| 2014 | Adversarial hypothesis testing and a quantum stein's lemma for restricted measurements. Fernando G. S. L. Brandão, Aram W. Harrow, James R. Lee, Yuval Peres |
| 2014 | An efficient algorithm for finding the ground state of 1D gapped local hamiltonians. Zeph Landau, Umesh V. Vazirani, Thomas Vidick |
| 2014 | Approximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problems. Yuichi Yoshida, Yuan Zhou |
| 2014 | Attribute-efficient evolvability of linear functions. Elaine Angelino, Varun Kanade |
| 2014 | Black-box obfuscation for d-CNFs. Zvika Brakerski, Guy N. Rothblum |
| 2014 | Building one-time memories from isolated qubits: (extended abstract). Yi-Kai Liu |
| 2014 | Candidate weak pseudorandom functions in AC Adi Akavia, Andrej Bogdanov, Siyao Guo, Akshay Kamath, Alon Rosen |
| 2014 | Capacity of non-malleable codes. Mahdi Cheraghchi, Venkatesan Guruswami |
| 2014 | Complexity of approximating CSP with balance / hard constraints. Venkatesan Guruswami, Euiwoong Lee |
| 2014 | Coordination mechanisms from (almost) all scheduling policies. Sayan Bhattacharya, Sungjin Im, Janardhan Kulkarni, Kamesh Munagala |
| 2014 | Cryptogenography. Joshua Brody, Sune K. Jakobsen, Dominik Scheder, Peter Winkler |
| 2014 | Decision trees, protocols and the entropy-influence conjecture. Andrew Wan, John Wright, Chenggang Wu |
| 2014 | Decompositions of triangle-dense graphs. Rishi Gupta, Tim Roughgarden, C. Seshadhri |
| 2014 | Deterministic compression with uncertain priors. Elad Haramaty, Madhu Sudan |
| 2014 | Direct sum fails for zero error average communication. Gillat Kol, Shay Moran, Amir Shpilka, Amir Yehudayoff |
| 2014 | Energy-efficient circuit design. Antonios Antoniadis, Neal Barcelo, Michael Nugent, Kirk Pruhs, Michele Scquizzato |
| 2014 | Expanders with respect to Hadamard spaces and random graphs: extended abstract. Manor Mendel, Assaf Naor |
| 2014 | Faster private release of marginals on small databases. Karthekeyan Chandrasekaran, Justin Thaler, Jonathan R. Ullman, Andrew Wan |
| 2014 | High dimensional expanders and property testing. Tali Kaufman, Alexander Lubotzky |
| 2014 | Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ, USA, January 12-14, 2014 Moni Naor |
| 2014 | Integer feasibility of random polytopes: random integer programs. Karthekeyan Chandrasekaran, Santosh S. Vempala |
| 2014 | Invitation games and the price of stability. Uriel Feige, Moshe Tennenholtz |
| 2014 | Iterated group products and leakage resilience against NC1. Eric Miles |
| 2014 | Lattice-based FHE as secure as PKE. Zvika Brakerski, Vinod Vaikuntanathan |
| 2014 | Learning mixtures of arbitrary distributions over large discrete domains. Yuval Rabani, Leonard J. Schulman, Chaitanya Swamy |
| 2014 | Limits of local algorithms over sparse random graphs. David Gamarnik, Madhu Sudan |
| 2014 | Limits of random oracles in secure computation. Mohammad Mahmoody, Hemanta K. Maji, Manoj Prabhakaran |
| 2014 | Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications. Erez Druk, Yuval Ishai |
| 2014 | Locally testable codes and cayley graphs. Parikshit Gopalan, Salil P. Vadhan, Yuan Zhou |
| 2014 | Mechanism design in large games: incentives and privacy. Michael J. Kearns, Mallesh M. Pai, Aaron Roth, Jonathan R. Ullman |
| 2014 | Multireference alignment using semidefinite programming. Afonso S. Bandeira, Moses Charikar, Amit Singer, Andy Zhu |
| 2014 | Non-commutative arithmetic circuits with division. Pavel Hrubes, Avi Wigderson |
| 2014 | On the automorphism groups of strongly regular graphs I. László Babai |
| 2014 | On the structure of boolean functions with small spectral norm. Amir Shpilka, Avishay Tal, Ben Lee Volk |
| 2014 | Optimal provision-after-wait in healthcare. Mark Braverman, Jing Chen, Sampath Kannan |
| 2014 | Parameterized testability. Kazuo Iwama, Yuichi Yoshida |
| 2014 | Partial tests, universal tests and decomposability. Eldar Fischer, Yonatan Goldhirsh, Oded Lachish |
| 2014 | Private interactive communication across an adversarial channel. Ran Gelles, Amit Sahai, Akshay Wadia |
| 2014 | Rate-independent computation in continuous chemical reaction networks. Ho-Lin Chen, David Doty, David Soloveichik |
| 2014 | Rational arguments: single round delegation with sublinear verification. Siyao Guo, Pavel Hubácek, Alon Rosen, Margarita Vald |
| 2014 | Redrawing the boundaries on purchasing data from privacy-sensitive individuals. Kobbi Nissim, Salil P. Vadhan, David Xiao |
| 2014 | Robust device independent quantum key distribution. Umesh V. Vazirani, Thomas Vidick |
| 2014 | Sequential decision making with vector outcomes. Yossi Azar, Uriel Feige, Michal Feldman, Moshe Tennenholtz |
| 2014 | Testers and their applications. Nader H. Bshouty |
| 2014 | The computational hardness of pricing compound options. Mark Braverman, Kanika Pasricha |
| 2014 | The truth behind the myth of the folk theorem. Joseph Y. Halpern, Rafael Pass, Lior Seeman |
| 2014 | Tree codes and a conjecture on exponential sums. Cristopher Moore, Leonard J. Schulman |
| 2014 | Welfare maximization and truthfulness in mechanism design with ordinal preferences. Deeparnab Chakrabarty, Chaitanya Swamy |
| 2014 | Why do simple algorithms for triangle enumeration work in the real world? Jonathan W. Berry, Luke K. Fostvedt, Daniel J. Nordman, Cynthia A. Phillips, C. Seshadhri, Alyson G. Wilson |