A two-phase algorithm for mining sequential patterns with differential privacy, Proceedings of the 22nd ACM international conference on Conference on information & knowledge management, CIKM '13, pp.269-278 ,
DOI : 10.1145/2505515.2505553
URL : http://www.mathcs.emory.edu/AIMS/pub/bonomi13cikm.pdf
Min-Wise Independent Permutations, Proceedings of the thirtieth annual ACM symposium on Theory of computing -STOC '98, pp.327-336, 1998. ,
DOI : 10.1006/jcss.1999.1690
URL : https://doi.org/10.1006/jcss.1999.1690
Differentially private sequential data publication via variable-length n-grams, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, p.638, 2012. ,
DOI : 10.1145/2382196.2382263
URL : https://hal.archives-ouvertes.fr/hal-00747830
Differential Privacy, Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Calibrating Noise to Sensitivity in Private Data Analysis, TCC'06 Proceedings of the Third conference on Theory of Cryptography, pp.265-284, 2006. ,
DOI : 10.1007/11681878_14
URL : http://www.cs.bgu.ac.il/~kobbi/papers/sensitivity-tcc-final.ps
Anonymizing trajectory data for passenger flow analysis, Transportation Research Part C: Emerging Technologies, vol.39, pp.63-79, 2014. ,
DOI : 10.1016/j.trc.2013.12.003
Interactive machine learning for health informatics: when do we need the human-in-the-loop?, Brain Informatics, vol.7, issue.1, pp.119-131, 2016. ,
DOI : 10.1007/978-3-540-69868-5_1
A tamper-proof audit and control system for the doctor in the loop, Brain Informatics, vol.53, issue.4, pp.1-11, 2016. ,
DOI : 10.1109/ARES.2012.50
Openaccess MIMIC-II database for intensive care research, Conference proceedings : ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp.8315-8323, 2011. ,
Unique in the Crowd: The privacy bounds of human mobility, Scientific Reports, vol.23, issue.1, p.1376, 2013. ,
DOI : 10.1007/BF00344744
Pattern-preserving kanonymization of sequences and its application to mobility data mining, CEUR Workshop Proceedings, pp.44-60, 2008. ,
Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001. ,
DOI : 10.1109/69.971193
URL : http://spdp.dti.unimi.it/papers/tkde_k-anonymity.pdf