Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases, 2008 IEEE 24th International Conference on Data Engineering, pp.376-385, 2008. ,
DOI : 10.1109/ICDE.2008.4497446
URL : http://www-kdd.isti.cnr.it/NWA/NWA_ICDE08.pdf
Hiding Sequential and Spatiotemporal Patterns, IEEE Transactions on Knowledge and Data Engineering, vol.22, issue.12, pp.1709-1723, 2010. ,
DOI : 10.1109/TKDE.2009.213
Efficient string matching: an aid to bibliographic search, Communications of the ACM, vol.18, issue.6, 1975. ,
DOI : 10.1145/360825.360855
Publishing set-valued data via differential privacy, PVLDB, vol.4, issue.11, pp.1087-1098, 2011. ,
Set cover algorithms for very large datasets, Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, pp.479-488, 2010. ,
DOI : 10.1145/1871437.1871501
Algorithm on strings, 2007. ,
DOI : 10.1017/CBO9780511546853
URL : https://hal.archives-ouvertes.fr/hal-00619586
Differential Privacy, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Revisiting sequential pattern hiding to enhance utility, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pp.1316-1324, 2011. ,
DOI : 10.1145/2020408.2020605
Utility-guided clustering-based transaction data anonymization, Trans. Data Privacy, vol.5, issue.1, pp.223-251, 2012. ,
MaskIt, Proceedings of the 2012 international conference on Management of Data, SIGMOD '12, pp.289-300, 2012. ,
DOI : 10.1145/2213836.2213870
Permutation-Based Sequential Pattern Hiding, 2013 IEEE 13th International Conference on Data Mining, pp.241-250, 2013. ,
DOI : 10.1109/ICDM.2013.57
URL : http://users.cs.cf.ac.uk/G.Loukides/PH_ICDM.pdf
On the complexity of privacy-preserving complex event processing, Proceedings of the 30th symposium on Principles of database systems of data, PODS '11, pp.165-174, 2011. ,
DOI : 10.1145/1989284.1989304
URL : http://pages.cs.wisc.edu/%7Esid/papers/CEP_privacy.pdf
Optimal event sequence sanitization, Proceedings of the 2015 SIAM International Conference on Data Mining, pp.775-783 ,
DOI : 10.1137/1.9781611974010.87
URL : https://epubs.siam.org/doi/pdf/10.1137/1.9781611974010.87
Anonymity preserving sequential pattern mining, Artificial Intelligence and Law, vol.30, issue.4, pp.141-173, 2014. ,
DOI : 10.1145/604264.604271
Protecting sensitive knowledge by data sanitization, Third IEEE International Conference on Data Mining, pp.211-218, 2003. ,
DOI : 10.1109/ICDM.2003.1250990
URL : http://www.cs.ualberta.ca/%7Ezaiane/postscript/icdm03.pdf
Apriori-based algorithms for km-anonymizing trajectory data, Trans. Data Privacy, vol.7, issue.2, pp.165-194, 2014. ,
Differentially private aggregation of distributed time-series with transformation and encryption, Proceedings of the 2010 international conference on Management of data, SIGMOD '10, pp.735-746, 2010. ,
DOI : 10.1145/1807167.1807247
URL : http://research.microsoft.com/en-us/people/sumann/paste-tr.pdf
Efficient Time-Stamped Event Sequence Anonymization, ACM Transactions on the Web, vol.8, issue.1, pp.1-4, 2013. ,
DOI : 10.1145/2532643
URL : http://www.cs.hku.hk/research/techreps/document/TR-2011-02.pdf
Hiding Sensitive Frequent Itemsets by a Border-Based Approach, Journal of Computing Science and Engineering, vol.1, issue.1, pp.426-433, 2005. ,
DOI : 10.5626/JCSE.2007.1.1.074
URL : http://www.ndsl.kr/soc_img/society/kiss/E1EIKI/2007/v1n1/E1EIKI_2007_v1n1_74.pdf
Association rule hiding, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.4, pp.434-447, 2004. ,
DOI : 10.1109/TKDE.2004.1269668
URL : http://www.comp.nus.edu.sg/~kalnis/cs5322/Verykios03.pdf
Utility-maximizing event stream suppression, Proceedings of the 2013 international conference on Management of data, SIGMOD '13, pp.589-600, 2013. ,
DOI : 10.1145/2463676.2465305
URL : http://pages.cs.wisc.edu/%7Eheyeye/paper/CEP-privacy-SIGMOD13.pdf