G. Cormode, Personal privacy vs population privacy, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, 2011.
DOI : 10.1145/2020408.2020598

G. Cormode, C. M. Procopiuc, E. Shen, D. Srivastava, and T. Yu, Empirical privacy and empirical utility of anonymized data, 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW), 2013.
DOI : 10.1109/ICDEW.2013.6547431

S. J. De and D. L. Métayer, Privacy Risk Analysis. Synthesis Lectures on Information Security, Privacy, & Trust, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01420968

C. Dwork, Differential Privacy, Automata, Languages and Programming, 33rd International Colloquium, ICALP, 2006.
DOI : 10.1007/11787006_1

C. Dwork, F. Mcsherry, K. Nissim, A. D. Smith-erlingsson, V. Pihur et al., Calibrating noise to sensitivity in private data analysis RAPPOR: randomized aggregatable privacy-preserving ordinal response, Theory of Cryptography, Third Theory of Cryptography Conference Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2006.
DOI : 10.1007/11681878_14

A. L. Gibbs and F. E. Su, On Choosing and Bounding Probability Metrics, International Statistical Review, vol.28, issue.2, pp.419-435, 2002.
DOI : 10.1137/1128025

Q. Gong, Implementation of basic mondrian k-anonymity. goo.gl/kKpqZ6, pp.16-25

Q. Gong, Implementation of mondrian k-anonymity. goo.gl/eFYXBv. Accessed, pp.16-25

Q. Gong, Implementation of mondrian l-diversity. goo.gl/2ymJ14, pp.16-25

A. Inan, M. Kantarcioglu, and E. Bertino, Using Anonymized Data for Classification, 2009 IEEE 25th International Conference on Data Engineering, 2009.
DOI : 10.1109/ICDE.2009.19

D. Kifer, Attacks on privacy and deFinetti's theorem, Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD '09, 2009.
DOI : 10.1145/1559845.1559861

URL : http://www.cse.psu.edu/%7Edkifer/papers/definetti.pdf

J. Klucar and F. Mcsherry, Lunchtime for data privacy. goo.gl/Lfq8iw, pp.16-25, 2016.

K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, Mondrian Multidimensional K-Anonymity, 22nd International Conference on Data Engineering (ICDE'06), 2006.
DOI : 10.1109/ICDE.2006.101

N. Li, T. Li, and S. Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, 2007.
DOI : 10.1109/ICDE.2007.367856

A. Machanavajjhala and D. Kifer, Designing statistical privacy for your data, Communications of the ACM, vol.58, issue.3, p.2015
DOI : 10.1142/S0218488502001648

A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, -diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, p.3, 2007.
DOI : 10.1145/1217299.1217302

Y. Rubner, C. Tomasi, and L. J. Guibas, The earth mover's distance as a metric for image retrieval, International Journal of Computer Vision, 2000.

P. Samarati and L. Sweeney, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. technical report, 1998.