1. On k-anonymity and the curse of dimensionality;Aggarwal,2005
2. Approximation algorithms for k-anonymity;Aggarwal,2005
3. Achieving high data utility k-anonymization using similarity-based clustering model;Aghdam;IEICE Trans. Inf. Syst.,2016
4. An obfuscation-based approach for protecting location privacy;Ardagna;IEEE Trans. Dependable Secure Comput.,2011
5. A systematic comparison and evaluation of k-anonymization algorithms for practitioners;Ayala-Rivera;Trans. Data Priv.,2014