{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:42:41Z","timestamp":1759941761722,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/globalsip.2016.7906058","type":"proceedings-article","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T19:50:55Z","timestamp":1494618655000},"page":"1335-1339","source":"Crossref","is-referenced-by-count":7,"title":["Analysis of a privacy-preserving PCA algorithm using random matrix theory"],"prefix":"10.1109","author":[{"given":"Lu","family":"Wei","sequence":"first","affiliation":[]},{"given":"Anand D.","family":"Sarwate","sequence":"additional","affiliation":[]},{"given":"Jukka","family":"Corander","sequence":"additional","affiliation":[]},{"given":"Alfred","family":"Hero","sequence":"additional","affiliation":[]},{"given":"Vahid","family":"Tarokh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref11","article-title":"Statistics on Special Manifolds","volume":"174","author":"chikuse","year":"2003","journal-title":"Lecture Notes in Statistics"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1142\/3438"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-06-01824-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1031689021"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1198\/jcgs.2009.07177"},{"journal-title":"Hypergeometric function of a matrix argument","year":"2008","author":"koev","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0047-259X(92)90072-N"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591883"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065184"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472095"},{"journal-title":"Private approximations of the 2nd-moment matrix using existing techniques in linear regression","year":"2015","author":"sheffet","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488650"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973105.101"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/11681878_14","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Proceedings of Theoretical Cryptography Conference (TCC)"},{"key":"ref1","first-page":"2905","article-title":"A near-optimal algorithm for differentially-private principal components","volume":"14","author":"chaudhuri","year":"2013","journal-title":"J Mach Learn Res"},{"key":"ref9","article-title":"The noisy power method: A meta algorithm with applications","author":"hardt","year":"2014","journal-title":"Proceedings of Conference on Neural Information Processing Systems (NIPS'14)"}],"event":{"name":"2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","start":{"date-parts":[[2016,12,7]]},"location":"Washington DC, DC, USA","end":{"date-parts":[[2016,12,9]]}},"container-title":["2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7897403\/7905762\/07906058.pdf?arnumber=7906058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T11:43:53Z","timestamp":1569325433000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7906058\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/globalsip.2016.7906058","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}