G. Acs and C. Castelluccia, A case study, Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '14, 2014.
DOI : 10.1145/2623330.2623361

URL : https://hal.archives-ouvertes.fr/hal-01060070

R. Chen, G. Acs, and C. Castelluccia, Differentially private sequential data publication via variable-length n-grams, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.638-649, 2012.
DOI : 10.1145/2382196.2382263

URL : https://hal.archives-ouvertes.fr/hal-00747830

R. Chen, B. Fung, B. C. Desai, and N. M. Sossou, Differentially private transit data publication, Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '12, pp.213-221, 2012.
DOI : 10.1145/2339530.2339564

G. Chittaranjan, J. Blom, and D. Gatica-perez, Mining large-scale smartphone data for personality studies, Personal and Ubiquitous Computing, vol.27, issue.3, pp.433-450, 2013.
DOI : 10.1016/j.tele.2009.11.001

D. J. Mir, S. Isaacman, R. C. Wright, and R. N. , Dp-where: Differentially private modeling of human mobility. BigData Conference p, pp.580-588, 2013.
DOI : 10.1109/bigdata.2013.6691626

C. Dwork, F. Mcsherry, K. Nissim, and . Smith, Calibrating Noise to Sensitivity in Private Data Analysis, Theory of cryptography, pp.265-284, 2006.
DOI : 10.1007/11681878_14

URL : http://www.cs.bgu.ac.il/~kobbi/papers/sensitivity-tcc-final.ps

H. Li, L. Xiong, L. Ohno-machado, and X. Jiang, Privacy Preserving RBF Kernel Support Vector Machine, BioMed Research International, vol.45, issue.3, 2014.
DOI : 10.1016/j.jbi.2005.02.008

URL : http://doi.org/10.1155/2014/827371

J. Mahmud, J. Nichols, and C. Drews, Where is this tweet from? inferring home locations of twitter users, ICWSM, vol.12, pp.511-514, 2012.

L. Sweeney, Risk assessments of personal identification technologies for domestic violence homeless shelters WIKIPEDIA: Interquartile range, p.3, 2005.