1. Dewri, R., Annadata, P., Eltarjaman, & W., Thurimella, R. (2013). Inferring trip destinations from driving habits data. In Proceedings of the ACM conference on computer and communications security (pp. 267–272).
2. Xiaofeng, L., Zhaowei, Q., Qi, L., & Pan, H. (2014). Privacy information security classification study in internet of things. In International conference on identification, information and knowledge in the internet of things (pp. 162–165).
3. Mivule, K., & Turner, C. (2015). A comparative analysis of data privacy and utility parameter adjustment, using machine learning classification as a gauge. In Procedia computer science (pp. 414–419).
4. Torra, V., & Navarro-Arribas, G. (2014). Data privacy. Data Mining and Knowledge Discovery,
4, 269–280.
5. Sweeney, L. (2002). K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems,
10, 557–570.