1. Achieving anonymity via clustering;Aggarwal;ACM Trans. Algorithms (TALG),2010
2. Achieving high data utility k-anonymization using similarity-based clustering model;Aghdam;IEICE Trans. Information Systems,2016
3. Adaptive k-anonymity approach for privacy preserving in cloud;Arava;Arabian J. Sci. Eng.,2019
4. A systematic comparison and evaluation of k-anonymization algorithms for practitioners;Ayala-Rivera;Trans. Data Privacy,2014
5. Bhaladhare, P.R., Jinwala, D.C., 2016a. Novel approaches for privacy preserving data mining in k-anonymity model. J. Inf. Sci. Eng., 32(1), 63-78.