Bo Han, Jian Li and Aravind Srinivasan. Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random-Walk Sampling. IEEE/ACM Transactions on Networking (TON), 22 (5) :1389-1400,2014.
Ling-yu Wei. A faster triangle-to-triangle intersection test algorithm. Computer Animation and Virtual Worlds, v 25, n 5-6, p 553-559, September 1, 2014.
Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng and Ziping Wang. Robust password changing and DoS resilience for human-centric password authentication. Security and Communication Networks, v 7, n 10, p 1552-1559, October 1, 2014.
Andrew Chi-Chih Yao and Yunlei Zhao. Privacy-Preserving Authenticated Key-Exchange Over Internet. IEEE Transactions on Information Forensics and Security, v 9, n 1, p 125-140, January 2014.
Haoran Yu, Man Hon Cheung, Longbo Huang and Jianwei Huang. Predictive Delay-Aware Network Selection in Data Offloading. 2014 IEEE Global Communications Conference, GLOBECOM 2014, p 1376-1381, February 9, 2014.
Lei Song, Yong cai Wang, Ji Jiang Yang, Jian qiang Li. Health Sensing by Wearable Sensors and Mobile Phones: A Survey. 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services, Healthcom 2014, p 453-459, 2015.
Hong xing Li, Chuan Wu, Qiang Sheng Hua, Francis C.M. Lau. Latency-minimizing data aggregation in wireless sensor networks under physical interference model. Ad Hoc Networks, vol.12, n.1, pp.52-68, January 2014.
Hongyu Liang. Optimal Collapsing Protocol for Multiparty Pointer Jumping. Theory of Computing Systems, v 54, n 1, p 13-23, 2014.
Deeparnab Chakrabarty, Gagan Goel, Vijayv Vazirani, Lei Wang, Changyuan Yu. SUBMODULARITY HELPS IN NASH AND NONSYMMETRIC BARGAINING GAMES. SIAM Journal on Discrete Mathematics, v 28, n 1, p 99-115, 2014.
Weihao Gao; Polyanskiy, Y.. On the bit error rate of repeated error-correcting codes. 2014 48th Annual Conference on Information Sciences and Systems, CISS 2014, 2014, 2014.
Yuanxi Dai, Jooyoung Lee, Bart Mennink, and John Steinberger kmkuu. The Security of Multiple Encryption in the Ideal Cipher Model. Proceedings of Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, v 8616 LNCS, n PART 1, p 20-38, 2014.
Zhaoquan Gu, QiangSheng Hua, Yuexuan Wang, and Francis Chi Moon Lau. Oblivious Rendezvous in Cognitive Radio Networks. v 8576 LNCS, p 165-179, 2014, Structural Information and Communication Complexity - 21st International Colloquium, SIROCCO 2014, Proceedings.
Yuan Cao, YuHuai Li, Zhu Cao, Juan Yin, YuAo Chen, Xiongfeng Ma, Cheng-Zhi Peng and JianWei Pan. Direct counterfactual communication with single photons. Conference on Lasers and Electro-Optics Europe - Technical Digest, v 2014-January, 2014.
Tzameret Iddo. Sparser Random 3-SAT Refutation Algorithms and the Interpolation Problem (Extended Abstract). Proceedings of Automata, Languages, and Programming - 41st International Colloquium(ICALP 2014） vol.8572 LNCS, n.PART 1, pp.1015-1026, 2014,.
Li Jinliang, Yu Yu, Fu Rong, Li Xiangxue. Built-in determined sub-key correlation power analysis. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v E93-A, n 9, p 1632-1638, September 2010.
Claudio Chamon, Alioscia Hamma, and Eduardo R. Mucciolo. Emergent Irreversibility and Entanglement Spectrum Statistics. Physical Review Letters, v 112, n 24, June 16, 2014.
Qian Yang, Jia Jun Ma, Fen Zhuo Guo and Qiao Yan Wen. Semi-loss-tolerant strong quantum coin-flipping protocol using quantum non-demolition measurement. Quantum Information Processing, v 13, n 7, p 1537-1544, July 2014.
Zhu Jian-Feng, An Jian-Ping, Wang Si-Wei. Enhanced Error Correction for Satellite Navigation Message Based on CRC Codes. Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, v 34, n 7, p 748-751, July 1, 2014.