“…This problem arises in many practical applications of interest, such as face recognition [1], subspace clustering [2], sensor network [3], latent variable modeling [4], principle component analysis [5], source separation [6], and so on. The theoretical aspects of this problem have also been studied under different scenarios in the literature, important examples include sparse signal recovery from sparse corruption [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], low-rank matrix recovery from sparse corruption [4], [5], [19], [20], [21], [22], and structured signal recovery from structured corruption [23], [24], [25], [26], [27], [28], [29].…”