- 28. Amin A. Gohari, Shenghao Yang, Sidharth Jaggi. Beyond the Cut-Set Bound: Uncertainty Computations in Network Coding with Correlated Sources. IEEE Transactions on Information Theory, vol. 59, no. 9, pp. 5708 - 5722, 2013.
- 27. Yi Chen, Shenghao Yang, Wing Shing Wong. Exact Non-Gaussian Interference Model for Fading Channels. IEEE Transactions on Wireless Communications, vol. 12, no. 1, pp. 168-179, 2013.
- 26. Longbo Huang and Michael J. Neely. Utility Optimal Scheduling in Energy Harvesting Networks. IEEE/ACM Transactions on Networking, Volume 21, Issue 4, Pages 1117-1130, August 2013..
- 25. Longbo Huang, Scott Moeller, Michael J. Neely, Bhaskar Krishnamachari. LIFO-Backpressure Achieves Near Optimal Utility-Delay Tradeoff. IEEE/ACM Transactions on Networking, Volume 21, Issue 3, Pages 831-844, June 2013.
- 24. Weihao Kong, Jian Li, Tao Qin, Tie-Yan Liu. Optimal Allocation for Chunked-Reward Advertising. The 9th Conference on Web and Internet Economics (WINE 2013), December 11-14, 2013, Cambridge, MA, USA.
- 23. Jian Li and Zeyu Zhang. Ranking with Diverse Intents and Correlated Contents. the 33rd Foundations of Software Technology and Theoretical Computer Science conference (FSTTCS 2013), December 12-14, 2013, IIT Guwahati, India.
- 22. Dong Deng, Yu Jiang, Guoliang Li, Jian Li, Cong Yu. Scalable Column Concept Determination for Web Tables Using Large Knowledge Bases. In the 39th International Conference on Very Large Data Bases (VLDB 2013), August 26-30, 2013, Italy.
- 21. Jingdong Wang, Naiyan Wang, You Jia; Jian Li, Gang Zeng, Hongbin Zha, Xian-Sheng Hua. Trinary-Projection Trees for Approximate Nearest Neighbor Search. The IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 2013.
- 20. Jian Li, Wen Yuan. Stochastic Combinatorial Optimization via Poisson Approximation. The 45th ACM Symposium on Theory of Computing (STOC 2013), May 31-June 5, 2013, Palo Alto, USA.
- 19. Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger. On the indifferentiability of key-alternating ciphers. CRYPTO 2013, LNCS 8042, Springer, 531-550.
- 18. John Steinberger. The distinguishability of product distributions by read-once branching programs. Proceedings of IEEE Conference on Computational Complexity (CCC 2013), Jun 4-7, 2013, Palo Alto, California, USA.
- 17. Andrew C. Yao, Yunlei Zhao. Online/Offline Signatures for Low-Power Devices. IEEE Transactions on Information Forensics and Security, 8 , 283-294,2013.
- 16. Yongcai Wang, Lei Song. Algorithm and Systematic Approach for Robustness of Ultrasound TOA based Localiz. 11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC2013), Nov.13-15, 2013.
- 15. Andrew C. Yao, Yunlei Zhao. OAKE: A New Family of Implicitly Authenticated Diffie-Hellman Protocols. Proceedings of 2013 ACM Conference on Computer and Communications Security (CCS 2013) November 4-8, 1113-1128, 2013,Berlin, Germany.
- 14. X. Li, Andrew C. Yao. On Revenue Maximization for Selling Multiple Independently Distributed Items. Proceedings of the National Academy of Sciences , 110, 11232-11237, 2013,USA.
- 13. Giulio Chiribella, Yuxiang Yang, Andrew Chi-Chih Yao. Quantum Replication at the Heisenberg Limit. Nature Communications , 4 (3) :2915,2013.
- 12. Yan Xu, Yining Wang, Jian-Tao Sun, Jianwen Zhang, Junichi Tsujii and Eric Chang. Building Large Collections of Chinese and English Medical Terms from Semi-struct. PLOS One, 8(7):e67526, 2013.
- 11. Yining Wang, Liwei Wang, Yuanzhi Li, Di He, Wei Chen and Tie-yan Liu. A Theoretical Analysis of Normalized Discounted Cumulative Gain (NDCG) Ranking Measures. COLT 2013.