0706.0534/cr.bbl
1: \begin{thebibliography}{40}
2: \expandafter\ifx\csname natexlab\endcsname\relax\def\natexlab#1{#1}\fi
3: \expandafter\ifx\csname url\endcsname\relax
4:   \def\url#1{\texttt{#1}}\fi
5: \expandafter\ifx\csname urlprefix\endcsname\relax\def\urlprefix{URL }\fi
6: 
7: \bibitem[{Agrawal and Aggarwal(2001)}]{Agrawal:01}
8: \textsc{Agrawal, D.} and \textsc{Aggarwal, C.~C.} (2001).
9: \newblock On the design and quantification of privacy preserving data mining
10:   algorithms.
11: \newblock In \textit{In Proceedings of the 20th Symposium on Principles of
12:   Database Systems}.
13: 
14: \bibitem[{Bennett(1962)}]{Ben62}
15: \textsc{Bennett, G.} (1962).
16: \newblock Probability inequalities for the sum of independent random variables.
17: \newblock \textit{Journal of the American Statistical Association} \textbf{57}
18:   33--45.
19: 
20: \bibitem[{Cand\`{e}s et~al.(2006)Cand\`{e}s, Romberg and
21:   Tao}]{Candes:Romberg:Tao:06}
22: \textsc{Cand\`{e}s, E.}, \textsc{Romberg, J.} and \textsc{Tao, T.} (2006).
23: \newblock Stable signal recovery from incomplete and inaccurate measurements.
24: \newblock \textit{Communications in Pure and Applied Mathematics} \textbf{59}
25:   1207--1223.
26: 
27: \bibitem[{Cand\`{e}s and Tao(2006)}]{Candes:Tao:06}
28: \textsc{Cand\`{e}s, E.} and \textsc{Tao, T.} (2006).
29: \newblock Near optimal signal recovery from random projections: {U}niversal
30:   encoding strategies?
31: \newblock \textit{IEEE Trans. Info. Theory} \textbf{52} 5406--5425.
32: 
33: \bibitem[{Dalenius(1977{\natexlab{a}})}]{Dalenius:77}
34: \textsc{Dalenius, T.} (1977{\natexlab{a}}).
35: \newblock Privacy transformations for statistical information systems.
36: \newblock \textit{J. Statis. Plann. Inference} \textbf{1} 73--86.
37: 
38: \bibitem[{Dalenius(1977{\natexlab{b}})}]{Dalenius:77b}
39: \textsc{Dalenius, T.} (1977{\natexlab{b}}).
40: \newblock Towards a methodology for statistical disclosure control.
41: \newblock \textit{Statistik Tidskrift} \textbf{15} 429--444.
42: 
43: \bibitem[{Davenport et~al.(2007)Davenport, Duarte, Wakin, Laska, Takhar, Kelly
44:   and Baraniuk}]{Davenport:06b}
45: \textsc{Davenport, M.}, \textsc{Duarte, M.}, \textsc{Wakin, M.}, \textsc{Laska,
46:   J.}, \textsc{Takhar, D.}, \textsc{Kelly, K.} and \textsc{Baraniuk, R.}
47:   (2007).
48: \newblock The smashed filter for compressive classification and target
49:   recognition.
50: \newblock In \textit{Proc. of Computational Imaging V}.
51: 
52: \bibitem[{Davenport et~al.(2006)Davenport, Wakin and Baraniuk}]{Davenport:06}
53: \textsc{Davenport, M.}, \textsc{Wakin, M.} and \textsc{Baraniuk, R.} (2006).
54: \newblock Detection and estimation with compressive measurements.
55: \newblock Tech. rep., Rice ECE Department, TREE 0610.
56: 
57: \bibitem[{Donoho(2006)}]{Donoho:cs}
58: \textsc{Donoho, D.} (2006).
59: \newblock Compressed sensing.
60: \newblock \textit{IEEE Trans. Info. Theory} \textbf{52} 1289--1306.
61: 
62: \bibitem[{Donoho et~al.(2006)Donoho, Elad and Temlyakov}]{DET06}
63: \textsc{Donoho, D.}, \textsc{Elad, M.} and \textsc{Temlyakov, V.} (2006).
64: \newblock Stable recovery of sparse overcomplete representations in the
65:   presence of noise.
66: \newblock \textit{IEEE Transactions on Information Theory} \textbf{52} 6--18.
67: 
68: \bibitem[{Donoho and Tanner(2006)}]{Donoho:Tanner:06}
69: \textsc{Donoho, D.} and \textsc{Tanner, J.} (2006).
70: \newblock Thresholds for the recovery of sparse solutions via $\ell_1$
71:   minimization.
72: \newblock \textit{Proc. Conf. on Information Sciences and Systems} .
73: 
74: \bibitem[{Duarte et~al.(2006)Duarte, Davenport, Wakin and Baraniuk}]{Duarte:06}
75: \textsc{Duarte, M.}, \textsc{Davenport, M.}, \textsc{Wakin, M.} and
76:   \textsc{Baraniuk, R.} (2006).
77: \newblock Sparse signal detection from incoherent projections.
78: \newblock In \textit{Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal
79:   Processing (ICASSP)}.
80: 
81: \bibitem[{Duncan and Pearson(1991)}]{duncan:91}
82: \textsc{Duncan, G.} and \textsc{Pearson, R.} (1991).
83: \newblock Enhancing access to microdata while protecting confidentiality:
84:   Prospects for the future.
85: \newblock \textit{Statistical Science} \textbf{6} 219--232.
86: 
87: \bibitem[{Dwork(2006)}]{Dwork:06}
88: \textsc{Dwork, C.} (2006).
89: \newblock Differential privacy.
90: \newblock In \textit{33rd International Colloquium on Automata, Languages and
91:   Programming--ICALP 2006}.
92: 
93: \bibitem[{Dwork et~al.(2007)Dwork, McSherry and Talwar}]{Dwork:07}
94: \textsc{Dwork, C.}, \textsc{McSherry, F.} and \textsc{Talwar, K.} (2007).
95: \newblock The price of privacy and the limits of {LP} decoding.
96: \newblock In \textit{Proceedings of Symposium on the Theory of Computing
97:   (STOC)}.
98: 
99: \bibitem[{Efron et~al.(2004)Efron, Hastie, Johnstone and Tibshirani}]{EHJ04}
100: \textsc{Efron, B.}, \textsc{Hastie, T.}, \textsc{Johnstone, I.} and
101:   \textsc{Tibshirani, R.} (2004).
102: \newblock Least angle regression.
103: \newblock \textit{Annals of Statistics} \textbf{32} 407--499.
104: 
105: \bibitem[{Feigenbaum et~al.(2006)Feigenbaum, Ishai, Malkin, Nissim, Strauss and
106:   Wright}]{feigen:06}
107: \textsc{Feigenbaum, J.}, \textsc{Ishai, Y.}, \textsc{Malkin, T.},
108:   \textsc{Nissim, K.}, \textsc{Strauss, M.~J.} and \textsc{Wright, R.~N.}
109:   (2006).
110: \newblock Secure multiparty computation of approximations.
111: \newblock \textit{ACM Trans. Algorithms} \textbf{2} 435--472.
112: 
113: \bibitem[{Greenshtein and Ritov(2004)}]{GR04}
114: \textsc{Greenshtein, E.} and \textsc{Ritov, Y.} (2004).
115: \newblock Persistency in high dimensional linear predictor-selection and the
116:   virtue of over-parametrization.
117: \newblock \textit{Journal of Bernoulli} \textbf{10} 971--988.
118: 
119: \bibitem[{Haupt et~al.(2006)Haupt, Castro, Nowak, Fudge and Yeh}]{Haupt:06}
120: \textsc{Haupt, J.}, \textsc{Castro, R.}, \textsc{Nowak, R.}, \textsc{Fudge, G.}
121:   and \textsc{Yeh, A.} (2006).
122: \newblock Compressive sampling for signal classification.
123: \newblock In \textit{Proc. Asilomar Conference on Signals, Systems, and
124:   Computers}.
125: 
126: \bibitem[{Horn and Johnson(1990)}]{HJ90}
127: \textsc{Horn, R.} and \textsc{Johnson, C.} (1990).
128: \newblock \textit{Matrix Analysis}.
129: \newblock Cambridge University Press; Reprint edition.
130: 
131: \bibitem[{Indyk and Woodruff(2006)}]{indyk:06}
132: \textsc{Indyk, P.} and \textsc{Woodruff, D.~P.} (2006).
133: \newblock Polylogarithmic private approximations and efficient matching.
134: \newblock In \textit{TCC}.
135: 
136: \bibitem[{Johnson and Lindenstrauss(1984)}]{JL:84}
137: \textsc{Johnson, W.~B.} and \textsc{Lindenstrauss, J.} (1984).
138: \newblock Extensions of {L}ipschitz mappings into a {H}ilbert space.
139: \newblock In \textit{Proc. Conf. in Modern Analysis and Probability}.
140: 
141: \bibitem[{Johnstone(2001)}]{Joh01}
142: \textsc{Johnstone, I.} (2001).
143: \newblock Chi-square oracle inequalities.
144: \newblock \textit{In State of the Art in Probability and Statistics, Festchrift
145:   for Willem R. van Zwet, M. de Gunst and C. Klaassen and A. van der Waart
146:   editors, IMS Lecture Notes - Monographs} \textbf{36} 399--418.
147: 
148: \bibitem[{Lafferty and Wasserman(2007)}]{Rodeo}
149: \textsc{Lafferty, J.} and \textsc{Wasserman, L.} (2007).
150: \newblock Rodeo: Sparse, greedy nonparametric regression.
151: \newblock \textit{The Annals of Statistics} To appear.
152: 
153: \bibitem[{Ledoux and Talagrand(1991)}]{LT91}
154: \textsc{Ledoux, M.} and \textsc{Talagrand, M.} (1991).
155: \newblock \textit{Probability in Banach Spaces: Isoperimetry and processes}.
156: \newblock Springer.
157: 
158: \bibitem[{Liu et~al.(2006)Liu, Kargupta and Ryan}]{Liu:06}
159: \textsc{Liu, K.}, \textsc{Kargupta, H.} and \textsc{Ryan, J.} (2006).
160: \newblock Random projection-based multiplicative data perturbation for privacy
161:   preserving distributed data mining.
162: \newblock \textit{IEEE Trans. on Knowledge and Data Engineering} \textbf{18}.
163: 
164: \bibitem[{Marzetta and Hochwald(1999)}]{Marzetta:99}
165: \textsc{Marzetta, T.~L.} and \textsc{Hochwald, B.~M.} (1999).
166: \newblock Capacity of a mobile multiple-antenna communication link in rayleigh
167:   flat fading.
168: \newblock \textit{IEEE Trans. Info. Theory} \textbf{45} 139--157.
169: 
170: \bibitem[{Meinshausen and Buhlmann(2006)}]{MB06}
171: \textsc{Meinshausen, N.} and \textsc{Buhlmann, P.} (2006).
172: \newblock High dimensional graphs and variable selection with the lasso.
173: \newblock \textit{Annals of Statistics} \textbf{34} 1436--1462.
174: 
175: \bibitem[{Meinshausen and Yu(2006)}]{MY06}
176: \textsc{Meinshausen, N.} and \textsc{Yu, B.} (2006).
177: \newblock Lasso-type recovery of sparse representations for high-dimensional
178:   data.
179: \newblock Tech. Rep. 720, Department of Statistics, UC Berkeley.
180: 
181: \bibitem[{Osborne et~al.(2000)Osborne, Presnell and Turlach}]{OPT00}
182: \textsc{Osborne, M.}, \textsc{Presnell, B.} and \textsc{Turlach, B.} (2000).
183: \newblock On the lasso and its dual.
184: \newblock \textit{Journal of Computational and Graphical Statistics} \textbf{9}
185:   319--337.
186: 
187: \bibitem[{Rauhut et~al.(2007)Rauhut, Schnass and Vandergheynst}]{RSV07}
188: \textsc{Rauhut, H.}, \textsc{Schnass, K.} and \textsc{Vandergheynst, P.}
189:   (2007).
190: \newblock Compressed sensing and redundant dictionaries.
191: \newblock Submitted to {IEEE} {T}ransactions on {I}nformation {T}heory.
192: 
193: \bibitem[{Sanil et~al.(2004)Sanil, Karr, Lin and Reiter}]{Sanil:04}
194: \textsc{Sanil, A.~P.}, \textsc{Karr, A.}, \textsc{Lin, X.} and \textsc{Reiter,
195:   J.~P.} (2004).
196: \newblock Privacy preserving regression modelling via distributed computation.
197: \newblock In \textit{In Proceedings of Tenth ACM SIGKDD International
198:   Conference on Knowledge Discovery and Data Mining}.
199: 
200: \bibitem[{Telatar(1999)}]{Telatar:99}
201: \textsc{Telatar, I.~E.} (1999).
202: \newblock Capacity of multi-antenna {G}aussian channels.
203: \newblock \textit{European Trans. on Telecommunications} \textbf{10} 585--595.
204: 
205: \bibitem[{Tibshirani(1996)}]{Tib96}
206: \textsc{Tibshirani, R.} (1996).
207: \newblock Regression shrinkage and selection via the lasso.
208: \newblock \textit{J. Roy. Statist. Soc. Ser. B} \textbf{58} 267--288.
209: 
210: \bibitem[{Ting et~al.(2007)Ting, Fienberg and Trottini}]{Ting:07}
211: \textsc{Ting, D.}, \textsc{Fienberg, S.~E.} and \textsc{Trottini, M.} (2007).
212: \newblock Random orthogonal matrix masking methodology for microdata release.
213: \newblock \textit{Int. J. of Information and Computer Security} .
214: 
215: \bibitem[{Tropp(2004)}]{Tro04}
216: \textsc{Tropp, J.} (2004).
217: \newblock Greed is good: Algorithmic results for sparse approximation.
218: \newblock \textit{IEEE Transactions on Information Theory} \textbf{50}
219:   2231--2242.
220: 
221: \bibitem[{Wainwright(2006)}]{Wai06}
222: \textsc{Wainwright, M.} (2006).
223: \newblock Sharp thresholds for high-dimensional and noisy recovery of sparsity.
224: \newblock Tech. Rep. 709, Department of Statistics, UC Berkeley.
225: 
226: \bibitem[{Wainwright(2007)}]{Wai07}
227: \textsc{Wainwright, M.} (2007).
228: \newblock Information-theoretic limits on sparsity recovery in the
229:   high-dimensional and noisy setting.
230: \newblock Tech. Rep. 725, Department of Statistics, UC Berkeley.
231: 
232: \bibitem[{Wainwright et~al.(2007)Wainwright, Ravikumar and Lafferty}]{wain:07}
233: \textsc{Wainwright, M.}, \textsc{Ravikumar, P.} and \textsc{Lafferty, J.}
234:   (2007).
235: \newblock High-dimensional graphical model selection using $\ell_1$-regularized
236:   logistic regression.
237: \newblock In \textit{Advances in Neural Information Processing Systems 19}. MIT
238:   Press.
239: 
240: \bibitem[{Zhao and Yu(2007)}]{ZY07}
241: \textsc{Zhao, P.} and \textsc{Yu, B.} (2007).
242: \newblock On model selection consistency of lasso.
243: \newblock \textit{Journal of Machine Learning Research} \textbf{7} 2541--2567.
244: 
245: \end{thebibliography}
246: