{"id":"https://openalex.org/W3192006367","doi":"https://doi.org/10.1109/tdsc.2021.3101280","title":"On the Security of the K Minimum Values (KMV) Sketch","display_name":"On the Security of the K Minimum Values (KMV) Sketch","publication_year":2021,"publication_date":"2021-08-02","ids":{"openalex":"https://openalex.org/W3192006367","doi":"https://doi.org/10.1109/tdsc.2021.3101280","mag":"3192006367"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2021.3101280","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3101280","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://e-archivo.uc3m.es/bitstreams/a854af5f-911d-47fd-a951-2bb6e8cf49ef/download","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080322790","display_name":"Pedro Reviriego","orcid":"https://orcid.org/0000-0003-2540-5234"},"institutions":[{"id":"https://openalex.org/I50357001","display_name":"Universidad Carlos III de Madrid","ror":"https://ror.org/03ths8210","country_code":"ES","type":"education","lineage":["https://openalex.org/I50357001"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Pedro Reviriego","raw_affiliation_strings":["Universidad Carlos III de Madrid, Legan&#x00E9;s, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"Universidad Carlos III de Madrid, Legan&#x00E9;s, Madrid, Spain","institution_ids":["https://openalex.org/I50357001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078857723","display_name":"Alfonso S\u00e1nchez\u2010Maci\u00e1n","orcid":"https://orcid.org/0000-0002-2220-0594"},"institutions":[{"id":"https://openalex.org/I3020445194","display_name":"Universidad Nebrija","ror":"https://ror.org/03tzyrt94","country_code":"ES","type":"education","lineage":["https://openalex.org/I3020445194"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Alfonso Sanchez-Macian","raw_affiliation_strings":["ARIES Research Center, Universidad Antonio de Nebrija, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"ARIES Research Center, Universidad Antonio de Nebrija, Madrid, Spain","institution_ids":["https://openalex.org/I3020445194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100417119","display_name":"Shanshan Liu","orcid":"https://orcid.org/0000-0001-6226-2880"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shanshan Liu","raw_affiliation_strings":["Department of ECE, Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of ECE, Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001979328","display_name":"Fabrizio Lombardi","orcid":"https://orcid.org/0000-0003-3152-3245"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fabrizio Lombardi","raw_affiliation_strings":["Department of ECE, Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of ECE, Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5080322790"],"corresponding_institution_ids":["https://openalex.org/I50357001"],"apc_list":null,"apc_paid":null,"fwci":0.42,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.69308158,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"19","issue":"5","first_page":"3539","last_page":"3545"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8529255390167236},{"id":"https://openalex.org/keywords/sketch","display_name":"Sketch","score":0.8300555944442749},{"id":"https://openalex.org/keywords/cardinality","display_name":"Cardinality (data modeling)","score":0.7390891313552856},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.722237229347229},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5369422435760498},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.5120425820350647},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4834814667701721},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4817209839820862},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.45291730761528015},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.4475225508213043},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42770904302597046},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.4129890203475952},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2663367986679077},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19819054007530212},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19464111328125},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1290610134601593},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08896410465240479}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8529255390167236},{"id":"https://openalex.org/C2779231336","wikidata":"https://www.wikidata.org/wiki/Q7534724","display_name":"Sketch","level":2,"score":0.8300555944442749},{"id":"https://openalex.org/C87117476","wikidata":"https://www.wikidata.org/wiki/Q362383","display_name":"Cardinality (data modeling)","level":2,"score":0.7390891313552856},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.722237229347229},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5369422435760498},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.5120425820350647},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4834814667701721},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4817209839820862},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.45291730761528015},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.4475225508213043},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42770904302597046},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.4129890203475952},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2663367986679077},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19819054007530212},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19464111328125},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1290610134601593},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08896410465240479},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2021.3101280","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3101280","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:e-archivo.uc3m.es:10016/35750","is_oa":true,"landing_page_url":"http://hdl.handle.net/10016/35750","pdf_url":"https://e-archivo.uc3m.es/bitstreams/a854af5f-911d-47fd-a951-2bb6e8cf49ef/download","source":{"id":"https://openalex.org/S4306400817","display_name":"e-Archivo (Carlos III University of Madrid)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I50357001","host_organization_name":"Universidad Carlos III de Madrid","host_organization_lineage":["https://openalex.org/I50357001"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:oai:e-archivo.uc3m.es:10016/35750","is_oa":true,"landing_page_url":"http://hdl.handle.net/10016/35750","pdf_url":"https://e-archivo.uc3m.es/bitstreams/a854af5f-911d-47fd-a951-2bb6e8cf49ef/download","source":{"id":"https://openalex.org/S4306400817","display_name":"e-Archivo (Carlos III University of Madrid)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I50357001","host_organization_name":"Universidad Carlos III de Madrid","host_organization_lineage":["https://openalex.org/I50357001"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3192006367.pdf","grobid_xml":"https://content.openalex.org/works/W3192006367.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1493892051","https://openalex.org/W1785933978","https://openalex.org/W1982092405","https://openalex.org/W2005731313","https://openalex.org/W2060324268","https://openalex.org/W2083966857","https://openalex.org/W2132069633","https://openalex.org/W2144982963","https://openalex.org/W2159205978","https://openalex.org/W2321155245","https://openalex.org/W2327315875","https://openalex.org/W2621345043","https://openalex.org/W2886584304","https://openalex.org/W2964277307","https://openalex.org/W2984129833","https://openalex.org/W3005974829","https://openalex.org/W3030848490","https://openalex.org/W3031693517","https://openalex.org/W3034570653","https://openalex.org/W3083090961","https://openalex.org/W3107382496","https://openalex.org/W4251572725","https://openalex.org/W4295126499","https://openalex.org/W4297813916","https://openalex.org/W4307203159","https://openalex.org/W6686976090","https://openalex.org/W6730356566","https://openalex.org/W6734131497","https://openalex.org/W6785104484","https://openalex.org/W6785990810"],"related_works":["https://openalex.org/W2150905383","https://openalex.org/W3192006367","https://openalex.org/W2272111399","https://openalex.org/W1577953800","https://openalex.org/W1520268336","https://openalex.org/W2950285904","https://openalex.org/W2359779281","https://openalex.org/W1819617256","https://openalex.org/W73805934","https://openalex.org/W1601455886"],"abstract_inverted_index":{"Data":[0],"sketches":[1,16,97],"are":[2],"widely":[3,135,162],"used":[4,136,163],"to":[5,17,60,117,164,208],"accelerate":[6],"operations":[7],"in":[8,34,91,228],"big":[9],"data":[10,78,90],"analytics.":[11],"For":[12,102],"example,":[13,103],"algorithms":[14],"use":[15,69,75],"compute":[18],"the":[19,25,68,74,89,96,109,112,150,191,195,202,215,222,225,229],"cardinality":[20,138,167],"of":[21,70,76,111,114,143,152,184,214,221],"a":[22,93,133,157,185],"set,":[23],"or":[24,121,212],"similarity":[26,169,192],"between":[27,241],"two":[28],"sets.":[29],"Sketches":[30],"achieve":[31],"significant":[32],"reductions":[33],"computing":[35],"time":[36],"and":[37,55,168,200,243],"storage":[38],"requirements":[39],"by":[40],"providing":[41],"probabilistic":[42,71,77],"estimates":[43],"rather":[44],"than":[45],"exact":[46],"values.":[47],"In":[48],"many":[49],"applications,":[50],"an":[51,85,99,104,128,176,198,210,238],"estimate":[52,110,216],"is":[53,58,160],"sufficient":[54],"thus,":[56],"it":[57],"possible":[59],"trade":[61],"accuracy":[62],"for":[63,137],"computational":[64],"complexity;":[65],"this":[66],"enables":[67],"sketches.":[72],"However,":[73],"structures":[79],"may":[80,87,217],"create":[81],"security":[82,151],"issues":[83],"because":[84],"attacker":[86,105,129],"manipulate":[88,131],"such":[92],"way":[94],"that":[95,127,159,189,205],"produce":[98],"incorrect":[100],"estimate.":[101,193],"could":[106],"potentially":[107],"inflate":[108],"number":[113],"distinct":[115],"users":[116],"increase":[118,211],"its":[119,144],"revenues":[120],"popularity.":[122],"Recent":[123],"works":[124],"have":[125],"shown":[126],"can":[130],"Hyperloglog,":[132],"sketch":[134,158],"estimate,":[139],"with":[140,179],"no":[141],"knowledge":[142],"implementation":[145,227],"details.":[146],"This":[147],"paper":[148,196],"considers":[149],"K":[153],"Minimum":[154],"Values":[155],"(KMV),":[156],"also":[161],"implement":[165],"both":[166],"estimates.":[170],"Next":[171],"sections":[172],"characterize":[173],"vulnerabilities":[174],"at":[175],"implementation-independent":[177],"level,":[178],"attacks":[180,223],"formulated":[181],"as":[182,206],"part":[183],"novel":[186],"adversary":[187],"model":[188],"manipulates":[190],"Therefore,":[194],"pursues":[197],"analysis":[199],"simulation;":[201],"results":[203],"suggest":[204],"vulnerable":[207],"attacks,":[209],"reduction":[213],"occur.":[218],"The":[219],"execution":[220],"against":[224],"KMV":[226],"Apache":[230],"DataSketches":[231],"library":[232],"validates":[233],"these":[234],"scenarios.":[235],"Experiments":[236],"show":[237],"excellent":[239],"agreement":[240],"theory":[242],"experimental":[244],"results.":[245]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2021-08-16T00:00:00"}
