{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:49Z","timestamp":1750221049276,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,22]],"date-time":"2018-10-22T00:00:00Z","timestamp":1540166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2017JM1001"],"award-info":[{"award-number":["2017JM1001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,22]]},"DOI":"10.1145\/3207677.3278070","type":"proceedings-article","created":{"date-parts":[[2018,10,18]],"date-time":"2018-10-18T14:19:29Z","timestamp":1539872369000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Randomized Method for Robust Principal Component Analysis"],"prefix":"10.1145","author":[{"given":"Sanyang","family":"Liu","sequence":"first","affiliation":[{"name":"Xidian University, Shaanxi, China"}]},{"given":"Chong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xidian University, Shaanxi, China"}]}],"member":"320","published-online":{"date-parts":[[2018,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500.2319"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02288367"},{"issue":"100","key":"e_1_3_2_1_3_1","first-page":"513","article-title":"Principal component analysis","volume":"87","author":"Jolliffe Lan T.","year":"2011","journal-title":"Journal of Marketing Research"},{"key":"e_1_3_2_1_4_1","unstructured":"J. Wright A. Ganesh S. Rao and Y. Ma. 2009. Robust Principal Component Analysis: Exact Recovery of Corrupted Low-Rank Matrices. In Proceeding of Advances in Neural Information Processing Systems 87(4) 20:3--20:56.   J. Wright A. Ganesh S. Rao and Y. Ma. 2009. Robust Principal Component Analysis: Exact Recovery of Corrupted Low-Rank Matrices. In Proceeding of Advances in Neural Information Processing Systems 87(4) 20:3--20:56."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2826566"},{"issue":"3","key":"e_1_3_2_1_6_1","first-page":"707","article-title":"Fast convex optimization algorithms for exact recovery of a corrupted low-rank matrix","volume":"56","author":"Lin Z.","year":"2009","journal-title":"Journal of the Marine Biological Association of the Uk"},{"key":"e_1_3_2_1_7_1","unstructured":"Z. Lin M. Chen and Y. Ma. 2009. The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices. Eprint Arxiv 9.  Z. Lin M. Chen and Y. Ma. 2009. The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices. Eprint Arxiv 9."},{"key":"e_1_3_2_1_8_1","unstructured":"X. Yuan and J. Yang. 2009. Sparse and low rank matrix decomposition via alternating direction method. Pacific Journal of Optimization 9(1).  X. Yuan and J. Yang. 2009. Sparse and low rank matrix decomposition via alternating direction method. Pacific Journal of Optimization 9(1)."},{"volume-title":"Proceeding of IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","year":"2015","author":"Oh Tae H.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Y. Li W. Yu. 2017. A Fast Implementation of Singular Value Thresholding Algorithm using Recycling Rank Revealing Randomized Singular Value Decomposition. arXiv preprint arXiv:1704.05528.  Y. Li W. Yu. 2017. A Fast Implementation of Singular Value Thresholding Algorithm using Recycling Rank Revealing Randomized Singular Value Decomposition. arXiv preprint arXiv:1704.05528."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"V. Rokhlin A. Szlam and M. Tygert. 2009. A Randomized Algorithm for Principal Component Analysis. Siam Journal on Matrix Analysis and Applications 31(3).  V. Rokhlin A. Szlam and M. Tygert. 2009. A Randomized Algorithm for Principal Component Analysis. Siam Journal on Matrix Analysis and Applications 31(3).","DOI":"10.1137\/080736417"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/090771806"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2016.11.001"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3934\/bdia.2016001"},{"volume-title":"Advances in Neural Information Processing Systems","year":"2011","author":"Lin Z.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"J. Cai E. Cand\u00e8s and Z. Shen. A singular value thresholding algorithm for matrix completion. SIAM Journal on Optimization 20 (2010) 1956--1982.  J. Cai E. Cand\u00e8s and Z. Shen. A singular value thresholding algorithm for matrix completion. SIAM Journal on Optimization 20 (2010) 1956--1982.","DOI":"10.1137\/080738970"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488620"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000035"},{"key":"e_1_3_2_1_19_1","unstructured":"Per G. Martinsson. 2016. Randomized methods for matrix computations. arXiv preprint arXiv:1607.01649.  Per G. Martinsson. 2016. Randomized methods for matrix computations. arXiv preprint arXiv:1607.01649."},{"volume-title":"Technical Report 1361, Department of Computer Science","year":"2006","author":"Martinsson Per G.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","unstructured":"M.Hached and K. Jbilou. 2018. Numerical methods for differential linear matrix equations via Krylov subspace methods. arXiv preprint arXiv:1805.10192.  M.Hached and K. Jbilou. 2018. Numerical methods for differential linear matrix equations via Krylov subspace methods. arXiv preprint arXiv:1805.10192."}],"event":{"name":"CSAE '18: The 2nd International Conference on Computer Science and Application Engineering","acronym":"CSAE '18","location":"Hohhot China"},"container-title":["Proceedings of the 2nd International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3207677.3278070","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3207677.3278070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:12Z","timestamp":1750207452000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3207677.3278070"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,22]]},"references-count":21,"alternative-id":["10.1145\/3207677.3278070","10.1145\/3207677"],"URL":"https:\/\/doi.org\/10.1145\/3207677.3278070","relation":{},"subject":[],"published":{"date-parts":[[2018,10,22]]},"assertion":[{"value":"2018-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}