Noise infusion as a confidentiality protection measure for graph-based statistics." Statistical Journal of the International Association for Official Statistics 32, no. 1 (2016): 127-135. DOI: 10.3233/SJI-160958, available at http://content.iospress.com/articles/statistical-journal-of-the-iaos/sji958."
Complementary Perspectives on Privacy and Security: Economics." In IEEE Security & Privacy, 93-95. Vol. 11., 2013."
Privacy and human behavior in the age of information." Science 347, no. 6221 (2015). DOI: 10.1126/science.aaa1465, available at http://www.sciencemag.org/content/347/6221/509."
What is Privacy Worth?" Journal of Legal Studies 42 (2013): 249-274."
Gone in 15 Seconds: The Limits of Privacy Transparency and Control." IEEE Security & Privacy 11 (2013): 72-74."
The Economics of Privacy." Journal of Economic Literature (2014)."
Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency." In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS). New York, NY: ACM, 2013."
Sleight of Privacy." In Conference on Web Privacy Measurement., 2012."
An Empirical Comparison of Multiple Imputation Methods for Categorical Data." The American Statistician: 0. DOI: 10.1080/00031305.2016.1277158, available at http://dx.doi.org/10.1080/00031305.2016.1277158."
An empirical comparison of multiple imputation methods for categorical data." arXiv, no. 1508.05918 (2015), available at http://arxiv.org/abs/1508.05918."
A Comparison of Multiple Imputation Methods for Categorical Data (Master's Thesis), Statistical Science. Duke University Masters, 2015.
What are you doing now?: Audit trails, Activity level responses and error in the American Time Use Survey." In American Association for Public Opinion Research. Boston, MA, 2013, available at http://www.aapor.org/AAPORKentico/Conference/Recent-Conferences.aspx."
What are You Doing Now? Activity Level Responses and Errors in the American Time Use Survey." Journal of Survey Statistics and Methodology 2, no. 4 (2014)."
Using Social Media to Measure Labor Market Flows. Mimeo, 2014, available at http://www-personal.umich.edu/~shapiro/papers/LaborFlowsSocialMedia.pdf.
Ringtail: Feature Selection for Easier Nowcasting." WebDB (2013): 49-54, available at http://www.cs.stanford.edu/people/chrismre/papers/webdb_ringtail.pdf."
Ringtail: a generalized nowcasting system." WebDB 6 (2013): 1358-1361, available at http://cs.stanford.edu/people/chrismre/papers/Ringtail-VLDB-demo.pdf."
Hierarchical Spatial Models." In Encyclopedia of Geographical Information Science. Springer, 2015."
I Know What You Did Next: Predicting Respondent’s Next Activity Using Machine Learning." In 70th Annual Conference of the American Association for Public Opinion Research (AAPOR). Hollywood, Florida, 2015, available at http://www.aapor.org/AAPORKentico/Conference/Recent-Conferences.aspx."
Designing an Intelligent Time Diary Instrument: Visualization, Dynamic Feedback, and Error Prevention and Mitigation." In UNL/SRAM/Gallup Symposium. Omaha, NE, 2014, available at http://grc.unl.edu/unlsramgallup-symposium."
Designing an Intelligent Time Diary Instrument: Visualization, Dynamic Feedback, and Error Prevention and Mitigation." In American Association for Public Opinion Research 2014 Annual Conference. Anaheim, CA. , 2014, available at http://www.aapor.org/AAPORKentico/Conference/Recent-Conferences.aspx."
Using Machine Learning Techniques to Predict Respondent Type from A Priori Demographic Information." In 70th Annual Conference of the American Association for Public Opinion Research (AAPOR). Hollywood, Florida, 2015, available at http://www.aapor.org/AAPORKentico/Conference/Recent-Conferences.aspx."
Is it the Typeset or the Type of Statistics? Disfluent Font and Self-Disclosure." In Proceedings of Learning from Authoritative Security Experiment Results (LASER). New York, NY: USENIX Association, 2013, available at https://www.usenix.org/laser2013/program/balebako."
Spiny CACTOS: OSN Users Attitudes and Perceptions Towards Cryptographic Access Control Tools." In Proceedings of the Workshop on Usable Security (USEC)., 2014, available at https://www.internetsociety.org/doc/spiny-cactos-osn-users-attitudes-and-perceptions-towards-cryptographic-access-control-tools."
Bayesian learning of joint distributions of objects." In Proceedings of the 16th International Conference on Artificial Intelligence and Statistics (AISTATS) 2013., 2013, available at http://jmlr.csail.mit.edu/proceedings/papers/v31/banerjee13a.html."