J. A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten, and V. Shmatikov, you might also like:" privacy risks of collaborative filtering, Security and Privacy (SP), 2011 IEEE Symposium on, pp.231-246, 2011.

Y. A. De-montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, Unique in the crowd: The privacy bounds of human mobility, Scientific reports, vol.3, p.1376, 2013.

C. Dwork, Differential privacy: A survey of results, International Conference on Theory and Applications of Models of Computation, pp.1-19, 2008.

K. Fawaz and K. G. Shin, Location privacy protection for smartphone users, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.239-250, 2014.

D. Frey, R. Guerraoui, A. M. Kermarrec, and A. Rault, Collaborative filtering under a sybil attack: analysis of a privacy threat, Proceedings of the Eighth European Workshop on System Security, p.5, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01158723

Z. Huo, X. Meng, H. Hu, and Y. Huang, You can walk alone: Trajectory privacypreserving through significant stays protection, 2012.

K. Jiang, D. Shao, S. Bressan, T. Kister, and K. L. Tan, Publishing trajectories with differential privacy guarantees, 2013.

Y. Kanza and H. Samet, An online marketplace for geosocial data, Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, p.10, 2015.

Y. Koren, R. Bell, and C. Volinsky, Matrix factorization techniques for recommender systems, Computer, issue.8, pp.30-37, 2009.

I. Parris and F. B. Abdesslem, Crawdad st andrews/locshare dataset, 2011.

N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley et al., Understanding and capturing people's privacy policies in a mobile social networking application, Personal and Ubiquitous Computing, vol.13, issue.6, pp.401-412, 2009.

H. Shin, S. Kim, J. Shin, and X. Xiao, Privacy enhanced matrix factorization for recommendation with local differential privacy, IEEE Transactions on Knowledge and Data Engineering, vol.30, pp.1770-1782, 2018.

L. Sweeney, k-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.

S. L. Warner, Randomized response: A survey technique for eliminating evasive answer bias, Journal of the American Statistical Association, vol.60, issue.309, pp.63-69, 1965.

A. Wasef and X. S. Shen, Rep: Location privacy for vanets using random encryption periods, Mobile Networks and Applications, vol.15, issue.1, pp.172-185, 2010.

Y. Zhao, J. Ye, and T. Henderson, Privacy-aware Location Privacy Preference Recommendations, Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp.120-129

, MOBIQUITOUS, vol.14, 2014.