{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2024,6,22]],“日期-时间”:“2024-06-22T06:43:44Z”,“时间戳”:1719038624707},“引用-计数”:31,“发布者”:“IEEE”,“许可证”:[{“开始”:{-“日期-零件”:[2019,5,1]],”“日期-时刻”:“2019-05-01T00:00:00 Z“,”timestamp“:1556668800000},”content-version“:”vor“,“延迟天数”:0,“URL”:“https://ieeexplore.ieee.org/Xplorehelp\/downloads\/license-information\/ieee.html”},{“开始”:{“日期部分”:[[2019,5,1]],“日期时间”:“2019-05-01T0:00:00Z”,“时间戳”:1556668800000},“内容版本”:“stm-asf”,“延迟天数”:0,“URL”:“https://doi.org/10.15223\/policy-009”},{“开始”:{日期部分”:[[2019,5,1]],“date-time”:“2019-05-01T00:00:00Z”,“timestamp”:1556668800000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\\/doi.org\/10.15223\/policy-001”}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},”short-container-title“:[],”published-print“:{”date-parts“:[2019,5]},“doi”:“10.1109\/sp.2019.00030”,“类型”:“proceedings-article”,“created”:{“date-parts”:[[2019,9,17]],“date-time”:“2019-09-17T02:02:02Z”,“timestamp”:1568685782000},“source”:“Crossref”,“is-referenced-by-count”:60,“title”:[“Learning to Reconstruct:Statistical Learning Theory and Encrypted Database Attacks”],“prefix”:“10.1109”,”author“[{”given“:”Paul“,“family”:“Grubbs”,“sequence”:“first”,“affiliation”:[]},{“given”:“Marie-Saha”,“family”:“Lacharite”,“sequence”:“additional”,“affaliance”:[]}31“,”doi-asserted-by“:”publisher“,”doi“:“10.1137\/1116025”},{“key”:“ref30”,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/0097-3165(72)90019-2”}:“算法和数据分析中的概率与计算随机化和概率技术”},{“key”:“ref12”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/3-540-49097-3_22”}、{“密钥”:“ref13”,“doi-asserte-by”:“publisher”,“DI:”10.1016\/S0022-0000(76)80045-1,“author”:“grothaus”,“year”:“2011”},{“key”:“ref15”,“article-title”:“Simplified wrapper and interface generator(SWIG、“article-title”:“ElasticSearch”,“year”:“2018”},{“key”:“ref19”,“articles-title“:”Salesforce.com“,”year“:”2018“},}”key“:”ref28“,”article-title“:”SQL查询的VC-dimension和通过采样的选择性估计“,”author“:”riondato“,”年份“:”2011“,”journal-title我“:“10.1145 \/2810103.2813651”},{“key”:“ref27”,“doi-asserted-by”:“publisher”,“doi”:“10.1141 \/281 0103.2813700”}“,”作者“:”张“,“年份”:“2016年”,“新闻标题”:“第25届USENIX安全研讨会USENIX-Security 16”},{“key”:“ref29”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1051510522”}、{“密钥”:“ref5”,“doi-assertd-by”:“publisher”,“DI:”10.1109\/SP.2017.44 2“},{”key“:”ref7“,”doi-asserted-by“:”publisher“,“DOI”:“10.1145\/2976749.2978351”},{“key”:“ref2”,“DOI-asserted-by”:“publisher”,“DOI:“10.1109\/SP.2018.0002”},{“key”:“ref20”,“article-title”:“ServiceNow”,“year”:“2018”},{”key“:”ref22“,“article-title”:“美国人口普查局名称统计数据”,“author”:“Bureau”,“year”:“2016”},{“key”:“ref21”,“article-title:“Dropbox”,“年”:“2018”},“doi-asserted-by”:“publisher”,“doi”:“10.1016\/0890-5401(89)90002-3”},{“key”:“ref26”,“doi-asserted-by”:”publisher“,”doi“:”10.14778\/3236187.3236217“},“key“:”ref25“,”first page“719”,“article-title”:“加密数据库上k最近邻查询泄漏的数据恢复”,“author”:“kornaropoulos”,“year”:“2018”,“journal-title“:“Cryptology ePrint Archive Report”}],“event”:{“name”:“2019年IEEE安全与隐私研讨会(SP)”,“location”:“San Francisco,CA,USA”,“start”:{-“date-parts”:[[2019,5,19]]},“end”:{--“date-parts”:[2019,5,23]]}},”container-title“:[”2019年EEE安全与隐私会议(SP)“],”original-title:[],“link”:[{“URL”:“http://\/xplorestaging.ieee.org\/ielx7\/8826229\/8835208\/088355288.pdf?arnumber=8835288”,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2022,7,17]],“date-time”:”2022-07-17T21:47:11Z“,”timestamp“1658094431000},“score”:1,“resource”“:{”primary“:{”URL“:“https:\/\/ieeexplore.iee.org\/document\/8835288\/”}},“副标题”:[],“短标题”:[],“已发布”:{“日期-部件”:[[2019,5]]},”引用计数“:31,”URL“:”http://\/dx.doi.org\/10.109\/sp.2019.00030“,”关系“:{}”,“主题”:[】,“发布”:}}