B. Bichsel, T. Gehr, D. Drachsler-cohen, P. Tsankov, and M. T. Vechev, Dp-finder: Finding differential privacy violations by sampling and optimization, ACM CCS, pp.508-524, 2018.

S. Bobkov and M. Ledoux, One-dimensional empirical measures, order statistics,and kantorovich transport distances, 2016.

G. Cormode, Personal privacy vs population privacy: learning to attack anonymization, ACC SIGKDD, 2011.

G. Cormode, C. M. Procopiuc, E. Shen, D. Srivastava, and T. Yu, Empirical privacy and empirical utility of anonymized data, Workshops Proceedings of ICDE, 2013.

S. J. De and D. L. Métayer, Privacy Risk Analysis. Synthesis Lectures on Information Security, Privacy, & Trust, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01420968

Z. Ding, Y. Wang, G. Wang, D. Zhang, and D. Kifer, Detecting violations of differential privacy, ACM CCS, pp.475-489, 2018.

C. Dwork, Differential privacy, ICALP, 2006.

K. E. Emam and C. Alvarez, A critical appraisal of the article 29 working party opinion 05/2014 on data anonymization techniques, Oxford Journals, vol.5, issue.1, pp.73-87, 2015.

S. R. Ganta, S. P. Kasiviswanathan, and A. D. Smith, Composition attacks and auxiliary information in data privacy, ACM SIGKDD, pp.265-273, 2008.

Q. Gong, Implementation of basic mondrian k-anonymity. goo.gl/ kKpqZ6, pp.1-02

Q. Gong, Implementation of mondrian l-diversity. goo.gl/2ymJ14

D. Kifer, Attacks on privacy and definetti's theorem, ACM SIGMOD, 2009.

J. Klucar and F. Mcsherry, Lunchtime for data privacy. goo.gl/ Lfq8iw, pp.1-02, 2016.

N. Li, T. Li, and S. Venkatasubramanian, t-closeness: Privacy beyond k-anonymity and l-diversity, ICDE, 2007.

M. Lyu, D. Su, and N. Li, Understanding the sparse vector technique for differential privacy, vol.10, pp.637-648, 2017.

M. Lyu, D. Su, and N. Li, Understanding the sparse vector technique for differential privacy, vol.10, pp.637-648, 2017.

A. Machanavajjhala and D. Kifer, Designing statistical privacy for your data, Commun. ACM, vol.58, issue.3, 2015.

A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, L-diversity: Privacy beyond k -anonymity, vol.1, p.3, 2007.

A. Pyrgelis, C. Troncoso, and E. D. Cristofaro, Knock knock, who's there? membership inference on aggregate location data, NDSS, 2018.

P. Samarati and L. Sweeney, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, 1998.

L. Sweeney, Uniqueness of simple demographics in the us population. LIDAP-WP4, 2000.

B. Woodward, The computer-based patient record and confidentiality, New England Journal of Medicine, vol.333, issue.21, pp.1419-1422, 1995.