- 388. Zhe-Xuan Gong, L.-M. Duan. Prethermalization and dynamical transition in an isolated trapped ion spin chain. New Journal of Physics , 15 (15) :3051, 2013.
- 387. Dong-Ling Deng, Sheng-Tao Wang, Chao Shen, Lu-Ming Duan. Hopf insulators and their topologically protected surface states. Physical Review B 88, 201105(Rapid Communications) (2013).
- 386. H. T. Ng. Quantum limited measurement of magnetic field gradient with entangled atoms. Physical Review A 87, 043602,2013.
- 385. Jianyang Zeng, Pei Zhou, Bruce R. Donald. HASH: a Program to Accurately Predict Protein Ha Shifts from Neighboring Backbon. Journal of Biomolecular NMR. 55(1):105-18, 2013.
- 384. Francois-Xavier Standaert, Olivier Pereira, Yu Yu. Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumption. Proceedings of the 33rd Annual International Conference on Cryptology (CRYPTO 2013), pp. 335-352,2013.
- 383. Yu Yu, Xiangxue Li, Jian Weng. Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters. the 19th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2013), pp.261-279,2013.
- 382. Yevgeniy Dodis, Yu Yu. Overcoming Weak Expectations. Proceedings of the 10th Theory of Cryptography Conference (TCC 2013), pp.1-22..
- 381. Yu Yu, Francois-Xavier Standaert. Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness. Proceedings of the Cryptographer's Track at RSA Conference (CT-RSA 2013), pp.223-239,2013.
- 380. Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater. On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards. proceedings of 17th Financial Cryptography (FC 2013), 7859,pp.230-238,2013.
- 379. Amin A. Gohari, Shenghao Yang, Sidharth Jaggi. Beyond the Cut-Set Bound: Uncertainty Computations in Network Coding with Correlated Sources. IEEE Transactions on Information Theory, vol. 59, no. 9, pp. 5708 - 5722, 2013.
- 378. Yi Chen, Shenghao Yang, Wing Shing Wong. Exact Non-Gaussian Interference Model for Fading Channels. IEEE Transactions on Wireless Communications, vol. 12, no. 1, pp. 168-179, 2013.
- 377. Longbo Huang and Michael J. Neely. Utility Optimal Scheduling in Energy Harvesting Networks. IEEE/ACM Transactions on Networking, Volume 21, Issue 4, Pages 1117-1130, August 2013..
- 376. Longbo Huang, Scott Moeller, Michael J. Neely, Bhaskar Krishnamachari. LIFO-Backpressure Achieves Near Optimal Utility-Delay Tradeoff. IEEE/ACM Transactions on Networking, Volume 21, Issue 3, Pages 831-844, June 2013.
- 375. Weihao Kong, Jian Li, Tao Qin, Tie-Yan Liu. Optimal Allocation for Chunked-Reward Advertising. The 9th Conference on Web and Internet Economics (WINE 2013), December 11-14, 2013, Cambridge, MA, USA.
- 374. Jian Li and Zeyu Zhang. Ranking with Diverse Intents and Correlated Contents. the 33rd Foundations of Software Technology and Theoretical Computer Science conference (FSTTCS 2013), December 12-14, 2013, IIT Guwahati, India.
- 373. Dong Deng, Yu Jiang, Guoliang Li, Jian Li, Cong Yu. Scalable Column Concept Determination for Web Tables Using Large Knowledge Bases. In the 39th International Conference on Very Large Data Bases (VLDB 2013), August 26-30, 2013, Italy.
- 372. Jingdong Wang, Naiyan Wang, You Jia; Jian Li, Gang Zeng, Hongbin Zha, Xian-Sheng Hua. Trinary-Projection Trees for Approximate Nearest Neighbor Search. The IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 2013.
- 371. Jian Li, Wen Yuan. Stochastic Combinatorial Optimization via Poisson Approximation. The 45th ACM Symposium on Theory of Computing (STOC 2013), May 31-June 5, 2013, Palo Alto, USA.