L. Bonomi and L. Xiong, A two-phase algorithm for mining sequential patterns with differential privacy, Proceedings of the 22nd ACM international conference on Conference on information & knowledge management, CIKM '13, pp.269-278
DOI : 10.1145/2505515.2505553

URL : http://www.mathcs.emory.edu/AIMS/pub/bonomi13cikm.pdf

A. Z. Broder, M. Charikar, A. M. Frieze, and M. Mitzenmacher, Min-Wise Independent Permutations, Proceedings of the thirtieth annual ACM symposium on Theory of computing -STOC '98, pp.327-336, 1998.
DOI : 10.1006/jcss.1999.1690

URL : https://doi.org/10.1006/jcss.1999.1690

R. Chen, G. Acs, and C. Castelluccia, Differentially private sequential data publication via variable-length n-grams, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, p.638, 2012.
DOI : 10.1145/2382196.2382263

URL : https://hal.archives-ouvertes.fr/hal-00747830

C. Dwork, Differential Privacy, Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, F. Mcsherry, K. Nissim, and . Smith, Calibrating Noise to Sensitivity in Private Data Analysis, TCC'06 Proceedings of the Third conference on Theory of Cryptography, pp.265-284, 2006.
DOI : 10.1007/11681878_14

URL : http://www.cs.bgu.ac.il/~kobbi/papers/sensitivity-tcc-final.ps

M. Ghasemzadeh, B. C. Fung, R. Chen, and A. Awasthi, Anonymizing trajectory data for passenger flow analysis, Transportation Research Part C: Emerging Technologies, vol.39, pp.63-79, 2014.
DOI : 10.1016/j.trc.2013.12.003

A. Holzinger, Interactive machine learning for health informatics: when do we need the human-in-the-loop?, Brain Informatics, vol.7, issue.1, pp.119-131, 2016.
DOI : 10.1007/978-3-540-69868-5_1

P. Kieseberg, B. Malle, P. Frühwirt, E. Weippl, and A. Holzinger, A tamper-proof audit and control system for the doctor in the loop, Brain Informatics, vol.53, issue.4, pp.1-11, 2016.
DOI : 10.1109/ARES.2012.50

J. Lee, D. J. Scott, M. Villarroel, G. D. Clifford, M. Saeed et al., Openaccess MIMIC-II database for intensive care research, Conference proceedings : ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp.8315-8323, 2011.

Y. A. De-montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, Unique in the Crowd: The privacy bounds of human mobility, Scientific Reports, vol.23, issue.1, p.1376, 2013.
DOI : 10.1007/BF00344744

R. G. Pensa, A. Monreale, F. Pinelli, and D. Pedreschi, Pattern-preserving kanonymization of sequences and its application to mobility data mining, CEUR Workshop Proceedings, pp.44-60, 2008.

P. Samarati, Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001.
DOI : 10.1109/69.971193

URL : http://spdp.dti.unimi.it/papers/tkde_k-anonymity.pdf