<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD with MathML3 v1.2 20190208//EN" "JATS-archivearticle1-mathml3.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article"><?properties manuscript?><front><journal-meta><journal-id journal-id-type="nlm-journal-id">101743592</journal-id><journal-id journal-id-type="pubmed-jr-id">48460</journal-id><journal-id journal-id-type="nlm-ta">Priv Stat Databases</journal-id><journal-title-group><journal-title>Privacy in statistical databases. PSD (Conference : 2004-)</journal-title></journal-title-group></journal-meta><article-meta><article-id pub-id-type="pmid">31745540</article-id><article-id pub-id-type="pmc">6863437</article-id><article-id pub-id-type="doi">10.1007/978-3-319-45381-1_4</article-id><article-id pub-id-type="manuscript">HHSPA1016620</article-id><article-categories><subj-group subj-group-type="heading"><subject>Article</subject></subj-group></article-categories><title-group><article-title>A Second Order Cone Formulation of Continuous CTA Model</article-title></title-group><contrib-group><contrib contrib-type="author"><name><surname>Lesaja</surname><given-names>Goran</given-names></name><email>goran@georgiasouthern.edu</email><xref ref-type="aff" rid="A1">1</xref></contrib><contrib contrib-type="author"><name><surname>Castro</surname><given-names>Jordi</given-names></name><email>jordi.castro@upc.edu</email><xref ref-type="aff" rid="A2">2</xref></contrib><contrib contrib-type="author"><name><surname>Oganian</surname><given-names>Anna</given-names></name><email>aoganyan@cdc.gov</email><xref ref-type="aff" rid="A1">1</xref><xref ref-type="aff" rid="A3">3</xref></contrib></contrib-group><aff id="A1"><label>1</label> Department of Mathematical Sciences, Georgia Southern University, P.O. Box 8093, Statesboro, GA 30460-8093, U.S.A.</aff><aff id="A2"><label>2</label> Department of Statistics and Operations Research, Universitat Polit&#x000e8;cnica de Catalunya, Jordi Girona 1&#x02013;3, 08034 Barcelona, Catalonia.</aff><aff id="A3"><label>3</label> National Center for Health Statistics 3311 Toledo Rd, Hyatsville, MD, 20782, U.S.A.</aff><pub-date pub-type="nihms-submitted"><day>2</day><month>4</month><year>2019</year></pub-date><pub-date pub-type="epub"><day>31</day><month>8</month><year>2016</year></pub-date><pub-date pub-type="ppub"><year>2016</year></pub-date><pub-date pub-type="pmc-release"><day>19</day><month>11</month><year>2019</year></pub-date><volume>9867</volume><fpage>41</fpage><lpage>53</lpage><!--elocation-id from pubmed: 10.1007/978-3-319-45381-1_4--><self-uri xlink:href="http://Lecture Notes in Computer Science, vol 9867"/><abstract id="ABS1"><p id="P1">In this paper we consider a minimum distance Controlled Tabular Adjustment (CTA) model for statistical disclosure limitation (control) of tabular data. The goal of the CTA model is to find the closest safe table to some original tabular data set that contains sensitive information. The measure of closeness is usually measured using &#x02113;<sub>1</sub> or &#x02113;<sub>2</sub> norm; with each measure having its advantages and disadvantages. Recently, in [<xref rid="R4" ref-type="bibr">4</xref>] a regularization of the &#x02113;<sub>1</sub>-CTA using Pseudo-Huber function was introduced in an attempt to combine positive characteristics of both &#x02113;<sub>1</sub>-CTA and &#x02113;<sub>2</sub>-CTA. All three models can be solved using appropriate versions of Interior-Point Methods (IPM). It is known that IPM in general works better on well structured problems such as conic optimization problems, thus, reformulation of these CTA models as conic optimization problem may be advantageous. We present reformulation of Pseudo-Huber-CTA, and &#x02113;<sub>1</sub>-CTA as Second-Order Cone (SOC) optimization problems and test the validity of the approach on the small example of two-dimensional tabular data set.</p></abstract><kwd-group><kwd>Statistical disclosure limitation (control)</kwd><kwd>controlled tabular adjustment models</kwd><kwd>pseudo-Huber function</kwd><kwd>convex optimization</kwd><kwd>second-order cone optimization</kwd><kwd>interior-point methods</kwd></kwd-group></article-meta></front><body><sec id="S1"><label>1</label><title>Introduction</title><p id="P2">The <italic>statistical disclosure limitation (control)</italic> is the term that describes the theory and methods of protecting sensitive information when releasing statistical microdata or tabular data. An up-to-date overview of theory and methods of this field can be found in the monograph [<xref rid="R19" ref-type="bibr">19</xref>] and, for tabular data only, in the survey [<xref rid="R8" ref-type="bibr">8</xref>]. An excellent reference is also [<xref rid="R27" ref-type="bibr">27</xref>].</p><p id="P3"><italic>Minimum-distance controlled tabular adjustment</italic> (CTA) methodology was first introduced in [<xref rid="R7" ref-type="bibr">7</xref>,<xref rid="R15" ref-type="bibr">15</xref>]. As indicated in [<xref rid="R4" ref-type="bibr">4</xref>] CTA can be formulated as the following problem: Given a table with sensitive cells, compute the closest safe table in which sensitive cells are modified to avoid recomputation, and the remaining cells are minimally adjusted to satisfy the table equations. The closeness of the original and modified table is measured by the weighted distance between the tables with respect to a certain norm. Most commonly used norms are &#x02113;<sub>1</sub> and &#x02113;<sub>2</sub> norms. Thus, the problem can be formulated as a minimization problem with the objective function being a particular weighted distance function and constraints being table equations and lower and upper bounds on the cell values.</p><p id="P4">In general, CTA is Mixed Integer Optimization Problem (MIOP) which is a difficult problem to solve especially for the large dimension problems. A priori fixing the values of binary variables reduces the problem to the continuous optimization problem which is easier to solve, however, the quality of the solution may be reduced. In addition, the values of the binary variables have to be assigned carefully otherwise the problem may become infeasible [<xref rid="R12" ref-type="bibr">12</xref>, <xref rid="R13" ref-type="bibr">13</xref>].</p><p id="P5">The objective function in continuous CTA is based on either the &#x02113;<sub>1</sub>-norm or &#x02113;<sub>2</sub>-norm. The formulation of &#x02113;<sub>2</sub> -CTA leads to the Quadratic Programing (QP) problem, while &#x02113;<sub>1</sub>-CTA can be formulated as the Linear Programming (LP) problem. However, the resulting LP has the number of variables that is twice the number of cells of the table as opposed to &#x02113;<sub>2</sub>-CTA where the resulting QP problem has a number of variables equal to the number of cells. In general, the QP of &#x02113;<sub>2</sub>-CTA is usually more efficiently solved than the LP of &#x02113;<sub>1</sub>-CTA [<xref rid="R4" ref-type="bibr">4</xref>,<xref rid="R7" ref-type="bibr">7</xref>].</p><p id="P6">In [<xref rid="R4" ref-type="bibr">4</xref>] the Pseudo-Huber regularization of the &#x02113;<sub>1</sub>-CTA is proposed. The Pseudo-Huber approximation of the &#x02113;<sub>1</sub>-norm objective function leads to the convex optimization problem. However, the advantage is that the number of variables in Pseudo-Huber formulation of the &#x02113;<sub>1</sub>-CTA remains the same as the number of cells. In [<xref rid="R4" ref-type="bibr">4</xref>] it is shown that Pseudo-Huber-CTA can be more efficiently solved than LP &#x02113;<sub>1</sub>-CTA for certain types of tables and using an appropriate method that takes into account the structure of the problem.</p><p id="P7">All these models are solved using appropriate versions of the Interior-Point Method (IPM). These methods have been developed in recent years to efficiently solve different types of, often large, nonlinear (convex) optimization problems. It has been shown both theoretically and numerically that IPMs perform better on problems that have a certain structure, such as Conic Optimization (CO) problems, which are LP problems where variables are elements of cones. Most common cones are non-negative orthant, second order (quadratic) cone and semidefinite cone [<xref rid="R2" ref-type="bibr">2</xref>, <xref rid="R3" ref-type="bibr">3</xref>, <xref rid="R25" ref-type="bibr">25</xref>].</p><p id="P8">Hence, motivated by the above comment, in this paper we develop a new Second Order (Quadratic) Cone (SOC) formulation of the &#x02113;<sub>1</sub> and Pseudo-Huber-CTA. It is shown on the small example of a two-dimensional table that SOC CTA models are more efficiently solved than the original models. It is expected that the same will be the case for larger and more complex tables. Extensive numerical testing on various types of tables is beyond the scope of this paper; however, it is needed and it is forthcoming as a part of future research.</p><p id="P9">The paper is organized as follows. In Section 2 the general MIOP and then continuous CTA are formulated. Then the &#x02113;<sub>1</sub> and &#x02113;<sub>2</sub> continuous CTA are derived. The Pseudo-Huber-CTA formulation is considered in Section 3. The new SOC formulations of both Pseudo-Huber and &#x02113;<sub>1</sub> CTA are developed in Section 4. In Section 5 the SOC CTA models are applied to the small example of two-dimensional table and these instances are solved using MOSEK SOC solver. The concluding remarks are given in Section 6.</p></sec><sec id="S2"><label>2</label><title>Formulation of the General CTA Model</title><p id="P10">The following CTA formulation is given in [<xref rid="R4" ref-type="bibr">4</xref>]: Given the following set of parameters:
<list list-type="roman-lower" id="L1"><list-item><p id="P11">A set of cells <italic>a</italic><sub><italic>i</italic></sub>, <inline-formula><mml:math display="inline" id="M1" overflow="scroll"><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">N</mml:mi><mml:mo>=</mml:mo><mml:mo>{</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x02026;</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi><mml:mo>}</mml:mo></mml:mrow></mml:math></inline-formula>. The vector <italic>a</italic> = (<italic>a</italic><sub>1</sub>, . . . , <italic>a</italic><sub><italic>n</italic></sub>)<sup><italic>T</italic></sup> satisfies certain linear system <italic>Aa</italic> = <italic>b</italic> where <italic>A</italic> &#x02208; &#x0211d;<sup><italic>m</italic>&#x000d7;<italic>n</italic></sup> is an <italic>m</italic> &#x000d7; <italic>n</italic> matrix and and <italic>b</italic> &#x02208; &#x0211d;<sup><italic>m</italic></sup> is <italic>m</italic>-vector.</p></list-item><list-item><p id="P12">A lower, and upper bound for each cell, <inline-formula><mml:math display="inline" id="M2" overflow="scroll"><mml:mrow><mml:msub><mml:mi>l</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:msub><mml:mo>&#x02264;</mml:mo><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02264;</mml:mo><mml:msub><mml:mi>u</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> for <inline-formula><mml:math display="inline" id="M3" overflow="scroll"><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">N</mml:mi></mml:mrow></mml:math></inline-formula>, which are considered known by any attacker.</p></list-item><list-item><p id="P13">A set of indices of sensitive cells, <inline-formula><mml:math display="inline" id="M4" overflow="scroll"><mml:mrow><mml:mi mathvariant="script">S</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:msub><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mo>,</mml:mo><mml:mo>&#x02026;</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>i</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow><mml:mo>}</mml:mo></mml:mrow><mml:mo>&#x02286;</mml:mo><mml:mi mathvariant="script">N</mml:mi></mml:mrow></mml:math></inline-formula>.</p></list-item><list-item><p id="P14">A lower and upper protection level for each sensitive cell <inline-formula><mml:math display="inline" id="M5" overflow="scroll"><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi></mml:mrow></mml:math></inline-formula> respectively, <italic>lpl</italic><sub><italic>i</italic></sub> and <italic>upl</italic><sub><italic>i</italic></sub>, such that the released values must be outside of the interval (<italic>a</italic><sub><italic>i</italic></sub> &#x02212; <italic>lpl</italic><sub><italic>i</italic></sub>, <italic>a</italic><sub><italic>i</italic></sub> + <italic>upl</italic><sub><italic>i</italic></sub>).</p></list-item><list-item><p id="P15">A set of weights, <italic>w</italic><sub><italic>i</italic></sub>, <inline-formula><mml:math display="inline" id="M6" overflow="scroll"><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">N</mml:mi></mml:mrow></mml:math></inline-formula> used in measuring the deviation of the released data values from the original data values.</p></list-item></list></p><p id="P16">A CTA problem is a problem of finding values <italic>z</italic><sub><italic>i</italic></sub>, <inline-formula><mml:math display="inline" id="M7" overflow="scroll"><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">N</mml:mi></mml:mrow></mml:math></inline-formula>, to be released, such that <italic>z</italic><sub><italic>i</italic></sub>, <inline-formula><mml:math display="inline" id="M8" overflow="scroll"><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi></mml:mrow></mml:math></inline-formula> are safe values and the weighted distance between released values <italic>z</italic><sub><italic>i</italic></sub> and original values <italic>a</italic><sub><italic>i</italic></sub>, denoted as &#x02016;<italic>z</italic> &#x02212; <italic>a</italic>&#x02016;<sub><italic>l</italic>(<italic>w</italic>)</sub>, is minimized, which leads to solving the following optimization problem
<disp-formula id="FD1"><label>(1)</label><mml:math display="block" id="M9" overflow="scroll"><mml:munder><mml:mrow><mml:mi mathvariant="normal">min</mml:mi></mml:mrow><mml:mi>z</mml:mi></mml:munder><mml:mspace width="0.25em"/><mml:mo stretchy="false">&#x02016;</mml:mo><mml:mi>z</mml:mi><mml:mo>&#x02212;</mml:mo><mml:mi>a</mml:mi><mml:msub><mml:mo stretchy="false">&#x02016;</mml:mo><mml:mrow><mml:mi>l</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>w</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mspace linebreak="newline"/><mml:mi mathvariant="italic">s.t.</mml:mi><mml:mspace width="0.25em"/><mml:mi>A</mml:mi><mml:mi>z</mml:mi><mml:mo>=</mml:mo><mml:mi>b</mml:mi><mml:mo>,</mml:mo><mml:mspace linebreak="newline"/><mml:mspace width="1em"/><mml:msub><mml:mi>l</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:msub><mml:mo>&#x02264;</mml:mo><mml:msub><mml:mi>z</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02264;</mml:mo><mml:msub><mml:mi>u</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mspace width="0.25em"/><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">N</mml:mi><mml:mo>,</mml:mo><mml:mspace linebreak="newline"/><mml:mspace width="1em"/><mml:msub><mml:mi>z</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mspace width="0.25em"/><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mspace width="0.25em"/><mml:mtext>are</mml:mtext><mml:mspace width="0.25em"/><mml:mtext>safe</mml:mtext><mml:mspace width="0.25em"/><mml:mtext>values.</mml:mtext></mml:math></disp-formula></p><p id="P17">As indicated in the assumption (iv) above, safe values are the values that satisfy
<disp-formula id="FD2"><label>(2)</label><mml:math display="block" id="M10" overflow="scroll"><mml:mrow><mml:msub><mml:mi>z</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02264;</mml:mo><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02212;</mml:mo><mml:mi>l</mml:mi><mml:mi>p</mml:mi><mml:msub><mml:mi>l</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mspace width="0.25em"/><mml:mtext>or</mml:mtext><mml:mspace width="0.25em"/><mml:msub><mml:mi>z</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02265;</mml:mo><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:mi>u</mml:mi><mml:mi>p</mml:mi><mml:msub><mml:mi>l</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mspace width="0.25em"/><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi></mml:mrow><mml:mo>.</mml:mo></mml:math></disp-formula></p><p id="P18">By introducing a vector of binary variables <italic>y</italic> &#x02208; {0,1}<sup><italic>s</italic></sup> the constraint <xref rid="FD2" ref-type="disp-formula">(2)</xref> can be written as
<disp-formula id="FD3"><label>(3)</label><mml:math display="block" id="M11" overflow="scroll"><mml:msub><mml:mi>z</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02265;</mml:mo><mml:mo>&#x02212;</mml:mo><mml:mi>M</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x02212;</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:mi>u</mml:mi><mml:mi>p</mml:mi><mml:msub><mml:mi>l</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mspace width="0.25em"/><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mo>,</mml:mo><mml:mspace linebreak="newline"/><mml:msub><mml:mi>z</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02264;</mml:mo><mml:mi>M</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02212;</mml:mo><mml:mi>l</mml:mi><mml:mi>p</mml:mi><mml:msub><mml:mi>l</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x02212;</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="1em"/><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mo>,</mml:mo></mml:math></disp-formula>
where <italic>M</italic> &#x0226b; 0 is a large positive number. Constraints <xref rid="FD3" ref-type="disp-formula">(3)</xref> enforce the upper safe value if <italic>y</italic><sub><italic>i</italic></sub> = 1 or the lower safe value if <italic>y</italic><sub><italic>i</italic></sub> = 0.</p><p id="P19">Replacing the last constraint in the CTA model <xref rid="FD1" ref-type="disp-formula">(1)</xref> with <xref rid="FD3" ref-type="disp-formula">(3)</xref> leads to a mixed integer convex optimization problem (MIOP) which is in general a difficult problem to solve; however, it provides solutions with high data utility [<xref rid="R11" ref-type="bibr">11</xref>]. The alternative approach is to fix binary variables up front which leads to a CTA that is acontinuous convex optimization problem. The continuous CTA may be easier to solve; however, the obtained solution may have a lower data utility. Furthermore, a wrong assignment of binary variables may result in the problem being infeasible. Strategies on how to avoid this difficulty are discussed in [<xref rid="R12" ref-type="bibr">12</xref>, <xref rid="R13" ref-type="bibr">13</xref>].</p><p id="P20">In this paper we consider a continuous CTA where binary variables are fixed and vector <italic>z</italic> is replaced by the vector of <italic>cell deviations</italic>
<disp-formula id="FD4"><label>(4)</label><mml:math display="block" id="M12" overflow="scroll"><mml:mrow><mml:mi>x</mml:mi><mml:mo>=</mml:mo><mml:mi>z</mml:mi><mml:mo>&#x02212;</mml:mo><mml:mi>a</mml:mi><mml:mo>.</mml:mo></mml:mrow></mml:math></disp-formula></p><p id="P21">The CTA <xref rid="FD1" ref-type="disp-formula">(1)</xref> with constraints <xref rid="FD3" ref-type="disp-formula">(3)</xref> reduces to the following convex optimization problem:
<disp-formula id="FD5"><label>(5)</label><mml:math display="block" id="M13" overflow="scroll"><mml:munder><mml:mrow><mml:mi mathvariant="normal">min</mml:mi></mml:mrow><mml:mi>x</mml:mi></mml:munder><mml:mspace width="0.25em"/><mml:mo stretchy="false">&#x02016;</mml:mo><mml:mi>x</mml:mi><mml:msub><mml:mo stretchy="false">&#x02016;</mml:mo><mml:mrow><mml:mi>l</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>w</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mspace linebreak="newline"/><mml:mi>s</mml:mi><mml:mo>.</mml:mo><mml:mi>t</mml:mi><mml:mo>.</mml:mo><mml:mspace width="0.25em"/><mml:mi>A</mml:mi><mml:mi>x</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mspace linebreak="newline"/><mml:mspace width="1em"/><mml:mi>l</mml:mi><mml:mo>&#x02264;</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x02264;</mml:mo><mml:mi>u</mml:mi><mml:mo>,</mml:mo></mml:math></disp-formula>
where upper and lover bounds for <italic>x</italic><sub><italic>i</italic></sub>, <inline-formula><mml:math display="inline" id="M14" overflow="scroll"><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">N</mml:mi></mml:mrow></mml:math></inline-formula> are defined as follows:
<disp-formula id="FD6"><label>(6)</label><mml:math display="block" id="M15" overflow="scroll"><mml:mrow><mml:msub><mml:mi>l</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mrow><mml:mi>u</mml:mi><mml:mi>p</mml:mi><mml:msub><mml:mi>l</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mspace width="0.25em"/><mml:mtext>and</mml:mtext><mml:mspace width="0.25em"/><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>l</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:msub><mml:mo>&#x02212;</mml:mo><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">N</mml:mi><mml:mo>\</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mspace width="0.25em"/><mml:mtext>or</mml:mtext><mml:mspace width="0.25em"/><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mspace width="0.25em"/><mml:mtext>and</mml:mtext><mml:mspace width="0.25em"/><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mrow></mml:mrow></mml:math></disp-formula>
<disp-formula id="FD7"><label>(7)</label><mml:math display="block" id="M16" overflow="scroll"><mml:mrow><mml:msub><mml:mi>u</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mrow><mml:mo>&#x02212;</mml:mo><mml:mi>l</mml:mi><mml:mi>p</mml:mi><mml:msub><mml:mi>l</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mspace width="0.25em"/><mml:mtext>and</mml:mtext><mml:mspace width="0.25em"/><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>u</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:msub><mml:mo>&#x02212;</mml:mo><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">N</mml:mi><mml:mo>\</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mspace width="0.25em"/><mml:mtext>or</mml:mtext><mml:mspace width="0.25em"/><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mspace width="0.25em"/><mml:mtext>and</mml:mtext><mml:mspace width="0.25em"/><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mrow></mml:mrow></mml:math></disp-formula></p><p id="P22">The two most commonly used norms in problem <xref rid="FD5" ref-type="disp-formula">(5)</xref> are the &#x02113;<sub>1</sub> and &#x02113;<sub>2</sub> norms. For the &#x02113;<sub>2</sub>-norm the problem, <xref rid="FD5" ref-type="disp-formula">(5)</xref> reduces to the following &#x02113;<sub>2</sub>-CTA model which is a QP problem:
<disp-formula id="FD8"><label>(8)</label><mml:math display="block" id="M17" overflow="scroll"><mml:mrow><mml:mrow><mml:munder><mml:mrow><mml:mi mathvariant="normal">min</mml:mi></mml:mrow><mml:mi>x</mml:mi></mml:munder><mml:mspace width="0.25em"/><mml:munderover><mml:mo>&#x02211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>n</mml:mi></mml:munderover><mml:mrow><mml:msub><mml:mi>w</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msubsup></mml:mrow><mml:mspace linebreak="newline"/><mml:mrow><mml:mi>s</mml:mi><mml:mo>.</mml:mo><mml:mi>t</mml:mi><mml:mo>.</mml:mo><mml:mspace width="0.25em"/><mml:mi>A</mml:mi><mml:mi>x</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo></mml:mrow><mml:mspace linebreak="newline"/><mml:mspace width="1em"/><mml:mrow><mml:mi>l</mml:mi><mml:mo>&#x02264;</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x02264;</mml:mo><mml:mi>u</mml:mi><mml:mo>.</mml:mo></mml:mrow></mml:mrow></mml:math></disp-formula></p><p id="P23">For the &#x02113;<sub>1</sub>-norm the problem, <xref rid="FD5" ref-type="disp-formula">(5)</xref> reduces to the following &#x02113;<sub>1</sub>-CTA model:
<disp-formula id="FD9"><label>(9)</label><mml:math display="block" id="M18" overflow="scroll"><mml:mrow><mml:mrow><mml:munder><mml:mrow><mml:mi mathvariant="normal">min</mml:mi></mml:mrow><mml:mi>x</mml:mi></mml:munder><mml:mspace width="0.25em"/><mml:munderover><mml:mo>&#x02211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>n</mml:mi></mml:munderover><mml:mrow><mml:msub><mml:mi>w</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>|</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>|</mml:mo></mml:mrow></mml:mrow><mml:mspace linebreak="newline"/><mml:mrow><mml:mi>s</mml:mi><mml:mo>.</mml:mo><mml:mi>t</mml:mi><mml:mo>.</mml:mo><mml:mspace width="0.25em"/><mml:mi>A</mml:mi><mml:mi>x</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo></mml:mrow><mml:mspace linebreak="newline"/><mml:mspace width="1em"/><mml:mrow><mml:mi>l</mml:mi><mml:mo>&#x02264;</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x02264;</mml:mo><mml:mi>u</mml:mi><mml:mo>.</mml:mo></mml:mrow></mml:mrow></mml:math></disp-formula></p><p id="P24">The above &#x02113;<sub>1</sub>-CTA model <xref rid="FD9" ref-type="disp-formula">(9)</xref> is a convex optimization problem; however, the objective function is not differentiable at <italic>x</italic> = 0. Since most of the algorithms, including IPMs, require differentiability of the objective function, problem <xref rid="FD9" ref-type="disp-formula">(9)</xref> needs to be reformulated. The reformulations that have been considered in [<xref rid="R4" ref-type="bibr">4</xref>] are reviewed in the next section.</p></sec><sec id="S3"><label>3</label><title>LP and Pseudo-Huber Formulation of &#x02113;<sub>1</sub>-CTA</title><p id="P25">The &#x02113;<sub>2</sub>-CTA model <xref rid="FD8" ref-type="disp-formula">(8)</xref> is a standard QP problem that can be efficiently solved using IPM or other methods. However, as noted at the end of the previous section, the &#x02113;<sub>1</sub>-CTA model <xref rid="FD9" ref-type="disp-formula">(9)</xref> needs reformulation in order to be efficiently solved by IPM or some other method. The standard reformulation is the transformation of model <xref rid="FD9" ref-type="disp-formula">(9)</xref> to the following LP model:
<disp-formula id="FD10"><label>(10)</label><mml:math display="block" id="M19" overflow="scroll"><mml:mrow><mml:mrow><mml:munder><mml:mrow><mml:mi mathvariant="normal">min</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mi>x</mml:mi><mml:mo>&#x02212;</mml:mo></mml:msup><mml:mo>,</mml:mo><mml:msup><mml:mi>x</mml:mi><mml:mo>+</mml:mo></mml:msup></mml:mrow></mml:munder><mml:mspace width="0.25em"/><mml:munderover><mml:mo>&#x02211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>n</mml:mi></mml:munderover><mml:mrow><mml:msub><mml:mi>w</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mo>+</mml:mo></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mo>&#x02212;</mml:mo></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mspace linebreak="newline"/><mml:mspace width="0.5em"/><mml:mrow><mml:mtext>s.t.</mml:mtext><mml:mspace width="0.25em"/><mml:mi>A</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mo>+</mml:mo></mml:msubsup><mml:mo>&#x02212;</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mo>&#x02212;</mml:mo></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo></mml:mrow><mml:mspace linebreak="newline"/><mml:mspace width="1em"/><mml:mrow><mml:mspace width="1em"/><mml:msup><mml:mi>l</mml:mi><mml:mo>+</mml:mo></mml:msup><mml:mo>&#x02264;</mml:mo><mml:msup><mml:mi>x</mml:mi><mml:mo>+</mml:mo></mml:msup><mml:mo>&#x02264;</mml:mo><mml:msup><mml:mi>u</mml:mi><mml:mo>+</mml:mo></mml:msup><mml:mo>,</mml:mo></mml:mrow><mml:mspace linebreak="newline"/><mml:mspace width="1em"/><mml:mrow><mml:msup><mml:mi>l</mml:mi><mml:mo>&#x02212;</mml:mo></mml:msup><mml:mo>&#x02264;</mml:mo><mml:msup><mml:mi>x</mml:mi><mml:mo>&#x02212;</mml:mo></mml:msup><mml:mo>&#x02264;</mml:mo><mml:msup><mml:mi>u</mml:mi><mml:mo>&#x02212;</mml:mo></mml:msup><mml:mo>,</mml:mo></mml:mrow></mml:mrow></mml:math></disp-formula>
where
<disp-formula id="FD11"><label>(11)</label><mml:math display="block" id="M20" overflow="scroll"><mml:mrow><mml:msup><mml:mi>x</mml:mi><mml:mo>+</mml:mo></mml:msup><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mi>x</mml:mi></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mi>x</mml:mi><mml:mo>&#x02265;</mml:mo><mml:mn>0</mml:mn></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mn>0</mml:mn></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mi>x</mml:mi><mml:mo>&#x0003c;</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mrow><mml:mspace width="2em"/><mml:msup><mml:mi>x</mml:mi><mml:mo>&#x02212;</mml:mo></mml:msup><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mn>0</mml:mn></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mi>x</mml:mi><mml:mo>&#x0003e;</mml:mo><mml:mn>0</mml:mn></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mo>&#x02212;</mml:mo><mml:mi>x</mml:mi></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mi>x</mml:mi><mml:mo>&#x02264;</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mrow></mml:mrow></mml:math></disp-formula>
and lower and upper bounds for <inline-formula><mml:math display="inline" id="M21" overflow="scroll"><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mo>&#x02212;</mml:mo></mml:msubsup></mml:mrow></mml:math></inline-formula> and <inline-formula><mml:math display="inline" id="M22" overflow="scroll"><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mo>+</mml:mo></mml:msubsup></mml:mrow></mml:math></inline-formula>, <inline-formula><mml:math display="inline" id="M23" overflow="scroll"><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">N</mml:mi></mml:mrow></mml:math></inline-formula> are as follows:
<disp-formula id="FD12"><label>(12)</label><mml:math display="block" id="M24" overflow="scroll"><mml:msubsup><mml:mi>l</mml:mi><mml:mi>i</mml:mi><mml:mo>+</mml:mo></mml:msubsup><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mrow><mml:mi>u</mml:mi><mml:mi>p</mml:mi><mml:msub><mml:mi>l</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mspace width="0.25em"/><mml:mtext>and</mml:mtext><mml:mspace width="0.25em"/><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mn>0</mml:mn></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">N</mml:mi><mml:mo>\</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mspace width="0.25em"/><mml:mtext>or</mml:mtext><mml:mspace width="0.25em"/><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mspace width="0.25em"/><mml:mtext>and</mml:mtext><mml:mspace width="0.25em"/><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mrow><mml:mspace linebreak="newline"/><mml:msubsup><mml:mi>u</mml:mi><mml:mi>i</mml:mi><mml:mo>+</mml:mo></mml:msubsup><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mn>0</mml:mn></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mspace width="0.25em"/><mml:mtext>and</mml:mtext><mml:mspace width="0.25em"/><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>u</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02212;</mml:mo><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">N</mml:mi><mml:mo>\</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mspace width="0.25em"/><mml:mtext>or</mml:mtext><mml:mspace width="0.25em"/><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mspace width="0.25em"/><mml:mtext>and</mml:mtext><mml:mspace width="0.25em"/><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mrow><mml:mspace linebreak="newline"/><mml:msubsup><mml:mi>l</mml:mi><mml:mi>i</mml:mi><mml:mo>&#x02212;</mml:mo></mml:msubsup><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mrow><mml:mi>l</mml:mi><mml:mi>p</mml:mi><mml:msub><mml:mi>l</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mspace width="0.25em"/><mml:mtext>and</mml:mtext><mml:mspace width="0.25em"/><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mn>0</mml:mn></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">N</mml:mi><mml:mo>\</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mspace width="0.25em"/><mml:mtext>or</mml:mtext><mml:mspace width="0.25em"/><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mspace width="0.25em"/><mml:mtext>and</mml:mtext><mml:mspace width="0.25em"/><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mrow><mml:mspace linebreak="newline"/><mml:msubsup><mml:mi>u</mml:mi><mml:mi>i</mml:mi><mml:mo>&#x02212;</mml:mo></mml:msubsup><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mn>0</mml:mn></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mspace width="0.25em"/><mml:mtext>and</mml:mtext><mml:mspace width="0.25em"/><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02212;</mml:mo><mml:msub><mml:mi>l</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mspace width="0.25em"/><mml:mtext>if</mml:mtext><mml:mspace width="0.25em"/><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">N</mml:mi><mml:mo>\</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mspace width="0.25em"/><mml:mtext>or</mml:mtext><mml:mspace width="0.25em"/><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">S</mml:mi><mml:mspace width="0.25em"/><mml:mtext>and</mml:mtext><mml:mspace width="0.25em"/><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mrow></mml:math></disp-formula></p><p id="P26">Problem &#x02113;<sub>1</sub>-CTA <xref rid="FD10" ref-type="disp-formula">(10)</xref> is an LP problem; however, it has twice the number of variables as the QP problem <xref rid="FD8" ref-type="disp-formula">(8)</xref> and twice the number of box constraints. As indicated in [<xref rid="R4" ref-type="bibr">4</xref>], the splitting of the variables <italic>x</italic> = <italic>x</italic><sup>+</sup>&#x02212;<italic>x</italic><sup>&#x02212;</sup> and the increased dimension of the model may cause problems. In order to overcome these difficulties in [<xref rid="R4" ref-type="bibr">4</xref>] it was suggested to use a regularization of problem <xref rid="FD9" ref-type="disp-formula">(9)</xref> by approximating absolute value with the Pseudo-Huber function that has the same number of variables as in the QP formulation <xref rid="FD8" ref-type="disp-formula">(8)</xref>.</p><p id="P27">The original Huber function <italic>&#x003c6;</italic><sub><italic>&#x003b4;</italic></sub> : &#x0211d; &#x02192; &#x0211d;<sub>+</sub> is defined as
<disp-formula id="FD13"><label>(13)</label><mml:math display="block" id="M25" overflow="scroll"><mml:mrow><mml:msub><mml:mi>&#x003c6;</mml:mi><mml:mi>&#x003b4;</mml:mi></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mrow><mml:mfrac><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msubsup></mml:mrow><mml:mrow><mml:mn>2</mml:mn><mml:mi>&#x003b4;</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mrow><mml:mo>|</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>|</mml:mo></mml:mrow><mml:mo>&#x02264;</mml:mo><mml:mi>&#x003b4;</mml:mi></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mrow><mml:mo>|</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>|</mml:mo></mml:mrow><mml:mo>&#x02212;</mml:mo><mml:mfrac><mml:mi>&#x003b4;</mml:mi><mml:mn>2</mml:mn></mml:mfrac></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mrow><mml:mo>|</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>|</mml:mo></mml:mrow><mml:mo>&#x02265;</mml:mo><mml:mi>&#x003b4;</mml:mi><mml:mo>.</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mrow></mml:mrow></mml:math></disp-formula>
It approximates |<italic>x</italic><sub><italic>i</italic></sub>| for small values of <italic>&#x003b4;</italic> &#x0003e; 0; the smaller the <italic>&#x003b4;</italic>, the better the approximation.The Huber function is continuously differentiable; however, the second derivative is not continuous at |<italic>x</italic><sub><italic>i</italic></sub>| = <italic>&#x003b4;</italic> which may cause problems when this function is used in second order optimization algorithms, such as IPMs. Hence, it is better to consider the Pseudo-Huber function <italic>&#x003d5;</italic><sub><italic>&#x003b4;</italic></sub> : &#x0211d; &#x02192; &#x0211d;<sub>+</sub>
<disp-formula id="FD14"><label>(14)</label><mml:math display="block" id="M26" overflow="scroll"><mml:mrow><mml:msub><mml:mi>&#x003d5;</mml:mi><mml:mi>&#x003b4;</mml:mi></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msqrt><mml:mrow><mml:msup><mml:mi>&#x003b4;</mml:mi><mml:mn>2</mml:mn></mml:msup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msubsup></mml:mrow></mml:msqrt><mml:mo>&#x02212;</mml:mo><mml:mi>&#x003b4;</mml:mi></mml:mrow></mml:math></disp-formula>
whose first and second derivatives are bounded and Lipschitz continuous [<xref rid="R17" ref-type="bibr">17</xref>]. Again, the smaller the <italic>&#x003b4;</italic> the better the approximation.</p><p id="P28">Now, the &#x02113;<sub>1</sub>-CTA problem <xref rid="FD9" ref-type="disp-formula">(9)</xref> can be approximated by the following convex optimization problem
<disp-formula id="FD15"><label>(15)</label><mml:math display="block" id="M27" overflow="scroll"><mml:mrow><mml:mrow><mml:munder><mml:mrow><mml:mi mathvariant="normal">min</mml:mi></mml:mrow><mml:mi>x</mml:mi></mml:munder><mml:mspace width="0.25em"/><mml:msubsup><mml:mo>&#x02211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>n</mml:mi></mml:msubsup><mml:mrow><mml:msub><mml:mi>w</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:msub><mml:mi>&#x003d5;</mml:mi><mml:mi>&#x003b4;</mml:mi></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mspace linebreak="newline"/><mml:mspace width="0.25em"/><mml:mrow><mml:mi>s</mml:mi><mml:mo>.</mml:mo><mml:mi>t</mml:mi><mml:mo>.</mml:mo><mml:mspace width="0.25em"/><mml:mi>A</mml:mi><mml:mi>x</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo></mml:mrow><mml:mspace linebreak="newline"/><mml:mspace width="1em"/><mml:mrow><mml:mi>l</mml:mi><mml:mo>&#x02264;</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x02264;</mml:mo><mml:mi>u</mml:mi><mml:mo>.</mml:mo></mml:mrow></mml:mrow></mml:math></disp-formula></p><p id="P29">The advantage of the Pseudo-Huber-CTA model <xref rid="FD15" ref-type="disp-formula">(15)</xref> is that it has the same number of variables as &#x02113;<sub>2</sub> - CTA and the same feasible region, the only difference is that the quadratic objective function is replaced by a strictly convex function.</p><p id="P30">Optimization problems <xref rid="FD8" ref-type="disp-formula">(8)</xref>, <xref rid="FD10" ref-type="disp-formula">(10)</xref> and <xref rid="FD15" ref-type="disp-formula">(15)</xref> can be solved with appropriate versions of the Interior-Point Methods (IPM). Since IPMs are the methods of choice to solve different CTA models, in the rest of the section we describe the main ideas of IPMs, only on a conceptual level, and then we discuss their application on given CTA models.</p><p id="P31">IPMs have in many ways revolutionized the optimization theory and practice in the past three decades since the appearance of the Karmarkar&#x02019;s breakthrough paper [<xref rid="R20" ref-type="bibr">20</xref>]. Since then, the field of IPMs has been a very active area of research with literary thousands of papers published as well as numerous excellent monographs and textbooks. The general theory of IPMs for convex optimization problems can be found in the seminal monograph of Nesterov and Nemirovskii [<xref rid="R26" ref-type="bibr">26</xref>]. In addition to this monograph, and without any attempt to be complete, we mention a few other relevant references [<xref rid="R29" ref-type="bibr">29</xref>, <xref rid="R28" ref-type="bibr">28</xref>, <xref rid="R22" ref-type="bibr">22</xref>]. The reason for such an interest is that IPMs have proven to be very efficient in solving large linear and non-linear (convex) optimization problems which were previously hard to solve. Now-days almost every relevant optimization software, whether commercial or open source, contains an IPM solver which is capable of solving at least LP problems and in many cases QP problems, and, less frequently, conic optimization problems. In the case of LP there are plenty of numerical studies showing that IPMs are at least as efficient, if not more, as the classical Simplex Method (SM) on large scale LP problems.</p><p id="P32">The basic idea of path-following IPMs, that are most commonly used and studied, is centered around approximately following the parametric trajectory that is called <italic>central path</italic> which leads to the solution of the problem when a parameter is approaching zero. The points on the central path are called <italic>&#x003bc;-centers</italic> and are obtained as solutions of the Karush-Kuhn-Tucker (KKT) optimality conditions of the problem where a (the) complementarity equation(s) is (are) perturbed by a positive parameter <italic>&#x003bc;</italic> &#x0003e; 0. In particular, the perturbed KKT system for Pseudo-Huber-CTA is explicitly listed in [<xref rid="R4" ref-type="bibr">4</xref>].</p><p id="P33">The solution of the problem, which is obtained when <italic>&#x003bc;</italic> = 0, is found by tracing the central path while gradually reducing <italic>&#x003bc;</italic> to zero. However, tracing the central path exactly would be prohibitively inefficient. The main achievement of IPMs have been to show that it is sufficient to trace the central path approximately; as long as the iterates are in the certain neighborhood of the central path, it is still possible to prove global convergence and, moreover, show that the -approximate solution of the problem, according to the appropriate proximity measure, can be obtained in polynomial number of iterations with the best theoretical upper bound being <inline-formula><mml:math display="inline" id="M28" overflow="scroll"><mml:mrow><mml:mi>O</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msqrt><mml:mi>n</mml:mi></mml:msqrt><mml:mi>log</mml:mi><mml:mfrac><mml:mi>n</mml:mi><mml:mi>&#x003f5;</mml:mi></mml:mfrac></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:math></inline-formula>, where <italic>n</italic> represents the number of variables of the problem at hand.</p><p id="P34">However, practical behavior of IPM heavily depends on many factors, such as the structure of the problem, the starting point, the accuracy needed, etc. As reported in [<xref rid="R4" ref-type="bibr">4</xref>], Pseudo-Huber-CTA <xref rid="FD15" ref-type="disp-formula">(15)</xref> can be difficult to solve with a general convex optimization solver even for small instances if the solver is not &#x02018;appropriately tuned&#x02019;. However, for problems that exhibit a special structure such as 3-D tables whose constraints have a block-angular structure, the specialized block-angular IPM of J. Castro [<xref rid="R5" ref-type="bibr">5</xref>, <xref rid="R9" ref-type="bibr">9</xref>, <xref rid="R10" ref-type="bibr">10</xref>] solves Pseudo-Huber-CTA more efficiently than &#x02113;<sub>1</sub>-CTA while &#x02113;<sub>2</sub>-CTA has by far the best CPU time. Hence, Pseudo-Huber-CTA is a viable option for solving &#x02113;<sub>1</sub>-CTA; however, the IPM have to be implemented with care and, in addition, the specialized IPM may not work efficiently for other types of tables. As indicated in [<xref rid="R4" ref-type="bibr">4</xref>], modifications and tuning of the Block-angular IPM so it can handle large and complex tables of different types is a direction for future research.</p><p id="P35">Another direction in searching how to efficiently solve Pseudo-Huber-CTA and &#x02113;<sub>1</sub>-CTA is to investigate whether these models can be transformed into the conic optimization (CO) problems. The motivation for such investigation comes from the fact that it has been established both theoretically and numerically that IPMs perform better on the well structured problems such as CO problems than on general convex optimization problems [<xref rid="R2" ref-type="bibr">2</xref>, <xref rid="R3" ref-type="bibr">3</xref>, <xref rid="R25" ref-type="bibr">25</xref>]. CO problems are LP problems over cones, that is, variables belong to certain types of cones. Most common cones are either non-negative orthant, second-order (quadratic) cone or semidefinite cone definitions; of which are listed in the next section. Thus, formulating Pseudo-Huber and &#x02113;<sub>1</sub>-CTA as CO problems would be advantageous. In the next section we develop SOC formulation of both Pseudo-Huber and &#x02113;<sub>1</sub> CTA.</p></sec><sec id="S4"><label>4</label><title>SOC Formulation of Pseudo-Huber and &#x02113;<sub>1</sub> CTA</title><p id="P36">In this section we investigate how Pseudo-Huber and &#x02113;<sub>1</sub> CTA can be formulated as SOC models. The CO problems can be formulated as
<disp-formula id="FD16"><label>(16)</label><mml:math display="block" id="M29" overflow="scroll"><mml:mrow><mml:mrow><mml:munder><mml:mrow><mml:mi mathvariant="normal">min</mml:mi></mml:mrow><mml:mi>x</mml:mi></mml:munder><mml:mspace width="0.25em"/><mml:msup><mml:mi>c</mml:mi><mml:mi>T</mml:mi></mml:msup><mml:mi>x</mml:mi></mml:mrow><mml:mspace linebreak="newline"/><mml:mspace width="0.25em"/><mml:mrow><mml:mi>s</mml:mi><mml:mo>.</mml:mo><mml:mi>t</mml:mi><mml:mo>.</mml:mo><mml:mspace width="0.25em"/><mml:mi>A</mml:mi><mml:mi>x</mml:mi><mml:mo>=</mml:mo><mml:mi>b</mml:mi><mml:mo>,</mml:mo></mml:mrow><mml:mspace linebreak="newline"/><mml:mspace width="1em"/><mml:mrow><mml:mi>x</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi mathvariant="script">K</mml:mi><mml:mo>,</mml:mo></mml:mrow></mml:mrow></mml:math></disp-formula>
where <inline-formula><mml:math display="inline" id="M30" overflow="scroll"><mml:mi mathvariant="script">K</mml:mi></mml:math></inline-formula> is a cone of the following three types:
<list list-type="order" id="L2"><list-item><p id="P37">The linear cone or non-negative orthant:
<disp-formula id="FD17"><mml:math display="block" id="M31" overflow="scroll"><mml:mrow><mml:mi mathvariant="script">K</mml:mi><mml:mo>=</mml:mo><mml:msubsup><mml:mi>&#x0211d;</mml:mi><mml:mo>+</mml:mo><mml:mi>n</mml:mi></mml:msubsup><mml:mo>:</mml:mo><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mi>x</mml:mi><mml:mo>&#x02208;</mml:mo><mml:msup><mml:mi>&#x0211d;</mml:mi><mml:mi>n</mml:mi></mml:msup><mml:mo>:</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02265;</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mspace width="0.25em"/><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x02026;</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi></mml:mrow><mml:mo>}</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:mrow></mml:math></disp-formula></p></list-item><list-item><p id="P38">The positive semidefinite cone:
<disp-formula id="FD18"><mml:math display="block" id="M32" overflow="scroll"><mml:mrow><mml:mi mathvariant="script">K</mml:mi><mml:mo>=</mml:mo><mml:msubsup><mml:mi mathvariant="bold">S</mml:mi><mml:mo>+</mml:mo><mml:mi>n</mml:mi></mml:msubsup><mml:mo>:</mml:mo><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mi>X</mml:mi><mml:mo>&#x02208;</mml:mo><mml:msup><mml:mi mathvariant="bold">S</mml:mi><mml:mi>n</mml:mi></mml:msup><mml:mo>:</mml:mo><mml:mi>X</mml:mi><mml:mo>&#x02ab0;</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mo>}</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:math></disp-formula>
where <inline-formula><mml:math display="inline" id="M33" overflow="scroll"><mml:mo>&#x02ab0;</mml:mo></mml:math></inline-formula> means that <italic>X</italic> is positive semidefinite matrix and <bold>S</bold><sup><italic>n</italic></sup> is a set of symmetric <italic>n</italic>-dimensional matrices.</p></list-item><list-item><p id="P39">The quadratic or second-order cone:
<disp-formula id="FD19"><mml:math display="block" id="M34" overflow="scroll"><mml:mrow><mml:mi mathvariant="script">K</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mi mathvariant="script">L</mml:mi><mml:mi>n</mml:mi></mml:msup><mml:mo>=</mml:mo><mml:mrow><mml:mo stretchy="false">{</mml:mo><mml:mrow><mml:mi>x</mml:mi><mml:mo>&#x02208;</mml:mo><mml:msup><mml:mi>&#x0211d;</mml:mi><mml:mi>n</mml:mi></mml:msup><mml:mo>:</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02265;</mml:mo><mml:msqrt><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mn>1</mml:mn><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:mo>&#x022ef;</mml:mo><mml:mo>+</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02212;</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:mo>&#x022ef;</mml:mo><mml:mo>+</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>n</mml:mi><mml:mn>2</mml:mn></mml:msubsup></mml:mrow></mml:msqrt></mml:mrow><mml:mo stretchy="false">}</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:mrow></mml:math></disp-formula></p></list-item></list></p><p id="P40">More generally, <inline-formula><mml:math display="inline" id="M35" overflow="scroll"><mml:mi mathvariant="script">K</mml:mi></mml:math></inline-formula> can be a Cartesian product of the above mentioned cones. It is also worth mentioning that the cones defined above are examples of symmetric cones, thus problem <xref rid="FD16" ref-type="disp-formula">(16)</xref> can be considered in a more general framework of Symmetric Optimization (SO) problems, see [<xref rid="R16" ref-type="bibr">16</xref>,<xref rid="R18" ref-type="bibr">18</xref>, <xref rid="R24" ref-type="bibr">24</xref>] and references therein.</p><p id="P41">In what follows, we present a reformulation of Pseudo-Huber-CTA problem <xref rid="FD15" ref-type="disp-formula">(15)</xref> as a SOC problem. Consider Pseudo-Huber Function <xref rid="FD14" ref-type="disp-formula">(14)</xref>
<disp-formula id="FD20"><mml:math display="block" id="M36" overflow="scroll"><mml:mrow><mml:msub><mml:mi>&#x003d5;</mml:mi><mml:mi>&#x003b4;</mml:mi></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msqrt><mml:mrow><mml:msup><mml:mi>&#x003b4;</mml:mi><mml:mn>2</mml:mn></mml:msup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msubsup></mml:mrow></mml:msqrt><mml:mo>&#x02212;</mml:mo><mml:mi>&#x003b4;</mml:mi><mml:mo>.</mml:mo></mml:mrow></mml:math></disp-formula>
Let&#x02019;s define
<disp-formula id="FD21"><label>(17)</label><mml:math display="block" id="M37" overflow="scroll"><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>:</mml:mo><mml:mo>=</mml:mo><mml:msqrt><mml:mrow><mml:msup><mml:mi>&#x003b4;</mml:mi><mml:mn>2</mml:mn></mml:msup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msubsup></mml:mrow></mml:msqrt><mml:mspace width="1em"/><mml:mspace width="0.25em"/><mml:mtext>and</mml:mtext><mml:mspace width="0.25em"/><mml:mspace width="1em"/><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>:</mml:mo><mml:mo>=</mml:mo><mml:mi>&#x003b4;</mml:mi><mml:mo>,</mml:mo><mml:mspace width="1em"/><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x02026;</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi><mml:mo>.</mml:mo></mml:mrow></mml:math></disp-formula>
Hence, we have
<disp-formula id="FD22"><mml:math display="block" id="M38" overflow="scroll"><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:msqrt><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>y</mml:mi><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msubsup></mml:mrow></mml:msqrt></mml:mrow></mml:math></disp-formula>
which is the boundary of the second-order (quadratic) cone
<disp-formula id="FD23"><mml:math display="block" id="M39" overflow="scroll"><mml:mrow><mml:msub><mml:mi mathvariant="script">K</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x02208;</mml:mo><mml:msup><mml:mi>&#x0211d;</mml:mi><mml:mn>3</mml:mn></mml:msup><mml:mspace width="0.5em"/><mml:mo>:</mml:mo><mml:mspace width="0.5em"/><mml:msub><mml:mi>t</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02265;</mml:mo><mml:msqrt><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>y</mml:mi><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msubsup></mml:mrow></mml:msqrt></mml:mrow><mml:mo>}</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:mrow></mml:math></disp-formula></p><p id="P42">Now, the reformulation of the Pseudo-Huber-CTA <xref rid="FD15" ref-type="disp-formula">(15)</xref> as a SOC problem follows
<disp-formula id="FD24"><label>(18)</label><mml:math display="block" id="M40" overflow="scroll"><mml:mrow><mml:mrow><mml:munder><mml:mrow><mml:mi>max</mml:mi></mml:mrow><mml:mi>x</mml:mi></mml:munder><mml:mspace width="0.25em"/><mml:msubsup><mml:mo>&#x02211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>n</mml:mi></mml:msubsup><mml:mrow><mml:msub><mml:mi>w</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02212;</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mspace linebreak="newline"/><mml:mrow><mml:mi>s</mml:mi><mml:mo>.</mml:mo><mml:mi>t</mml:mi><mml:mo>.</mml:mo><mml:mspace width="0.25em"/><mml:mi>A</mml:mi><mml:mi>x</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo></mml:mrow><mml:mspace linebreak="newline"/><mml:mspace width="1em"/><mml:mrow><mml:mspace width="1em"/><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mi>&#x003b4;</mml:mi><mml:mo>;</mml:mo><mml:mspace width="1em"/><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x02026;</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi><mml:mo>,</mml:mo></mml:mrow><mml:mspace linebreak="newline"/><mml:mspace width="1em"/><mml:mrow><mml:mspace width="1em"/><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x02208;</mml:mo><mml:msub><mml:mi mathvariant="script">K</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>;</mml:mo><mml:mspace width="1em"/><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x02026;</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi><mml:mo>,</mml:mo></mml:mrow><mml:mspace linebreak="newline"/><mml:mspace width="1em"/><mml:mrow><mml:mi>l</mml:mi><mml:mo>&#x02264;</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x02264;</mml:mo><mml:mi>u</mml:mi><mml:mo>.</mml:mo></mml:mrow></mml:mrow></mml:math></disp-formula></p><p id="P43">This model is valid even for <italic>&#x003b4;</italic> = 0. In that case we obtain a SOC formulation of the <italic>l</italic>1-CTA <xref rid="FD9" ref-type="disp-formula">(9)</xref>
<disp-formula id="FD25"><label>(19)</label><mml:math display="block" id="M41" overflow="scroll"><mml:mrow><mml:mrow><mml:munder><mml:mrow><mml:mi mathvariant="normal">min</mml:mi></mml:mrow><mml:mi>x</mml:mi></mml:munder><mml:mspace width="0.25em"/><mml:msubsup><mml:mo>&#x02211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>n</mml:mi></mml:msubsup><mml:mrow><mml:msub><mml:mi>w</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mspace linebreak="newline"/><mml:mrow><mml:mi>s</mml:mi><mml:mo>.</mml:mo><mml:mi>t</mml:mi><mml:mo>.</mml:mo><mml:mspace width="0.25em"/><mml:mi>A</mml:mi><mml:mi>x</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo></mml:mrow><mml:mspace linebreak="newline"/><mml:mspace width="1em"/><mml:mrow><mml:mspace width="1em"/><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x02208;</mml:mo><mml:msub><mml:mi mathvariant="script">K</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>;</mml:mo><mml:mspace width="1em"/><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x02026;</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi><mml:mo>,</mml:mo></mml:mrow><mml:mspace linebreak="newline"/><mml:mspace width="1em"/><mml:mrow><mml:mspace width="1em"/><mml:mi>l</mml:mi><mml:mo>&#x02264;</mml:mo><mml:mi>x</mml:mi><mml:mo>&#x02264;</mml:mo><mml:mi>u</mml:mi><mml:mo>.</mml:mo></mml:mrow></mml:mrow></mml:math></disp-formula>
This model could have been obtained directly from <italic>l</italic>1-CTA <xref rid="FD9" ref-type="disp-formula">(9)</xref> because the absolute value has an obvious second-order cone representation since the epigraph of the absolute value function is exactly second-order cone, that is,
<disp-formula id="FD26"><mml:math display="block" id="M42" overflow="scroll"><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>|</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>|</mml:mo></mml:mrow><mml:mspace width="1em"/><mml:mo>&#x02192;</mml:mo><mml:mspace width="1em"/><mml:msub><mml:mi mathvariant="script">K</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x02208;</mml:mo><mml:msup><mml:mi>&#x0211d;</mml:mi><mml:mn>2</mml:mn></mml:msup><mml:mo>:</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x02265;</mml:mo><mml:msqrt><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msubsup></mml:mrow></mml:msqrt></mml:mrow><mml:mo>}</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:mrow></mml:math></disp-formula></p><p id="P44">It is well known that the solutions of SOC problems <xref rid="FD24" ref-type="disp-formula">(18)</xref> and <xref rid="FD25" ref-type="disp-formula">(19)</xref> achieve solutions at the boundary of the cones, hence, <xref rid="FD21" ref-type="disp-formula">equations (17)</xref> will hold at the solution [<xref rid="R2" ref-type="bibr">2</xref>,<xref rid="R3" ref-type="bibr">3</xref>]. Thus, it is not necessary to enforce these equations in SOC models; in fact, their inclusion would lead to noncovex problems that would be difficult to solve.</p><p id="P45">An IPM for SOC can now be used to find an -approximate solutions to SOC Pseudo-Huber and &#x02113;<sub>1</sub> CTA models. We have used MOSEK SOC solver [<xref rid="R1" ref-type="bibr">1</xref>] that is considered one of the best, if not the best, SOC solver available on the market today.</p></sec><sec id="S5"><label>5</label><title>Numerical Results for the Small Example</title><p id="P46">In this section an example of the small two-dimensional table stated in Figure 3 in [<xref rid="R4" ref-type="bibr">4</xref>] is considered. The table is listed in <xref rid="F1" ref-type="fig">Figure 1</xref> below as the table (a).</p><p id="P47">The continuous CTA model based on the table (a) is formulated in the following way:
<list list-type="bullet" id="L3"><list-item><p id="P48">The linear constraints are obtained from the requirement that the sum of the elements in each row (or column) remains constant and is equal to the corresponding component in the last column (or row) of table (a).</p></list-item><list-item><p id="P49">The sensitive cells are cells <italic>a</italic><sub>1</sub> and <italic>a</italic><sub>12</sub>. For both of them the upper safe values are enforced, which are listed in the parentheses in the lower right corners of the cells, <italic>upl</italic><sub>1</sub> = 3 and <italic>upl</italic><sub>12</sub> = 5 respectively. Hence, in the transformed tables the upper safe value of the cell <italic>a</italic><sub>1</sub> should be 13 or above and for <italic>a</italic><sub>12</sub> the upper safe value should be 18 or above.</p></list-item><list-item><p id="P50">For the nonsensitive cells the lower and upper bounds are set to be zero and positive infinity respectively, that is, <italic>l</italic><sub><italic>ai</italic></sub> = 0 and <italic>u</italic><sub><italic>ai</italic></sub> = inf for <italic>i</italic> = 2, . . . ,11.</p></list-item><list-item><p id="P51">The weights in the objective function are set to have the value one, that is, <italic>w</italic><sub><italic>i</italic></sub> = 1 for <italic>i</italic> = 1, . . . ,12.</p></list-item></list></p><p id="P52">From this basic CTA model different CTA models discussed in the paper were formulated and then these models were solved using appropriate IPM solvers. The results are listed in <xref rid="F1" ref-type="fig">Figure 1</xref>. Below is the summary of the IPM solvers used.
<list list-type="order" id="L4"><list-item><p id="P53">The &#x02113;<sub>2</sub>-CTA <xref rid="FD8" ref-type="disp-formula">(8)</xref> instance was solved in [<xref rid="R4" ref-type="bibr">4</xref>] using IPM based MOSEK QP solver. Table (d).</p></list-item><list-item><p id="P54">The LP-&#x02113;<sub>1</sub>-CTA <xref rid="FD10" ref-type="disp-formula">(10)</xref> instance was solved in [<xref rid="R4" ref-type="bibr">4</xref>] using MOSEK LP solver. The IPM solver with crossover option was used. Table (b).</p></list-item><list-item><p id="P55">The Pseudo-Huber-CTA <xref rid="FD15" ref-type="disp-formula">(15)</xref> instance was solved in [<xref rid="R4" ref-type="bibr">4</xref>] using Block-angular IPM of J. Castro [<xref rid="R5" ref-type="bibr">5</xref>, <xref rid="R9" ref-type="bibr">9</xref>, <xref rid="R10" ref-type="bibr">10</xref>]. Table (c).</p></list-item><list-item><p id="P56">The SOC &#x02113;<sub>1</sub>-CTA <xref rid="FD25" ref-type="disp-formula">(19)</xref> instance was solved for the first time in this paper using IPM based MOSEK SOC solver. Table (e).</p></list-item><list-item><p id="P57">The SOC Pseudo-Huber-CTA <xref rid="FD24" ref-type="disp-formula">(18)</xref> instance was solved for the first time in this paper using IPM based MOSEK SOC solver. Table (f).</p></list-item></list></p><p id="P58">In [<xref rid="R4" ref-type="bibr">4</xref>] it was observed that &#x02113;<sub>2</sub>-CTA had the fastest execution. Hence, we replicated the solution of the &#x02113;<sub>2</sub>-CTA instance of the example and compared its performance with SOC models instances. The calculations were carried out on a Lenovo ThinkPad W530 computer with Intel(R) CORE i7&#x02013;3740QM 2.70GHz processor. The results are given in <xref rid="T1" ref-type="table">Table 1</xref>.</p><p id="P59">From <xref rid="T1" ref-type="table">Table 1</xref> we can observe that SOC versions are comparable to the &#x02113;<sub>2</sub> version both in number of iterations and CPU time; SOC &#x02113;<sub>1</sub> was slightly faster than &#x02113;<sub>2</sub> while SOC Pseudo-Huber was slightly slower, which is the expected result. Hence, the SOC models are more effective than the LP &#x02113;<sub>1</sub> and Pseudo-Huber-CTA models for this example.</p><p id="P60">Furthermore, for LP &#x02113;<sub>1</sub>, Pseudo-Huber <italic>&#x003d5;</italic><sub>0.001</sub>, SOC &#x02113;<sub>1</sub>, and SOC Pseudo-Huber <italic>&#x003d5;</italic><sub>0.001</sub> CTA instances the optimal values of their respective objective functions are the same, namely, the value is 20, while for &#x02113;<sub>2</sub>-CTA instance it is 20.69. Thus, the objective values for SOC Pseudo Huber and &#x02113;<sub>1</sub>-CTA instances are the same as for the original non-SOC instances, namely 20, which was expected.</p><p id="P61">These results are in line with plenty of other evidence that it is advantageous to solve the SOC formulation of the problem by IPM, rather than using IPM to the original formulation of the problem (see for example [<xref rid="R2" ref-type="bibr">2</xref>, <xref rid="R3" ref-type="bibr">3</xref>, <xref rid="R25" ref-type="bibr">25</xref>, <xref rid="R23" ref-type="bibr">23</xref>]). We are confident that the advantages of the SOC models will be even more visible when applied to larger tabular data sets. Moreover, the SOC IPM is robust and flexible enough to handle different types of tables.</p></sec><sec id="S6"><label>6</label><title>Concluding Remarks</title><p id="P62">The main goal of the paper is mainly theoretical, that is, to present a Second Order Cone (SOC) formulation of the Pseudo-Huber and the &#x02113;<sub>1</sub> CTA models, <xref rid="FD24" ref-type="disp-formula">(18)</xref> and <xref rid="FD25" ref-type="disp-formula">(19)</xref> respectively as an alternative to the original Pseudo-Huber and LP &#x02113;<sub>1</sub> CTA models, <xref rid="FD15" ref-type="disp-formula">(15)</xref> and <xref rid="FD10" ref-type="disp-formula">(10)</xref> respectively. The application of the SOC models to the small example in Section 5 shows promise to be an effective alternative to the application of the original models to the small example. More numerical testing is needed and is forthcoming as a future research topic where SOC models would be implemented and tested on the different types of tables of large dimensions mentioned in the Conclusion of [<xref rid="R4" ref-type="bibr">4</xref>].</p><p id="P63">From <xref rid="F1" ref-type="fig">Figure 1</xref>, it can be observed that the resulting tables for all the models except LP &#x02113;<sub>1</sub> change most of the cells of the original table (a) that are not fixed, even the ones that are not sensitive cells. The reason lays in the nature of IPMs. In these methods, the iterates approximately follow the central path that converges to the analytic center of the optimal set which implies that most of the cells will be changed, while the IPM with crossover or alternatively the Simplex Method, for LP &#x02113;<sub>1</sub> finds the basic solution which implies fewer cells will be changed. Hence, if there is a requirement to minimize the number of non-sensitive cells that are changed, then the LP &#x02113;<sub>1</sub> models solved with SM or IPM with crossover is the right approach. However, if the number of nonsensitive cells changed is not an issue such as for certain types of magnitude tables, then the suggested approach is to use either the SOC &#x02113;<sub>1</sub> model or the &#x02113;<sub>2</sub> model because they are faster. Unless prior regularization of the &#x02113;<sub>1</sub> model is necessary, which then leads to the Pseudo-Huber model and related SOC Pseudo-Huber model, it is more efficient to use the SOC &#x02113;<sub>1</sub> model directly.</p><p id="P64">As noted in [<xref rid="R4" ref-type="bibr">4</xref>], it has been empirically shown that CTA in general exhibits a low disclosure risk [<xref rid="R6" ref-type="bibr">6</xref>] and, at the same time, high data utility [<xref rid="R14" ref-type="bibr">14</xref>, <xref rid="R13" ref-type="bibr">13</xref>] (see also [<xref rid="R21" ref-type="bibr">21</xref>]). However, the study of the disclosure risk and data utility of tables protected by the Pseudo-Huber-CTA model and the SOC CTA models is lacking and is certainly an interesting future research topic.</p></sec></body><back><ack id="S7"><title>Acknowledgments</title><p id="P65">The first author would like to thank Erling Andersen and Florian Jarre for the constructive discussion regarding the SOC model and Iryna Petrenko for her help in performing the calculations described in Section 5.</p><p id="P66">The authors would like to express their appreciation to Donald Malec for his careful reading of the paper and many useful suggestions.</p><p id="P67">Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the authors only and do not necessarily reflect the views of the Centers for Disease Control and Prevention.</p></ack><ref-list><title>References</title><ref id="R1"><label>1.</label><mixed-citation publication-type="book"><name><surname>Andersen</surname><given-names>ED</given-names></name>, <publisher-name>MOSEK solver</publisher-name>, <comment><ext-link ext-link-type="uri" xlink:href="https://mosek.com/resources/doc">https://mosek.com/resources/doc</ext-link></comment>, <year>2016</year></mixed-citation></ref><ref id="R2"><label>2.</label><mixed-citation publication-type="journal"><name><surname>Alizadeh</surname><given-names>F</given-names></name>, and <name><surname>Goldfarb</surname><given-names>D</given-names></name>, <article-title>Second-order cone programming</article-title>. <source>Math. Programming</source>, <volume>95</volume>(<issue>1</issue>):<fpage>3</fpage>&#x02013;<lpage>51</lpage>, <year>2003</year>.</mixed-citation></ref><ref id="R3"><label>3.</label><mixed-citation publication-type="journal"><name><surname>Andersen</surname><given-names>ED</given-names></name>, <name><surname>Roos</surname><given-names>C</given-names></name> and <name><surname>Terlaky</surname><given-names>T</given-names></name>, <article-title>On implementing a primal-dual interior-point method for conic quadratic optimization</article-title>. <source>Math. Programming</source>, <volume>95</volume>(<issue>2</issue>):<fpage>249</fpage>&#x02013;<lpage>277</lpage>, <year>2003</year>.</mixed-citation></ref><ref id="R4"><label>4.</label><mixed-citation publication-type="book"><name><surname>Castro</surname><given-names>J</given-names></name>, <chapter-title>A CTA Model Based on the Huber Function</chapter-title>
<source>Privacy in Statistical Databases 2014</source>, <publisher-name>LNCS</publisher-name>, <volume>8744</volume>:<fpage>79</fpage>&#x02013;<lpage>88</lpage>, <year>2014</year>.</mixed-citation></ref><ref id="R5"><label>5.</label><mixed-citation publication-type="journal"><name><surname>Castro</surname><given-names>J</given-names></name>, <article-title>An interior-point approach for primal block-angular problems</article-title>. <source>Computational Optimization and Applications</source>, <volume>36</volume>:<fpage>195</fpage>&#x02013;<lpage>219</lpage>, <year>2007</year>.</mixed-citation></ref><ref id="R6"><label>6.</label><mixed-citation publication-type="journal"><name><surname>Castro</surname><given-names>J</given-names></name>, <article-title>On assessing the disclosure risk of controlled adjustment methods for statistical tabular data</article-title>. <source>International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems</source>, <volume>20</volume>:<fpage>921</fpage>&#x02013;<lpage>941</lpage>, <year>2012</year>.</mixed-citation></ref><ref id="R7"><label>7.</label><mixed-citation publication-type="journal"><name><surname>Castro</surname><given-names>J</given-names></name>, <article-title>Minimum-distance controlled perturbation methods for large-scale tabular data protection</article-title>. <source>European Journal of Operational Research</source>, <volume>171</volume>:<fpage>39</fpage>&#x02013;<lpage>52</lpage>, <year>2006</year>.</mixed-citation></ref><ref id="R8"><label>8.</label><mixed-citation publication-type="journal"><name><surname>Castro</surname><given-names>J</given-names></name>, <article-title>Recent advances in optimization techniques for statistical tabular data protection</article-title>. <source>European Journal of Operational Research</source>, <volume>216</volume>:<fpage>257</fpage>&#x02013;<lpage>269</lpage>, <year>2012</year>.</mixed-citation></ref><ref id="R9"><label>9.</label><mixed-citation publication-type="journal"><name><surname>Castro</surname><given-names>J</given-names></name> and <name><surname>Cuesta</surname><given-names>J</given-names></name>, <article-title>Quadratic regularization in an interior-point method for primal block-angular problems</article-title>. <source>Mathematical programming</source>, <volume>130</volume>:<fpage>415</fpage>&#x02013;<lpage>445</lpage>, <year>2011</year>.</mixed-citation></ref><ref id="R10"><label>10.</label><mixed-citation publication-type="journal"><name><surname>Castro</surname><given-names>J</given-names></name> and <name><surname>Cuesta</surname><given-names>J</given-names></name>, <article-title>Solving &#x02113;1-CTA in 3D tables by an interior-point method for primal block-angular problems</article-title>. <source>TOP</source>, <volume>21</volume>:<fpage>25</fpage>&#x02013;<lpage>47</lpage>, <year>2013</year>.</mixed-citation></ref><ref id="R11"><label>11.</label><mixed-citation publication-type="book"><name><surname>Castro</surname><given-names>J</given-names></name> and <name><surname>Gonzalez</surname><given-names>JA</given-names></name>, <chapter-title>Assessing the information loss of controlled adjustment methods in two-way tables</chapter-title>
<source>Privacy in Statistical Databases 2014</source>, <publisher-name>LNCS</publisher-name>, <volume>8744</volume>:<fpage>79</fpage>&#x02013;<lpage>88</lpage>, <year>2014</year>.</mixed-citation></ref><ref id="R12"><label>12.</label><mixed-citation publication-type="confproc"><name><surname>Castro</surname><given-names>J</given-names></name> and <name><surname>Gonzalez</surname><given-names>JA</given-names></name>, <article-title>A fast CTA method without complicating binary decisions</article-title>. <conf-name>Documents of the Joint UNECE / Eurostat Work Session on Statistical Data Confidentiality</conf-name>, <conf-loc>Statistics Canada, Ottawa</conf-loc>, <fpage>1</fpage>&#x02013;<lpage>7</lpage>, <year>2013</year>.</mixed-citation></ref><ref id="R13"><label>13.</label><mixed-citation publication-type="confproc"><name><surname>Castro</surname><given-names>J</given-names></name> and <name><surname>Gonzalez</surname><given-names>JA</given-names></name>
<article-title>A multiobjective LP approach for controlled tabular adjustment in statistical disclosure control</article-title>. <conf-name>Working paper</conf-name>, <collab>Department of Statistics and Operations Research, Universitat Politecnica de Catalunya</collab>, <year>2014</year>.</mixed-citation></ref><ref id="R14"><label>14.</label><mixed-citation publication-type="book"><name><surname>Castro</surname><given-names>J</given-names></name> and <name><surname>Giessing</surname><given-names>S</given-names></name>, <chapter-title>Testing variants of minimum distance controlled tabular adjustment</chapter-title> In <source>Monographs of Official Statistics</source>, <publisher-name>Eurostat-Office for Official Publications of the European Communities</publisher-name>, <publisher-loc>Luxembourg</publisher-loc>, <fpage>333</fpage>&#x02013;<lpage>343</lpage>, <year>2006</year>.</mixed-citation></ref><ref id="R15"><label>15.</label><mixed-citation publication-type="book"><name><surname>Dandekar</surname><given-names>RA</given-names></name> and <name><surname>Cox</surname><given-names>LH</given-names></name>, <chapter-title>Synthetic tabular Data: an alternative to complementary cell suppression</chapter-title>
<source>Manuscript</source>, <publisher-name>Energy Information Administration</publisher-name>, <publisher-loc>U.S.</publisher-loc>
<year>2002</year>.</mixed-citation></ref><ref id="R16"><label>16.</label><mixed-citation publication-type="book"><name><surname>Faraut</surname><given-names>J</given-names></name> and <name><surname>Koranyi</surname><given-names>A</given-names></name>, <source>Analysis on Symmetric Cones</source>. <publisher-name>Oxford University Press</publisher-name>, <publisher-loc>New York, USA</publisher-loc>, <year>1994</year>.</mixed-citation></ref><ref id="R17"><label>17.</label><mixed-citation publication-type="book"><name><surname>Fountoulakis</surname><given-names>K</given-names></name> and <name><surname>Gondzio</surname><given-names>J</given-names></name>
<source>A second-order method for strongly convex L1-regularization problems</source>. <comment>Technical Report ERGO-14&#x02013;005</comment>, <publisher-name>School of Mathematics, The University of Edinburgh</publisher-name>, <year>2014</year>.</mixed-citation></ref><ref id="R18"><label>18.</label><mixed-citation publication-type="thesis"><name><surname>Gu</surname><given-names>G</given-names></name>, <source>Interior-Point Methods for Symmetric Optimization</source>. <part-title>Ph.D. Thesis</part-title>, <collab>TU Delft</collab>, <year>2009</year>.</mixed-citation></ref><ref id="R19"><label>19.</label><mixed-citation publication-type="book"><name><surname>Hundepool</surname><given-names>A</given-names></name>, <name><surname>Domingo-Ferrer</surname><given-names>J</given-names></name>, <name><surname>Franconi</surname><given-names>L</given-names></name>, <name><surname>Giessing</surname><given-names>S</given-names></name>, <name><surname>Schulte Nordholt</surname><given-names>E</given-names></name>,<name><surname>Spicer</surname><given-names>K</given-names></name> and <name><surname>DeWolf</surname><given-names>P-P</given-names></name>
<source>Statistical Disclosure Control</source>. <publisher-name>Wiley</publisher-name>, <publisher-loc>Chichester, United Kingdom</publisher-loc>, <year>2012</year>.</mixed-citation></ref><ref id="R20"><label>20.</label><mixed-citation publication-type="journal"><name><surname>Karmarkar</surname><given-names>N</given-names></name>, <article-title>A polynomial-time algorithm for linear programming</article-title>. <source>Combinatorica</source>, <volume>4</volume>:<fpage>373</fpage>&#x02013;<lpage>395</lpage>, <year>1984</year>.</mixed-citation></ref><ref id="R21"><label>21.</label><mixed-citation publication-type="journal"><name><surname>Karr</surname><given-names>AF</given-names></name>, <name><surname>Kohnen</surname><given-names>CN</given-names></name>, <name><surname>Oganian</surname><given-names>A</given-names></name>, <name><surname>Reiter</surname><given-names>JP</given-names></name>, and <name><surname>Sanil</surname><given-names>AP</given-names></name>, <article-title>A frameworkfor evaluating the utility of data altered to protect confidentiality</article-title>. <source>The American Statistician</source>, <volume>60</volume>(<issue>3</issue>):<fpage>224</fpage>&#x02013;<lpage>232</lpage>, <year>2006</year>.</mixed-citation></ref><ref id="R22"><label>22.</label><mixed-citation publication-type="journal"><name><surname>Lesaja</surname><given-names>G</given-names></name>, <article-title>Introducing Interior-Point Methods for Introductory Operations Research Courses and/or Linear Programming Courses</article-title>. <source>The Open Operational Research Journal</source>, <volume>3</volume>:<fpage>1</fpage>&#x02013;<lpage>12</lpage>, <year>2009</year>.</mixed-citation></ref><ref id="R23"><label>23.</label><mixed-citation publication-type="journal"><name><surname>Lesaja</surname><given-names>G</given-names></name> and <name><surname>Slaughter</surname><given-names>V</given-names></name>, <article-title>Interior-point algorithms for a class of convex optimization problems</article-title>. <source>Yugoslav Journal of Operations Research</source>, <volume>19</volume>(<issue>3</issue>):<fpage>239</fpage>&#x02013;<lpage>248</lpage>, <year>2009</year>.</mixed-citation></ref><ref id="R24"><label>24.</label><mixed-citation publication-type="journal"><name><surname>Lesaja</surname><given-names>G</given-names></name> and <name><surname>Roos</surname><given-names>C</given-names></name>, <article-title>Kernel-based interior-point methods for monotone linear complementarity problems over symmetric cones</article-title>, <source>J. Optim. Theory Appl</source>
<volume>150</volume>(<issue>3</issue>):<fpage>444</fpage>&#x02013;<lpage>474</lpage>, <year>2011</year>.</mixed-citation></ref><ref id="R25"><label>25.</label><mixed-citation publication-type="book"><name><surname>Ben-Tal</surname><given-names>A</given-names></name> and <name><surname>Nemirovski</surname><given-names>A</given-names></name>, <chapter-title>Lectures in Modern Convex Optimization: Analysis, Algorithms and Engineering Applications</chapter-title>
<source>MPS/SIAM Series in Optimization</source>, <publisher-name>SIAM</publisher-name>, <publisher-loc>Philadelphia</publisher-loc>, <year>2001</year>.</mixed-citation></ref><ref id="R26"><label>26.</label><mixed-citation publication-type="book"><name><surname>Nesterov</surname><given-names>Y</given-names></name> and <name><surname>Nemirovski</surname><given-names>A</given-names></name>, <chapter-title>Interior-Point Polynomial Algorithms in Convex Programming</chapter-title>
<source>SIAM Studies in Applied Mathematics</source>, Volume <volume>13</volume>, <publisher-name>SIAM</publisher-name>, <publisher-loc>Philadelphia</publisher-loc>, <year>1994</year>.</mixed-citation></ref><ref id="R27"><label>27.</label><mixed-citation publication-type="thesis"><name><surname>Oganian</surname><given-names>A</given-names></name>, <source>Security and Information Loss in Statistical Database Protection</source>. <part-title>PhD thesis</part-title>, <collab>Universitat Politecnica de Catalunya</collab>, <year>2003</year>.</mixed-citation></ref><ref id="R28"><label>28.</label><mixed-citation publication-type="book"><name><surname>Roos</surname><given-names>C</given-names></name>, <name><surname>Terlaky</surname><given-names>T</given-names></name>, and <name><surname>Ph</surname><given-names>J</given-names></name>
<chapter-title>Vial, Theory and Algorithms for Linear Optimization</chapter-title>
<source>An Interior-Point Approach</source>. <publisher-name>Springer Science</publisher-name>, <year>2005</year>.</mixed-citation></ref><ref id="R29"><label>29.</label><mixed-citation publication-type="book"><name><surname>Wright</surname><given-names>SJ</given-names></name>, <source>Primal-Dual Interior-Point Methods</source>. <publisher-name>SIAM</publisher-name>, <publisher-loc>Philadelphia</publisher-loc>, <year>1996</year>.</mixed-citation></ref></ref-list></back><floats-group><fig id="F1" orientation="portrait" position="float"><label>Fig. 1.</label><caption><p id="P68">Results of the small example (rounded to two decimal places).</p></caption><graphic xlink:href="nihms-1016620-f0001"/></fig><table-wrap id="T1" position="float" orientation="portrait"><label>Table 1.</label><caption><p id="P69">Results for &#x02113;<sub>2</sub> and SOC CTA</p></caption><table frame="box" rules="all"><colgroup span="1"><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/></colgroup><thead><tr><th align="center" valign="top" rowspan="1" colspan="1">CTA Model</th><th align="left" valign="top" rowspan="1" colspan="1">Obj. Funct.</th><th align="left" valign="top" rowspan="1" colspan="1">It. No.</th><th align="left" valign="top" rowspan="1" colspan="1">CPU</th></tr></thead><tbody><tr><td align="center" valign="top" rowspan="1" colspan="1">&#x02113;<sub>2</sub></td><td align="center" valign="top" rowspan="1" colspan="1">20.69</td><td align="center" valign="top" rowspan="1" colspan="1">6</td><td align="left" valign="top" rowspan="1" colspan="1">&#x02003;0.08</td></tr><tr><td align="center" valign="top" rowspan="1" colspan="1">SOC-&#x02113;<sub>1</sub></td><td align="center" valign="top" rowspan="1" colspan="1">20</td><td align="center" valign="top" rowspan="1" colspan="1">7</td><td align="left" valign="top" rowspan="1" colspan="1">&#x02003;0.07</td></tr><tr><td align="left" valign="top" rowspan="1" colspan="1">SOC Pseudo-Huber</td><td align="center" valign="top" rowspan="1" colspan="1">20</td><td align="center" valign="top" rowspan="1" colspan="1">9</td><td align="left" valign="top" rowspan="1" colspan="1">&#x02003;0.09</td></tr></tbody></table></table-wrap></floats-group></article>