- 398. Z. Zhang, L.-M. Duan. Generation of Massive Entanglement Through Adiabatic Quantum Phase Transition in. Physics Review Letters, (accepted, 2013).
- 397. Chao Shen, Luming Duan. Efficient Spin Squeezing with Optimized Pulse Sequences. Phys. Rev. A 87, 051801(Rapid Communication) (2013).
- 396. Chao Shen, Zhe-xuan Gong, Luming Duan. Individual Addressing in Quantum Computation through Spatial Refocusing. Phys. Rev. A 88, 052325 (2013).
- 395. Zhe-Xuan Gong, L.-M. Duan. Prethermalization and dynamical transition in an isolated trapped ion spin chain. New. J. Phys. (accepted 2013).
- 394. Dong-Ling Deng, Sheng-Tao Wang, Chao Shen, Lu-Ming Duan. Hopf insulators and their topologically protected surface states. Phys. Rev. B 88, 201105(Rapid Communications) (2013).
- 393. H. T. Ng. Quantum limited measurement of magnetic field gradient with entangled atoms. Phys. Rev. A 87, 043602 (2013).
- 392. Jianyang Zeng, Pei Zhou, Bruce R. Donald. HASH: a Program to Accurately Predict Protein Ha Shifts from Neighboring Backbon. Journal of Biomolecular NMR. 55(1):105-18, 2013.
- 391. Francois-Xavier Standaert, Olivier Pereira, Yu Yu. Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumption. Proceedings of the 33rd Annual International Conference on Cryptology (CRYPTO 2013), pp. 335-352.
- 390. Yu Yu, Xiangxue Li, Jian Weng. Pseudorandom Generators from Regular One-way Functions: New Constructions with I. the 19th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2013), pp.261-279.
- 389. Yevgeniy Dodis, Yu Yu. Overcoming Weak Expectations. Proceedings of the 10th Theory of Cryptography Conference (TCC 2013), pp.1-22..
- 388. Yu Yu, Francois-Xavier Standaert. Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness. Proceedings of the Cryptographer's Track at RSA Conference (CT-RSA 2013), pp.223-239..
- 387. Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater. On the Need of Physical Security for Small Embedded Devices: a Case Study with C. proceedings of 17th Financial Cryptography (FC 2013), pp 230-238..
- 386. Amin A. Gohari, Shenghao Yang, Sidharth Jaggi. Beyond the cut set bound: uncertainty computations in network coding with correl. IEEE Transactions on Information Theory, vol. 59, no. 9, pp. 5708 - 5722, 2013..
- 385. Yi Chen, Shenghao Yang, Wing Shing Wong. Exact Non-Gaussian Interference Model for Fading Channels. IEEE Transactions on Wireless Communications, vol. 12, no. 1, pp. 168-179, 2013.
- 384. Longbo Huang and Michael J. Neely. Utility Optimal Scheduling in Energy Harvesting Networks. IEEE/ACM Transactions on Networking, Volume 21, Issue 4, Pages 1117-1130, August 2013..
- 383. Longbo Huang, Scott Moeller, Michael J. Neely, Bhaskar Krishnamachari. LIFO-Backpressure Achieves Near Optimal Utility-Delay Tradeoff. IEEE/ACM Transactions on Networking, Volume 21, Issue 3, Pages 831-844, June 2013..
- 382. Weihao Kong, Jian Li, Tao Qin, Tie-Yan Liu. Optimal Allocation for Chunked-Reward Advertising. The 9th Conference on Web and Internet Economics (WINE 2013), December 11-14, 2013, Cambridge, MA, USA.
- 381. Jian Li and Zeyu Zhang. Ranking with Diverse Intents and Correlated Contents. the 33rd Foundations of Software Technology and Theoretical Computer Science conference (FSTTCS 2013), December 12-14, 2013, IIT Guwahati, India.