{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:11:28Z","timestamp":1771611088224,"version":"3.50.1"},"reference-count":79,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/tit.2017.2700857","type":"journal-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T14:19:00Z","timestamp":1493821140000},"page":"5011-5038","source":"Crossref","is-referenced-by-count":54,"title":["Principal Inertia Components and Applications"],"prefix":"10.1109","volume":"63","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7493-1428","authenticated-orcid":false,"given":"Flavio du Pin","family":"Calmon","sequence":"first","affiliation":[]},{"given":"Ali","family":"Makhdoumi","sequence":"additional","affiliation":[]},{"given":"Muriel","family":"Medard","sequence":"additional","affiliation":[]},{"given":"Mayank","family":"Varia","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Christiansen","sequence":"additional","affiliation":[]},{"given":"Ken R.","family":"Duffy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"ref72","author":"tishby","year":"2000","journal-title":"The information bottleneck method"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483380"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139814782"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483335"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/18.32120"},{"key":"ref74","author":"gallager","year":"1968","journal-title":"Information Theory and Reliable Communication"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7447113"},{"key":"ref75","article-title":"Minimax lower bounds","author":"guntuboyina","year":"2011"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176347739"},{"key":"ref78","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-68276-1","author":"marshall","year":"2011","journal-title":"Inequalities Theory of Majorization and Its Applications"},{"key":"ref79","author":"eggleston","year":"2009","journal-title":"Convexity"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620260"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283845"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1137\/0128010"},{"key":"ref30","first-page":"207","article-title":"Maximum correlation coefficient (nonsymmetric case)","volume":"2","author":"sarmanov","year":"1962","journal-title":"Selected Translations in Math Stat and Probability"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2484066"},{"key":"ref36","author":"liu","year":"2016","journal-title":"Brascamplieb inequality and its reverse An information theoretic view"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7447175"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2013.6736575"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2014.7028602"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2014.6970882"},{"key":"ref61","author":"asoodeh","year":"2015","journal-title":"Information extraction under privacy constraints"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282996"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1017\/S0305004100013517"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282882"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1987.10478446"},{"key":"ref65","author":"horn","year":"1994","journal-title":"Topic in Matrix Analysis"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/zamm.19410210604"},{"key":"ref67","first-page":"289","article-title":"Effet de l&#x2019;affinement d&#x2019;une partition sur les valeurs propres issues d&#x2019;un tableau de correspondance","volume":"4","author":"deniau","year":"1979","journal-title":"Cahiers l&#x2019;analyse donn&#x00E9;es"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374458"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1214\/13-EJS787"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref1","author":"abu-mostafa","year":"2012","journal-title":"Learning From Data"},{"key":"ref20","first-page":"368","article-title":"The information bottleneck method","author":"tishby","year":"1999","journal-title":"Proc 37th Annu Allerton Conf Commun Control Comput"},{"key":"ref22","author":"anantharam","year":"2013","journal-title":"On Maximal Correlation Hypercontractivity and the Data Processing Inequality Studied by Erkip and Cover"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1176995937"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1561\/9781933019543","author":"csisz\u00e1r","year":"2004","journal-title":"Information Theory and Statistics A Tutorial"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139020411"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1201\/9781420011234","author":"greenacre","year":"2007","journal-title":"Correspondence Analysis in Practice"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2010.5707067"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1499586.1499731"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.190"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2013.6691224"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2014.7028548"},{"key":"ref57","author":"li","year":"2014","journal-title":"Maximal correlation secrecy"},{"key":"ref56","author":"polyanskiy","year":"2014","journal-title":"Dissipation of Information in Channels with Input Constraints"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2013.6736724"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2259613"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2253320"},{"key":"ref10","author":"duchi","year":"2013","journal-title":"Distance-based and continuum Fano inequalities with applications to statistical estimation"},{"key":"ref11","author":"greenacre","year":"1984","journal-title":"Theory and Applications of Correspondence Analysis"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2090211"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/2288473"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BF02024507"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1561\/0100000004"},{"key":"ref15","author":"oppenheim","year":"2009","journal-title":"Discrete-Time Signal Processing"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"4515","DOI":"10.1109\/TIT.2014.2326877","article-title":"Which Boolean functions maximize mutual information on noisy inputs?","volume":"60","author":"kumar","year":"2014","journal-title":"IEEE Trans Inf Theory"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/18.50384"},{"key":"ref18","first-page":"1401","article-title":"Privacy against statistical inference","author":"calmon","year":"2012","journal-title":"Proc 50th Annu Allerton Conf Commun Control Comput"},{"key":"ref19","article-title":"PriView: Media consumption and recommendation meet privacy against inference attacks","author":"zhang","year":"2014","journal-title":"Proc IEEE Web 2 0 Secur Privacy Workshop"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11787006_1","article-title":"Differential privacy","volume":"4052","author":"dwork","year":"2006","journal-title":"Automata Languages and Programming"},{"key":"ref3","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Proc TCC"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1109\/JSTSP.2015.2442227","article-title":"Managing your private and public data: Bringing down inference attacks against your privacy","volume":"9","author":"zhang","year":"2015","journal-title":"IEEE J Sel Topics Signal Process"},{"key":"ref5","first-page":"269","article-title":"How to hide the elephant-or the donkey-in the room: Practical privacy against statistical inference for large data","author":"zhang","year":"2013","journal-title":"Proc IEEE GlobalSIP"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.100"},{"key":"ref49","author":"samorodnitsky","year":"2015","journal-title":"The &#x2018;Most informative Boolean function&#x2019; conjecture holds for high noise"},{"key":"ref9","author":"cover","year":"2006","journal-title":"Elements of Information Theory"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2013.6736499"},{"key":"ref45","author":"kindler","year":"2015","journal-title":"Remarks on the most informative function conjecture at fixed mean"},{"key":"ref48","first-page":"1","article-title":"Most informative quantization functions","author":"chandar","year":"2014","journal-title":"Proc ITA"},{"key":"ref47","author":"ordentlich","year":"2015","journal-title":"An improved upper bound for the most informative boolean function conjecture"},{"key":"ref42","author":"guntuboyina","year":"2013","journal-title":"Sharp Inequalities for F-divergences"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2110791"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/18.915643"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2050835"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/7976396\/07918623.pdf?arnumber=7918623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:40:04Z","timestamp":1641987604000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7918623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":79,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tit.2017.2700857","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8]]}}}