On k-anonymity and the curse of dimensionality, Proceedings of the 31st international conference on Very large data bases VLDB, pp.901-909, 2005. ,
Approximation algorithms for k-anonymity, Dilys Thomas, and An Zhu, 2005. ,
On the effect of data set size on bias and variance in classification learning, Proceedings of the Fourth Australian Knowledge Acquisition Workshop, pp.117-128, 1999. ,
Data and Structural k-Anonymity in Social Networks, Privacy, Security, and Trust in KDD, pp.33-54, 2009. ,
DOI : 10.1109/ICDE.2008.4497459
URL : http://www.nku.edu/~trutat1/papers/LNCS09_campan.pdf
Privacy aware learning, Journal of the ACM (JACM), issue.6, p.6138, 2014. ,
Differential Privacy: A Survey of Results, International Conference on Theory and Applications of Models of Computation, pp.1-19, 2008. ,
DOI : 10.1007/978-3-540-79228-4_1
Towards interactive Machine Learning (iML): Applying Ant Colony Algorithms to Solve the Traveling Salesman Problem with the Human-in-the-Loop Approach, IFIP International Cross Domain Conference and Workshop (CD-ARES), page in print, 2016. ,
DOI : 10.1016/j.compedu.2005.11.026
URL : https://hal.archives-ouvertes.fr/hal-01635020
Interactive machine learning for health informatics: when do we need the human-in-the-loop?, Brain Informatics, vol.7, issue.1, pp.119-131, 2016. ,
DOI : 10.1007/978-3-540-69868-5_1
Introduction to MAchine Learning & Knowledge Extraction (MAKE), Machine Learning and Knowledge Extraction, vol.15, issue.1, pp.1-20, 2017. ,
DOI : 10.1007/978-3-642-40511-2_22
A tamper-proof audit and control system for the doctor in the loop, Brain Informatics, vol.53, issue.4, pp.1-11, 2016. ,
DOI : 10.1109/ARES.2012.50
Utilitypreserving anonymization for health data publishing, BMC Medical Informatics and Decision Making, 2017. ,
DOI : 10.1186/s12911-017-0499-0
URL : https://doi.org/10.1186/s12911-017-0499-0
Mondrian Multidimensional K-Anonymity, 22nd International Conference on Data Engineering (ICDE'06), pp.25-25, 2006. ,
DOI : 10.1109/ICDE.2006.101
Information based data anonymization for classification utility, Data & Knowledge Engineering, vol.70, issue.12, pp.1030-1045, 2011. ,
DOI : 10.1016/j.datak.2011.07.001
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007. ,
DOI : 10.1109/ICDE.2007.367856
-diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, pp.1-52, 2007. ,
DOI : 10.1145/1217299.1217302
Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data, Sensors, vol.17, issue.5, pp.1-23, 2017. ,
DOI : 10.1145/1656274.1656278
The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases, International Conference on Availability, Reliability, and Security, pp.251-266, 2016. ,
DOI : 10.1145/1540276.1540279
URL : https://hal.archives-ouvertes.fr/hal-01635002
??-Presence without Complete World Knowledge, IEEE Transactions on Knowledge and Data Engineering, vol.22, issue.6, pp.868-883, 2010. ,
DOI : 10.1109/TKDE.2009.125
Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001. ,
DOI : 10.1109/69.971193
Measurement of diversity, Nature, 1949. ,
ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.571-588, 2002. ,
DOI : 10.1142/S021848850200165X
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002. ,
DOI : 10.1109/RISP.1993.287632
A Comparison of the Effects of K-Anonymity on Machine Learning Algorithms, International Journal of Advanced Computer Science and Applications, vol.5, issue.11, pp.1-9, 2014. ,
DOI : 10.14569/IJACSA.2014.051126
Understanding data augmentation for classification: when to warp?, Digital Image Computing: Techniques and Applications (DICTA), 2016 International Conference on, pp.1-6, 2016. ,