CSE 543 F a l l 2025
Course Project initial suggested information and references
Artificial Intelligence
[1] J. Curzon, T. A. Kosa, R. Akalu and K. El-Khatib, "Privacy and Artificial Intelligence," in IEEE
Transactions on Artificial Intelligence, vol. 2, no. 2, pp. 96-108, April 2021, doi:
10.1109/TAI.2021.3088084.
[2] C. Huang, Z. Zhang, B. Mao and X. Yao, "An Overview of Artificial Intelligence Ethics," in IEEE
Transactions on Artificial Intelligence, vol. 4, no. 4, pp. 799-819, Aug. 2023, doi:
10.1109/TAI.2022.3194503.
[3] T. T. H. Nguyen, V. T. K. Nguyen, Q. H. Cao, V. B. Truong, Q. K. Nguyen and H. Cao, "Enhancing the
Fairness and Performance of Edge Cameras with Explainable AI," 2024 IEEE International Conference
on Consumer Electronics (ICCE), Las Vegas, NV, USA, 2024, pp. 1-4, doi:
10.1109/ICCE59016.2024.10444383.
[4] S. S. Yau, K. Pandya and S. Choudhary, "Regulatory Compliance in Software Services Using Emerging Technologies,"
2024 IEEE International Conference on Software Services Engineering (SSE), Shenzhen, China, 2024, pp. 36-42, doi:
10.1109/SSE62657.2024.00018.
[5] Q. Yuan et al., "Multi-Agent for Network Security Monitoring and Warning: A Generative AI Solution," in
IEEE Network, doi: 10.1109/MNET.2025.3579001.
[6] S.-F. Wen, A. Shukla, and B. Katt, "Artificial intelligence for system security assurance: A systematic
literature review," International Journal of Information Security, vol. 24, pp. 1–20, 2024, doi:
10.1007/s10207-024-00959-0.
[7] M. Gupta, C. Akiri, K. Aryal, E. Parker and L. Praharaj, "From ChatGPT to ThreatGPT: Impact of
Generative AI in Cybersecurity and Privacy," in IEEE Access, vol. 11, pp. 80218-80245, 2023, doi:
10.1109/ACCESS.2023.3300381.
[8] M. Hao, H. Li, X. Luo, G. Xu, H. Yang and S. Liu, "Efficient and Privacy-Enhanced Federated Learning
for Industrial Artificial Intelligence," in IEEE Transactions on Industrial Informatics, vol. 16, no. 10, pp.
6532-6542, Oct. 2020, doi: 10.1109/TII.2019.2945367.
Deep Learning
[1] Y. He, G. Meng, K. Chen, X. Hu and J. He,” Towards Security Threats of Deep Learning Systems: A Survey”
in IEEE Transactions on Software Engineering, vol. 48, no. 05, pp. 1743-1770, 2022
[2] T. T. Nguyen and V. J. Reddi, "Deep Reinforcement Learning for Cyber Security," in IEEE Transactions
on Neural Networks and Learning Systems, vol. 34, no. 8, pp. 3779-3795, Aug. 2023, doi:
10.1109/TNNLS.2021.3121870.
[3] B. Li, Y. Wu, J. Song, R. Lu, T. Li and L. Zhao, "DeepFed: Federated Deep Learning for Intrusion Detection
in Industrial Cyber–Physical Systems," in IEEE Transactions on Industrial Informatics, vol. 17, no. 8, pp.
5615-5624, Aug. 2021, doi: 10.1109/TII.2020.3023430.
[4] J. Weng, J. Weng, J. Zhang, M. Li, Y. Zhang and W. Luo, "DeepChain: Auditable and Privacy-Preserving
Deep Learning with Blockchain-Based Incentive," in IEEE Transactions on Dependable and Secure
Computing, vol. 18, no. 5, pp. 2438-2455, 1 Sept.-Oct. 2021, doi: 10.1109/TDSC.2019.2952332.
[5] T. Zhang et al., "Security and Privacy Challenges in Deep Learning Models," arXiv preprint
arXiv:2311.13744, Nov. 2023. [Online]. Available: https://arxiv.org/abs/2311.13744.
[6] R. N. Wadibhasme, A. U. Chaudhari, P. Khobragade, H. D. Mehta, R. Agrawal and C. Dhule, "Detection
And Prevention of Malicious Activities In Vulnerable Network Security Using Deep Learning," 2024
International Conference on Innovations and Challenges in Emerging Technologies (ICICET), Nagpur,
India, 2024, pp. 1-6, doi: 10.1109/ICICET59348.2024.10616289.
[7] T. Wang et al., "Deep Learning Model Security: Threats and Defenses," arXiv preprint arXiv:2412.08969,
Dec. 2024. [Online]. Available: https://arxiv.org/abs/2412.08969
Large Language Models:
[1] M. D. Purba, A. Ghosh, B. J. Radford and B. Chu, "Software Vulnerability Detection using Large Language
Models," 2023 IEEE 34th International Symposium on Software Reliability Engineering Workshops
(ISSREW), Florence, Italy, 2023, pp. 112-119, doi: 10.1109/ISSREW60843.2023.00058.
[2] Y. Yao et al., "A Survey on Large Language Model (LLM) Security and Privacy: The Good, the Bad, and
the Ugly," arXiv preprint arXiv:2312.02003, Dec. 2023. [Online]. Available:
https://arxiv.org/abs/2312.02003.
[3] M. A. Ferrag et al., "Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-
Preserving BERT-Based Lightweight Model for IoT/IIoT Devices," in IEEE Access, vol. 12, pp. 23733-
23750, 2024, doi: 10.1109/ACCESS.2024.3363469.
[4] N. Kshetri, "Cybercrime and Privacy Threats of Large Language Models," in IT Professional, vol. 25, no.
3, pp. 9-13, May-June 2023, doi: 10.1109/MITP.2023.3275489.
[5] X. Zhou, T. Zhang and D. Lo, "Large Language Model for Vulnerability Detection: Emerging Results and
Future Directions," 2024 IEEE/ACM 46th International Conference on Software Engineering: New
Ideas and Emerging Results (ICSE-NIER), Lisbon, Portugal, 2024, pp. 47-51, doi:
10.1145/3639476.3639762.
[6] W. Zhou et al., "The Security of Using Large Language Models: A Survey with Emphasis on ChatGPT," in
IEEE/CAA Journal of Automatica Sinica, vol. 12, no. 1, pp. 1-26, January 2025, doi:
10.1109/JAS.2024.124983.
[7] S. Hassani, "Enhancing Legal Compliance and Regulation Analysis with Large Language Models," 2024
IEEE 32nd International Requirements Engineering Conference (RE), Reykjavik, Iceland, 2024, pp.
507-511, doi: 10.1109/RE59067.2024.00065.
[8] S. Hu, T. Huang, F. İlhan, S. F. Tekin and L. Liu, "Large Language Model-Powered Smart Contract
Vulnerability Detection: New Perspectives," 2023 5th IEEE International Conference on Trust, Privacy
and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2023, pp. 297-306,
doi: 10.1109/TPS-ISA58951.2023.00044.
Machine Learning
[1] P. C. M. Arachchige, P. Bertok, I. Khalil, D. Liu, S. Camtepe and M. Atiquzzaman, "A Trustworthy Privacy
Preserving Framework for Machine Learning in Industrial IoT Systems," in IEEE Transactions on
Industrial Informatics, vol. 16, no. 9, pp. 6092-6102, Sept. 2020, doi: 10.1109/TII.2020.2974555.
[2] A. B. Nassif, M. A. Talib, Q. Nasir and F. M. Dakalbab, "Machine Learning for Anomaly Detection: A
Systematic Review," in IEEE Access, vol. 9, pp. 78658-78700, 2021, doi: 10.1109/ACCESS.2021.3083060.
[3] P. Kumar et al., "PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-
Learning for IoT-Driven Smart Cities," in IEEE Transactions on Network Science and Engineering, vol.
8, no. 3, pp. 2326-2341, 1 July-Sept. 2021, doi: 10.1109/TNSE.2021.3089435.
[4] J. -W. Lee et al., "Privacy-Preserving Machine Learning With Fully Homomorphic Encryption for Deep
Neural Network," in IEEE Access, vol. 10, pp. 30039-30054, 2022, doi: 10.1109/ACCESS.2022.3159694.
[5] S. Tanwar, Q. Bhatia, P. Patel, A. Kumari, P. K. Singh and W. -C. Hong, "Machine Learning Adoption in
Blockchain-Based Smart Applications: The Challenges, and a Way Forward," in IEEE Access, vol. 8, pp.
474-488, 2020, doi: 10.1109/ACCESS.2019.2961372.
[6] M. Shafiq, Z. Tian, A. K. Bashir, X. Du and M. Guizani, "CorrAUC: A Malicious Bot-IoT Traffic Detection
Method in IoT Network Using Machine-Learning Techniques," in IEEE Internet of Things Journal, vol.
8, no. 5, pp. 3242-3254, 1 March1, 2021, doi: 10.1109/JIOT.2020.3002255.
[7] F. O. Olowononi, D. B. Rawat and C. Liu, "Resilient Machine Learning for Networked Cyber Physical
Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS," in IEEE
Communications Surveys & Tutorials, vol. 23, no. 1, pp. 524-552, Firstquarter 2021, doi:
10.1109/COMST.2020.3036778.
Federated Learning
[1] K. Wei et al., "Federated Learning With Differential Privacy: Algorithms and Performance Analysis," in
IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3454-3469, 2020, doi:
10.1109/TIFS.2020.2988575.
[2] Q. Li et al., "A Survey on Federated Learning Systems: Vision, Hype and Reality for Data Privacy and
Protection," in IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 4, pp. 3347-3366,
1 April 2023, doi: 10.1109/TKDE.2021.3124599.
[3] K. Thumula, H. Holla, C. Gutti, A. A. Sasikumar and H. Gogineni, "PrivFED: Protecting User Privacy in
Federated Learning Systems Through Differential Privacy," 2025 8th International Conference on
Electronics, Materials Engineering & Nano-Technology (IEMENTech), Kolkata, India, 2025, pp. 1-6,
doi: 10.1109/IEMENTech65115.2025.10959665.
[4] G. Xu, H. Li, S. Liu, K. Yang and X. Lin, "VerifyNet: Secure and Verifiable Federated Learning," in IEEE
Transactions on Information Forensics and Security, vol. 15, pp. 911-926, 2020, doi:
10.1109/TIFS.2019.2929409.
[5] D. C. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li and H. Vincent Poor, "Federated Learning
for Internet of Things: A Comprehensive Survey," in IEEE Communications Surveys & Tutorials, vol.
23, no. 3, pp. 1622-1658, thirdquarter 2021, doi: 10.1109/COMST.2021.3075439.
[6] T. Li, A. K. Sahu, A. Talwalkar and V. Smith, "Federated Learning: Challenges, Methods, and Future
Directions," in IEEE Signal Processing Magazine, vol. 37, no. 3, pp. 50-60, May 2020, doi:
10.1109/MSP.2020.2975749.
[7] R. Hu, Y. Guo, H. Li, Q. Pei and Y. Gong, "Personalized Federated Learning With Differential Privacy," in
IEEE Internet of Things Journal, vol. 7, no. 10, pp. 9530-9539, Oct. 2020, doi:
10.1109/JIOT.2020.2991416.
Internet of Things
[1] S. Singh, P. K. Sharma, and Y.-S. Jeong, "Internet of Things (IoT) Applications Security Trends and
Challenges," Journal of IoT Security and Privacy, vol. 6, no. 3, pp. 45–59, Jan. 2024. [Online]. Available:
https://link.springer.com
[2] N. Mishra and S. Pandya, "Internet of Things Applications, Security Challenges, Attacks, Intrusion
Detection, and Future Visions: A Systematic Review," in IEEE Access, vol. 9, pp. 59353-59377, 2021, doi:
10.1109/ACCESS.2021.3073408.
[3] Y. Lu, X. Huang, Y. Dai, S. Maharjan and Y. Zhang, "Blockchain and Federated Learning for Privacy-
Preserved Data Sharing in Industrial IoT," in IEEE Transactions on Industrial Informatics, vol. 16, no.
6, pp. 4177-4186, June 2020, doi: 10.1109/TII.2019.2942190.
[4] M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali and M. Guizani, "A Survey of Machine and Deep
Learning Methods for Internet of Things (IoT) Security," in IEEE Communications Surveys & Tutorials,
vol. 22, no. 3, pp. 1646-1685, thirdquarter 2020, doi: 10.1109/COMST.2020.2988293.
[5] F. Hussain, R. Hussain, S. A. Hassan and E. Hossain, "Machine Learning in IoT Security: Current
Solutions and Future Challenges," in IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1686-
1721, thirdquarter 2020, doi: 10.1109/COMST.2020.2986444.
[6] I. Butun, P. Österberg and H. Song, "Security of the Internet of Things: Vulnerabilities, Attacks, and
Countermeasures," in IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 616-644,
Firstquarter 2020, doi: 10.1109/COMST.2019.2953364.
[7] M. Shen et al., "Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT," in
IEEE Journal on Selected Areas in Communications, vol. 38, no. 5, pp. 942-954, May 2020, doi:
10.1109/JSAC.2020.2980916.
Big Data Analytics
[1] N. Zhou, F. Dufour, V. Bode, P. Zinterhof, N. J. Hammer, and D. Kranzlmüller, "Towards confidential
computing: A secure cloud architecture for big data analytics and AI," arXiv preprint arXiv:2305.17761,
May 2023. [Online]. Available: https://arxiv.org/abs/2305.17761.
[2] I. H. Sarker, A. Hossain, H. F. Khan, A. N. Uddin, and A. A. Alam, "Cybersecurity data science: An
overview from machine learning perspective," Journal of Big Data, vol. 7, no. 1, p. 41, May 2020, doi:
10.1186/s40537-020-00318-5
[3] A. Fu, X. Zhang, N. Xiong, Y. Gao, H. Wang and J. Zhang, "VFL: A Verifiable Federated Learning With
Privacy-Preserving for Big Data in Industrial IoT," in IEEE Transactions on Industrial Informatics, vol.
18, no. 5, pp. 3316-3326, May 2022, doi: 10.1109/TII.2020.3036166.
[4] B. Zhao, K. Fan, K. Yang, Z. Wang, H. Li and Y. Yang, "Anonymous and Privacy-Preserving Federated
Learning With Industrial Big Data," in IEEE Transactions on Industrial Informatics, vol. 17, no. 9, pp.
6314-6323, Sept. 2021, doi: 10.1109/TII.2021.3052183.
[5] D. B. Rawat, R. Doku and M. Garuba, "Cybersecurity in Big Data Era: From Securing Big Data to Data-
Driven Security," in IEEE Transactions on Services Computing, vol. 14, no. 6, pp. 2055-2072, 1 Nov.-
Dec. 2021, doi: 10.1109/TSC.2019.2907247.
[6] S. Kasera, A. Gehlot, V. Uniyal, S. Pandey, G. Chhabra and K. Joshi, "Right to Digital Privacy: A
Technological Intervention of Blockchain and Big Data Analytics," 2023 International Conference on
Innovative Data Communication Technologies and Application (ICIDCA), Uttarakhand, India, 2023,
pp. 1122-1127, doi: 10.1109/ICIDCA56705.2023.10100229.
[7] S. Wang, Z. Wei and F. Wang, "Data Security and Privacy Protection in the Era of Big Data: A Review,"
2024 2nd International Conference on Computer Network Technology and Electronic and Information
Engineering (CNTEIE), Changchun, China, 2024, pp. 73-77, doi: 10.1109/CNTEIE66268.2024.00020.
Block Chain
[1] Y. Zhao et al., "Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices," in IEEE
Internet of Things Journal, vol. 8, no. 3, pp. 1817-1829, 1 Feb.1, 2021, doi: 10.1109/JIOT.2020.3017377.
[2] W. Jie et al., "A Secure and Flexible Blockchain-Based Offline Payment Protocol," in IEEE Transactions
on Computers, vol. 73, no. 2, pp. 408-421, Feb. 2024, doi: 10.1109/TC.2023.3331823.
[3] Y. Fan, E. Chen, Y. Zhu, X. He, S. S. Yau and K. Pandya, "Automatic Generation of Smart Contracts from
Real-World Contracts in Natural Language," 2023 IEEE Smart World Congress (SWC),
Portsmouth,UnitedKingdom, 2023, pp. 1-8, doi: 10.1109/SWC57546.2023.10448870
[4] Y. Qu et al., "Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing,"
in IEEE Internet of Things Journal, vol. 7, no. 6, pp. 5171-5183, June 2020, doi:
10.1109/JIOT.2020.2977383.
[5] B. Jia, X. Zhang, J. Liu, Y. Zhang, K. Huang and Y. Liang, "Blockchain-Enabled Federated Learning Data
Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT," in
IEEE Transactions on Industrial Informatics, vol. 18, no. 6, pp. 4049-4058, June 2022, doi:
10.1109/TII.2021.3085960.
[6] M. Shen et al., "Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT," in
IEEE Journal on Selected Areas in Communications, vol. 38, no. 5, pp. 942-954, May 2020, doi:
10.1109/JSAC.2020.2980916.
[7] Chenxing Li, Sidi Mohamed Beillahi, Guang Yang, Ming Wu, Wei Xu, and Fan Long. 2024. LVMT: An
Efficient Authenticated Storage for Blockchain. ACM Trans. Storage 20, 3, Article 17 (August 2024), 34
pages. https://doi.org/10.1145/3664818
[8] H. Yin, E. Chen, Y. Zhu, C. Zhao, R. Feng and S. S. Yau, "Attribute-Based Private Data Sharing With Script-
Driven Programmable Ciphertext and Decentralized Key Management in Blockchain Internet of
Things,"in IEEE Internet of Things Journal, vol. 9, no. 13, pp. 10625-10639, 1 July1, 2022,
doi:10.1109/JIOT.2021.3124016
Spatial Computing
[1] F. Song, Z. Qin, L. Xue, J. Zhang, X. Lin and X. Shen, "Privacy-Preserving Keyword Similarity Search Over
Encrypted Spatial Data in Cloud Computing," in IEEE Internet of Things Journal, vol. 9, no. 8, pp. 6184-
6198, 15 April15, 2022, doi: 10.1109/JIOT.2021.3110300.
[2] Y. Fan, E. Chen, Y. Zhu, X. He, S. S. Yau and K. Pandya, "Automatic Generation of Smart Contracts from
Real-World Contracts in Natural Language," 2023 IEEE Smart World Congress (SWC), Portsmouth,
UnitedKingdom, 2023, pp. 1-8, doi: 10.1109/SWC57546.2023.10448870
[3] K. Niu, C. Peng, Y. Tian and W. Tan, "Spatial Ciphertext Aggregation Computing Scheme for Mobile
Crowd Sensing Privacy Protection," 2020 International Conference on Networking and Network
Applications (NaNA), Haikou City, China, 2020, pp. 388-393, doi: 10.1109/NaNA51271.2020.00072.
[4] X. Xu, C. He, Z. Xu, L. Qi, S. Wan and M. Z. A. Bhuiyan, "Joint Optimization of Offloading Utility and
Privacy for Edge Computing Enabled IoT," in IEEE Internet of Things Journal, vol. 7, no. 4, pp. 2622-
2629, April 2020, doi: 10.1109/JIOT.2019.2944007
[5] H. Wang, Y. Huang and H. Li, "Quadtree-Based Adaptive Spatial Decomposition for Range Queries Under
Local Differential Privacy," in IEEE Transactions on Emerging Topics in Computing, vol. 11, no. 4, pp.
1045-1056, Oct.-Dec. 2023, doi: 10.1109/TETC.2023.3317393.
[6] X. Wang et al., "Privacy-preserving Boolean Range Query over Encrypted Spatial Data," IEEE INFOCOM
2020 - IEEE Conference on Computer Communications, Toronto, ON, Canada, 2020, pp. 2253-2262,
doi: 10.1109/INFOCOM41043.2020.9155505.
[7] F. Song, Z. Qin, L. Xue, J. Zhang, X. Lin and X. Shen, "Privacy-Preserving Keyword Similarity Search Over
Encrypted Spatial Data in Cloud Computing," in IEEE Internet of Things Journal, vol. 9, no. 8, pp. 6184-
6198, 15 April15, 2022, doi: 10.1109/JIOT.2021.3110300.
Quantum Computing
[1] Y. Zhao, H. Zhong, X. Zhang, Y. Li, C. Zhang and M. Pan, "Bridging Quantum Computing and Differential Privacy:
Insights into Quantum Computing Privacy," 2024 IEEE International Conference on Quantum Computing and
Engineering (QCE), Montreal, QC, Canada, 2024, pp. 13-24, doi: 10.1109/QCE60285.2024.00012.
[2] Y. Fan, E. Chen, Y. Zhu, X. He, S. S. Yau and K. Pandya, "Automatic Generation of Smart Contracts from Real-World
Contracts in Natural Language," 2023 IEEE Smart World Congress (SWC), Portsmouth, UnitedKingdom, 2023, pp.
1-8, doi: 10.1109/SWC57546.2023.10448870
[3] L. Zhou and M. Ying, “Differential privacy in quantum computation,” in IEEE Computer Security Foundations
Symposium (CSF’17), August 2017, pp. 249–262.
[4] C. Hirche, C. Rouzé, and D. S. França, “Quantum differential privacy: An information theory perspective,” IEEE
Transactions on Information Theory (TIT), vol. 69, no. 9, pp. 5771–5787, September 2023.
[5] T. Nuradha, Z. Goldfeld, and M. M. Wilde, “Quantum pufferfish privacy: A flexible privacy framework for quantum
systems,” IEEE Transactions on Information Theory (TIT), vol. 70, no. 8, pp. 5731–5762, May 2024.
[6] J.-S. Kim, A. McCaskey, B. Heim, M. Modani, S. Stanwyck, and T. Costa, “Cuda quantum: The platform for integrated
quantum-classical computing,” in ACM/IEEE Design Automation Conference (DAC’23), July 2023, pp. 1–4.
Cloud Computing
[1] Z. Xiao and Y. Xiao, "Information security risk assessment methods in cloud computing: A review," Journal of
Supercomputing, vol. 71, no. 5, pp. 1345-1367, May 2021, doi: 10.1080/08874417.2024.2329985.
[2] A. R. Alzubi, S. Nayyar, and M. Kumar, "A systematic literature review on cloud computing security: Threats and
mitigation strategies," 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC),
Las Vegas, NV, USA, 2021, pp. 0987-0993, doi: 10.1109/CCWC51342.2021.9376002.
[3] T. Wei, Z. Lv, R. Jin, W. Di, L. Yang and X. Yang, "Homomorphic Encryption Based Privacy Protection Techniques for
Cloud Computing," 2023 2nd International Conference on Cloud Computing, Big Data Application and Software
Engineering (CBASE), Chengdu, China, 2023, pp. 67-71, doi: 10.1109/CBASE60015.2023.10439092.
[4] X. Wu, X. Xu, F. Dai, J. Gao, G. Ji and L. Qi, "An Ensemble of Random Decision Trees with Personalized Privacy
Preservation in Edge-Cloud Computing," 2020 International Conferences on Internet of Things (iThings) and IEEE
Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and
IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), Rhodes, Greece, 2020, pp. 779-
786, doi: 10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00134.
[5] P. Kaur, R. Kaur, A. Kaur and V. K. Sharma, "Privacy Preservation and Secured Data Storage on Cloud Using
Encryption Algorithms," 2023 International Conference on Advances in Computation, Communication and
Information Technology (ICAICCIT), Faridabad, India, 2023, pp. 1374-1378, doi:
10.1109/ICAICCIT60255.2023.10465702.
[6] P. Khatiwada, H. Bhusal, A. Chatterjee and M. W. Gerdes, "A Proposed Access Control-Based Privacy Preservation
Model to Share Healthcare Data in Cloud," 2020 16th International Conference on Wireless and Mobile
Computing, Networking and Communications (WiMob), Thessaloniki, Greece, 2020, pp. 40-47, doi:
10.1109/WiMob50308.2020.9253414.
[7] S. Attuluri, B. S. Bama and K. Anand, "Swarm Based Optimized Key Generation for Preserving the Privacy in Cloud
Environment," 2023 3rd International Conference on Intelligent Technologies (CONIT), Hubli, India, 2023, pp. 1-5,
doi: 10.1109/CONIT59222.2023.10205751.
[8] M. J. Priya and G. Yamuna, "Privacy preserving Data security model for Cloud Computing Technology," 2022
International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN),
Villupuram, India, 2022, pp. 1-5, doi: 10.1109/ICSTSN53084.2022.9761350.
Sample Topics:
Topic 1: Financial Systems
Sample Topic : Identifying Suspicious Real‑Time Banking Transactions using ML
[1] D. Ghelani, T. K. Hua, and S. K. R. Koduru, “Cyber security threats, vulnerabilities, and security solutions models in banking,”
Authorea Preprints, 2022. FinancialSystems
[2] Khalifa AL-Dosari, Noora Fetais & Murat Kucukvar (2022) Artificial Intelligence and Cyber Defense System for Banking
Industry: A Qualitative Study of AI Applications and Challenges, Cybernetics and Systems, DOI:
10.1080/01969722.2022.2112539
[3] H. M. Alzoubi et al., "Cyber Security Threats on Digital Banking," 2022 1st International Conference on AI in Cybersecurity
(ICAIC), Victoria, TX, USA, 2022, pp. 1-4, doi: 10.1109/ICAIC53980.2022.9896966.
[4] Aziz, L. A.-R., & Andriansyah, Y. (2023). The Role Artificial Intelligence in Modern Banking: An Exploration of AI-Driven
Approaches for Enhanced Fraud Prevention, Risk Management, and Regulatory Compliance. Reviews of Contemporary
Business Analytics, 6(1), 110–132
[5] C. V. Sai, D. Das, N. Elmitwally, O. Elezaj, and M. B. Islam, Explainable AI-driven financial transaction fraud detection using
machine learning and deep neural networks," Available at SSRN 4439980.
[6] S. Sarpal, Technological upgradation in the banking sector: Role of artificial intelligence," Technological Innovations in
Banking and Financial Sector-A Road Map to Society, p. 266, 2022.
[7] M. Kour, "Blockchain Technology Changing Landscape of Banking Industry," 2023 2nd International Conference on Applied
Artificial Intelligence and Computing (ICAAIC), Salem, India, 2023, pp. 1212-1216, doi:
10.1109/ICAAIC56838.2023.10140854.
[8] A. D. Mahajan, A. Mahale, A. S. Deshmukh, A. Vidyadharan, V. S. Hegde and K. Vijayaraghavan, "Knowledge Graph-based
Recommendation Engine: The Review," 2023 Second International Conference on Augmented Intelligence and Sustainable
Systems (ICAISS), Trichy, India, 2023, pp. 1088-1095, doi: 10.1109/ICAISS58487.2023.10250672.
Topic 2: Social Media
Sample Topic : Detection & Mitigation of Malware and Phishing on Social Media using Neural
Networks
[1] V. U. Gongane, M. V. Munot, and A. D. Anuse, “Detection and moderation of detrimental content on social media platforms:
current status and future directions,” Social Network Analysis and Mining, vol. 12, no. 1, p. 129, 2022.
[2] T. F. Stafford and B. Q. Duong, "Social Media in Emerging Economies: A Cross-Cultural Comparison," in IEEE Transactions
on Computational Social Systems, vol. 10, no. 3, pp. 1160-1178, June 2023, doi: 10.1109/TCSS.2022.3169412.
[3] Chenwang Wu, Defu Lian, Yong Ge, Min Zhou, and Enhong Chen. 2024. Attacking Social Media via Behavior Poisoning.
ACM Trans. Knowl. Discov. Data 18, 7, Article 169 (August 2024), 27 pages. https://doi.org/10.1145/3654673.
[4] Abdurahman Maarouf, Nicolas Pröllochs, and Stefan Feuerriegel. 2024. The Virality of Hate Speech on Social Media. Proc.
ACM Hum.-Comput. Interact. 8, CSCW1, Article 186 (April 2024), 22 pages. https://doi.org/10.1145/3641025.
[5] M. Huda, L. Sutopo, Liberty, Febrianto, and M. C. Mustafa, “Digital information transparency for cyber security: critical
points in social media trends,” in Future of Information and Commu- nication Conference, pp. 814–831, Springer, 2022.
[6] A. Haleem, M. Javaid, M. A. Qadri, R. P. Singh, and R. Suman, “Artificial intelligence (ai) appli- cations for marketing: A
literature-based study,” International Journal of Intelligent Networks, 2022.
[7] S. Prakasam, N. Balakrishnan, T. Kirthickram, S. Deepak, et al., “Design and development of ai- powered healthcare
whatsapp chatbot,” in 2023 2nd International Conference on Vision Towards Emerging Trends in Communication and
Networking Technologies (ViTECoN), pp. 1–6, IEEE, 2023.
[8] M. Hawkins et al., “Metaverse live shopping analytics: retail data measurement tools, computer vision and deep learning
algorithms, and decision intelligence and modeling,” Journal of Self- Governance and Management Economics, vol. 10,
no. 2, pp. 22–36, 2022.
Topic 3: Smart Cities, Smart Homes, Smart World
Sample Topic: Enhancing Security & Privacy in Smart Homes using Blockchain
[1] J. Yang, Y. Kwon and D. Kim, "Regional Smart City Development Focus: The South Korean National Strategic Smart City
Program," in IEEE Access, vol. 9, pp. 7193-7210, 2021, doi: 10.1109/ACCESS.2020.3047139.
[2] V. Javidroozi, H. Shah and G. Feldman, "FABS: A Framework for Addressing the Business Process Change Challenges for
Smart City Development," in IEEE Access, vol. 11, pp. 64850-64885, 2023, doi: 10.1109/ACCESS.2023.3289213.
[3] B. Kurniawan, S. Supangkat, F. Lumban Gaol and B. Ranti, "Framework for Developing Smart City Models in Indonesian
Cities (Based On Garuda Smart City Framework)," 2022 International Conference on ICT for Smart Society (ICISS),
Bandung, Indonesia, 2022, pp. 01-05, doi: 10.1109/ICISS55894.2022.9915073.
[4] D. Gao, J. Wu and L. Niu, "A Method For Comprehensive Ability Assessment of Smart City Construction From The
Perspective of Big Data," 2021 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS),
Xi'an, China, 2021, pp. 51-54, doi: 10.1109/ICITBS53129.2021.00021.
[5] H. F. Al-Turkistani and N. K. AlSa'awi, "Poster: Combination of Blockchains to Secure Smart Home Internet of Things,"
2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia,
2020, pp. 261-262, doi: 10.1109/SMART- TECH49988.2020.00069.
[6] Y. -H. Lin, H. -S. Tang, T. -Y. Shen and C. -H. Hsia, "A Smart Home Energy Management System Utilizing Neurocomputing-
Based Time-Series Load Modeling and Forecasting Facilitated by Energy Decomposition for Smart Home Automation," in
IEEE Access, vol. 10, pp. 116747-116765, 2022, doi: 10.1109/ACCESS.2022.3219068.
[7] Z. Lin and S. S. Yau, "A Blockchain-Based Approach to Improving Smart Home Security With Situation- Aware Access
Control," 2023 IEEE International Conference on Blockchain (Blockchain), Danzhou, China,2023, pp. 340-347, doi:
10.1109/Blockchain60715.2023.00059..
[8] M. Aslam, M. A. Khan Abbasi, T. Khalid, R. U. Shan, S. Ullah, T. Ahmad, S. Saeed, D. A. Alabbad, and R. Ahmad, “Getting
smarter about smart cities: Improving data security and privacy through compliance,” Sensors, vol. 22, no. 23, p. 9338, 2022.
[9] D. E. MAJDOUBI, H. EL BAKKALI and S. SADKI, "Towards Smart Blockchain-Based System for Privacy and Security in a
Smart City environment," 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and
Applications (CloudTech), Marrakesh, Morocco, 2020, pp. 1-7, doi: 10.1109/CloudTech49835.2020.9365905.
Topic 4: Health Care
Sample Topic :Federated Learning for Strengthening Privacy Protection in Healthcare
Information Systems
[1] A. I. Newaz, A. K. Sikder, M. A. Rahman, and A. S. Uluagac, “A survey on security and privacy issues in modern healthcare
systems: Attacks and defenses,” ACM Transactions on Computing for Healthcare, vol. 2, no. 3, pp. 1–44, 2021.
[2] N. Mohamed, J. Al-Jaroodi, I. Jawhar and N. Kesserwan, "Leveraging Digital Twins for Healthcare Systems Engineering,"
in IEEE Access, vol. 11, pp. 69841-69853, 2023, doi: 10.1109/ACCESS.2023.3292119.
[3] A. K. Jameil and H. Al-Raweshidy, "AI-Enabled Healthcare and Enhanced Computational Resource Management With
Digital Twins Into Task Offloading Strategies," in IEEE Access, vol. 12, pp. 90353- 90370, 2024, doi:
10.1109/ACCESS.2024.3420741.
[4] V. S. Naresh and M. Thamarai, “Privacy-preserving data mining and machine learning in health-care: Applications,
challenges, and solutions,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol. 13, no. 2, p. e1490,
2023.
[5] A. Qayyum, J. Qadir, M. Bilal, and A. Al-Fuqaha, “Secure and robust machine learning for healthcare: A survey,” IEEE
Reviews in Biomedical Engineering, vol. 14, pp. 156–180, 2020.
[6] B. A. Alzahrani, A. Irshad, K. Alsubhi, and A. Albeshri, “A secure and efficient remote patient-monitoring authentication
protocol for cloud-iot,” International Journal of Communication Sys-tems, vol. 33, no. 11, p. e4423, 2020.
[7] L. S. van Boven, R. W. Kusters, D. Tin, F. H. van Osch, H. De Cauwer, L. Ketelings, M. Rao,C. Dameff, andD. G. Barten,
“Hacking acute care: A qualitative study on the health care impactsof ransomware attacks against hospitals,” Annals of
Emergency Medicine, 2023.
[8] E. A. Al-Qarni, “Cybersecurity in healthcare: A review of recent attacks and mitigation strate-gies,” International Journal of
Advanced Computer Science and Applications, vol. 14, no. 5, 2023.
Software Services
Sample Topic : Privacy Protection in Software Authentication using DevOps
[1] A. A. A. Sen et al., "A New SDLC Model for Enhancing Privacy and Security in a Design-Based Approach,"
2025 12th International Conference on Computing for Sustainable Global Development (INDIACom),
Delhi, India, 2025, pp. 1-6, doi: 10.23919/INDIACom66777.2025.11115282.
[2] W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf and Y. A. Bangash, "An In-Depth Analysis of IoT Security
Requirements, Challenges, and Their Countermeasures via Software-Defined Security," in IEEE Internet
of Things Journal, vol. 7, no. 10, pp. 10250-10276, Oct. 2020, doi: 10.1109/JIOT.2020.2997651.
[3] J. Saraiva and S. Soares, "Privacy and Security Documents for Agile Software Engineering: An Experiment
of LGPD Inventory Adoption," 2023 ACM/IEEE International Symposium on Empirical Software
Engineering and Measurement (ESEM), New Orleans, LA, USA, 2023, pp. 1-9, doi:
10.1109/ESEM56168.2023.10304806.
[4] F. Elkourdi, C. Wei, L. Xiao, Z. YU and O. Asan, "Exploring Current Practices and Challenges of HIPAA
Compliance in Software Engineering: Scoping Review," in IEEE Open Journal of Systems Engineering,
vol. 2, pp. 94-104, 2024, doi: 10.1109/OJSE.2024.3392691.
[5] G. Zhang, Y. Liao and S. Zhou, "A privacy-preserving revocable framework in the deep-learning-as-a-
service platform system based on non software as a service," 2021 IEEE Intl Conf on Dependable,
Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on
Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress
(DASC/PiCom/CBDCom/CyberSciTech), AB, Canada, 2021, pp. 1-9, doi: 10.1109/DASC-PICom-
CBDCom-CyberSciTech52372.2021.00017.
[6] J. Nema, M. Bures, J. Novak, Z. Cepan and H. Schvach, "Using Data from Wearable Electronics in the
Military Environment - Security, Privacy, and Software Development Style Discussion," 2025 IEEE
International Conference on Digital Health (ICDH), Helsinki, Finland, 2025, pp. 138-141, doi:
10.1109/ICDH67620.2025.00027.
[7] I. Pashchenko, R. Scandariato, A. Sabetta and F. Massacci, "Secure Software Development in the Era of
Fluid Multi-party Open Software and Services," 2021 IEEE/ACM 43rd International Conference on
Software Engineering: New Ideas and Emerging Results (ICSE-NIER), Madrid, ES, 2021, pp. 91-95,
doi: 10.1109/ICSE-NIER52604.2021.00027.
[8] A. A. Bakar, S. Yussof, F. A. Rahim, R. Ramli, N. K. Anuar and A. A. Bakar, "A Review on Software
Deployment Environments for Privacy Protection in an Organizations," 2020 8th International
Conference on Information Technology and Multimedia (ICIMU), Selangor, Malaysia, 2020, pp. 415-
419, doi: 10.1109/ICIMU49871.2020.9243317.
Topic 6: Supply chain
Sample Topic : Unauthorized Access Detection in Supply chain management
using RegOps
[1] R. Pellegrino, "Supply Chain Finance: How Do Supply Chain Strategies Perform in Mitigating Supply
Chain Disruption and Commodity Price Volatility Risks?," in IEEE Engineering Management Review,
vol. 52, no. 2, pp. 116-133, April 2024, doi: 10.1109/EMR.2024.3358104.
[2] D. Ivanov, "Digital Supply Chain Management and Technology to Enhance Resilience by Building and
Using End-to-End Visibility During the COVID-19 Pandemic," in IEEE Transactions on Engineering
Management, vol. 71, pp. 10485-10495, 2024, doi: 10.1109/TEM.2021.3095193.
[3] S. Saberi, M. Kouhizadeh and J. Sarkis, "Blockchains and the Supply Chain: Findings from a Broad Study
of Practitioners," in IEEE Engineering Management Review, vol. 47, no. 3, pp. 95-103, 1
thirdquarter,Sept. 2019, doi: 10.1109/EMR.2019.2928264.
[4] R. Toorajipour, V. Sohrabpour, A. Nazarpour, P. Oghazi, and M. Fischl, “Artificial intelligence in supply
chain management: A systematic literature review,” Journal of Business Research, vol. 122, pp. 502–
517, 2021.
[5] G. F. Frederico, “Chatgpt in supply chains: Initial evidence of applications and potential research agenda,”
Logistics, vol. 7, no. 2, p. 26, 2023.
[6] N. S. Harzevili, A. B. Belle, J. Wang, S. Wang, Z. Ming, N. Nagappan, et al., “A survey on automated
software vulnerability detection using machine learning and deep learning,” arXiv preprint
arXiv:2306.11673, 2023.
[7] A. D. Ganesh and P. Kalpana, “Future of artificial intelligence and its influence on supply chain risk
management–a systematic review,” Computers & Industrial Engineering, vol. 169, p. 108206, 2022.