{"id":"https://openalex.org/W2983374155","doi":"https://doi.org/10.1145/3319535.3354235","title":"Probabilistic Data Structures in Adversarial Environments","display_name":"Probabilistic Data Structures in Adversarial Environments","publication_year":2019,"publication_date":"2019-11-06","ids":{"openalex":"https://openalex.org/W2983374155","doi":"https://doi.org/10.1145/3319535.3354235","mag":"2983374155"},"language":"en","primary_location":{"id":"doi:10.1145/3319535.3354235","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3319535.3354235","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3354235","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3354235","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052029788","display_name":"David F. Clayton","orcid":"https://orcid.org/0000-0002-6395-3488"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"David Clayton","raw_affiliation_strings":["University of Florida, GAINESVILLE, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of Florida, GAINESVILLE, FL, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069464930","display_name":"Christopher Patton","orcid":null},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Christopher Patton","raw_affiliation_strings":["University of Florida, GAINESVILLE, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of Florida, GAINESVILLE, FL, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023897618","display_name":"Thomas Shrimpton","orcid":"https://orcid.org/0000-0001-8131-5634"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thomas Shrimpton","raw_affiliation_strings":["University of Florida, GAINESVILLE, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of Florida, GAINESVILLE, FL, USA","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5052029788"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":4.0677,"has_fulltext":true,"cited_by_count":45,"citation_normalized_percentile":{"value":0.94599807,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1317","last_page":"1334"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7903518080711365},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.7795113325119019},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.731569230556488},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.664677619934082},{"id":"https://openalex.org/keywords/data-structure","display_name":"Data structure","score":0.560464084148407},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4939194321632385},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.46461808681488037},{"id":"https://openalex.org/keywords/provable-security","display_name":"Provable security","score":0.4392443895339966},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.43480342626571655},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.4305029511451721},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4176049828529358},{"id":"https://openalex.org/keywords/sketch","display_name":"Sketch","score":0.4103327989578247},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32654380798339844},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2572619915008545},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2528727650642395},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2189081907272339},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16631054878234863},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14370056986808777},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09266433119773865}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7903518080711365},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.7795113325119019},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.731569230556488},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.664677619934082},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.560464084148407},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4939194321632385},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.46461808681488037},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.4392443895339966},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.43480342626571655},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.4305029511451721},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4176049828529358},{"id":"https://openalex.org/C2779231336","wikidata":"https://www.wikidata.org/wiki/Q7534724","display_name":"Sketch","level":2,"score":0.4103327989578247},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32654380798339844},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2572619915008545},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2528727650642395},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2189081907272339},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16631054878234863},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14370056986808777},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09266433119773865},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3319535.3354235","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3319535.3354235","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3354235","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3319535.3354235","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3319535.3354235","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3354235","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7300000190734863}],"awards":[{"id":"https://openalex.org/G7341325734","display_name":null,"funder_award_id":"1564444, 1816375","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2983374155.pdf","grobid_xml":"https://content.openalex.org/works/W2983374155.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1524340365","https://openalex.org/W1549681244","https://openalex.org/W1563402047","https://openalex.org/W1891810191","https://openalex.org/W1967373117","https://openalex.org/W1993284846","https://openalex.org/W2017005873","https://openalex.org/W2052267638","https://openalex.org/W2074633331","https://openalex.org/W2080234606","https://openalex.org/W2081533422","https://openalex.org/W2083100635","https://openalex.org/W2097352549","https://openalex.org/W2099480861","https://openalex.org/W2117098909","https://openalex.org/W2123845384","https://openalex.org/W2126540423","https://openalex.org/W2131566399","https://openalex.org/W2158259254","https://openalex.org/W2165621523","https://openalex.org/W2167606175","https://openalex.org/W2173213060","https://openalex.org/W2634547503","https://openalex.org/W2914741066","https://openalex.org/W2914982603","https://openalex.org/W6674793367"],"related_works":["https://openalex.org/W2227807207","https://openalex.org/W2370014100","https://openalex.org/W4287264924","https://openalex.org/W3137108924","https://openalex.org/W1852009617","https://openalex.org/W1979110442","https://openalex.org/W2042819006","https://openalex.org/W2170165007","https://openalex.org/W2156660460","https://openalex.org/W2362866566"],"abstract_inverted_index":{"Probabilistic":[0],"data":[1,7,39,60,82,134],"structures":[2,20,61,83,161],"use":[3],"space-efficient":[4],"representations":[5],"of":[6,50,80,96,105,111,140],"in":[8,36,65,84,108],"order":[9],"to":[10,13,54],"(approximately)":[11],"respond":[12],"queries":[14,42],"about":[15],"the":[16,38,41,51,56,109,120,137],"data.":[17],"Traditionally,":[18],"these":[19,68],"are":[21,43,45,62,145],"accompanied":[22],"by":[23],"probabilistic":[24,59,81],"bounds":[25,30,107],"on":[26,118],"query-response":[27],"errors.":[28],"These":[29],"implicitly":[31],"assume":[32],"benign":[33],"attack":[34],"models,":[35],"which":[37],"and":[40,48,99,131,166],"inputs":[44],"chosen":[46],"non-adaptively,":[47],"independent":[49],"randomness":[52],"used":[53,64,122],"construct":[55],"representation.":[57],"Yet":[58],"increasingly":[63],"settings":[66],"where":[67],"assumptions":[69],"may":[70],"be":[71],"violated.":[72],"This":[73],"work":[74],"provides":[75],"a":[76,89,93],"provable":[77,164],"security":[78,101,143],"treatment":[79],"adversarial":[85],"environments.":[86],"We":[87],"give":[88],"syntax":[90],"that":[91,151,162],"captures":[92],"wide":[94],"variety":[95],"in-use":[97],"structures,":[98],"our":[100,142],"notions":[102],"support":[103],"development":[104],"error":[106],"presence":[110],"powerful":[112],"attacks.":[113],"Concretely,":[114],"we":[115,149],"primarily":[116],"focus":[117],"examining":[119],"widely":[121],"Bloom":[123],"filter,":[124],"but":[125],"also":[126],"consider":[127],"counting":[128],"(Bloom)":[129],"filters":[130],"count-min":[132],"sketch":[133],"structures.":[135],"For":[136],"traditional":[138],"version":[139],"these,":[141],"findings":[144],"largely":[146],"negative;":[147],"however,":[148],"show":[150],"simple":[152],"embellishments":[153],"(e.g.,":[154],"using":[155],"salts,":[156],"or":[157],"secret":[158],"keys)":[159],"yields":[160],"provide":[163],"security,":[165],"with":[167],"little":[168],"overhead.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
