{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T06:49:17Z","timestamp":1769150957170,"version":"3.49.0"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"FUN4DATE","award":["PID2022-136684OB-C21\/C22"],"award-info":[{"award-number":["PID2022-136684OB-C21\/C22"]}]},{"name":"6G-INTEGRATION-3","award":["TSI-063000-2021-127"],"award-info":[{"award-number":["TSI-063000-2021-127"]}]},{"name":"Spanish Agencia Estatal de Investigacion","award":["10.13039\/501100011033"],"award-info":[{"award-number":["10.13039\/501100011033"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1109\/tetc.2024.3383321","type":"journal-article","created":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T18:46:27Z","timestamp":1712342787000},"page":"1056-1065","source":"Crossref","is-referenced-by-count":2,"title":["On the Privacy of the Count-Min Sketch: Extracting the Top-K Elements"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2220-0594","authenticated-orcid":false,"given":"Alfonso","family":"S\u00e1nchez-Maci\u00e1n","sequence":"first","affiliation":[{"name":"Universidad Carlos III de Madrid, Legan&#x00E9;s, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6014-248X","authenticated-orcid":false,"given":"Jorge","family":"Mart\u00ednez","sequence":"additional","affiliation":[{"name":"Saint Louis University Madrid, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2540-5234","authenticated-orcid":false,"given":"Pedro","family":"Reviriego","sequence":"additional","affiliation":[{"name":"Universidad Polit&#x00E9;cnica de Madrid, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6226-2880","authenticated-orcid":false,"given":"Shanshan","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3152-3245","authenticated-orcid":false,"given":"Fabrizio","family":"Lombardi","sequence":"additional","affiliation":[{"name":"Department of ECE, Northeastern University, Boston, MA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3406480"},{"key":"ref2","first-page":"1","article-title":"Modeling conservative updates in multi-hash approximate count sketches","volume-title":"Proc. 24th Int. Teletraffic Congr.","author":"Bianchi"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2021.3109559"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3080008"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_27"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/BigComp.2018.00024"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2019.2933868"},{"issue":"24","key":"ref8","doi-asserted-by":"crossref","first-page":"4958","DOI":"10.1016\/j.ins.2010.08.024","article-title":"Finding top-k elements in data streams","volume":"180","author":"Homem","year":"2010","journal-title":"Inf. Sci."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref10","first-page":"51","article-title":"Sketch techniques for scaling distributional similarity to the web","volume-title":"Proc. Workshop Geometrical Models Natural Lang. Semantics","author":"Goyal"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2013.6742785"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3101280"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3306193"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354235"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33627-0_27"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.21"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3158469"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2799486"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029817"},{"key":"ref20","article-title":"Protecting privacy using hyperloglog to process data from location based social networks","volume-title":"Proc. LESSON: Legal Ethical FactorS CrowdSourced GeOgraphic iNformation","author":"L\u00f6chner"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi9120709"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2988065"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0101271"},{"key":"ref28","first-page":"1","article-title":"Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks","volume-title":"Proc. 5th USENIX Workshop Hot Topics Secur.","author":"Schechter"},{"key":"ref29","article-title":"Computer networks fifth edition","author":"Andrew","year":"2011"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2096149.2096152"},{"key":"ref31","article-title":"Realtime passive network monitors","year":"2014"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/10779195\/10492661.pdf?arnumber=10492661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T05:38:33Z","timestamp":1733549913000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10492661\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":31,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2024.3383321","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10]]}}}