F. Osman-abul, M. Bonchi, and . Nanni, Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases, Proceedings of the 24th International Conference on Data Engineering, pp.376-385, 2008.

F. Osman-abul, M. Bonchi, and . Nanni, Anonymization of moving objects databases by clustering and perturbation, Inf. Syst, vol.35, pp.884-910, 2010.

K. Berker-agir, U. Huguenin, J. Hengartner, and . Hubaux, On the Privacy Implications of Location Semantics, PoPETs, vol.2016, pp.165-183, 2016.

M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, Geo-indistinguishability: differential privacy for location-based systems, 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, pp.901-914, 2013.

O. Barak, G. Cohen, and E. Toch, Anonymizing mobility data using semantic cloaking, Pervasive and Mobile Computing, vol.28, pp.102-112, 2016.

I. Bilogrevic, K. Huguenin, M. Jadliwala, F. Lopez, J. Hubaux et al., Inferring social ties in academic networks using short-range wireless communications, Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, pp.179-188, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00853975

I. Bilogrevic, K. Huguenin, S. Mihaila, R. Shokri, and J. Hubaux, Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms, 22nd Annual Network and Distributed System Security Symposium, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01076554

A. Boutet, S. B. Mokhtar, and V. Primault, Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets, Ph.D. Dissertation. LIRIS UMR CNRS, p.5205, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01381986

S. Cerf, V. Primault, A. Boutet, S. B. Mokhtar, R. Birke et al., PULP: Achieving Privacy and Utility Trade-Off in User Mobility Data, 36th IEEE Symposium on Reliable Distributed Systems, SRDS 2017, pp.164-173, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01578635

K. Chatzikokolakis, C. Palamidessi, and M. Stronati, Constructing elastic distinguishability metrics for location privacy, PoPETs, vol.2015, pp.156-170, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01270197

Y. Mulder, G. Danezis, L. Batina, and B. Preneel, Identification via location-profiling in GSM networks, Proceedings of the 7th ACM workshop on Privacy in the electronic society, pp.23-32, 2008.

C. Dwork, Differential privacy. Encyclopedia of Cryptography and Security, pp.338-340, 2011.

M. Dominik, J. E. Endres, and . Schindelin, A new metric for probability distributions, IEEE Transactions on Information theory, 2003.

K. Fawaz, G. Kang, and . Shin, Location Privacy Protection for Smartphone Users, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.239-250, 2014.

S. Gambs, M. Killijian, and M. Cortez, Next place prediction using mobility markov chains, Proceedings of the First Workshop on Measurement, Privacy, and Mobility, p.3, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00736947

S. Gambs, M. Killijian, and M. Cortez, De-anonymization attack on geolocated data, J. Comput. System Sci, vol.80, pp.1597-1614, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01242268

R. Gupta and U. Rao, An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Survey, Wireless Personal Communications, vol.96, pp.1973-2007, 2017.

Y. Huang, Z. Cai, and A. G. Bourgeois, Search locations safely and accurately: A location privacy protection algorithm with accurate service, J. Network and Computer Applications, vol.103, pp.146-156, 2018.

J. Laurila, D. Gatica-perez, . Aad, J. Blom, O. Bornet et al., The Mobile Data Challenge: Big Data for Mobile Computing Research, Pervasive Computing, 2012.

H. Li, H. Zhu, S. Du, X. Liang, and X. Shen, Privacy leakage of location sharing in mobile social networks: Attacks and defense, IEEE Transactions on Dependable and Secure Computing, vol.15, pp.646-660, 2018.

N. Maisonneuve, M. Stevens, M. E. Niessen, and L. Steels, NoiseTube: Measuring and mapping noise pollution with mobile phones, Information Technologies in Environmental Engineering, Proceedings of the 4th International ICSC Symposium, pp.215-228, 2009.

M. Maouche, S. B. Mokhtar, and S. Bouchenak, AP-Attack: A Novel User Re-identification Attack On Mobility Datasets, Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp.48-57, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01785155

M. Maouche, S. B. Mokhtar, and S. Bouchenak, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol.2, pp.1-25, 2018.

M. Piorkowski, Natasa Sarafijanovic-Djukic, and Matthias Grossglauser, 2009.

V. Primault, A. Boutet, S. B. Mokhtar, and L. Brunie, Adaptive Location Privacy with ALP, 35th IEEE Symposium on Reliable Distributed Systems, SRDS 2016, pp.269-278, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01370447

V. Primault, M. Maouche, A. Boutet, S. B. Mokhtar, S. Bouchenak et al., ACCIO: How to Make Location Privacy Experimentation Open and Easy, 38th IEEE International Conference on Distributed Computing Systems, ICDCS 2018, pp.896-906, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01784557

V. Primault, S. B. Mokhtar, C. Lauradoux, and L. Brunie, Differentially private location privacy in practice, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01148230

V. Primault, S. B. Mokhtar, C. Lauradoux, and L. Brunie, Time Distortion Anonymization for the Publication of Mobility Data with High Utility, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01170060

A. Sadilek and J. Krumm, Far Out: Predicting Long-Term Human Mobility, Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012.

P. Shankar, V. Ganapathy, and L. Iftode, Privately querying location-based services with SybilQuery, UbiComp 2009: Ubiquitous Computing, 11th International Conference, pp.31-40, 2009.

L. Sweeney, k-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, pp.557-570, 2002.

D. Wang, D. Pedreschi, C. Song, F. Giannotti, and A. Barabasi, Human mobility, social ties, and link prediction, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pp.1100-1108, 2011.

R. Wang, M. Zhang, D. Feng, Y. Fu, and Z. Chen, A de-anonymization attack on geo-located data considering spatio-temporal influences, International Conference on Information and Communications Security, pp.478-484, 2015.

Y. Zheng, X. Xie, and W. Ma, Geolife: A collaborative social networking service among user, location and trajectory, IEEE Data Eng. Bull, vol.33, pp.32-39, 2010.

C. Zhou, D. Frankowski, P. Ludford, S. Shekhar, and L. Terveen, Discovering personal gazetteers: an interactive clustering approach, Proceedings of the 12th annual ACM international workshop on Geographic information systems, pp.266-273, 2004.

C. Zhou, D. Frankowski, P. J. Ludford, S. Shekhar, and L. G. Terveen, Discovering personal gazetteers: an interactive clustering approach, 12th ACM International Workshop on Geographic Information Systems, ACM-GIS, pp.266-273, 2004.