐾1𝐶𝑑2𝜋𝐾𝛿\frac{(K-1)Cd}{\sqrt{2\pi}K\delta}divide start_ARG ( italic_K - 1 ) italic_C italic_d end_ARG start_ARG square-root start_ARG 2 italic_π end_ARG italic_K italic_δ end_ARG (see (Che et al., 2023) for more details).

Refer to caption
Figure 9. An illustration of FedAF (Li et al., 2023a). Synthetic labels are generated for the data to be unlearned. A trusted third party creates random teacher models, and ensemble predictions from these models to provide synthetic labels for the unlearned data. Training is then conducted using this data with synthetic labels to achieve unlearning.

Some FU approaches are proposed with the use of synthetic data and gradient ascent principles. For instance, in UKRL(Xu et al., 2023a), unlearning is conducted by training on perturbed unlearned data. In FedAF (Li et al., 2023a), shown in Figure 9, synthetic labels are generated for the data to be unlearned. A trusted third party creates random teacher models, and ensemble predictions from these models to provide synthetic labels for the unlearned data. Training is then conducted using this data with synthetic labels to achieve unlearning. Note that a multi-task approach is also employed in FedAF, where an additional task is introduced to retain the memory of the remaining data. In another work (Alam et al., 2023), which focuses on how adversaries can stealthily perform backdoor unlearning to evade server detection, the gradient ascent method is employed. The loss from the local benign dataset is utilized to constrain unbounded losses during the unlearning process based on gradient ascent.

Unlearning is also applicable in Bayesian federated learning systems. In Forget-SVGD (Gong et al., 2022a), when a client requests to leave, the target client leverages the remaining data to compute the posterior probability, approximated through variational inference (VI), and performs an extra FL round for model updating. Similar unlearning methods are employed in (Gong et al., 2022b; Gong, 2023). BVIFU (Gong et al., 2021) shares a core concept with Forget-SVGD, employing exponential family distributions in VI to approximate posterior probability. Unlike retraining-based unlearning in Bayesian FL, BFU (Wang et al., 2023c) introduces a multi-task unlearning approach. It employs a parameter self-sharing method to balance between forgetting the unlearned data and remembering the knowledge learned by the original model, where probability distributions are approximated by a neural network.

In addition to the aforementioned approaches, the work in (Wang et al., 2022) specializes in unlearning a specific type of partial data, particularly focusing on a category within the training dataset, i.e., a class. Typically initiated by the server, this unlearning process involves the application of quantization and pruning techniques. Specifically, the locally trained CNN model takes private images as input and produces feature map scores that assess the relationship between each channel and category. These scores are transmitted to the central server and aggregated into global feature map scores. The server utilizes TF-IDF to evaluate the relevance scores between channels and categories and creates a pruner to perform selective pruning on the most distinguishing channels of the target category. Subsequently, normal federated training proceeds with the exclusion of training data associated with the target category.

Limitations. Unlearning partial data through active unlearning is notably complex among all unlearning targets. It requires the removal of specific data while maintaining model performance on the remaining data. This complexity often results in more intricate algorithms, leading to increased computational and communication costs. Furthermore, this setting is susceptible to attacks based on over-unlearning, as identified in (Hu et al., 2023b), where adversaries can exploit the unlearning process to enhance the effects of remaining poisoned data, thus facilitating poisoning attacks. This vulnerability underscores the need for careful consideration in implementing active partial data unlearning.

4.2.2. Unlearn entire client

As mentioned earlier, unlearning through gradient ascent is a versatile approach suitable for both partial data and target client unlearning. As detailed in (Halimi et al., 2022), the target client employs gradient ascent to maximize the local loss, subject to constraints determined by the reference model provided by the remaining clients. Specifically, during FL training, a client’s objective is to address the following optimization problem:

minw1|D|(xi,yi)D(w;(xi,yi))subscript𝑚𝑖𝑛𝑤1𝐷subscriptsubscript𝑥𝑖subscript𝑦𝑖𝐷𝑤subscript𝑥𝑖subscript𝑦𝑖\mathop{min}\limits_{w}\frac{1}{|D|}\sum\limits_{(x_{i},y_{i})\in D}\mathcal{L% }(w;(x_{i},y_{i}))start_BIGOP italic_m italic_i italic_n end_BIGOP start_POSTSUBSCRIPT italic_w end_POSTSUBSCRIPT divide start_ARG 1 end_ARG start_ARG | italic_D | end_ARG ∑ start_POSTSUBSCRIPT ( italic_x start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) ∈ italic_D end_POSTSUBSCRIPT caligraphic_L ( italic_w ; ( italic_x start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) )

where (w;(xi,yi))𝑤subscript𝑥𝑖subscript𝑦𝑖\mathcal{L}(w;(x_{i},y_{i}))caligraphic_L ( italic_w ; ( italic_x start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) ) represents the loss function, which calculates the prediction error for an individual example (xi,yi)subscript𝑥𝑖subscript𝑦𝑖(x_{i},y_{i})( italic_x start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) from the dataset D𝐷Ditalic_D, using the model parameters w𝑤witalic_w. The unlearning method designed in (Halimi et al., 2022) is to reverse this learning process. That is, during unlearning, instead of learning model parameters that minimize the empirical loss, the client i𝑖iitalic_i strives to learn the model parameters to maximize the loss. Additionally, to prevent the process of gradient ascent from producing an arbitrary model similar to a random model, the average of the other clients’ models, i.e., wref=1N1ijwjsubscript𝑤𝑟𝑒𝑓1𝑁1subscript𝑖𝑗subscript𝑤𝑗w_{ref}=\frac{1}{N-1}\sum\limits_{i\neq j}w_{j}italic_w start_POSTSUBSCRIPT italic_r italic_e italic_f end_POSTSUBSCRIPT = divide start_ARG 1 end_ARG start_ARG italic_N - 1 end_ARG ∑ start_POSTSUBSCRIPT italic_i ≠ italic_j end_POSTSUBSCRIPT italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT, is used as a reference model, and an 2subscript2\ell_{2}roman_ℓ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT-norm ball around the reference model is employed to limit the unbounded loss. Thus, during unlearning, the client solves the following optimization problem:

maxw:wwref2δ1|Di|(xk,yk)Di(w;(xk,yk))subscript𝑚𝑎𝑥:𝑤subscriptnorm𝑤subscript𝑤𝑟𝑒𝑓2𝛿1subscript𝐷𝑖subscriptsubscript𝑥𝑘subscript𝑦𝑘subscript𝐷𝑖𝑤subscript𝑥𝑘subscript𝑦𝑘\mathop{max}\limits_{w:||w-w_{ref}||_{2}\leq\delta}\frac{1}{|D_{i}|}\sum% \limits_{(x_{k},y_{k})\in D_{i}}\mathcal{L}(w;(x_{k},y_{k}))start_BIGOP italic_m italic_a italic_x end_BIGOP start_POSTSUBSCRIPT italic_w : | | italic_w - italic_w start_POSTSUBSCRIPT italic_r italic_e italic_f end_POSTSUBSCRIPT | | start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ≤ italic_δ end_POSTSUBSCRIPT divide start_ARG 1 end_ARG start_ARG | italic_D start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | end_ARG ∑ start_POSTSUBSCRIPT ( italic_x start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) ∈ italic_D start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT caligraphic_L ( italic_w ; ( italic_x start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) )

Similarly to constraints, concurrent boost training on the remaining data (Wang et al., 2024c) and reference models (Bano et al., 2023) can also be adopted as mitigation methods. To reduce the computation overhead, unlearning is conducted based on gradient ascent on distilled dataset (Dhasade et al., 2023). Apart from the unlearning principle based on gradient ascent, 2F2L (** et al., 2023) and Appro-Fun (Xiong et al., 2024) adopt model scrubbing methods similar to previous works such as (Liu et al., 2022c) and (Cao et al., 2023). To enhance computational efficiency, the complex task of Hessian matrix inversions is approximated using a pre-trained deep neural network and Taloy expansion.

Limitations. Unlearning an entire client through active learning poses limitations in scenarios where the unlearning request comes from the client to be unlearned. In such cases, the client must remain in the system for unlearning, conflicting with the common “request then leave” behavior in FL systems. Moreover, this method necessitates the unlearned client’s continued participation alongside remaining clients, which is not cost-effective, especially in large-scale and resource-constrained FL systems.

Table 5. A Summary of Active FU schemes
Ref. Who-Unlearn Unlearn-What Principle Method Verifier Verify Method
Active Unlearning (Shaik et al., 2023a) Server & All clients Partial data Fine-tuning The server aggregates local models and attention scores from all clients, based on which filters out unlearned data points and updates the global model. Server Global model convergence
(Zhu et al., 2023) Server & All clients Partial data Fine-tuning & Multi-task unlearning All clients iteratively optimize the local embedding based on mutual knowledge distillation following a multi-task style. Server Prediction results on knowledge
(Che et al., 2023) Server Partial data Model scrubbing Treat unlearned data as a perturbation on the whole dataset. Refine the global model by random smoothing. Server Certified budget of data removals
(Fan et al., 2022) Server & All clients Partial data Retraining After each client removes unlearned data and calculates the new updates, the server identifies a prior state from which the remaining clients proceed with their training. Server Global model convergence
(Xiong et al., [n. d.]) All clients Partial data Retraining The client calculates a new model based on the remaining data. If the original model matches the new quantized model, the FL model remains unchanged. Otherwise, retraining is required. NA Accuracy-based metrics, MIA, speed-up ratio
(Gong et al., 2022a) (Gong et al., 2022b) (Gong, 2023) Target client Partial data Retrain Use variational inference to approximate Bayesian posterior probability. After the client requests to leave, the client uses the remaining data to reapproximation the posterior probability and execute an extra round of model upload NA Accuracy, Posterior Distribution
(Liu et al., [n. d.]) Target clients Partial data Model scrubbing Dummy gradients are computed to align confidence vectors of the unlearned model with that of a perfectly unlearned model. NA Forgetting rate
Table 6. A Summary of Active FU schemes (continued)
Ref. Who-Unlearn Unlearn-What Principle Method Verifier Verify Method
Active Unlearning (Wang et al., 2022) Server and all clients Partial data (a class) Model scrubbing The server assesses the relevance between channels and classes and establishes a pruner to selectively trim the most distinguishing channels of the target class. NA Accuracy-based, speed-up ratio, MIA
(Xia et al., 2023) All clients Partial data Multi-task unlearning Engage in multi-task learning to optimize the loss of the local model, the loss from an MIA-like evaluation model, and a penalty from the difference between the local model and the global model. NA Convergence analysis, accuracy-based metrics, forgetting rate
(Ma et al., 2022) Target client Partial data Model Scrubbing Target clients iteratively minimizes the distance between the posteriors of the data to be forgotten and those of non-member data for unlearning. NA Accuracy-based and efficiency-based metrics, MIA
(Li et al., 2023a) Target clients Partial data Multi-task unlearning Synthetic labels are generated based on teacher ensembles for the data to be unlearned, and training is conducted using this data with synthetic labels to achieve unlearning. NA Accuracy, running time
(Wang et al., 2023c) Target client Partial data Multi-task unlearning Adopts a multi-task unlearning approach that utilizes a parameter self-sharing method to strike a balance between forgetting the unlearned data and retaining the remaining knowledge. NA Running time, model differences, accuracy-based metrics, backdoor attack
(Gong et al., 2021) Target client Partial data Retraining Shares a core concept with (Gong et al., 2022a), employing exponential family distributions in VI to approximate posterior probability. NA KL-divergence
(Alam et al., 2023) Target clients Partial data Gradient ascent Follows the gradient ascent method, utilizing the loss from the local benign dataset to constrain unbounded losses. NA Accuracy-based metrics, backdoor attack
(Liu et al., 2022c) Target client Partial data Model scrubbing Scrubs the model based on the approximation of Hessian matrix using the remaining data. NA Running time, accuracy, model utility
Table 7. A Summary of Active FU schemes (continued)
Ref. Who-Unlearn Unlearn-What Principle Method Verifier Verify Method
Active Unlearning (Pan et al., 2022) Target clients Partial data Retraining Each client computes a new local vector, and these vectors are subsequently aggregated by the server. Server Global model convergence
(** et al., 2023) Target client Target client Model scrubbing Scrubs the model based on the approximation of Hessian matrix using public server data. NA Accuracy-based metrics, MIA
(Halimi et al., 2022) Target client Target client Gradient ascent Target client computes the maximum empirical loss with the constraint of the reference model from remaining clients. NA Accuracy-based metrics, backdoor attack
(Gu et al., 2024b) Server and all clients Partial data Model Scrubbing Linear combination of the trained model and auxiliary model obtained during unlearning. NA Accuracy
(Wang et al., 2024c) Server Target client Gradient ascent Unlearning low-quality data with concurrent boost training with good-quality data Server Accuracy, loss, running time
(Zhang et al., 2023b) Target client Partial data Retraining Retrain the model based on prune local models NA Accuracy, loss
(Dhasade et al., 2023) All clients Target client or a class Gradient ascent Reverse training on the distilled dataset NA Accuracy, time, rounds, data size, MIA
(Wang et al., 2024e) Server & all clients Partial data Multi-task unlearning Optimize model performance on the remaining dataset while considering bias caused by the unlearned data. NA Backdoor attack, L2 distance, JS divergence, T-test
(Zhao et al., 2023) Server & target clients Partial data or a class Fine-tuning Fine-tuning based on randomly initialized degradation models NA Backdoor attack, accuracy
(Wang et al., 2024a) All clients Partial data (a feature) Retraining Rapid retraining using first-order method based on reinitialized model. NA Accuracy-based metrics
(Xiong et al., 2024) Server & target client Target client Model scrubbing Achieving indistinguishability based on DP definition. NA Accuracy, loss, MIA, speed-up ratio
(Xu et al., 2023a) Server & target client Target client Synthetic data Training on perturbed unlearned data. NA Accuracy
(Gu et al., 2024a) Server & target client Target client Model scrubbing Local feature unlearning to minimize feature sensitivity. NA Sensitivity, bias, backdoor attack
(Meerza et al., 2024) Server & target client Target client or partial data Multi-task unlearning Influence removal based on confusion Loss and performance recovery based on saliency map. NA Accuracy, MIA, backdoor attack

4.3. Verification

In line with the description provided in VERIFI (Gao et al., 2022b), the participant who requests unlearning, e.g., a target client or the server, is granted “the right to verify” (RTV). This means that the requester has the ability to actively verify the unlearning effect after the unlearning process is completed. This section will provide an overview of the verification mechanisms proposed in existing FU works.

4.3.1. Client-side

To ensure the “right to verify,” it is imperative that federated unlearning schemes provide clients with the ability to confirm the successful unlearning of their data. Regrettably, this aspect has received limited attention in existing FU literature. In EMA (Huang et al., 2022), the target client employs various metrics, including correctness, confidence, and negative entropy, to assess the performance of the audited dataset concerning the global model. These metrics are then ensembled to determine whether they meet a predefined threshold, serving as an indicator of whether the target client’s data has been effectively unlearned.

Another noteworthy contribution in this domain is VERIFI (Gao et al., 2022b). VERIFI introduces two non-invasive verification methods that distinguish themselves from invasive techniques involving the injection of backdoors or watermarks, which manipulate the original data. In contrast, the verification methods proposed in VERIFI operate without modifying the data itself. These methods revolve around tracking a subset of unlearned data known as “markers,” selected based on specific criteria. The criteria encompass two primary categories: (i) Forgettable Memory, where markers are identified as a representative subset incurring a high variance of local training loss, and (ii) Erroneous Memory, which designates markers as incorrectly predicted samples labeled as erroneous. By actively monitoring the unlearned model’s performance on these markers, clients can effectively verify whether the unlearning process has successfully removed the unlearned data.

4.3.2. Server-side

The outcome of the verification conducted by the server plays an important role in determining when to stop the unlearning process within the FU system. For instance, FRAMU (Shaik et al., 2023a) terminates unlearning when the difference between two consecutive global models becomes smaller than a predefined parameter. KNOT (Su and Li, 2023) concludes unlearning based on the required validation accuracy and the standard deviation across a recent history of such validation accuracies. ViFLa (Fan et al., 2022) and SCMA (Pan et al., 2022) end unlearning when the model converges. FedLU (Zhu et al., 2023) relies on prediction results derived from knowledge, while FFMU (Che et al., 2023) assesses whether data removals exceed a certified budget.

4.3.3. Verification metrics

While the remaining FU works reviewed in this survey do not explicitly introduce verification mechanisms, the verification metrics employed in these works to assess unlearning performance could provide valuable insights for future research. We have summarized these metrics adopted in reviewed FU works in Table 3.

Accuracy-based metrics over unlearned data are the most commonly utilized metrics in the reviewed FU works. For example, they are used in works such as (Wang et al., 2023c; ** et al., 2023; Zhang et al., 2023e; Fraboni et al., 2022; Cao et al., 2023; Liu et al., 2021b; Halimi et al., 2022; Xia et al., 2023; Li et al., 2023a; Wu et al., 2023d; Alam et al., 2023; Liu et al., 2022c; Zhu et al., 2023). Metrics based on running time are employed to assess the efficiency of unlearning algorithms, as demonstrated in (Wang et al., 2023c; Zhang et al., 2023e; Fraboni et al., 2022; Cao et al., 2023; Liu et al., 2021b; Xia et al., 2023; Liu et al., [n. d.]; Ma et al., 2022; Li et al., 2023a; Liu et al., 2022c; Pan et al., 2022). Furthermore, some works rely on verification through backdoor attacks, as in (Li et al., 2023d; Cao et al., 2023; Yuan et al., 2023; Halimi et al., 2022; Ma et al., 2022; Wu et al., 2023d; Alam et al., 2023), while others use membership inference attacks, as seen in (** et al., 2023; Zhang et al., 2023e; Liu et al., 2021b; Ma et al., 2022). The difference between the unlearned model and the retrained model is adopted to evaluate unlearning performance in (Wang et al., 2023c; Ma et al., 2022; Gong et al., 2022b).

4.3.4. Limitations

By surveying the existing FU literature, we can make several observations regarding verification as follows:

  • Only a few research studies on FU take “who-verify” into account, and the verification in almost all FU schemes remains at an experimental assessment level.

  • Most FU methods rely on the assumption that verification is conducted by the server rather than the clients.

  • There are no standard or widely adopted methods for proof of unlearning.

These observations indicate the need for research into ”who-verify” and the development of efficient and robust verification methods conducted by different participants, especially client-verify methods. For instance, when considering MLaaS with unlearning services, clients must be allowed to verify if their data has been unlearned and its impact on the FL model has been removed. Only when the data removal adheres strictly to the specified unlearning request can the trustworthiness of the federated unlearning system be maintained.

4.4. Lessons Learned

In this section, we present the key lessons learned from our review of existing FU methods.

  • “Who-unlearn” and “Who-verify”: According to the proposed taxonomy, unlearning can be carried out by the participant who initiates the unlearning request (e.g., client or server) or by other participants, excluding the one who made the request. Similarly, verification can also be performed by clients or the server. However, we observe that the alignment between “Who-unlearn” and “Who-verify” is not optimal in FU literature. In other words, an FU system should allow the participants who raise the unlearning request to either conduct the unlearning or perform the verification themselves. This ensures that the unlearning results are credible to the participants who made the request.

  • Selection of unlearning principles: It can be observed that different unlearning principles vary in their reliance on access to the training data. For instance, gradient ascent-based unlearning methods heavily rely on the unlearned data, while fine-tuning-based methods may rely only on the remaining data, and retraining-based methods are more flexible. Therefore, selecting appropriate unlearning principles that align with the FU scenarios concerning data access levels should be carefully considered.

  • Structure of unlearning requests: It is challenging to determine the structure of unlearning requests from the existing FU literature. The underlying assumption that the unlearner has direct access to the unlearned data appears contradictory to the privacy foundation of FL systems. For example, if the unlearner is the server and the unlearned data is held by the clients, this creates a conflict. The lack of consideration for the structure of unlearning requests and their integration within the FL system may hinder the adoption of unlearning services in a federated setting.

  • Proof of unlearning: As mentioned earlier, there are no standard or widely adopted metrics for proof of unlearning. To deploy unlearning as a service within MLaaS, it is crucial to establish a standard, either globally or within regional organizations, to guide the design of unlearning verification. Additionally, emphasis should be placed on verification by the entity that raises the unlearning requests.

5. FL-Tailored Optimizations, Limitations, and Applications

In addition to the primary challenges and solutions discussed in earlier sections, FU schemes face limitations due to the unique characteristics of the FL setting. These include (i) constrained resources, (ii) participant heterogeneity, and (iii) security and privacy threats. Furthermore, since FU systems involve additional unlearning processes compared to FL systems, new security and privacy threats arise. To address these issues, various optimization approaches and solutions have been proposed. In this section, we will delve into these limitations and concerns arising from the unique characteristics of the FL setting and explore the efforts made to address them. A summary of these FL-tailored optimization methods and solutions in FU is provided in Table 8.

Table 8. A Summary of FL-Tailored Optimization Methods in FU.
Limitation Optimization Method Reference
Memory Selective storage (Liu et al., 2021b; Yuan et al., 2023; Jiang et al., 2024)
Compression (Lin et al., 2024a)
Size reduction (Xiong et al., [n. d.])
Communication Rounds reduction (Xiong et al., [n. d.]; Fan et al., 2022; Fraboni et al., 2022)
Clustering (Su and Li, 2023; Qiu et al., 2023; Liu et al., 2024c; Wang et al., 2023a)
Approximation (** et al., 2023; Cao et al., 2023; Li et al., 2023a; Liu et al., 2022c)
Parallel computation (Che et al., 2023)
Constrained Resources Computation Outsource computation (Li et al., 2023a; Cao et al., 2023)
    Pre-computation (Gu et al., 2024b)
    Dataset distillation (Dhasade et al., 2023)
Partitioned feature Vertical FL (Liu et al., 2021a; Deng et al., 2023; Zhang et al., 2023b; Wang et al., 2024a)
Variational representation Knowledge distillation (Zhu et al., 2023; Shaik et al., 2023a; Wang et al., 2024e)
Weighted aggregation (Shaik et al., 2023a; Fan et al., 2022; Wang et al., 2022; Su and Li, 2023)
Non-IID distribution Knowledge distillation (Zhu et al., 2023; Ye et al., 2023)
Participant Heterogeneity Training capability Client clustering (Su and Li, 2023)
Diverse payoff     Incentive mechanism (Ding et al., 2023; Lin et al., 2024b; Ding et al., 2024)
Indirect information (Pan et al., 2022; Ding et al., 2023; Ye et al., 2023)
Security & Privacy Threats Privacy-preservation PETs (Liu et al., 2024g, 2021a, [n. d.]; Xiong et al., [n. d.]; Zhang et al., 2023e; Liu et al., 2024c; Zhang et al., 2023b)

5.1. Constrained Resources

In cross-device FL settings, FL clients are typically resource-constrained mobile devices that may drop out of the system at any time (Kairouz et al., 2021). As shown in the FU workflow in Figure 4, federated unlearning is a subsequent process after federated learning. Therefore, the characteristic of resource-constrained participants exists in both FL and FU systems. Consequently, it is crucial to consider the resource requirements and consumption of FU schemes.

5.1.1. Memory

In many FU works, historical information is essential for facilitating the unlearning process. Nevertheless, this implies that the server needs to store a substantial volume of data, leading to significant memory consumption. This historical information can be gradients and global models (Cao et al., 2023; Fraboni et al., 2022; Liu et al., 2021b; Yuan et al., 2023; Wu et al., 2023d; Halimi et al., 2022), gradient residuals (Zhang et al., 2023e), specific state (Shaik et al., 2023a), or some intermediate results (Liu et al., 2021a).

Approaches to mitigation. Memory consumption reduction can be achieved by selectively storing historical information. For instance, in FedEraser (Liu et al., 2021b), the server stores clients’ gradients at specific intervals of FL rounds or based on the importance of gradients (Jiang et al., 2024). Similarly, in FRU (Yuan et al., 2023), only important updates to clients’ item embeddings are stored. In addition, by adopting coding-based techniques, the storage can be further compressed as demonstrated in (Lin et al., 2024a).

5.1.2. Communication

Unlearning in the FU system typically necessitates FL clients to transmit extra information, such as gradients, to the server to facilitate the process. For example, in FRAMU (Shaik et al., 2023a), clients additionally send attention scores to the server. In FedLU (Zhu et al., 2023), loss information is transferred for mutual knowledge distillation between the server and clients. In SFU (Li et al., 2023d), the remaining clients need to send their representation matrix to the server. In (Halimi et al., 2022), the remaining clients’ models are sent to the target client as references.

Approaches to mitigation. Reducing the communication cost can be achieved by minimizing the size of the model to be transferred, which may involve methods like quantization (Xiong et al., [n. d.]), and by reducing the number of unlearning rounds. For retraining-based unlearning, the FU system may roll back the global model to a state where it has not been significantly influenced by the target client. From this point, all FL clients can conduct the retraining process (Xiong et al., [n. d.]; Fan et al., 2022; Fraboni et al., 2022), thus reducing the unlearning rounds and enhancing communication efficiency. Besides, clustering is used to divide FL users into groups, each with its own model. The final inference is determined by a majority vote from these sub-models. This method confines unlearning processes to individual clusters, eliminating the need for participation from all users, thus improving efficiency (Su and Li, 2023; Qiu et al., 2023; Liu et al., 2024c; Wang et al., 2023a).

5.1.3. Computation

FU often requires clients to engage in additional computational tasks compared to standard FL. These tasks can involve generating dummy gradients (Liu et al., [n. d.]), conducting online reinforcement learning (Shaik et al., 2023a), seed model generation (Ye et al., 2023), or computing Hessian matrices (** et al., 2023; Cao et al., 2023; Li et al., 2023a; Liu et al., 2022c). It’s important to note that some of these computational tasks can be resource-intensive, which could pose challenges for deploying unlearning mechanisms in FL systems.

Approaches to mitigation. To enhance computational efficiency, approximation methods are commonly employed to accelerate certain components of FU algorithms. For example, the computation on the Hessian matrix can be approximated using techniques like a pre-trained deep neural network with Taylor expansion (** et al., 2023), the L-BFGS algorithm (Cao et al., 2023), or the Fisher information matrix (Li et al., 2023a; Liu et al., 2022c). Additionally, other optimizations are based on different FU structures. For instance, some works conduct training and unlearning simultaneously (Che et al., 2023), similar to the approach used in (Zhang et al., 2022b) in an MU setting. Orthogonally, computation tasks can be outsourced to a trusted third party, as demonstrated in (Li et al., 2023a). Another approach is transferring the majority of tasks to the server for estimation while executing only a small part of computation tasks for calibration (Cao et al., 2023), or reducing the computational tasks in the unlearning process by involving some pre-computation during the learning phase (Gu et al., 2024b). In (Dhasade et al., 2023), dataset distillation is adopted to compress the size of the dataset while preserving the unlearning performance, hence reducing the computational overhead.

5.2. Participant Heterogeneity

In both FL and FU systems, clients exhibit heterogeneity in various aspects, encompassing differences in data structures, data distributions, such as vertical partitioned features (Liu et al., 2021a; Deng et al., 2023), variational data representations (Shaik et al., 2023a; Zhu et al., 2023), and the presence of Non-IID data (Shaik et al., 2023a; Fan et al., 2022; Wang et al., 2022; Su and Li, 2023). Furthermore, there are disparities in training capabilities on computational, communication and memory, with some clients operating on resource-constrained mobile or IoT devices (Su and Li, 2023). The existence of such diversity highlights the importance of develo** heterogeneity-aware approaches for federated unlearning.

Approaches to mitigation. To address challenges associated with vertical partitioned features, certain vertical federated learning schemes are employed, as seen in works like (Liu et al., 2021a; Deng et al., 2023; Zhang et al., 2023b; Wang et al., 2024a). To handle Non-IID data distributions and variations in data representations, weighted aggregation techniques are commonly utilized, leveraging different metrics such as attention-based mechanisms (Shaik et al., 2023a; Fan et al., 2022), TF-IDF (Wang et al., 2022), and model sparsity (Su and Li, 2023). The introduction of knowledge distillation techniques helps mitigate issues arising from data heterogeneity, bias, and diverse model architectures (Zhu et al., 2023; Wang et al., 2024e; Ye et al., 2023). Additionally, clustering based on local computational resources is considered to achieve asynchronous aggregation for FL, along with clustered retraining for FU (Su and Li, 2023). Furthermore, incentive mechanisms can be adopted in FU systems to deal with diverse payoffs for different FU participants (Ding et al., 2023; lin2024incentive,ding2023strategic).

5.3. Security and Privacy Threats

Privacy and security issues in FU systems encompass those present in FL, such as the risk of information leakage and both targeted and untargeted attacks on ML models (see Section 3 for more details). For instance, the leakage from gradients even allows the attacker to recover images with pixel-wise accuracy and texts with token-wise matching (Zhu et al., 2019). Methods to mitigate such a risk focus on privacy-preserving aggregation (Zheng et al., 2022; Liu et al., 2022a, b). Additionally, recent research highlights that malicious clients can launch (i) untargeted poisoning attacks, which aim to slow the learning process or reduce the global model’s performance (Shejwalkar et al., 2022; Liu et al., 2020), or (ii) targeted backdoor attacks, where a backdoor is embedded into the model, triggering malicious behavior under specific input conditions (Jebreel and Domingo-Ferrer, 2023; Li et al., 2021; Huang et al., 2023). Such attacks can quickly degrade the global model’s performance or implant backdoors within a few FL rounds, with effects lasting for many rounds, posing serious security risks (Ma et al., 2023; Zhang et al., 2023c; Li et al., 2023c).

Approaches to mitigation. To address these security and privacy concerns, mitigation strategies involve the use of indirect information, such as transmitting representative vectors instead of centroids in federated clustering (Pan et al., 2022), calculating clients’ contributions using federated Shapley values (Ding et al., 2023), and generating predictions on the ensemble of seed models acquired through knowledge distillation (Ye et al., 2023). Moreover, integrating privacy-enhancing techniques (PETs) into the FL-FU workflow can bolster security and privacy guarantees, such as employing secure random forest construction for secure random forest re-construction (Liu et al., 2021a), secure aggregation (Liu et al., 2024b) for privacy-preserving gradient sum-up (Liu et al., 2024c, [n. d.]), secure two-party computation for privacy-preserving unlearning (Liu et al., 2024g), homomorphic encryption for initialization (Zhang et al., 2023b), and differential privacy mechanisms (Zhang et al., 2023e) for rendering unlearned mode indistinguishable from the retrained one.

5.4. Applications for Enhanced Security

In addition to ensuring RTBF, federated unlearning has significant applications in enhancing the security and integrity of federated learning models. In the context of poisoning recovery, it enables the removal of maliciously inserted data from trained models, thus restoring their original accuracy and reliability (Cao et al., 2023). For backdoor removal, federated unlearning is instrumental in eliminating hidden backdoors in FL models (Alam et al., 2023; Wu et al., 2023d, d), which could otherwise be exploited for adversarial purposes. Additionally, it plays a crucial role in addressing data misuse in unauthorized training by enabling the removal of improperly used data or outdated data (Fan et al., 2022; Ye et al., 2023), thereby ensuring compliance with standards and regulations. These applications underscore federated unlearning’s importance in maintaining the trustworthiness and security of machine learning models.

5.5. Lessons Learned

In this section, we present the key lessons learned from our review of FL-tailored optimizations in existing FU methods.

  • Trade-offs of resource consumption: The interplay between memory, communication, and computation is complex. We observe independent efforts to optimize efficiency in each of these areas within existing FU approaches. However, there is a lack of combined consideration, which is crucial, especially for resource-constrained FL participants. The trade-offs between memory, communication, and computation should be thoroughly investigated to achieve optimal results.

  • Consideration of participant heterogeneity: We observe that a few studies consider the heterogeneity among FL participants, but this area still requires further exploration. For instance, when managing heterogeneity based on training ability, memory, communication, and computation should all be taken into account. Additionally, existing FU literature primarily addresses simple Non-IID settings with basic data representations. There is a need to investigate complex Non-IID data with other representations, such as graphs.

  • Security & privacy: More studies on machine unlearning reveal that additional privacy leakage can occur in the unlearning setting compared to the learning process. In addition, malicious unlearning, where attackers raise crafted unlearning requests to achieve goals such as degrading model performance or injecting backdoors, exists. However, there is a lack of extended investigation into these issues and the development of defense strategies in the federated setting.

6. Discussions and Promising Directions

In previous sections, we conducted a comprehensive survey of FU schemes. However, given the rapid evolution of FU schemes and their increasing deployment, numerous emerging challenges and open problems are awaiting further investigation. Many of these challenges necessitate additional properties and broader capabilities from FU schemes. In this section, we extend our discussion to encompass these challenges and present potential research directions, highlighting areas where FU schemes can further enhance their capabilities.

6.1. Privacy-preserving FU

The majority of FU schemes reviewed in this survey heavily rely on gradient information from the target client or all clients. For instance, historical client models and updated client models are exposed to the server in various schemes (Zhang et al., 2023e; Liu et al., 2021b; Yuan et al., 2023; Cao et al., 2023). However, it has been highlighted that with only a client’s model and the global model, an attacker, such as a malicious central server, can accurately reconstruct a client’s data in a pixel-wise manner for images or token-wise matching for texts, as discussed in (Zhu et al., 2019). To counteract this “deep leakage from gradients,” privacy-preserving techniques (PPT), such as Homomorphic Encryption (HE) (Gentry, 2009), Multi-Party Computation (MPC) (Yao, 1982), and Differential Privacy (DP) (Dwork et al., 2014), can be integrated to aggregate clients’ locally trained models in a privacy-preserving manner. However, it’s important to note that this approach significantly impacts the performance of existing FU algorithms, as the server no longer has access to the gradient of the target client. Therefore, there is a critical need for privacy-preserving FU methods that enable unlearning while preserving clients’ data privacy. Additionally, as previously mentioned, there are additional security and privacy risks introduced in MU systems due to information leakage from the differences between the original and unlearned models (Chen et al., 2021). This potential information leakage must also be analyzed within a FU system, and corresponding defense mechanisms should be developed.

6.2. Verification and proof of unlearning

As elaborated in Section 4.3 and summarized in Table 3, it is unfortunate that this aspect regarding “who-verify” has received limited attention in existing FU literature. Given that in most real-life FL systems, unlearning requests are typically initiated by a specific target FL client, there should be a heightened emphasis on client-side verification that allows clients to verify if their data has been unlearned and its impact on the FL model has been removed. This approach not only enhances privacy guarantees (Wang et al., 2023b) but also aligns with the marking-then-verification strategy outlined in (Gao et al., 2022b), hence maintaining the trustworthiness of the federated unlearning system. Traditional invasive marking methods, including watermarking, fingerprinting, and backdoor attacks, manipulate the original data, potentially impacting the performance of the FL model. Consequently, the exploration of effective and non-invasive verification mechanisms is a critical area of research within the context of FU.

Apart from verification mechanisms, the development of “proof of unlearning” using applied cryptography such as Zero-Knowledge Proofs (ZKPs) or Trusted Execution Environments (TEEs) presents a compelling research area, particularly for environments where mentioned unlearning verification methods are impractical or trust is limited. This approach offers enhanced cryptographic security guarantees, ensuring more robust and verifiable federated unlearning in sensitive or distrustful settings. Emphasizing cryptographic and hardware-based solutions marks a critical step forward in secure and trustworthy ML practices.

6.3. Emerging threats in unlearning

Due to the nature of unlearning, additional security and privacy risks are introduced in FU systems. For instance, the information can be leaked by the differences between the original and unlearned models (Chen et al., 2021; Hu et al., 2024b; Gao et al., 2022a; Lu et al., 2022). This could exacerbate client privacy issues if an attacker has access to the model before and after the unlearning. Furthermore, from a security perspective, various studies demonstrate that adversarial users can submit crafted unlearning requests with untargeted goals, such as degrading the utility of the unlearned model (Hu et al., 2024a; Zhao et al., 2024; Qian et al., 2023), or untargeted goals, such as injecting backdoors (Liu et al., 2024e; Di et al., 2022; Zhao et al., 2024; Qian et al., 2023). These issues highlight potential vulnerabilities in FU schemes. Research needs to focus on develo** robust defense mechanisms to mitigate these risks and ensure the integrity and security of FU systems.

6.4. Awareness of client-dynamics

The process of federated unlearning introduces significantly more non-determinism compared to centralized machine unlearning. This increased complexity arises from the random selection of clients and data for global aggregation and local training in each round, as well as the presence of potentially numerous dropped and newly joined clients. The unlearning process becomes even more challenging when considering the need to recall past clients for unlearning and retraining. This is particularly difficult for more complex FU schemes, such as privacy-preserving FU, where the integration of PETs must also provide resilience to dynamic client participation. Addressing these dynamic challenges requires the development of client-dynamics-aware FU algorithms. Such algorithms must be capable of adapting to the fluid nature of client involvement in FU, ensuring the integrity and effectiveness of the unlearning process even as clients frequently join or leave the network. This area of research is crucial for the advancement of FU, aiming to create robust solutions that maintain high standards of privacy and efficiency despite the inherent non-determinism of federated environments.

6.5. Domain-specific applications

Machine unlearning techniques are employed in diverse scenarios, such as LLMs (Pawelczyk et al., 2023; Liu et al., 2024a; Si et al., 2023; Kumar et al., 2022), recommendation systems (Li et al., 2024; Chen et al., 2022a; Li et al., 2023b), and specific application scenarios such as health (Fraboni et al., 2023; ElBedoui, 2023; Zhong, 2024), IoT and blockchain (Yuan et al., 2024; Zuo et al., 2024; Wang et al., 2023e; Liu et al., 2024d; Lin et al., 2024c), HAR (Chen et al., 2024), and metaverse and digital twin (Wang et al., 2023d; Islam et al., 2024), to adhere to data privacy and compliance objectives for RTBF. In LLMs, unlearning helps ensure that sensitive or outdated information can be effectively removed, maintaining user privacy and data accuracy. For recommendation systems, unlearning allows for the deletion of user-specific data upon request, thereby enhancing user trust and compliance with privacy regulations. These techniques are also utilized in graph neural networks (GNNs) (Wu et al., 2023c; Chien et al., 2022; Chen et al., 2022b), addressing privacy concerns in GNNs (Wu et al., 2023b; Zhang et al., 2023d; Wu et al., 2022a) to ensure data accuracy and relevance, and knowledge graphs to erase specific knowledge (Liu and Fang, 2024). These applications demonstrate the versatility and critical role of machine unlearning in various technological domains. However, these domain-specific MU applications have yet to be extensively adapted to FU in federated settings. This gap underscores the potential for expanding the scope and applicability of FU strategies to these areas, encouraging further research into adapting these unlearning techniques for federated learning environments.

6.6. Fairness and explainability

Researching fairness and explainability in FU algorithms is essential, given the intricacies of ML and the distributed nature of FL. For instance, overlap** data among different FL clients is a common scenario. Unlearning data in such overlaps might fulfill the unlearning request from one client but could adversely affect the performance of other clients sharing that data. Furthermore, unlearning in FL introduces an extra layer of complexity, complicating the understanding of the model’s alterations and their impact on the system as a whole. Addressing these issues is crucial to ensure transparency, trustworthiness, and adherence to regulations. Bridging the knowledge gap in this research field is imperative for improved decision-making interpretation in distributed AI systems. This is especially vital in industries where the processes of learning and unlearning carry profound ethical and legal connotations. Additionally, unlearning can be utilized as a method to enhance fairness in federated learning (FL), which is often a challenge due to the Non-IID nature of the data across different clients. By selectively unlearning biased or unfair data contributions, the overall model can be adjusted to provide more equitable outcomes, addressing the inherent discrepancies that arise from Non-IID data distributions. Research in this field is promising as unlearning not only improves the fairness of the FL model but also ensures that the model’s performance is more consistent and reliable across diverse data sources.

6.7. Integration with MLaaS

A key future direction for FU lies in its integration with MLaaS. This involves addressing several critical challenges. First, the structure of unlearning requests needs to be carefully designed to meet the stringent privacy requirements of FL. Effective protocols must ensure that unlearning processes do not compromise client privacy. Second, the system must efficiently handle multiple unlearning requests. This includes develo** strategies to manage these requests in a scalable and responsive manner. Third, maintaining the quality of service (QoS) in MLaaS is essential, particularly regarding throughput and privacy guarantees. One challenge is that executing unlearning requests might necessitate halting inference services, impacting QoS. Conversely, not performing unlearning contravenes the RTBF regulation. Therefore, future research should focus on creating mechanisms that respect RTBF while minimizing service disruptions. This would enable MLaaS to deliver reliable, privacy-conscious, and high-performance machine learning services.

7. Conclusions

In conclusion, this survey has made remarkable contributions to the field of federated unlearning. We began by meticulously formalizing the targets and challenges of federated unlearning and introducing an innovative unified federated unlearning workflow. We then derived a novel taxonomy for existing federated unlearning methods, based on crucial factors such as who initiates the unlearning, what precisely needs to be unlearned, and how to effectively verify the unlearning results in federated settings. Furthermore, we thoroughly explored various optimizations tailored to federated learning and provided a critical examination of their limitations. Through these comprehensive efforts, we have gained profound insights into the current challenges in federated unlearning and have outlined promising research directions for the future. This survey stands as an invaluable and insightful resource for researchers and practitioners, significantly advancing the rapidly evolving field of federated unlearning.

References

  • (1)
  • Alam et al. (2023) Manaar Alam, Hithem Lamri, and Michail Maniatakos. 2023. Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning. arXiv preprint arXiv:2304.10638 (2023).
  • Bagdasaryan and Shmatikov (2021) Eugene Bagdasaryan and Vitaly Shmatikov. 2021. Blind backdoors in deep learning models. In 30th USENIX Security Symposium (USENIX Security 21). 1505–1521.
  • Bano et al. (2023) Hasin Bano, Muhammad Ameen, Muntazir Mehdi, Amaad Hussain, and Pengfei Wang. 2023. Federated Unlearning and Server Right to Forget: Handling Unreliable Client Contributions. In International Conference on Recent Trends in Image Processing and Pattern Recognition. Springer, 393–410.
  • Bell et al. (2020) James Henry Bell, Kallista A Bonawitz, Adrià Gascón, Tancrède Lepoint, and Mariana Raykova. 2020. Secure single-server aggregation with (poly) logarithmic overhead. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. 1253–1269.
  • Bonawitz et al. (2017) Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, and Karn Seth. 2017. Practical secure aggregation for privacy-preserving machine learning. In proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 1175–1191.
  • Bourtoule et al. (2021) Lucas Bourtoule, Varun Chandrasekaran, Christopher A Choquette-Choo, Hengrui Jia, Adelin Travers, Baiwu Zhang, David Lie, and Nicolas Papernot. 2021. Machine unlearning. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 141–159.
  • Cao et al. (2021) Xiaoyu Cao, Minghong Fang, Jia Liu, and Neil Zhenqiang Gong. 2021. FLTrust: Byzantine-robust Federated Learning via Trust Bootstrap**. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21-25, 2021.
  • Cao et al. (2023) Xiaoyu Cao, **yuan Jia, Zaixi Zhang, and Neil Zhenqiang Gong. 2023. Fedrecover: Recovering from poisoning attacks in federated learning using historical information. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE, 1366–1383.
  • Che et al. (2023) Tianshi Che, Yang Zhou, Zijie Zhang, Lingjuan Lyu, Ji Liu, Da Yan, De**g Dou, and Jun Huan. 2023. Fast Federated Machine Unlearning with Nonlinear Functional Theory. In International Conference on Machine Learning, ICML 2023, 23-29 July 2023, Honolulu, Hawaii, USA (Proceedings of Machine Learning Research, Vol. 202). PMLR, 4241–4268.
  • Chen et al. (2022a) Chong Chen, Fei Sun, Min Zhang, and Bolin Ding. 2022a. Recommendation unlearning. In Proceedings of the ACM Web Conference 2022. 2768–2777.
  • Chen et al. (2024) Kongyang Chen, Ya** Chai, Weibin Zhang, Shaowei Wang, Jiaxing Shen, et al. 2024. Federated Unlearning for Human Activity Recognition. arXiv preprint arXiv:2404.03659 (2024).
  • Chen et al. (2021) Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, and Yang Zhang. 2021. When machine unlearning jeopardizes privacy. In Proceedings of the 2021 ACM SIGSAC conference on computer and communications security. 896–911.
  • Chen et al. (2022b) Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, and Yang Zhang. 2022b. Graph unlearning. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 499–513.
  • Chien et al. (2022) Eli Chien, Chao Pan, and Olgica Milenkovic. 2022. Certified graph unlearning. arXiv preprint arXiv:2206.09140 (2022).
  • Cohen et al. (2019) Jeremy Cohen, Elan Rosenfeld, and Zico Kolter. 2019. Certified adversarial robustness via randomized smoothing. In international conference on machine learning. PMLR, 1310–1320.
  • Deng et al. (2023) Zihao Deng, Zhaoyang Han, Chuan Ma, Ming Ding, Long Yuan, Chunpeng Ge, and Zhe Liu. 2023. Vertical Federated Unlearning on the Logistic Regression Model. Electronics 12, 14 (2023), 3182.
  • Dhasade et al. (2023) Akash Dhasade, Yaohong Ding, Song Guo, Anne-marie Kermarrec, Martijn De Vos, and Leijie Wu. 2023. QuickDrop: Efficient Federated Unlearning by Integrated Dataset Distillation. arXiv preprint arXiv:2311.15603 (2023).
  • Di et al. (2022) Jimmy Z Di, Jack Douglas, Jayadev Acharya, Gautam Kamath, and Ayush Sekhari. 2022. Hidden poison: Machine unlearning enables camouflaged poisoning attacks. In NeurIPS ML Safety Workshop.
  • Ding et al. (2023) Ningning Ding, Zhenyu Sun, Ermin Wei, and Randall Berry. 2023. Incentive Mechanism Design for Federated Learning and Unlearning. In Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing. 11–20.
  • Ding et al. (2024) Ningning Ding, Ermin Wei, and Randall Berry. 2024. Strategic Data Revocation in Federated Unlearning. In IEEE INFOCOM 2024-IEEE Conference on Computer Communications. IEEE.
  • Dwork et al. (2014) Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9, 3-4 (2014), 211–407.
  • ElBedoui (2023) Khaoula ElBedoui. 2023. ECG Classifiction Based on Federated Unlearning. In 2023 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 1–5.
  • Fan et al. (2022) Jiamin Fan, Kui Wu, Yang Zhou, Zhengan Zhao, and Shengqiang Huang. 2022. Fast model update for iot traffic anomaly detection with machine unlearning. IEEE Internet of Things Journal (2022).
  • Fraboni et al. (2023) Yann Fraboni, Lucia Innocenti, Michela Antonelli, Richard Vidal, Laetitia Kameni, Sebastien Ourselin, and Marco Lorenzi. 2023. Validation of Federated Unlearning on Collaborative Prostate Segmentation. In International Conference on Medical Image Computing and Computer-Assisted Intervention. Springer, 322–333.
  • Fraboni et al. (2022) Yann Fraboni, Richard Vidal, Laetitia Kameni, and Marco Lorenzi. 2022. Sequential Informed Federated Unlearning: Efficient and Provable Client Unlearning in Federated Optimization. arXiv preprint arXiv:2211.11656 (2022).
  • Fu et al. (2024) Chaohao Fu, Weijia Jia, and Na Ruan. 2024. Client-Free Federated Unlearning via Training Reconstruction with Anchor Subspace Calibration. In ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 9281–9285.
  • Gao et al. (2022a) Ji Gao, Sanjam Garg, Mohammad Mahmoody, and Prashant Nalini Vasudevan. 2022a. Deletion inference, reconstruction, and compliance in machine (un) learning. arXiv preprint arXiv:2202.03460 (2022).
  • Gao et al. (2022b) Xiangshan Gao, Xingjun Ma, **gyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng, and Jiming Chen. 2022b. Verifi: Towards verifiable federated unlearning. arXiv preprint arXiv:2205.12709 (2022).
  • Gentry (2009) Craig Gentry. 2009. Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing. 169–178.
  • Ginart et al. (2019) Antonio Ginart, Melody Guan, Gregory Valiant, and James Y Zou. 2019. Making ai forget you: Data deletion in machine learning. Advances in neural information processing systems 32 (2019).
  • Golatkar et al. (2020) Aditya Golatkar, Alessandro Achille, and Stefano Soatto. 2020. Forgetting outside the box: Scrubbing deep networks of information accessible from input-output observations. In Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part XXIX 16. Springer, 383–398.
  • Goldman (2020) Eric Goldman. 2020. An introduction to the california consumer privacy act (ccpa). Santa Clara Univ. Legal Studies Research Paper (2020).
  • Gong (2023) **u Gong. 2023. Bayesian learning and unlearning in distributed wireless network. (2023).
  • Gong et al. (2022a) **u Gong, Joonhyuk Kang, Osvaldo Simeone, and Rahif Kassab. 2022a. Forget-svgd: Particle-based bayesian federated unlearning. In 2022 IEEE Data Science and Learning Workshop (DSLW). IEEE, 1–6.
  • Gong et al. (2021) **u Gong, Osvaldo Simeone, and Joonhyuk Kang. 2021. Bayesian variational federated learning and unlearning in decentralized networks. In 2021 IEEE 22nd International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE, 216–220.
  • Gong et al. (2022b) **u Gong, Osvaldo Simeone, and Joonhyuk Kang. 2022b. Compressed particle-based federated bayesian learning and unlearning. IEEE Communications Letters 27, 2 (2022), 556–560.
  • Gu et al. (2024a) Hanlin Gu, WinKent Ong, Chee Seng Chan, and Lixin Fan. 2024a. Ferrari: Federated Feature Unlearning via Optimizing Feature Sensitivity. arXiv preprint arXiv:2405.17462 (2024).
  • Gu et al. (2024b) Hanlin Gu, Gongxi Zhu, Jie Zhang, Xinyuan Zhao, Yuxing Han, Lixin Fan, and Qiang Yang. 2024b. Unlearning during Learning: An Efficient Federated Machine Unlearning Method. In 33nd International Joint Conference on Artificial Intelligence (IJCAI 2024).
  • Gu et al. (2017) Tianyu Gu, Brendan Dolan-Gavitt, and Siddharth Garg. 2017. Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733 (2017).
  • Guo et al. (2021) Jiale Guo, Ziyao Liu, Kwok-Yan Lam, Jun Zhao, and Yiqiang Chen. 2021. Privacy-enhanced federated learning with weighted aggregation. In Security and Privacy in Social Networks and Big Data: 7th International Symposium, SocialSec 2021, Fuzhou, China, November 19–21, 2021, Proceedings 7. Springer, 93–109.
  • Guo et al. (2023) Xintong Guo, Pengfei Wang, Sen Qiu, Wei Song, Qiang Zhang, Xiaopeng Wei, and Dongsheng Zhou. 2023. FAST: Adopting Federated Unlearning to Eliminating Malicious Terminals at Server Side. IEEE Transactions on Network Science and Engineering (2023).
  • Halimi et al. (2022) Anisa Halimi, Swanand Ravindra Kadhe, Ambrish Rawat, and Nathalie Baracaldo Angel. 2022. Federated Unlearning: How to Efficiently Erase a Client in FL?. In International Conference on Machine Learning.
  • Han et al. (2024) Ling Han, Nanqing Luo, Hao Huang, **g Chen, and Mary-Anne Hartley. 2024. Towards Independence Criterion in Machine Unlearning of Features and Labels. arXiv preprint arXiv:2403.08124 (2024).
  • Hu et al. (2023b) Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Hao** Zhu, and Minhui Xue. 2023b. A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. arXiv preprint arXiv:2309.08230 (2023).
  • Hu et al. (2024a) Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Hao** Zhu, and Minhui Xue. 2024a. A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. In NDSS.
  • Hu et al. (2024b) Hongsheng Hu, Shuo Wang, Tian Dong, and Minhui Xue. 2024b. Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning. In 2024 IEEE Symposium on Security and Privacy (SP).
  • Hu et al. (2023a) Yuke Hu, Jian Lou, Jiaqi Liu, Feng Lin, Zhan Qin, and Kui Ren. 2023a. ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach. arXiv preprint arXiv:2311.16136 (2023).
  • Huang et al. (2022) Yangsibo Huang, Chun-Yin Huang, Xiaoxiao Li, and Kai Li. 2022. A Dataset Auditing Method for Collaboratively Trained Machine Learning Models. IEEE Transactions on Medical Imaging (2022).
  • Huang et al. (2023) Yu** Huang, Terry Yue Zhuo, Qiongkai Xu, Han Hu, Xingliang Yuan, and Chunyang Chen. 2023. Training-free Lexical Backdoor Attacks on Language Models. In Proceedings of the ACM Web Conference 2023. 2198–2208.
  • Huynh et al. (2024) Thanh Trung Huynh, Trong Bang Nguyen, Phi Le Nguyen, Thanh Tam Nguyen, Matthias Weidlich, Quoc Viet Hung Nguyen, and Karl Aberer. 2024. Fast-FedUL: A Training-Free Federated Unlearning with Provable Skew Resilience. arXiv preprint arXiv:2405.18040 (2024).
  • Islam et al. (2024) Anik Islam, Hadis Karimipour, Thippa Reddy Gadekallu, and Yaodong Zhu. 2024. A Federated Unlearning-Based Secure Management Scheme to Enable Automation in Smart Consumer Electronics Facilitated by Digital Twin. IEEE Transactions on Consumer Electronics (2024).
  • Iwase (2019) Hitomi Iwase. 2019. Overview of the Act on the Protection of Personal Information. Eur. Data Prot. L. Rev. 5 (2019), 92.
  • Jebreel and Domingo-Ferrer (2023) Najeeb Moharram Jebreel and Josep Domingo-Ferrer. 2023. FL-Defender: Combating targeted attacks in federated learning. Knowledge-Based Systems 260 (2023), 110178.
  • Jeong et al. (2024) Hyejun Jeong, Shiqing Ma, and Amir Houmansadr. 2024. SoK: Challenges and Opportunities in Federated Unlearning. arXiv preprint arXiv:2403.02437 (2024).
  • Jiang et al. (2024) Yu Jiang, Jiyuan Shen, Ziyao Liu, Chee Wei Tan, and Kwok-Yan Lam. 2024. Towards Efficient and Certified Recovery from Poisoning Attacks in Federated Learning. arXiv preprint arXiv:2401.08216 (2024).
  • ** et al. (2023) Ruinan **, Minghui Chen, Qiong Zhang, and Xiaoxiao Li. 2023. Forgettable Federated Linear Learning with Certified Data Removal. arXiv preprint arXiv:2306.02216 (2023).
  • Kairouz et al. (2021) Peter Kairouz, H Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, et al. 2021. Advances and open problems in federated learning. Foundations and Trends® in Machine Learning (2021).
  • Kumar et al. (2022) Vinayshekhar Bannihatti Kumar, Rashmi Gangadharaiah, and Dan Roth. 2022. Privacy adhering machine un-learning in nlp. arXiv preprint arXiv:2212.09573 (2022).
  • Li et al. (2023d) Guanghao Li, Li Shen, Yan Sun, Yue Hu, Han Hu, and Dacheng Tao. 2023d. Subspace based Federated Unlearning. arXiv preprint arXiv:2302.12448 (2023).
  • Li et al. (2020a) Suyi Li, Yong Cheng, Wei Wang, Yang Liu, and Tianjian Chen. 2020a. Learning to detect malicious clients for robust federated learning. arXiv preprint arXiv:2002.00211 (2020).
  • Li et al. (2021) Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Hao** Zhu, and Jialiang Lu. 2021. Hidden backdoors in human-centric language models. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 3123–3140.
  • Li et al. (2020b) Shaofeng Li, Minhui Xue, Benjamin Zi Hao Zhao, Hao** Zhu, and Xinpeng Zhang. 2020b. Invisible backdoor attacks on deep neural networks via steganography and regularization. IEEE Transactions on Dependable and Secure Computing 18, 5 (2020), 2088–2105.
  • Li et al. (2024) Yuyuan Li, Chaochao Chen, Xiaolin Zheng, Junlin Liu, and Jun Wang. 2024. Making recommender systems forget: Learning and unlearning for erasable recommendation. Knowledge-Based Systems 283 (2024), 111124.
  • Li et al. (2023a) Yuyuan Li, Chaochao Chen, Xiaolin Zheng, and Jiaming Zhang. 2023a. Federated Unlearning via Active Forgetting. arXiv preprint arXiv:2307.03363 (2023).
  • Li et al. (2023b) Yuyuan Li, Chaochao Chen, Xiaolin Zheng, Yizhao Zhang, Biao Gong, Jun Wang, and Linxun Chen. 2023b. Selective and collaborative influence function for efficient recommendation unlearning. Expert Systems with Applications 234 (2023), 121025.
  • Li et al. (2022) Yiming Li, Yong Jiang, Zhifeng Li, and Shu-Tao Xia. 2022. Backdoor learning: A survey. IEEE Transactions on Neural Networks and Learning Systems (2022).
  • Li et al. (2023c) Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Yifeng Zheng, Said F Al-Sarawi, and Derek Abbott. 2023c. Ntd: Non-transferability enabled deep learning backdoor detection. IEEE Transactions on Information Forensics and Security (2023).
  • Lin et al. (2024a) Yi**g Lin, Zhipeng Gao, Hongyang Du, Dusit Niyato, Gui Gui, Shuguang Cui, and **ke Ren. 2024a. Scalable Federated Unlearning via Isolated and Coded Sharding. arXiv preprint arXiv:2401.15957 (2024).
  • Lin et al. (2024b) Yi**g Lin, Zhipeng Gao, Hongyang Du, Dusit Niyato, Jiawen Kang, and Xiaoyuan Liu. 2024b. Incentive and Dynamic Client Selection for Federated Unlearning. In Proceedings of the ACM on Web Conference 2024. 2936–2944.
  • Lin et al. (2024c) Yi**g Lin, Zhipeng Gao, Hongyang Du, **ke Ren, Zhiqiang Xie, and Dusit Niyato. 2024c. Blockchain-enabled Trustworthy Federated Unlearning. arXiv preprint arXiv:2401.15917 (2024).
  • Liu and Fang (2024) Bingchen Liu and Yuanyuan Fang. 2024. Federated Knowledge Graph Unlearning via Diffusion Model. arXiv preprint arXiv:2403.08554 (2024).
  • Liu et al. (2021b) Gaoyang Liu, Xiaoqiang Ma, Yang Yang, Chen Wang, and Jiangchuan Liu. 2021b. Federaser: Enabling efficient client-level data removal from federated learning models. In 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS). IEEE, 1–10.
  • Liu et al. (2024d) ** Liu. 2024d. Decentralized Federated Unlearning on Blockchain. arXiv preprint arXiv:2402.16294 (2024).
  • Liu et al. (2018) Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, and Xiangyu Zhang. 2018. Trojaning attack on neural networks. In 25th Annual Network And Distributed System Security Symposium (NDSS 2018). Internet Soc.
  • Liu et al. ([n. d.]) Yang Liu, Zhuo Ma, Ximeng Liu, and Jianfeng Ma. [n. d.]. Learn to forget: User-level memorization elimination in federated learning. ([n. d.]).
  • Liu et al. (2021a) Yang Liu, Zhuo Ma, Yilong Yang, Ximeng Liu, Jianfeng Ma, and Kui Ren. 2021a. Revfrf: Enabling cross-domain random forest training with revocable federated learning. IEEE Transactions on Dependable and Secure Computing 19, 6 (2021), 3671–3685.
  • Liu et al. (2022c) Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, and Bo Li. 2022c. The right to be forgotten in federated learning: An efficient realization with rapid retraining. In IEEE INFOCOM 2022-IEEE Conference on Computer Communications. IEEE, 1749–1758.
  • Liu et al. (2020) Yi Liu, Xingliang Yuan, Ruihui Zhao, Cong Wang, Dusit Niyato, and Yefeng Zheng. 2020. Poisoning Semi-supervised Federated Learning via Unlabeled Data: Attacks and Defenses. arXiv preprint arXiv:2012.04432 (2020).
  • Liu et al. (2024a) Zheyuan Liu, Guangyao Dou, Zhaoxuan Tan, Yijun Tian, and Meng Jiang. 2024a. Towards Safer Large Language Models through Machine Unlearning. In Findings of the Association for Computational Linguistics: ACL 2024.
  • Liu et al. (2023a) Zheyuan Liu, Guangyao Dou, Yijun Tian, Chunhui Zhang, Eli Chien, and Ziwei Zhu. 2023a. Breaking the trilemma of privacy, utility, efficiency via controllable machine unlearning. arXiv preprint arXiv:2310.18574 (2023).
  • Liu et al. (2022a) Ziyao Liu, Jiale Guo, Kwok-Yan Lam, and Jun Zhao. 2022a. Efficient dropout-resilient aggregation for privacy-preserving machine learning. IEEE Transactions on Information Forensics and Security 18 (2022), 1839–1854.
  • Liu et al. (2022b) Ziyao Liu, Jiale Guo, Wenzhuo Yang, Jiani Fan, Kwok-Yan Lam, and Jun Zhao. 2022b. Privacy-preserving aggregation in federated learning: A survey. IEEE Transactions on Big Data (2022).
  • Liu et al. (2024b) Ziyao Liu, Jiale Guo, Wenzhuo Yang, Jiani Fan, Kwok-Yan Lam, and Jun Zhao. 2024b. Dynamic User Clustering for Efficient and Privacy-Preserving Federated Learning. IEEE Transactions on Dependable and Secure Computing (2024).
  • Liu et al. (2024c) Ziyao Liu, Yu Jiang, Weifeng Jiang, Jiale Guo, Jun Zhao, and Kwok-Yan Lam. 2024c. Guaranteeing Data Privacy in Federated Unlearning with Dynamic User Participation. arXiv preprint arXiv:2406.00966 (2024).
  • Liu et al. (2023b) Ziyao Liu, Hsiao-Ying Lin, and Yamin Liu. 2023b. Long-Term Privacy-Preserving Aggregation With User-Dynamics for Federated Learning. IEEE Transactions on Information Forensics and Security (2023).
  • Liu et al. (2024e) Zihao Liu, Tianhao Wang, Mengdi Huai, and Chenglin Miao. 2024e. Backdoor Attacks via Machine Unlearning. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 38. 14115–14123.
  • Liu et al. (2024f) Ziyao Liu, Huanyi Ye, Chen Chen, and Kwok-Yan Lam. 2024f. Threats, Attacks, and Defenses in Machine Unlearning: A Survey. arXiv preprint arXiv:2403.13682 (2024).
  • Liu et al. (2024g) Ziyao Liu, Huanyi Ye, Yu Jiang, Jiyuan Shen, Jiale Guo, Ivan Tjuawinata, and Kwok-Yan Lam. 2024g. Privacy-Preserving Federated Unlearning with Certified Client Removal. arXiv preprint arXiv:2404.09724 (2024).
  • Lu et al. (2022) Zhaobo Lu, Hai Liang, Minghao Zhao, Qingzhe Lv, Tiancai Liang, and Yilei Wang. 2022. Label-only membership inference attacks on machine unlearning without dependence of posteriors. International Journal of Intelligent Systems 37, 11 (2022), 9424–9441.
  • Lyu et al. (2020) Lingjuan Lyu, Han Yu, and Qiang Yang. 2020. Threats to federated learning: A survey. arXiv preprint arXiv:2003.02133 (2020).
  • Ma et al. (2023) Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Jiliang Zhang, Said F Al-Sarawi, and Derek Abbott. 2023. Quantization backdoors to deep learning commercial frameworks. IEEE Transactions on Dependable and Secure Computing (2023).
  • Ma et al. (2022) Zhuo Ma, Yang Liu, Ximeng Liu, Jian Liu, Jianfeng Ma, and Kui Ren. 2022. Learn to forget: Machine unlearning via neuron masking. IEEE Transactions on Dependable and Secure Computing (2022).
  • McMahan et al. (2017) Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR, 1273–1282.
  • Meerza et al. (2024) Syed Irfan Ali Meerza, Amir Sadovnik, and Jian Liu. 2024. CONFUSE: Confusion-based Federated Unlearning with Salience Exploration. (2024).
  • Nguyen et al. (2024) Thai-Hung Nguyen, Hong-Phuc Vu, Dung Thuy Nguyen, Tuan Minh Nguyen, Khoa D Doan, and Kok-Seng Wong. 2024. Empirical Study of Federated Unlearning: Efficiency and Effectiveness. In Asian Conference on Machine Learning. PMLR, 959–974.
  • Nguyen et al. (2022) Thanh Tam Nguyen, Thanh Trung Huynh, Phi Le Nguyen, Alan Wee-Chung Liew, Hongzhi Yin, and Quoc Viet Hung Nguyen. 2022. A survey of machine unlearning. arXiv preprint arXiv:2209.02299 (2022).
  • Nocedal (1980) Jorge Nocedal. 1980. Updating quasi-Newton matrices with limited storage. Mathematics of computation 35, 151 (1980), 773–782.
  • Pan et al. (2022) Chao Pan, ** Sima, Saurav Prakash, Vishal Rana, and Olgica Milenkovic. 2022. Machine Unlearning of Federated Clusters. In The Eleventh International Conference on Learning Representations.
  • Pawelczyk et al. (2023) Martin Pawelczyk, Seth Neel, and Himabindu Lakkaraju. 2023. In-context unlearning: Language models as few shot unlearners. arXiv preprint arXiv:2310.07579 (2023).
  • Qian et al. (2023) Wei Qian, Chenxu Zhao, Wei Le, Meiyi Ma, and Mengdi Huai. 2023. Towards understanding and enhancing robustness of deep learning models against malicious unlearning attacks. In Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 1932–1942.
  • Qiu et al. (2023) Hongyu Qiu, Yongwei Wang, Yonghui Xu, Lizhen Cui, and Zhiqi Shen. 2023. FedCIO: Efficient Exact Federated Unlearning with Clustering, Isolation, and One-shot Aggregation. In 2023 IEEE International Conference on Big Data (BigData). IEEE, 5559–5568.
  • Qu et al. (2023) Youyang Qu, Xin Yuan, Ming Ding, Wei Ni, Thierry Rakotoarivelo, and David Smith. 2023. Learn to Unlearn: A Survey on Machine Unlearning. arXiv preprint arXiv:2305.07512 (2023).
  • Regulation (2018) General Data Protection Regulation. 2018. General data protection regulation (GDPR). Intersoft Consulting, Accessed in October 24, 1 (2018).
  • Romandini et al. (2024) Nicolò Romandini, Alessio Mora, Carlo Mazzocca, Rebecca Montanari, and Paolo Bellavista. 2024. Federated Unlearning: A Survey on Methods, Design Guidelines, and Evaluation Metrics. arXiv preprint arXiv:2401.05146 (2024).
  • Saha et al. (2020) Aniruddha Saha, Akshayvarun Subramanya, and Hamed Pirsiavash. 2020. Hidden trigger backdoor attacks. In Proceedings of the AAAI conference on artificial intelligence, Vol. 34. 11957–11965.
  • Shaik et al. (2023a) Thanveer Shaik, Xiaohui Tao, Lin Li, Haoran Xie, Taotao Cai, Xiaofeng Zhu, and Qing Li. 2023a. FRAMU: Attention-based Machine Unlearning using Federated Reinforcement Learning. arXiv preprint arXiv:2309.10283 (2023).
  • Shaik et al. (2023b) Thanveer Shaik, Xiaohui Tao, Haoran Xie, Lin Li, Xiaofeng Zhu, and Qing Li. 2023b. Exploring the Landscape of Machine Unlearning: A Survey and Taxonomy. arXiv preprint arXiv:2305.06360 (2023).
  • Shao et al. (2024) Jiaqi Shao, Tao Lin, Xuanyu Cao, and Bing Luo. 2024. Federated Unlearning: a Perspective of Stability and Fairness. arXiv preprint arXiv:2402.01276 (2024).
  • Shejwalkar et al. (2022) Virat Shejwalkar, Amir Houmansadr, Peter Kairouz, and Daniel Ramage. 2022. Back to the drawing board: A critical evaluation of poisoning attacks on production federated learning. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1354–1371.
  • Shen et al. (2016) Shiqi Shen, Shruti Tople, and Prateek Saxena. 2016. Auror: Defending against poisoning attacks in collaborative deep learning systems. In Proceedings of the 32nd Annual Conference on Computer Security Applications. 508–519.
  • Shokri et al. (2017) Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership inference attacks against machine learning models. In 2017 IEEE symposium on security and privacy (SP). IEEE, 3–18.
  • Si et al. (2023) Nianwen Si, Hao Zhang, Heyu Chang, Wenlin Zhang, Dan Qu, and Weiqiang Zhang. 2023. Knowledge Unlearning for LLMs: Tasks, Methods, and Challenges. arXiv preprint arXiv:2311.15766 (2023).
  • Su and Li (2023) Ningxin Su and Baochun Li. 2023. Asynchronous Federated Unlearning. In IEEE INFOCOM 2023-IEEE Conference on Computer Communications. IEEE, 1–10.
  • Tao et al. (2024) Youming Tao, Cheng-Long Wang, Miao Pan, Dongxiao Yu, Xiuzhen Cheng, and Di Wang. 2024. Communication Efficient and Provable Federated Unlearning. Proc. VLDB Endow. 17, 5 (2024), 1119–1131.
  • Wang et al. (2023b) Fei Wang, Baochun Li, and Bo Li. 2023b. Federated Unlearning and Its Privacy Threats. IEEE Network (2023).
  • Wang et al. (2024e) Houzhe Wang, Xiaojie Zhu, Chi Chen, and Paulo Esteves-Veríssimo. 2024e. Goldfish: An Efficient Federated Unlearning Framework. arXiv preprint arXiv:2404.03180 (2024).
  • Wang et al. (2022) Junxiao Wang, Song Guo, Xin Xie, and Heng Qi. 2022. Federated unlearning via class-discriminative pruning. In Proceedings of the ACM Web Conference 2022. 622–632.
  • Wang et al. (2024c) Pengfei Wang, Wei Song, Heng Qi, Changjun Zhou, Fuliang Li, Yong Wang, Peng Sun, and Qiang Zhang. 2024c. Server-Initiated Federated Unlearning to Eliminate Impacts of Low-Quality Data. IEEE Transactions on Services Computing 01 (2024), 1–15.
  • Wang et al. (2023d) Pengfei Wang, Zongzheng Wei, Heng Qi, Shaohua Wan, Yunming Xiao, Geng Sun, and Qiang Zhang. 2023d. Mitigating Poor Data Quality Impact with Federated Unlearning for Human-Centric Metaverse. IEEE Journal on Selected Areas in Communications (2023).
  • Wang et al. (2023e) Pengfei Wang, Zhaohong Yan, Mohammad S Obaidat, Zhiwei Yuan, Leyou Yang, Junxiang Zhang, Zongzheng Wei, and Qiang Zhang. 2023e. Edge Caching with Federated Unlearning for Low-latency V2X Communications. IEEE Communications Magazine (2023).
  • Wang et al. (2024b) Shuyi Wang, Bing Liu, and Guido Zuccon. 2024b. How to Forget Clients in Federated Online Learning to Rank?. In European Conference on Information Retrieval. Springer, 105–121.
  • Wang et al. (2024d) Weiqi Wang, Zhiyi Tian, and Shui Yu. 2024d. Machine Unlearning: A Comprehensive Survey. arXiv preprint arXiv:2405.07406 (2024).
  • Wang et al. (2023c) Weiqi Wang, Zhiyi Tian, Chenhan Zhang, An Liu, and Shui Yu. 2023c. BFU: Bayesian Federated Unlearning with Parameter Self-Sharing. In Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security. 567–578.
  • Wang et al. (2023f) Weiqi Wang, Chenhan Zhang, Zhiyi Tian, and Shui Yu. 2023f. Machine Unlearning via Representation Forgetting With Parameter Self-Sharing. IEEE Transactions on Information Forensics and Security (2023).
  • Wang et al. (2023a) Zhen Wang, Daniyal M Alghazzawi, Li Cheng, Gaoyang Liu, Chen Wang, Zeng Cheng, and Yang Yang. 2023a. FedCSA: Boosting the Convergence Speed of Federated Unlearning under Data Heterogeneity. In 2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom). IEEE, 388–393.
  • Wang et al. (2024a) Zichen Wang, Xiangshan Gao, Cong Wang, Peng Cheng, and Jiming Chen. 2024a. Efficient Vertical Federated Unlearning via Fast Retraining. ACM Transactions on Internet Technology 24, 2 (2024), 1–22.
  • Wu et al. (2022a) Bang Wu, Xiangwen Yang, Shirui Pan, and Xingliang Yuan. 2022a. Model extraction attacks on graph neural networks: Taxonomy and realisation. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. 337–350.
  • Wu et al. (2023b) Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, and Shirui Pan. 2023b. Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. arXiv preprint arXiv:2312.07870 (2023).
  • Wu et al. (2023c) Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, and Xingliang Yuan. 2023c. GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks. arXiv preprint arXiv:2312.07861 (2023).
  • Wu et al. (2022b) Chen Wu, Sencun Zhu, and Prasenjit Mitra. 2022b. Federated unlearning with knowledge distillation. arXiv preprint arXiv:2201.09441 (2022).
  • Wu et al. (2023d) Chen Wu, Sencun Zhu, and Prasenjit Mitra. 2023d. Unlearning Backdoor Attacks in Federated Learning. In ICLR 2023 Workshop on Backdoor Attacks and Defenses in Machine Learning.
  • Wu et al. (2023a) Leijie Wu, Song Guo, Junxiao Wang, Zicong Hong, Jie Zhang, and **gren Zhou. 2023a. On Knowledge Editing in Federated Learning: Perspectives, Challenges, and Future Directions. arXiv preprint arXiv:2306.01431 (2023).
  • Wu et al. (2024) Nan Wu, Xin Yuan, Shuo Wang, Hongsheng Hu, and Minhui Xue. 2024. Cardinality Counting in” Alcatraz”: A Privacy-aware Federated Learning Approach. In Proceedings of the ACM on Web Conference 2024. 3076–3084.
  • Xia et al. (2023) Hui Xia, Shuo Xu, Jiaming Pei, Rui Zhang, Zhi Yu, Weitao Zou, Lukun Wang, and Chao Liu. 2023. FedME 2: Memory Evaluation & Erase Promoting Federated Unlearning in DTMN. IEEE Journal on Selected Areas in Communications (2023).
  • Xiong et al. (2024) Zuobin Xiong, Wei Li, and Zhipeng Cai. 2024. Appro-Fun: Approximate Machine Unlearning in Federated Setting. (2024).
  • Xiong et al. ([n. d.]) Zuobin Xiong, Wei Li, Yingshu Li, and Zhipeng Cai. [n. d.]. Exact-Fun: An Exact and Efficient Federated Unlearning Approach. ([n. d.]).
  • Xu et al. (2023c) Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, and Philip S Yu. 2023c. Machine unlearning: A survey. Comput. Surveys 56, 1 (2023), 1–36.
  • Xu et al. (2023b) Jie Xu, Zihan Wu, Cong Wang, and Xiaohua Jia. 2023b. Machine Unlearning: Solutions and Challenges. arXiv preprint arXiv:2308.07061 (2023).
  • Xu et al. (2023a) Rui-Zhen Xu, Sheng-Yi Hong, Po-Wen Chi, and Ming-Hung Wang. 2023a. A Revocation Key-based Approach Towards Efficient Federated Unlearning. In 2023 18th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 17–24.
  • Yang and Zhao (2023) Jiaxi Yang and Yang Zhao. 2023. A Survey of Federated Unlearning: A Taxonomy, Challenges and Future Directions. arXiv preprint arXiv:2310.19218 (2023).
  • Yang et al. (2019) Qiang Yang, Yang Liu, Tianjian Chen, and Yongxin Tong. 2019. Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST) 10, 2 (2019), 1–19.
  • Yao (1982) Andrew C Yao. 1982. Protocols for secure computations. In 23rd annual symposium on foundations of computer science (sfcs 1982). IEEE, 160–164.
  • Ye et al. (2023) Guanhua Ye, Quoc Viet Hung Nguyen, and Hongzhi Yin. 2023. Heterogeneous Decentralized Machine Unlearning with Seed Model Distillation. arXiv preprint arXiv:2308.13269 (2023).
  • Yuan et al. (2023) Wei Yuan, Hongzhi Yin, Fangzhao Wu, Shijie Zhang, Tieke He, and Hao Wang. 2023. Federated unlearning for on-device recommendation. In Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining. 393–401.
  • Yuan et al. (2024) Yanli Yuan, BingBing Wang, Chuan Zhang, Zehui Xiong, Chunhai Li, and Liehuang Zhu. 2024. Towards Efficient and Robust Federated Unlearning in IoT Networks. IEEE Internet of Things Journal (2024).
  • Zhang et al. (2023d) He Zhang, Bang Wu, Shuo Wang, Xiangwen Yang, Minhui Xue, Shirui Pan, and Xingliang Yuan. 2023d. Demystifying uneven vulnerability of link stealing attacks against graph neural networks. In International Conference on Machine Learning. PMLR, 41737–41752.
  • Zhang et al. (2023b) Jian Zhang, Bowen Li Jie Li, and Chentao Wu. 2023b. SecureCut: Federated Gradient Boosting Decision Trees with Efficient Machine Unlearning. arXiv preprint arXiv:2311.13174 (2023).
  • Zhang et al. (2023e) Lefeng Zhang, Tianqing Zhu, Haibin Zhang, ** Xiong, and Wanlei Zhou. 2023e. FedRecovery: Differentially Private Machine Unlearning for Federated Learning Frameworks. IEEE Transactions on Information Forensics and Security (2023).
  • Zhang et al. (2023c) Xinyu Zhang, Qingyu Liu, Zhongjie Ba, Yuan Hong, Tianhang Zheng, Feng Lin, Li Lu, and Kui Ren. 2023c. FLTracer: Accurate Poisoning Attack Provenance in Federated Learning. arXiv preprint arXiv:2310.13424 (2023).
  • Zhang et al. (2023a) Yanjun Zhang, Guangdong Bai, Mahawaga Arachchige Pathum Chamikara, Mengyao Ma, Liyue Shen, **gwei Wang, Surya Nepal, Minhui Xue, Long Wang, and Joseph Liu. 2023a. AgrEvader: Poisoning membership inference against Byzantine-robust federated learning. In Proceedings of the ACM Web Conference 2023. 2371–2382.
  • Zhang et al. (2022a) Zaixi Zhang, Xiaoyu Cao, **yuan Jia, and Neil Zhenqiang Gong. 2022a. FLDetector: Defending federated learning against model poisoning attacks via detecting malicious clients. In Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 2545–2555.
  • Zhang et al. (2022b) Zijie Zhang, Yang Zhou, Xin Zhao, Tianshi Che, and Lingjuan Lyu. 2022b. Prompt certified machine unlearning with randomized gradient smoothing and quantization. Advances in Neural Information Processing Systems 35 (2022), 13433–13455.
  • Zhao et al. (2024) Chenxu Zhao, Wei Qian, Rex Ying, and Mengdi Huai. 2024. Static and Sequential Malicious Attacks in the Context of Selective Forgetting. Advances in Neural Information Processing Systems 36 (2024).
  • Zhao et al. (2023) Yian Zhao, Pengfei Wang, Heng Qi, Jianguo Huang, Zongzheng Wei, and Qiang Zhang. 2023. Federated unlearning with momentum degradation. IEEE Internet of Things Journal (2023).
  • Zheng et al. (2022) Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, and Cong Wang. 2022. Aggregation service for federated learning: An efficient, secure, and more resilient realization. IEEE Transactions on Dependable and Secure Computing 20, 2 (2022), 988–1001.
  • Zhong (2024) Yuyao Zhong. 2024. Federated unlearning for medical image analysis. In Fourth Symposium on Pattern Recognition and Applications (SPRA 2023), Vol. 13162. SPIE, 36–43.
  • Zhu et al. (2019) Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep leakage from gradients. Advances in Neural Information Processing Systems 32 (2019).
  • Zhu et al. (2023) Xiangrong Zhu, Guangyao Li, and Wei Hu. 2023. Heterogeneous federated knowledge graph embedding learning and unlearning. In Proceedings of the ACM Web Conference 2023. 2444–2454.
  • Zuo et al. (2024) Xuhan Zuo, Minghao Wang, Tianqing Zhu, Lefeng Zhang, Shui Yu, and Wanlei Zhou. 2024. Federated Learning with Blockchain-Enhanced Machine Unlearning: A Trustworthy Approach. arXiv preprint arXiv:2405.20776 (2024).