- 116. Bo Han, Jian Li and Aravind Srinivasan. Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random-Walk Sampling. IEEE/ACM Transactions on Networking (TON), 22 (5) :1389-1400,2014.
- 115. Ling-yu Wei. A faster triangle-to-triangle intersection test algorithm. Computer Animation and Virtual Worlds, v 25, n 5-6, p 553-559, September 1, 2014.
- 114. Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng and Ziping Wang. Robust password changing and DoS resilience for human-centric password authentication. Security and Communication Networks, v 7, n 10, p 1552-1559, October 1, 2014.
- 113. Andrew Chi-Chih Yao and Yunlei Zhao. Privacy-Preserving Authenticated Key-Exchange Over Internet. IEEE Transactions on Information Forensics and Security, v 9, n 1, p 125-140, January 2014.
- 112. Haoran Yu, Man Hon Cheung, Longbo Huang and Jianwei Huang. Predictive Delay-Aware Network Selection in Data Offloading. 2014 IEEE Global Communications Conference, GLOBECOM 2014, p 1376-1381, February 9, 2014.
- 111. Lei Song, Yong cai Wang, Ji Jiang Yang, Jian qiang Li. Health Sensing by Wearable Sensors and Mobile Phones: A Survey. 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services, Healthcom 2014, p 453-459, 2015.
- 110. Hong xing Li, Chuan Wu, Qiang Sheng Hua, Francis C.M. Lau. Latency-minimizing data aggregation in wireless sensor networks under physical interference model. Ad Hoc Networks, vol.12, n.1, pp.52-68, January 2014.
- 109. Hongyu Liang. Optimal Collapsing Protocol for Multiparty Pointer Jumping. Theory of Computing Systems, v 54, n 1, p 13-23, 2014.
- 108. Deeparnab Chakrabarty, Gagan Goel, Vijayv Vazirani, Lei Wang, Changyuan Yu. SUBMODULARITY HELPS IN NASH AND NONSYMMETRIC BARGAINING GAMES. SIAM Journal on Discrete Mathematics, v 28, n 1, p 99-115, 2014.
- 107. Weihao Gao; Polyanskiy, Y.. On the bit error rate of repeated error-correcting codes. 2014 48th Annual Conference on Information Sciences and Systems, CISS 2014, 2014, 2014.
- 106. Yuanxi Dai, Jooyoung Lee, Bart Mennink, and John Steinberger kmkuu. The Security of Multiple Encryption in the Ideal Cipher Model. Proceedings of Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, v 8616 LNCS, n PART 1, p 20-38, 2014.
- 105. Zhaoquan Gu, QiangSheng Hua, Yuexuan Wang, and Francis Chi Moon Lau. Oblivious Rendezvous in Cognitive Radio Networks. v 8576 LNCS, p 165-179, 2014, Structural Information and Communication Complexity - 21st International Colloquium, SIROCCO 2014, Proceedings.
- 104. Yuan Cao, YuHuai Li, Zhu Cao, Juan Yin, YuAo Chen, Xiongfeng Ma, Cheng-Zhi Peng and JianWei Pan. Direct counterfactual communication with single photons. Conference on Lasers and Electro-Optics Europe - Technical Digest, v 2014-January, 2014.
- 103. Tzameret Iddo. Sparser Random 3-SAT Refutation Algorithms and the Interpolation Problem (Extended Abstract). Proceedings of Automata, Languages, and Programming - 41st International Colloquium(ICALP 2014) vol.8572 LNCS, n.PART 1, pp.1015-1026, 2014,.
- 102. Li Jinliang, Yu Yu, Fu Rong, Li Xiangxue. Built-in determined sub-key correlation power analysis. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v E93-A, n 9, p 1632-1638, September 2010.
- 101. Claudio Chamon, Alioscia Hamma, and Eduardo R. Mucciolo. Emergent Irreversibility and Entanglement Spectrum Statistics. Physical Review Letters, v 112, n 24, June 16, 2014.
- 100. Qian Yang, Jia Jun Ma, Fen Zhuo Guo and Qiao Yan Wen. Semi-loss-tolerant strong quantum coin-flipping protocol using quantum non-demolition measurement. Quantum Information Processing, v 13, n 7, p 1537-1544, July 2014.
- 99. Zhu Jian-Feng, An Jian-Ping, Wang Si-Wei. Enhanced Error Correction for Satellite Navigation Message Based on CRC Codes. Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, v 34, n 7, p 748-751, July 1, 2014.