Author:
Lipton Richard J.,Naughton Jeffrey F.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,General Computer Science
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Adversarial Correctness and Privacy for Probabilistic Data Structures;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07
2. HyperLogLog: Exponentially Bad in Adversarial Settings;2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P);2022-06
3. Pollution Attacks on Counting Bloom Filters for Black Box Adversaries;2020 16th International Conference on Network and Service Management (CNSM);2020-11-02
4. Data structures meet cryptography: 3SUM with preprocessing;Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing;2020-06-06
5. The Adversarial Robustness of Sampling;Proceedings of the 39th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems;2020-05-29