{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T22:11:05Z","timestamp":1773094265972,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2009,2,1]],"date-time":"2009-02-01T00:00:00Z","timestamp":1233446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1109\/tit.2008.2009605","type":"journal-article","created":{"date-parts":[[2009,2,13]],"date-time":"2009-02-13T18:54:48Z","timestamp":1234551288000},"page":"846-866","source":"Crossref","is-referenced-by-count":40,"title":["Compressed and Privacy-Sensitive Sparse Regression"],"prefix":"10.1109","volume":"55","author":[{"given":"Shuheng","family":"Zhou","sequence":"first","affiliation":[]},{"given":"John","family":"Lafferty","sequence":"additional","affiliation":[]},{"given":"Larry","family":"Wasserman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1214\/009053604000000067"},{"key":"ref32","author":"johnstone","year":"2004","journal-title":"?Sparse Principal Components Analysis ?"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1214\/lnms\/1215090080","volume":"36","author":"johnstone","year":"2001","journal-title":"State of the Art in Probability and Statistics Festchrift for Willem R van Zwet"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.834793"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1214\/009053607000000811"},{"key":"ref36","author":"wainwright","year":"2007","journal-title":"Advances in Neural Information Processing Systems 19"},{"key":"ref35","author":"horn","year":"1990","journal-title":"Matrix Analysis"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2307\/1390657"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871582"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/cpa.20124"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.885507"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.920190"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1660651"},{"key":"ref15","author":"davenport","year":"2006","journal-title":"?Detection and Estimation With Compressive Measurements ?"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2006.354994"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1117\/12.714460"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/026\/737400"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0378-3758(77)90007-6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250804"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/18.746779"},{"key":"ref27","first-page":"429","article-title":"towards a methodology for statistical disclosure control","volume":"15","author":"dalenius","year":"1977","journal-title":"Statistisk Tidskrift"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3150\/bj\/1106314846"},{"key":"ref6","author":"wainwright","year":"2006","journal-title":"?Sharp Thresholds for High-Dimensional and Noisy Recovery of Sparsity ?"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.860430"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1002\/ett.4460100604","article-title":"capacity of multi-antenna gaussian channels","volume":"10","author":"telatar","year":"1999","journal-title":"Europ Trans Telecommun"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1214\/009053606000000281"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.21236\/ADA472998"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1177011681"},{"key":"ref9","first-page":"2541","article-title":"On model selection consistency of lasso","volume":"7","author":"zhao","year":"2007","journal-title":"J Machine Learn Res"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014139"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2008.016823"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.14"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/18\/4777616\/04777644.pdf?arnumber=4777644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T01:55:12Z","timestamp":1640224512000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4777644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,2]]},"references-count":37,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tit.2008.2009605","relation":{},"ISSN":["0018-9448"],"issn-type":[{"value":"0018-9448","type":"print"}],"subject":[],"published":{"date-parts":[[2009,2]]}}}