{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:06:21Z","timestamp":1760079981193,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/icassp.2016.7472095","type":"proceedings-article","created":{"date-parts":[[2016,6,23]],"date-time":"2016-06-23T21:58:30Z","timestamp":1466719110000},"page":"2339-2343","source":"Crossref","is-referenced-by-count":13,"title":["Symmetric matrix perturbation for differentially-private principal component analysis"],"prefix":"10.1109","author":[{"given":"Hafiz","family":"Imtiaz","sequence":"first","affiliation":[]},{"given":"Anand D.","family":"Sarwate","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Private approximations of the 2nd-moment matrix using existing techniques in linear regression","author":"sheffet","year":"2015","journal-title":"Tech Rep arXiv 1507 00056 [cs DS] ArXiV"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/1035134"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/20A.1-2.32"},{"journal-title":"Spectral Methods for Data Analysis","year":"2004","author":"mc sherry","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-21540-2","author":"chikuse","year":"2003","journal-title":"Statistics on Special Manifolds"},{"year":"0","author":"imtiaz","key":"ref16"},{"article-title":"UCI machine learning repository","year":"2013","author":"lichman","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1145\/1065167.1065184","article-title":"Prac-tical privacy: The sulq framework","author":"blum","year":"2005","journal-title":"Proceedings of the Twenty-third ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems"},{"key":"ref3","first-page":"1","article-title":"Differential privacy for statistics: What we know and what we want to learn","author":"dwork","year":"2009","journal-title":"Proceedings of the 33rd International Colloquium on Automata Languages and Programming volume 4052 of LECTURE NOTES IN COMPUTER SCIENCE"},{"key":"ref6","first-page":"2861","article-title":"The noisy power method: A meta algorithm with applications","author":"hardt","year":"2014","journal-title":"Advances in Neural Information Processing Systems 27"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591883"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref7","first-page":"2905","article-title":"A near-optimal algorithm for differentially-private principal components","volume":"14","author":"chaudhuri","year":"2013","journal-title":"J Mach Learn Res"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.2259911"},{"key":"ref1","first-page":"265","article-title":"Cal-ibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Proceedings of the Third Conference on Theory of Cryp-tography"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973105.101"}],"event":{"name":"2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2016,3,20]]},"location":"Shanghai","end":{"date-parts":[[2016,3,25]]}},"container-title":["2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7465907\/7471614\/07472095.pdf?arnumber=7472095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T00:14:26Z","timestamp":1568074466000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7472095\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icassp.2016.7472095","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}