A case study, Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '14, 2014. ,
DOI : 10.1145/2623330.2623361
URL : https://hal.archives-ouvertes.fr/hal-01060070
Differentially private sequential data publication via variable-length n-grams, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.638-649, 2012. ,
DOI : 10.1145/2382196.2382263
URL : https://hal.archives-ouvertes.fr/hal-00747830
Differentially private transit data publication, Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '12, pp.213-221, 2012. ,
DOI : 10.1145/2339530.2339564
Mining large-scale smartphone data for personality studies, Personal and Ubiquitous Computing, vol.27, issue.3, pp.433-450, 2013. ,
DOI : 10.1016/j.tele.2009.11.001
Dp-where: Differentially private modeling of human mobility. BigData Conference p, pp.580-588, 2013. ,
DOI : 10.1109/bigdata.2013.6691626
Calibrating Noise to Sensitivity in Private Data Analysis, Theory of cryptography, pp.265-284, 2006. ,
DOI : 10.1007/11681878_14
URL : http://www.cs.bgu.ac.il/~kobbi/papers/sensitivity-tcc-final.ps
Privacy Preserving RBF Kernel Support Vector Machine, BioMed Research International, vol.45, issue.3, 2014. ,
DOI : 10.1016/j.jbi.2005.02.008
URL : http://doi.org/10.1155/2014/827371
Where is this tweet from? inferring home locations of twitter users, ICWSM, vol.12, pp.511-514, 2012. ,
Risk assessments of personal identification technologies for domestic violence homeless shelters WIKIPEDIA: Interquartile range, p.3, 2005. ,