Dp-finder: Finding differential privacy violations by sampling and optimization, ACM CCS, pp.508-524, 2018. ,
One-dimensional empirical measures, order statistics,and kantorovich transport distances, 2016. ,
Personal privacy vs population privacy: learning to attack anonymization, ACC SIGKDD, 2011. ,
Empirical privacy and empirical utility of anonymized data, Workshops Proceedings of ICDE, 2013. ,
, Privacy Risk Analysis. Synthesis Lectures on Information Security, Privacy, & Trust, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01420968
Detecting violations of differential privacy, ACM CCS, pp.475-489, 2018. ,
Differential privacy, ICALP, 2006. ,
A critical appraisal of the article 29 working party opinion 05/2014 on data anonymization techniques, Oxford Journals, vol.5, issue.1, pp.73-87, 2015. ,
Composition attacks and auxiliary information in data privacy, ACM SIGKDD, pp.265-273, 2008. ,
Implementation of basic mondrian k-anonymity. goo.gl/ kKpqZ6, pp.1-02 ,
Implementation of mondrian l-diversity. goo.gl/2ymJ14 ,
Attacks on privacy and definetti's theorem, ACM SIGMOD, 2009. ,
Lunchtime for data privacy. goo.gl/ Lfq8iw, pp.1-02, 2016. ,
t-closeness: Privacy beyond k-anonymity and l-diversity, ICDE, 2007. ,
Understanding the sparse vector technique for differential privacy, vol.10, pp.637-648, 2017. ,
Understanding the sparse vector technique for differential privacy, vol.10, pp.637-648, 2017. ,
Designing statistical privacy for your data, Commun. ACM, vol.58, issue.3, 2015. ,
L-diversity: Privacy beyond k -anonymity, vol.1, p.3, 2007. ,
Knock knock, who's there? membership inference on aggregate location data, NDSS, 2018. ,
Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, 1998. ,
Uniqueness of simple demographics in the us population. LIDAP-WP4, 2000. ,
The computer-based patient record and confidentiality, New England Journal of Medicine, vol.333, issue.21, pp.1419-1422, 1995. ,