C. Charu and . Aggarwal, On k-anonymity and the curse of dimensionality, Proceedings of the 31st international conference on Very large data bases VLDB, pp.901-909, 2005.

G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, and R. Panigrahy, Approximation algorithms for k-anonymity, Dilys Thomas, and An Zhu, 2005.

A. Campan and T. M. Truta, Data and Structural k-Anonymity in Social Networks, Privacy, Security, and Trust in KDD, pp.33-54, 2009.
DOI : 10.1109/ICDE.2008.4497459

URL : http://www.nku.edu/~trutat1/papers/LNCS09_campan.pdf

S. Chester, B. Kapron, G. Ramesh, and G. Srivastava, Alex Thomo, and S Venkatesh. k-anonymization of social networks by vertex addition, ADBIS, vol.789, issue.2, pp.107-116, 2011.

C. John, . Duchi, I. Michael, . Jordan, J. Martin et al., Privacy aware learning, Journal of the ACM (JACM), issue.6, p.6138, 2014.

A. Holzinger, . Plass, . Holzinger, . Gc-crisan, V. Pintea et al., Towards interactive Machine Learning (iML): Applying Ant Colony Algorithms to Solve the Traveling Salesman Problem with the Human-in-the-Loop Approach, IFIP International Cross Domain Conference and Workshop (CD-ARES), page in print, 2016.
DOI : 10.1016/j.compedu.2005.11.026

URL : https://hal.archives-ouvertes.fr/hal-01635020

A. Holzinger, Interactive machine learning for health informatics: when do we need the human-in-the-loop?, Brain Informatics, vol.7, issue.1, pp.119-131, 2016.
DOI : 10.1007/978-3-540-69868-5_1

B. Kapron, G. Srivastava, and S. Venkatesh, Social Network Anonymization via Edge Addition, 2011 International Conference on Advances in Social Networks Analysis and Mining, pp.155-162, 2011.
DOI : 10.1109/ASONAM.2011.108

P. Kieseberg, B. Malle, P. Frhwirt, E. Weippl, and A. Holzinger, A tamper-proof audit and control system for the doctor in the loop, Brain Informatics, vol.53, issue.4, pp.1-11, 2016.
DOI : 10.1109/ARES.2012.50

N. Li, T. Li, and S. Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007.
DOI : 10.1109/ICDE.2007.367856

URL : http://www.cs.purdue.edu/homes/ninghui/papers/t_closeness_icde07.pdf

A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, -diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, pp.1-52, 2007.
DOI : 10.1145/1217299.1217302

M. E. Nergiz and C. Clifton, ??-Presence without Complete World Knowledge, IEEE Transactions on Knowledge and Data Engineering, vol.22, issue.6, pp.868-883, 2010.
DOI : 10.1109/TKDE.2009.125

P. Samarati, Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001.
DOI : 10.1109/69.971193

L. Sweeney, ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.571-588, 2002.
DOI : 10.1142/S021848850200165X

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002.
DOI : 10.1109/RISP.1993.287632

W. Zheng, S. Gong, and T. Xiang, Reidentification by Relative Distance Comparison, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.35, issue.3, pp.653-668, 2013.
DOI : 10.1109/TPAMI.2012.138

B. Zhou, J. Pei, and W. Luk, A brief survey on anonymization techniques for privacy preserving publishing of social network data, ACM SIGKDD Explorations Newsletter, vol.10, issue.2, pp.12-22, 2008.
DOI : 10.1145/1540276.1540279