- 91. Wei Yang, Xiaohong Li, Zhiyong Feng and Jianye Hao. TLSsem: A TLS Security-Enhanced Mechanism against MITM Attacks in Public WiFis,ICECCS2017 (The 22nd International Conference on Engineering of Complex Computer Systems (ICECCS 2017), The Kyushu University, November 5-8, 2017, Fukuoka, Japan).2017
- 90. Yunhao Liu, Xiaohong Li, Zhiyong Feng, and Jianye Hao. An improved android collusion attack detection method based on program slicing. 19th International Conference on Formal Engineering Methods, 2017(Submitted, CCF C). .2017
- 89. Jiangjuan Wang, Xiaohong Li, Zhiyong Feng, Jianye Hao, Guangquan Xu, Zhuobing Han. Automated Software Security Requirements Recommendation Based on FT-SR Model.SEKE2017.382-385(short paper).2017
- 88. Zhao R, Li X, Xu G, et al. E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet[C]//International Workshop on Structured Object-Oriented Formal Language and Method. Springer, Cham, 2016: 101-120..2017
- 87. Fang K, Li X, Hao J, et al. Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on UML 2.3[C]//Trustcom/BigDataSE/I SPA, 2016 IEEE. IEEE, 2016: 852-859..2017
- 86. Zhang X, Li X, Feng Z, et al. Universal Analysis and Detection Framework for Location Aided Routing[C]//Engineering of Complex Computer Systems (ICECCS), 2016 21st International Conference on. IEEE, 2016: 145-154..2017
- 85. Li X, Xu J, Xu G, et al. Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service[J]. International Journal of Software Engineering and Knowledge Engineering, 2016, 26(04): 563-585..2017
- 84. Huang K, Siegel M, Madnick S, et al. Poster: Diversity or concentration? Hackers’ strategy for working across multiple bug bounty programs[C]//37th IEEE Symposium on Security and Privacy (S&P). 2016..2017
- 83. Li X, Zhang C, Hao J, et al. Socially-Aware Multiagent Learning: Towards Socially Optimal Outcomes[C]//ECAI. 2016: 533-541..2017
- 82. Xie X, Chen B, Liu Y, et al. Proteus: computing disjunctive loop summary via path dependency analysis[C]//Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. ACM, 2016: 61-72..2017