## Privacy * [k-ANONYMITY: A model for Protecting Privacy (1998)](https://epic.org/wp-content/uploads/privacy/reidentification/Sweeney_Article.pdf) * [Differential Privacy(2006)](https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/dwork.pdf) * [Robust De-anonymization of Large Sparse Datasets(2008)](https://www.cs.utexas.edu/~shmat/shmat_oak08netflix.pdf) * [Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization(2010)](https://www.uclalawreview.org/broken-promises-of-privacy-responding-to-the-surprising-failure-of-anonymization-2/) * [Timing Attacks on Web Privacy(2000)](https://www.cs.jhu.edu/~fabian/courses/CS600.424/course_papers/webtiming.pdf) * [Protecting Browser State from Web Privacy Attacks(2006)](https://crypto.stanford.edu/sameorigin/sameorigin.pdf) * [KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale(2019)](https://storage.googleapis.com/pub-tools-public-publication-data/pdf/40bc2804cbd3e41ed28dc8991316361eca48630c.pdf) ### Other Sources * [Privacy Papers for Visual Data](https://github.com/brighter-ai/awesome-privacy-papers)