Skip to content

abbottyanginchina/Awesome-Federated-Unlearning

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

39 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

A Survey of Federated Unlearning: A Taxonomy, Challenges and Future Directions

Awesome Contrib

📖 This project is related to our survey paper: A Survey of Federated Unlearning: A Taxonomy, Challenges and Future Directions

📧 Feel free to contact us if you come across any errors. We greatly appreciate any suggestions or new papers of FU to enhance our work, so please don't hesitate to send me (Jiaxi Yang) email at abbottyanginchina@gmail.com or my partner Yang Zhao at s180049@e.ntu.edu.sg.

News

  • Our open source code library of FU named OpenFederatedUnlearning is coming !!!

Citation

If you find this project useful for your research, please use the following BibTeX entry.

@article{yang2023survey,
  title={A Survey of Federated Unlearning: A Taxonomy, Challenges and Future Directions},
  author={Zhao, Yang, Yang, Jiaxi, Yiling Tao, Lixu Wang, Xiaoxiao Li and Dusit Niyato},
  journal={arXiv preprint arXiv:2310.19218},
  year={2023}
}

Table of Contents

Overview

Federated Unlearning (FU) addresses a federated learning scenario where clients collaborate to train and maintain a global model using a federated learning server. However, there may be situations which the target clients ask the aggregation server in federated learning to remove specific privacy-sensitive or illegal data contributions from the global model to safeguard privacy or mitigate legal risks. In response, the aggregation server should transform the model into an updated version that operates as if the erased data never took part in federated learning training. The framework of federated unlearning can be divided into three categories: Class-level FU, Sample-level FU, and Client-level FU.

Paper Structure

Taxonomy of Federated Unlearning

We outline the taxonomy for federated unlearning.

Paper List of Federated Unlearning

Privacy (P1)

Security (P2)

Utility (P3)

Computation Efficiency (P4)

Storage Efficiency (P5)

Communication Efficiency (P6)

Incentive Mechanism (P7)

Applications