- 380. Bo Han, Jian Li and Aravind Srinivasan. Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users. IEEE/ACM Transactions on Networking (TON), 2013 (accepted).
- 379. Dong Deng, Yu Jiang, Guoliang Li, Jian Li, Cong Yu. Scalable Column Concept Determination for Web Tables Using Large Knowledge Bases. In the 39th International Conference on Very Large Data Bases (VLDB 2013), August 26-30, 2013, Italy, 2013.
- 378. Jingdong Wang, Naiyan Wang, You Jia; Jian Li, Gang Zeng, Hongbin Zha, Xian-Sheng Hua. Trinary-Projection Trees for Approximate Nearest Neighbor Search. The IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 2013.
- 377. Jian Li, Wen Yuan. Stochastic Combinatorial Optimization via Poisson Approximation. The 45th ACM Symposium on Theory of Computing (STOC 2013), May 31-June 5, 2013, Palo Alto, USA.
- 376. Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger. On the indifferentiability of key-alternating ciphers. CRYPTO 2013, LNCS 8042, Springer, 531-550.
- 375. John Steinberger. The distinguishability of product distributions by read-once branching programs. Proceedings of IEEE Conference on Computational Complexity (CCC 2013), Jun 4-7, 2013, Palo Alto, California, USA.
- 374. Andrew C. Yao, Yunlei Zhao. Online/Offline Signatures for Low-Power Devices. IEEE Transactions on Information Forensics and Security, 8 (2013), 283-294..
- 373. Yongcai Wang, Lei Song. Algorithm and Systematic Approach for Robustness of Ultrasound TOA based Localiz. 11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC2013), Nov.13-15, 2013.
- 372. Andrew C. Yao, Yunlei Zhao. OAKE: A New Family of Implicitly Authenticated Diffie-Hellman Protocols. Proceedings of 2013 ACM Conference on Computer and Communications Security (CCS 2013), Berlin, Germany, November 4-8, 2013, 1113-1128..
- 371. X. Li, Andrew C. Yao. On Revenue Maximization for Selling Multiple Independently Distributed Items. Proceedings of the National Academy of Sciences USA, 110 (2013), 11232-11237..
- 370. Giulio Chiribella, Yuxiang Yang, Andrew Chi-Chih Yao. Quantum Replication at the Heisenberg Limit. Nature Communications 4 (2013), 1768..
- 369. Yan Xu, Yining Wang, Jian-Tao Sun, Jianwen Zhang, Junichi Tsujii and Eric Chang. Building Large Collections of Chinese and English Medical Terms from Semi-struct. PLOS One, 8(7):e67526, 2013..
- 368. Yining Wang, Liwei Wang, Yuanzhi Li, Di He, Wei Chen and Tie-yan Liu. A Theoretical Analysis of Normalized Discounted Cumulative Gain (NDCG) Ranking M. COLT 2013..
- 367. Jingjing Liu, Panupong Pasupat, Yining Wang, Scott Cyphers and Jim Glass. Query Understanding Enhanced by Hierarchical Parsing Structures. ASRU 2013..
- 366. Zhen-Qiang Yin, Chi-Hang Fred Fung, Xiongfeng Ma, Chun-Mei Zhang, Hong-Wei Li, Wei Chen, Shuang Wang, Guang-Can Guo, Zheng-Fu Han. Measurement-device-independent Quantum Key Distribution with Uncharacterized Qub. Phys. Rev. A 88, 062322 (2013).
- 365. Y. Cao, H. Liang, J. Yin, H.-L. Yong, F. Zhou, Y.-P. Wu, J.-G. Ren, Y.-H. Li, G.-S. Pan, T. Yang, Xiongfeng Ma, C.-Z. Peng, J.-W. Pan. Entanglement-based quantum key distribution with biased basis choice via free sp. Optics Express, Vol. 21, Iss. 22, pp. 27260-8 (2013).
- 364. Y. Wang, Q. Zhao, D. Zheng. On Optimisation of Cluster-based Sensor Network Tracking System. Int. J. of Ad Hoc and Ubiquitous Computing, (IJAHUC) Vol. 14, No.3, pp. 145 - 157, 2013.
- 363. Y. Wang, Y. X. Wang, D. Zheng. Predict the Multi-hop Reliability for Receiver Contention Based Routing in Dynam. Ad Hoc & Sensor Wireless Networks (AHSWN) 18(3-4): pp. 181-201, 2013.