Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater. On the Need of Physical Security for Small Embedded Devices: a Case Study with C. proceedings of 17th Financial Cryptography (FC 2013), pp 230-238..
Amin A. Gohari, Shenghao Yang, Sidharth Jaggi. Beyond the cut set bound: uncertainty computations in network coding with correl. IEEE Transactions on Information Theory, vol. 59, no. 9, pp. 5708 - 5722, 2013..
Yi Chen, Shenghao Yang, Wing Shing Wong. Exact Non-Gaussian Interference Model for Fading Channels. IEEE Transactions on Wireless Communications, vol. 12, no. 1, pp. 168-179, 2013.
Longbo Huang and Michael J. Neely. Utility Optimal Scheduling in Energy Harvesting Networks. IEEE/ACM Transactions on Networking, Volume 21, Issue 4, Pages 1117-1130, August 2013..
Longbo Huang, Scott Moeller, Michael J. Neely, Bhaskar Krishnamachari. LIFO-Backpressure Achieves Near Optimal Utility-Delay Tradeoff. IEEE/ACM Transactions on Networking, Volume 21, Issue 3, Pages 831-844, June 2013..
Weihao Kong, Jian Li, Tao Qin, Tie-Yan Liu. Optimal Allocation for Chunked-Reward Advertising. The 9th Conference on Web and Internet Economics (WINE 2013), December 11-14, 2013, Cambridge, MA, USA.
Jian Li and Zeyu Zhang. Ranking with Diverse Intents and Correlated Contents. the 33rd Foundations of Software Technology and Theoretical Computer Science conference (FSTTCS 2013), December 12-14, 2013, IIT Guwahati, India.
Bo Han, Jian Li and Aravind Srinivasan. Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users. IEEE/ACM Transactions on Networking (TON), 2013 (accepted).
Dong Deng, Yu Jiang, Guoliang Li, Jian Li, Cong Yu. Scalable Column Concept Determination for Web Tables Using Large Knowledge Bases. In the 39th International Conference on Very Large Data Bases (VLDB 2013), August 26-30, 2013, Italy, 2013.
Jingdong Wang, Naiyan Wang, You Jia; Jian Li, Gang Zeng, Hongbin Zha, Xian-Sheng Hua. Trinary-Projection Trees for Approximate Nearest Neighbor Search. The IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 2013.
Jian Li, Wen Yuan. Stochastic Combinatorial Optimization via Poisson Approximation. The 45th ACM Symposium on Theory of Computing (STOC 2013), May 31-June 5, 2013, Palo Alto, USA.
Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger. On the indifferentiability of key-alternating ciphers. CRYPTO 2013, LNCS 8042, Springer, 531-550.
John Steinberger. The distinguishability of product distributions by read-once branching programs. Proceedings of IEEE Conference on Computational Complexity (CCC 2013), Jun 4-7, 2013, Palo Alto, California, USA.
Andrew C. Yao, Yunlei Zhao. Online/Offline Signatures for Low-Power Devices. IEEE Transactions on Information Forensics and Security, 8 (2013), 283-294..
Yongcai Wang, Lei Song. Algorithm and Systematic Approach for Robustness of Ultrasound TOA based Localiz. 11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC2013), Nov.13-15, 2013.
Andrew C. Yao, Yunlei Zhao. OAKE: A New Family of Implicitly Authenticated Diffie-Hellman Protocols. Proceedings of 2013 ACM Conference on Computer and Communications Security (CCS 2013), Berlin, Germany, November 4-8, 2013, 1113-1128..
X. Li, Andrew C. Yao. On Revenue Maximization for Selling Multiple Independently Distributed Items. Proceedings of the National Academy of Sciences USA, 110 (2013), 11232-11237..
Giulio Chiribella, Yuxiang Yang, Andrew Chi-Chih Yao. Quantum Replication at the Heisenberg Limit. Nature Communications 4 (2013), 1768..