1: \begin{thebibliography}{40}
2: \expandafter\ifx\csname natexlab\endcsname\relax\def\natexlab#1{#1}\fi
3: \expandafter\ifx\csname url\endcsname\relax
4: \def\url#1{\texttt{#1}}\fi
5: \expandafter\ifx\csname urlprefix\endcsname\relax\def\urlprefix{URL }\fi
6:
7: \bibitem[{Agrawal and Aggarwal(2001)}]{Agrawal:01}
8: \textsc{Agrawal, D.} and \textsc{Aggarwal, C.~C.} (2001).
9: \newblock On the design and quantification of privacy preserving data mining
10: algorithms.
11: \newblock In \textit{In Proceedings of the 20th Symposium on Principles of
12: Database Systems}.
13:
14: \bibitem[{Bennett(1962)}]{Ben62}
15: \textsc{Bennett, G.} (1962).
16: \newblock Probability inequalities for the sum of independent random variables.
17: \newblock \textit{Journal of the American Statistical Association} \textbf{57}
18: 33--45.
19:
20: \bibitem[{Cand\`{e}s et~al.(2006)Cand\`{e}s, Romberg and
21: Tao}]{Candes:Romberg:Tao:06}
22: \textsc{Cand\`{e}s, E.}, \textsc{Romberg, J.} and \textsc{Tao, T.} (2006).
23: \newblock Stable signal recovery from incomplete and inaccurate measurements.
24: \newblock \textit{Communications in Pure and Applied Mathematics} \textbf{59}
25: 1207--1223.
26:
27: \bibitem[{Cand\`{e}s and Tao(2006)}]{Candes:Tao:06}
28: \textsc{Cand\`{e}s, E.} and \textsc{Tao, T.} (2006).
29: \newblock Near optimal signal recovery from random projections: {U}niversal
30: encoding strategies?
31: \newblock \textit{IEEE Trans. Info. Theory} \textbf{52} 5406--5425.
32:
33: \bibitem[{Dalenius(1977{\natexlab{a}})}]{Dalenius:77}
34: \textsc{Dalenius, T.} (1977{\natexlab{a}}).
35: \newblock Privacy transformations for statistical information systems.
36: \newblock \textit{J. Statis. Plann. Inference} \textbf{1} 73--86.
37:
38: \bibitem[{Dalenius(1977{\natexlab{b}})}]{Dalenius:77b}
39: \textsc{Dalenius, T.} (1977{\natexlab{b}}).
40: \newblock Towards a methodology for statistical disclosure control.
41: \newblock \textit{Statistik Tidskrift} \textbf{15} 429--444.
42:
43: \bibitem[{Davenport et~al.(2007)Davenport, Duarte, Wakin, Laska, Takhar, Kelly
44: and Baraniuk}]{Davenport:06b}
45: \textsc{Davenport, M.}, \textsc{Duarte, M.}, \textsc{Wakin, M.}, \textsc{Laska,
46: J.}, \textsc{Takhar, D.}, \textsc{Kelly, K.} and \textsc{Baraniuk, R.}
47: (2007).
48: \newblock The smashed filter for compressive classification and target
49: recognition.
50: \newblock In \textit{Proc. of Computational Imaging V}.
51:
52: \bibitem[{Davenport et~al.(2006)Davenport, Wakin and Baraniuk}]{Davenport:06}
53: \textsc{Davenport, M.}, \textsc{Wakin, M.} and \textsc{Baraniuk, R.} (2006).
54: \newblock Detection and estimation with compressive measurements.
55: \newblock Tech. rep., Rice ECE Department, TREE 0610.
56:
57: \bibitem[{Donoho(2006)}]{Donoho:cs}
58: \textsc{Donoho, D.} (2006).
59: \newblock Compressed sensing.
60: \newblock \textit{IEEE Trans. Info. Theory} \textbf{52} 1289--1306.
61:
62: \bibitem[{Donoho et~al.(2006)Donoho, Elad and Temlyakov}]{DET06}
63: \textsc{Donoho, D.}, \textsc{Elad, M.} and \textsc{Temlyakov, V.} (2006).
64: \newblock Stable recovery of sparse overcomplete representations in the
65: presence of noise.
66: \newblock \textit{IEEE Transactions on Information Theory} \textbf{52} 6--18.
67:
68: \bibitem[{Donoho and Tanner(2006)}]{Donoho:Tanner:06}
69: \textsc{Donoho, D.} and \textsc{Tanner, J.} (2006).
70: \newblock Thresholds for the recovery of sparse solutions via $\ell_1$
71: minimization.
72: \newblock \textit{Proc. Conf. on Information Sciences and Systems} .
73:
74: \bibitem[{Duarte et~al.(2006)Duarte, Davenport, Wakin and Baraniuk}]{Duarte:06}
75: \textsc{Duarte, M.}, \textsc{Davenport, M.}, \textsc{Wakin, M.} and
76: \textsc{Baraniuk, R.} (2006).
77: \newblock Sparse signal detection from incoherent projections.
78: \newblock In \textit{Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal
79: Processing (ICASSP)}.
80:
81: \bibitem[{Duncan and Pearson(1991)}]{duncan:91}
82: \textsc{Duncan, G.} and \textsc{Pearson, R.} (1991).
83: \newblock Enhancing access to microdata while protecting confidentiality:
84: Prospects for the future.
85: \newblock \textit{Statistical Science} \textbf{6} 219--232.
86:
87: \bibitem[{Dwork(2006)}]{Dwork:06}
88: \textsc{Dwork, C.} (2006).
89: \newblock Differential privacy.
90: \newblock In \textit{33rd International Colloquium on Automata, Languages and
91: Programming--ICALP 2006}.
92:
93: \bibitem[{Dwork et~al.(2007)Dwork, McSherry and Talwar}]{Dwork:07}
94: \textsc{Dwork, C.}, \textsc{McSherry, F.} and \textsc{Talwar, K.} (2007).
95: \newblock The price of privacy and the limits of {LP} decoding.
96: \newblock In \textit{Proceedings of Symposium on the Theory of Computing
97: (STOC)}.
98:
99: \bibitem[{Efron et~al.(2004)Efron, Hastie, Johnstone and Tibshirani}]{EHJ04}
100: \textsc{Efron, B.}, \textsc{Hastie, T.}, \textsc{Johnstone, I.} and
101: \textsc{Tibshirani, R.} (2004).
102: \newblock Least angle regression.
103: \newblock \textit{Annals of Statistics} \textbf{32} 407--499.
104:
105: \bibitem[{Feigenbaum et~al.(2006)Feigenbaum, Ishai, Malkin, Nissim, Strauss and
106: Wright}]{feigen:06}
107: \textsc{Feigenbaum, J.}, \textsc{Ishai, Y.}, \textsc{Malkin, T.},
108: \textsc{Nissim, K.}, \textsc{Strauss, M.~J.} and \textsc{Wright, R.~N.}
109: (2006).
110: \newblock Secure multiparty computation of approximations.
111: \newblock \textit{ACM Trans. Algorithms} \textbf{2} 435--472.
112:
113: \bibitem[{Greenshtein and Ritov(2004)}]{GR04}
114: \textsc{Greenshtein, E.} and \textsc{Ritov, Y.} (2004).
115: \newblock Persistency in high dimensional linear predictor-selection and the
116: virtue of over-parametrization.
117: \newblock \textit{Journal of Bernoulli} \textbf{10} 971--988.
118:
119: \bibitem[{Haupt et~al.(2006)Haupt, Castro, Nowak, Fudge and Yeh}]{Haupt:06}
120: \textsc{Haupt, J.}, \textsc{Castro, R.}, \textsc{Nowak, R.}, \textsc{Fudge, G.}
121: and \textsc{Yeh, A.} (2006).
122: \newblock Compressive sampling for signal classification.
123: \newblock In \textit{Proc. Asilomar Conference on Signals, Systems, and
124: Computers}.
125:
126: \bibitem[{Horn and Johnson(1990)}]{HJ90}
127: \textsc{Horn, R.} and \textsc{Johnson, C.} (1990).
128: \newblock \textit{Matrix Analysis}.
129: \newblock Cambridge University Press; Reprint edition.
130:
131: \bibitem[{Indyk and Woodruff(2006)}]{indyk:06}
132: \textsc{Indyk, P.} and \textsc{Woodruff, D.~P.} (2006).
133: \newblock Polylogarithmic private approximations and efficient matching.
134: \newblock In \textit{TCC}.
135:
136: \bibitem[{Johnson and Lindenstrauss(1984)}]{JL:84}
137: \textsc{Johnson, W.~B.} and \textsc{Lindenstrauss, J.} (1984).
138: \newblock Extensions of {L}ipschitz mappings into a {H}ilbert space.
139: \newblock In \textit{Proc. Conf. in Modern Analysis and Probability}.
140:
141: \bibitem[{Johnstone(2001)}]{Joh01}
142: \textsc{Johnstone, I.} (2001).
143: \newblock Chi-square oracle inequalities.
144: \newblock \textit{In State of the Art in Probability and Statistics, Festchrift
145: for Willem R. van Zwet, M. de Gunst and C. Klaassen and A. van der Waart
146: editors, IMS Lecture Notes - Monographs} \textbf{36} 399--418.
147:
148: \bibitem[{Lafferty and Wasserman(2007)}]{Rodeo}
149: \textsc{Lafferty, J.} and \textsc{Wasserman, L.} (2007).
150: \newblock Rodeo: Sparse, greedy nonparametric regression.
151: \newblock \textit{The Annals of Statistics} To appear.
152:
153: \bibitem[{Ledoux and Talagrand(1991)}]{LT91}
154: \textsc{Ledoux, M.} and \textsc{Talagrand, M.} (1991).
155: \newblock \textit{Probability in Banach Spaces: Isoperimetry and processes}.
156: \newblock Springer.
157:
158: \bibitem[{Liu et~al.(2006)Liu, Kargupta and Ryan}]{Liu:06}
159: \textsc{Liu, K.}, \textsc{Kargupta, H.} and \textsc{Ryan, J.} (2006).
160: \newblock Random projection-based multiplicative data perturbation for privacy
161: preserving distributed data mining.
162: \newblock \textit{IEEE Trans. on Knowledge and Data Engineering} \textbf{18}.
163:
164: \bibitem[{Marzetta and Hochwald(1999)}]{Marzetta:99}
165: \textsc{Marzetta, T.~L.} and \textsc{Hochwald, B.~M.} (1999).
166: \newblock Capacity of a mobile multiple-antenna communication link in rayleigh
167: flat fading.
168: \newblock \textit{IEEE Trans. Info. Theory} \textbf{45} 139--157.
169:
170: \bibitem[{Meinshausen and Buhlmann(2006)}]{MB06}
171: \textsc{Meinshausen, N.} and \textsc{Buhlmann, P.} (2006).
172: \newblock High dimensional graphs and variable selection with the lasso.
173: \newblock \textit{Annals of Statistics} \textbf{34} 1436--1462.
174:
175: \bibitem[{Meinshausen and Yu(2006)}]{MY06}
176: \textsc{Meinshausen, N.} and \textsc{Yu, B.} (2006).
177: \newblock Lasso-type recovery of sparse representations for high-dimensional
178: data.
179: \newblock Tech. Rep. 720, Department of Statistics, UC Berkeley.
180:
181: \bibitem[{Osborne et~al.(2000)Osborne, Presnell and Turlach}]{OPT00}
182: \textsc{Osborne, M.}, \textsc{Presnell, B.} and \textsc{Turlach, B.} (2000).
183: \newblock On the lasso and its dual.
184: \newblock \textit{Journal of Computational and Graphical Statistics} \textbf{9}
185: 319--337.
186:
187: \bibitem[{Rauhut et~al.(2007)Rauhut, Schnass and Vandergheynst}]{RSV07}
188: \textsc{Rauhut, H.}, \textsc{Schnass, K.} and \textsc{Vandergheynst, P.}
189: (2007).
190: \newblock Compressed sensing and redundant dictionaries.
191: \newblock Submitted to {IEEE} {T}ransactions on {I}nformation {T}heory.
192:
193: \bibitem[{Sanil et~al.(2004)Sanil, Karr, Lin and Reiter}]{Sanil:04}
194: \textsc{Sanil, A.~P.}, \textsc{Karr, A.}, \textsc{Lin, X.} and \textsc{Reiter,
195: J.~P.} (2004).
196: \newblock Privacy preserving regression modelling via distributed computation.
197: \newblock In \textit{In Proceedings of Tenth ACM SIGKDD International
198: Conference on Knowledge Discovery and Data Mining}.
199:
200: \bibitem[{Telatar(1999)}]{Telatar:99}
201: \textsc{Telatar, I.~E.} (1999).
202: \newblock Capacity of multi-antenna {G}aussian channels.
203: \newblock \textit{European Trans. on Telecommunications} \textbf{10} 585--595.
204:
205: \bibitem[{Tibshirani(1996)}]{Tib96}
206: \textsc{Tibshirani, R.} (1996).
207: \newblock Regression shrinkage and selection via the lasso.
208: \newblock \textit{J. Roy. Statist. Soc. Ser. B} \textbf{58} 267--288.
209:
210: \bibitem[{Ting et~al.(2007)Ting, Fienberg and Trottini}]{Ting:07}
211: \textsc{Ting, D.}, \textsc{Fienberg, S.~E.} and \textsc{Trottini, M.} (2007).
212: \newblock Random orthogonal matrix masking methodology for microdata release.
213: \newblock \textit{Int. J. of Information and Computer Security} .
214:
215: \bibitem[{Tropp(2004)}]{Tro04}
216: \textsc{Tropp, J.} (2004).
217: \newblock Greed is good: Algorithmic results for sparse approximation.
218: \newblock \textit{IEEE Transactions on Information Theory} \textbf{50}
219: 2231--2242.
220:
221: \bibitem[{Wainwright(2006)}]{Wai06}
222: \textsc{Wainwright, M.} (2006).
223: \newblock Sharp thresholds for high-dimensional and noisy recovery of sparsity.
224: \newblock Tech. Rep. 709, Department of Statistics, UC Berkeley.
225:
226: \bibitem[{Wainwright(2007)}]{Wai07}
227: \textsc{Wainwright, M.} (2007).
228: \newblock Information-theoretic limits on sparsity recovery in the
229: high-dimensional and noisy setting.
230: \newblock Tech. Rep. 725, Department of Statistics, UC Berkeley.
231:
232: \bibitem[{Wainwright et~al.(2007)Wainwright, Ravikumar and Lafferty}]{wain:07}
233: \textsc{Wainwright, M.}, \textsc{Ravikumar, P.} and \textsc{Lafferty, J.}
234: (2007).
235: \newblock High-dimensional graphical model selection using $\ell_1$-regularized
236: logistic regression.
237: \newblock In \textit{Advances in Neural Information Processing Systems 19}. MIT
238: Press.
239:
240: \bibitem[{Zhao and Yu(2007)}]{ZY07}
241: \textsc{Zhao, P.} and \textsc{Yu, B.} (2007).
242: \newblock On model selection consistency of lasso.
243: \newblock \textit{Journal of Machine Learning Research} \textbf{7} 2541--2567.
244:
245: \end{thebibliography}
246: