Differential Privacy, Proc. of ICALP, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Calibrating Noise to Sensitivity in Private Data Analysis, Proc. of TCC, pp.265-284, 2006. ,
DOI : 10.1007/11681878_14
Distance makes the types grow stronger: a calculus for differential privacy, Proc. of ICFP, pp.157-168, 2010. ,
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009. ,
DOI : 10.1109/SP.2009.22
Privacy: Theory meets Practice on the Map, 2008 IEEE 24th International Conference on Data Engineering, pp.277-286, 2008. ,
DOI : 10.1109/ICDE.2008.4497436
Composition attacks and auxiliary information in data privacy, Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD 08, pp.265-273, 2008. ,
DOI : 10.1145/1401890.1401926
Universally utility-maximizing privacy mechanisms, Proc. of STOC, pp.351-360, 2009. ,
Impossibility of differentially private universally optimal mechanisms, Proc. of FOCS, pp.71-80, 2010. ,
Smooth sensitivity and sampling in private data analysis, Proceedings of the thirty-ninth annual ACM symposium on Theory of computing , STOC '07, pp.75-84, 2007. ,
DOI : 10.1145/1250790.1250803
Probabilistic relational reasoning for differential privacy, Proc. of POPL, 2012. ,
Fairness through awareness, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on, ITCS '12, pp.214-226, 2012. ,
DOI : 10.1145/2090236.2090255
Broadening the Scope of Differential Privacy Using Metrics ,
DOI : 10.1007/978-3-642-39077-7_5
URL : https://hal.archives-ouvertes.fr/hal-00767210
Our Data, Ourselves: Privacy Via Distributed Noise Generation, Proc. of EUROCRYPT, pp.486-503, 2006. ,
DOI : 10.1007/11761679_29
Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pp.94-103, 2007. ,
DOI : 10.1109/FOCS.2007.66
A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signaturesof, IEEE Transactions on Consumer Electronics, vol.53, issue.2, pp.653-660, 2007. ,
DOI : 10.1109/TCE.2007.381742
Multimedia content identification through smart meter power use profiles, In: CPDP, 2012. ,
Differentially Private Billing with Rebates, IACR Cryptology ePrint Archive, pp.2011-134, 2011. ,
DOI : 10.1007/978-3-642-24178-9_11
Geo-indistinguishability, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 1212. ,
DOI : 10.1145/2508859.2516735
Quantifying Location Privacy, 2011 IEEE Symposium on Security and Privacy, pp.247-262, 2011. ,
DOI : 10.1109/SP.2011.18
URL : https://hal.archives-ouvertes.fr/hal-01266229
Protecting location privacy, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.617-627, 2012. ,
DOI : 10.1145/2382196.2382261