{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:28:32Z","timestamp":1774369712186,"version":"3.50.1"},"reference-count":255,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Dakota State University","award":["81R203"],"award-info":[{"award-number":["81R203"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Artificial intelligence (AI) is rapidly redefining both computer science and cybersecurity by enabling more intelligent, scalable, and privacy-conscious systems. While most prior surveys treat these fields in isolation, this paper provides a unified review of 256 peer-reviewed publications to bridge that gap. We examine how emerging AI paradigms, such as explainable AI (XAI), AI-augmented software development, and federated learning, are shaping technological progress across both domains. In computer science, AI is increasingly embedded throughout the software development lifecycle to boost productivity, improve testing reliability, and automate decision making. In cybersecurity, AI drives advances in real-time threat detection and adaptive defense. Our synthesis highlights powerful cross-cutting findings, including shared challenges such as algorithmic bias, interpretability gaps, and high computational costs, as well as empirical evidence that AI-enabled defenses can reduce successful breaches by up to 30%. Explainability is identified as a cornerstone for trust and bias mitigation, while privacy-preserving techniques, including federated learning and local differential privacy, emerge as essential safeguards in decentralized environments such as the Internet of Things (IoT) and healthcare. Despite transformative progress, we emphasize persistent limitations in fairness, adversarial robustness, and the sustainability of large-scale model training. By integrating perspectives from two traditionally siloed disciplines, this review delivers a unified framework that not only maps current advances and limitations but also provides a foundation for building more resilient, ethical, and trustworthy AI systems.<\/jats:p>","DOI":"10.3390\/computers14090374","type":"journal-article","created":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T11:51:12Z","timestamp":1757332272000},"page":"374","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Bridging Domains: Advances in Explainable, Automated, and Privacy-Preserving AI for Computer Science and Cybersecurity"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6784-6199","authenticated-orcid":false,"given":"Youssef","family":"Harrath","sequence":"first","affiliation":[{"name":"Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, SD 57042, USA"}]},{"given":"Oswald","family":"Adohinzin","sequence":"additional","affiliation":[{"name":"Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, SD 57042, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9677-9607","authenticated-orcid":false,"given":"Jihene","family":"Kaabi","sequence":"additional","affiliation":[{"name":"Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, SD 57042, USA"}]},{"given":"Morgan","family":"Saathoff","sequence":"additional","affiliation":[{"name":"Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, SD 57042, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,9,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.70063\/techcompinnovations.v1i1.22","article-title":"Pushing Boundaries: AI and Computer Science in the Era of Technological Revolution","volume":"1","author":"Abdussalam","year":"2024","journal-title":"TechComp Innov. J. Comput. Sci. Technol."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Nagarhalli, T.P., Vaze, V., and Rana, N. (2021, January 4\u20136). Impact of machine learning in natural language processing: A review. Proceedings of the 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), Tirunelveli, India.","DOI":"10.1109\/ICICV50876.2021.9388380"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1613\/jair.1.11688","article-title":"Trends in integration of vision and language research: A survey of tasks, datasets, and methods","volume":"71","author":"Mogadala","year":"2021","journal-title":"J. Artif. Intell. Res."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.47672\/ejt.1486","article-title":"Machine learning in cybersecurity: Techniques and challenges","volume":"7","author":"Bharadiya","year":"2023","journal-title":"Eur. J. Technol."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"e3","DOI":"10.4108\/eai.7-7-2021.170285","article-title":"The future of artificial intelligence in cybersecurity: A comprehensive survey","volume":"8","author":"Tao","year":"2021","journal-title":"EAI Endorsed Trans. Creat. Technol."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Khatri, V., Agarwal, G., Gupta, A.K., and Sanghi, A. (2024, January 16\u201317). Machine Learning and Artificial Intelligence in Cybersecurity: Innovations and Challenges. Proceedings of the 2024 Second International Conference on Advanced Computing & Communication Technologies (ICACCTech), Sonipat, India.","DOI":"10.1109\/ICACCTech65084.2024.00122"},{"key":"ref_7","first-page":"13","article-title":"The impact of artificial intelligence in the present world","volume":"35","author":"Ramesh","year":"2023","journal-title":"J. Artif. Intell. Mach. Learn. Neural Netw."},{"key":"ref_8","unstructured":"Pachegowda, C. (2023). The Global Impact of AI-Artificial Intelligence: Recent Advances and Future Directions, A Review. arXiv."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1293","DOI":"10.1109\/TSC.2023.3331083","article-title":"An In-Depth Examination of Artificial Intelligence-Enhanced Cybersecurity in Robotics, Autonomous Systems, and Critical Infrastructures","volume":"17","author":"Santoso","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1462","DOI":"10.1631\/FITEE.1800573","article-title":"Cyber security meets artificial intelligence: A survey","volume":"19","author":"Li","year":"2018","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3430360","article-title":"Trailblazing the artificial intelligence for cybersecurity discipline: A multi-disciplinary research roadmap","volume":"11","author":"Samtani","year":"2020","journal-title":"ACM Trans. Manag. Inf. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Truong, T.C., Diep, Q.B., and Zelinka, I. (2020). Artificial intelligence in the cyber domain: Offense and defense. Symmetry, 12.","DOI":"10.3390\/sym12030410"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Mondal, B. (2020). Artificial intelligence: State of the art. Recent Trends and Advances in Artificial Intelligence and Internet of Things, Springer.","DOI":"10.1007\/978-3-030-32644-9_32"},{"key":"ref_14","first-page":"165","article-title":"Survey on the applications of artificial intelligence in cyber security","volume":"9","author":"Atiku","year":"2020","journal-title":"Int. J. Sci. Technol. Res."},{"key":"ref_15","first-page":"564","article-title":"Emerging threats: The latest cybersecurity risks and the role of artificial intelligence in enhancing cybersecurity defenses","volume":"1","author":"Jimmy","year":"2021","journal-title":"Val. Int. J. Digit. Libr."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s42979-021-00557-0","article-title":"Ai-driven cybersecurity: An overview, security intelligence modeling and research directions","volume":"2","author":"Sarker","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_17","unstructured":"Srivastava, G., Jhaveri, R.H., Bhattacharya, S., Pandya, S., Maddikunta, P.K.R., Yenduri, G., Hall, J.G., Alazab, M., and Gadekallu, T.R. (2022). XAI for cybersecurity: State of the art, challenges, open issues and future directions. arXiv."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"109032","DOI":"10.1016\/j.comnet.2022.109032","article-title":"A survey on deep learning for cybersecurity: Progress, challenges, and opportunities","volume":"212","author":"Macas","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Lourens, M., Dabral, A.P., Gangodkar, D., Rathour, N., Tida, C.N., and Chadha, A. (2022, January 14\u201316). Integration of AI with the Cybersecurity: A detailed Systematic review with the practical issues and challenges. Proceedings of the 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), Uttar Pradesh, India.","DOI":"10.1109\/IC3I56241.2022.10073040"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L.F., and Abdulkadir, S.J. (2022). Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. Electronics, 11.","DOI":"10.3390\/electronics11020198"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"93104","DOI":"10.1109\/ACCESS.2022.3204051","article-title":"Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research","volume":"10","author":"Zhang","year":"2022","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2272358","DOI":"10.1080\/23311916.2023.2272358","article-title":"Current trends in AI and ML for cybersecurity: A state-of-the-art survey","volume":"10","author":"Mohamed","year":"2023","journal-title":"Cogent Eng."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Yarali, A., Rodocker, E., and Gora, C. (2023, January 13\u201315). Artificial Intelligence in Cybersecurity: A Dual-Nature Technology. Proceedings of the 2023 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA.","DOI":"10.1109\/CSCI62032.2023.00042"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Guemmah, T., El Fadili, H., and Hraoui, S. (2023, January 16\u201322). A review and synthesis for framing the use of artificial intelligence in cybersecurity. Proceedings of the 2023 7th IEEE Congress on Information Science and Technology (CiSt), Essaouira, Morocco.","DOI":"10.1109\/CiSt56084.2023.10409914"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"101804","DOI":"10.1016\/j.inffus.2023.101804","article-title":"Artificial intelligence for cybersecurity: Literature review and future research directions","volume":"97","author":"Kaur","year":"2023","journal-title":"Inf. Fusion"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"5115","DOI":"10.1109\/TNSM.2023.3282740","article-title":"A survey on explainable artificial intelligence for cybersecurity","volume":"20","author":"Rjoub","year":"2023","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_27","first-page":"360","article-title":"Artificial intelligence in cybersecurity: Enhancing threat detection and mitigation","volume":"157","author":"Mamadaliev","year":"2023","journal-title":"Sci. Collect. InterConf"},{"key":"ref_28","first-page":"6273","article-title":"AI and Cyber-Security: Enhancing threat detection and response with machine learning","volume":"30","author":"Katiyar","year":"2024","journal-title":"Educ. Adm. Theory Pract."},{"key":"ref_29","unstructured":"(2025, January 01). IEEE Xplore. Available online: https:\/\/ieeexplore.ieee.org\/Xplore\/home.jsp."},{"key":"ref_30","unstructured":"(2025, January 07). ACM Digital Library. Available online: https:\/\/dl.acm.org\/."},{"key":"ref_31","unstructured":"(2025, January 14). Springer Nature Link. Available online: https:\/\/link.springer.com\/."},{"key":"ref_32","unstructured":"(2025, January 21). ScienceDirect. Available online: https:\/\/www.sciencedirect.com\/."},{"key":"ref_33","unstructured":"(2025, January 28). Elsevier. Available online: https:\/\/www.elsevier.com\/."},{"key":"ref_34","unstructured":"(2025, February 04). Web of Science. Available online: https:\/\/mjl.clarivate.com\/home."},{"key":"ref_35","unstructured":"(2025, February 11). Google Scholar. Available online: https:\/\/scholar.google.com\/."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Turing, A.M. (1950). Computing Machinery and Intelligence, Springer.","DOI":"10.1093\/mind\/LIX.236.433"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/BF02478259","article-title":"A logical calculus of the ideas immanent in nervous activity","volume":"5","author":"McCulloch","year":"1943","journal-title":"Bull. Math. Biophys."},{"key":"ref_38","unstructured":"Wiener, N. (1948). Cybernetics or Control and Communication in the Animal and the Machine, MIT Press."},{"key":"ref_39","first-page":"12","article-title":"A proposal for the dartmouth summer research project on artificial intelligence, August 31, 1955","volume":"27","author":"McCarthy","year":"2006","journal-title":"AI Mag."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1145\/367177.367199","article-title":"Recursive functions of symbolic expressions and their computation by machine, part I","volume":"3","author":"McCarthy","year":"1960","journal-title":"Commun. ACM"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1038\/323533a0","article-title":"Learning representations by back-propagating errors","volume":"323","author":"Rumelhart","year":"1986","journal-title":"Nature"},{"key":"ref_42","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., and Longstaff, T.A. (1996, January 6\u20138). A sense of self for Unix processes. Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, USA."},{"key":"ref_43","unstructured":"Hofmeyr, S.A., and Forrest, S. (1998, January 3\u20136). Intrusion detection using immune system principles. Proceedings of the 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186), Oakland, CA, USA."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/MCE.2016.2614740","article-title":"Toast of the IoT: The 1990 Interop Internet Toaster","volume":"6","author":"Romkey","year":"2017","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"8774","DOI":"10.1109\/JIOT.2020.3048439","article-title":"Application Domains, Evaluation Data Sets, and Research Challenges of IoT: A Systematic Review","volume":"8","author":"Lohiya","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Villar, E., Mart\u00edn Toral, I., Calvo, I., Barambones, O., and Fern\u00e1ndez-Bustamante, P. (2024). Architectures for Industrial AIoT Applications. Sensors, 24.","DOI":"10.3390\/s24154929"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"3559","DOI":"10.1007\/s40747-022-00667-z","article-title":"Cyber-physical security for IoT networks: A comprehensive review on traditional, blockchain and artificial intelligence based key-security","volume":"8","author":"Attkan","year":"2022","journal-title":"Complex Intell. Syst."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"7789","DOI":"10.1109\/JIOT.2020.3039359","article-title":"Empowering things with intelligence: A survey of the progress, challenges, and opportunities in artificial intelligence of things","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"20","DOI":"10.54254\/2977-3903\/5\/2023040","article-title":"Edge AI and IoT: Direct integration for on-the-device data processing","volume":"5","author":"Ali","year":"2023","journal-title":"Adv. Eng. Innov."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"13849","DOI":"10.1109\/JIOT.2021.3088875","article-title":"A survey of recent advances in edge-computing-powered artificial intelligence of things","volume":"8","author":"Chang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"24920","DOI":"10.1109\/JSEN.2021.3055618","article-title":"Artificial intelligence-based sensors for next generation IoT applications: A review","volume":"21","author":"Mukhopadhyay","year":"2021","journal-title":"IEEE Sens. J."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Andronie, M., L\u0103z\u0103roiu, G., Iatagan, M., U\u021b\u0103, C., \u0218tef\u0103nescu, R., and Coco\u0219atu, M. (2021). Artificial intelligence-based decision-making algorithms, internet of things sensing networks, and deep learning-assisted smart process management in cyber-physical production systems. Electronics, 10.","DOI":"10.3390\/electronics10202497"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MWC.001.1900292","article-title":"Artificial intelligence enabled wireless networking for 5G and beyond: Recent advances and future challenges","volume":"27","author":"Wang","year":"2020","journal-title":"IEEE Wirel. Commun."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"2100228","DOI":"10.1002\/aisy.202100228","article-title":"Artificial intelligence-enabled sensing technologies in the 5G\/internet of things era: From virtual reality\/augmented reality to the digital twin","volume":"4","author":"Zhang","year":"2022","journal-title":"Adv. Intell. Syst."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Serrano, M., Dang, H.N., and Nguyen, H.M.Q. (2018, January 15\u201318). Recent advances on artificial intelligence and internet of things convergence for human-centric applications: Internet of things science. Proceedings of the 8th International Conference on the Internet of Things, Santa Barbara, CA, USA.","DOI":"10.1145\/3277593.3277638"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"0006","DOI":"10.34133\/icomputing.0006","article-title":"Intelligent computing: The latest advances, challenges, and future","volume":"2","author":"Zhu","year":"2023","journal-title":"Intell. Comput."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Almusaed, A., Yitmen, I., and Almssad, A. (2023). Enhancing smart home design with AI models: A case study of living spaces implementation review. Energies, 16.","DOI":"10.3390\/en16062636"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"101555","DOI":"10.1016\/j.iot.2025.101555","article-title":"HealthAIoT: AIoT-driven smart healthcare system for sustainable cloud computing environments","volume":"31","author":"Wang","year":"2025","journal-title":"Internet Things"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"147728","DOI":"10.1109\/ACCESS.2020.3014047","article-title":"Design of smart unstaffed retail shop based on IoT and artificial intelligence","volume":"8","author":"Xu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"104089","DOI":"10.1016\/j.jnca.2024.104089","article-title":"Intelligent energy management with iot framework in smart cities using intelligent analysis: An application of machine learning methods for complex networks and systems","volume":"235","author":"Nikpour","year":"2025","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"104905","DOI":"10.1016\/j.micpro.2023.104905","article-title":"A novel autonomous irrigation system for smart agriculture using AI and 6G enabled IoT network","volume":"101","author":"Sitharthan","year":"2023","journal-title":"Microprocess Microsyst."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Alakwaa, L., Alhothli, S., and Alhashemi, R. (2025, January 7\u20138). Survey of the Role of IoT and AI in Smart City Infrastructure. Proceedings of the 2025 International Conference on Innovation in Artificial Intelligence and Internet of Things (AIIT), Jeddah, Saudi Arabia.","DOI":"10.1109\/AIIT63112.2025.11082832"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Wazid, M., Singh, J., Pandey, C., Sherratt, R.S., Das, A.K., Giri, D., and Park, Y. (2025). Explainable deep Learning-Enabled malware attack detection for IoT-Enabled intelligent transportation systems. IEEE Trans. Intell. Transp. Syst.","DOI":"10.1109\/TITS.2025.3525505"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"120827","DOI":"10.1109\/ACCESS.2023.3327174","article-title":"The impact of AI applications on smart decision-making in smart cities as mediated by the Internet of Things and smart governance","volume":"11","author":"Bokhari","year":"2023","journal-title":"IEEE Access"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"1596","DOI":"10.1109\/TII.2014.2302638","article-title":"An integrated system for regional environmental monitoring and management based on internet of things","volume":"10","author":"Fang","year":"2014","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Miko\u0142ajewska, E., Miko\u0142ajewski, D., Miko\u0142ajczyk, T., and Paczkowski, T. (2025). Generative AI in AI-based digital twins for fault diagnosis for predictive maintenance in Industry 4.0\/5.0. Appl. Sci., 15.","DOI":"10.3390\/app15063166"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Wehbi, K., Hong, L., Al-salah, T., and Bhutta, A.A. (2019, January 11\u201314). A survey on machine learning based detection on DDoS attacks for IoT systems. Proceedings of the 2019 SoutheastCon, Huntsville, AL, USA.","DOI":"10.1109\/SoutheastCon42311.2019.9020468"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"8872586","DOI":"10.1155\/2020\/8872586","article-title":"Artificial intelligence for securing IoT services in edge computing: A survey","volume":"2020","author":"Xu","year":"2020","journal-title":"Secur. Commun. Netw."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"113251","DOI":"10.1016\/j.eswa.2020.113251","article-title":"Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks","volume":"149","author":"Ortiz","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"100514","DOI":"10.1016\/j.iot.2022.100514","article-title":"AI for next generation computing: Emerging trends and future directions","volume":"19","author":"Gill","year":"2022","journal-title":"Internet Things"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"5827","DOI":"10.1109\/JIOT.2019.2952146","article-title":"Local differential privacy for deep learning","volume":"7","author":"Arachchige","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"7659","DOI":"10.1109\/JIOT.2019.2903312","article-title":"Energy theft detection with energy privacy preservation in the smart grid","volume":"6","author":"Yao","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Chi, J., Owusu, E., Yin, X., Yu, T., Chan, W., Liu, Y., Liu, H., Chen, J., Sim, S., and Iyengar, V. (2018, January 25\u201327). Privacy partition: A Privacy-Preserving Framework for Deep Neural Networks in Edge Networks. Proceedings of the 2018 IEEE\/ACM Symposium on Edge Computing (SEC), Seattle, WA, USA.","DOI":"10.1109\/SEC.2018.00049"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"12806","DOI":"10.1109\/JIOT.2021.3072611","article-title":"Federated Learning Meets Blockchain in Edge Computing: Opportunities and Challenges","volume":"8","author":"Nguyen","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"101945","DOI":"10.1016\/j.inffus.2023.101945","article-title":"Computational approaches to Explainable Artificial Intelligence: Advances in theory, applications and trends","volume":"100","author":"Arco","year":"2023","journal-title":"Inf. Fusion"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Longo, L., Goebel, R., Lecue, F., Kieseberg, P., and Holzinger, A. (2020, January 25\u201328). Explainable artificial intelligence: Concepts, applications, research challenges and visions. Proceedings of the International Cross-Domain Conference for Machine Learning and Knowledge Extraction, Dublin, Ireland.","DOI":"10.1007\/978-3-030-57321-8_1"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"79","DOI":"10.17148\/IARJSET\/NCIARCSE.2017.22","article-title":"A review paper on general concepts of artificial intelligence and machine learning","volume":"4","author":"Rupali","year":"2017","journal-title":"Int. Adv. Res. J. Sci. Eng. Technol."},{"key":"ref_78","first-page":"1","article-title":"A survey on deep learning: Algorithms, techniques, and applications","volume":"51","author":"Pouyanfar","year":"2018","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.neucom.2020.05.078","article-title":"Artificial intelligence within the interplay between natural and artificial computation: Advances in data science, trends and applications","volume":"410","author":"Segovia","year":"2020","journal-title":"Neurocomputing"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"e00938","DOI":"10.1016\/j.heliyon.2018.e00938","article-title":"State-of-the-art in artificial neural network applications: A survey","volume":"4","author":"Abiodun","year":"2018","journal-title":"Heliyon"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Prasad, A., Kumar, A.S., Sharma, P., Irawati, I.D., Chandrashekar, D., Musirin, I.B., Abdullah, H.M.A., and Rao, L.M. (2023). Artificial Intelligence in Computer Science: An Overview of Current Trends and Future Directions. Advances in Artificial and Human Intelligence in the Modern Era, IGI Global.","DOI":"10.4018\/979-8-3693-1301-5.ch002"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"97557","DOI":"10.1109\/ACCESS.2021.3090364","article-title":"Subgoal-Based Reward Shaping to Improve Efficiency in Reinforcement Learning","volume":"9","author":"Okudo","year":"2021","journal-title":"IEEE Access"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neucom.2018.01.090","article-title":"Advances in artificial neural networks, machine learning and computational intelligence","volume":"298","author":"Aiolli","year":"2018","journal-title":"Neurocomputing"},{"key":"ref_85","first-page":"546","article-title":"Advancements in Computing: Emerging Trends in Computational Science with Next-Generation Computing","volume":"12","author":"Ajani","year":"2024","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"2001883","DOI":"10.1002\/smll.202001883","article-title":"Role of artificial intelligence and machine learning in nanosafety","volume":"16","author":"Winkler","year":"2020","journal-title":"Small"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Reis, J., Santo, P.E., and Mel\u00e3o, N. (2019, January 19\u201322). Impacts of artificial intelligence on public administration: A systematic literature review. Proceedings of the 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), Coimbra, Portugal.","DOI":"10.23919\/CISTI.2019.8760893"},{"key":"ref_88","first-page":"7411","article-title":"Artificial intelligence for improving the optimization of NP-hard problems: A review","volume":"9","author":"Tkatek","year":"2020","journal-title":"Int. J. Adv. Trends Comput. Sci. Appl."},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Wang, S., Ji, Y., Bai, W., Ji, Y., Li, J., Yao, Y., Zhang, Z., Jiang, Q., and Li, K. (2023). Advances in artificial intelligence models and algorithms in the field of optometry. Front. Cell Dev. Biol., 11.","DOI":"10.3389\/fcell.2023.1170068"},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Chen, X. (2022, January 20\u201322). The Advance of Deep Learning and Attention Mechanism. Proceedings of the 2022 International Conference on Electronics and Devices, Computational Science (ICEDCS), Marseille, France.","DOI":"10.1109\/ICEDCS57360.2022.00078"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.neunet.2022.03.037","article-title":"Deep learning, reinforcement learning, and world models","volume":"152","author":"Matsuo","year":"2022","journal-title":"Neural Netw."},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Shinde, P.P., and Shah, S. (2018, January 16\u201318). A review of machine learning and deep learning applications. Proceedings of the 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India.","DOI":"10.1109\/ICCUBEA.2018.8697857"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Raschka, S., Patterson, J., and Nolet, C. (2020). Machine learning in python: Main developments and technology trends in data science, machine learning, and artificial intelligence. Information, 11.","DOI":"10.3390\/info11040193"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.cogr.2023.04.001","article-title":"Artificial intelligence, machine learning and deep learning in advanced robotics, a review","volume":"3","author":"Soori","year":"2023","journal-title":"Cogn. Robot."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"2208683","DOI":"10.1002\/adma.202208683","article-title":"Artificial intelligence and advanced materials","volume":"35","year":"2023","journal-title":"Adv. Mater."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1016\/j.procs.2021.04.014","article-title":"Recent advances in machine-learning driven intrusion detection in transportation: Survey","volume":"184","author":"Bangui","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Rao, A.S., Pai B H, K., Veeresh, V., Rao, R., Mahima, M., D R, J., and Aazam U T, M. (2024, January 24\u201326). Early Detection of Melanoma Disease with Artificial Intelligence-Driven Skin Cancer Diagnosis Using Deep Learning Approach. Proceedings of the 2024 Third International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT), Trichirappalli, India.","DOI":"10.1109\/ICEEICT61591.2024.10718411"},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Zuo, B., Chen, J., Wang, L., and Wang, Y. (2014, January 5\u20138). A reinforcement learning based robotic navigation system. Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), San Diego, CA, USA.","DOI":"10.1109\/SMC.2014.6974463"},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Capi, G., Sugiyama, N., and Kaneko, S.i. (2021, January 12\u201314). Application of Deep Learning for Drone Obstacle Avoidance and Goal Directed Navigation. Proceedings of the 2021 18th International Conference on Ubiquitous Robots (UR), Gangneung, Republic of Korea.","DOI":"10.1109\/UR52253.2021.9494663"},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"2539","DOI":"10.1109\/LRA.2018.2808368","article-title":"Perception, Guidance, and Navigation for Indoor Autonomous Drone Racing Using Deep Learning","volume":"3","author":"Jung","year":"2018","journal-title":"IEEE Robot. Autom. Lett."},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Mishra, A. (2024). Scalable AI and Design Patterns: Design, Develop, and Deploy Scalable AI Solutions, Springer Nature.","DOI":"10.1007\/979-8-8688-0158-7"},{"key":"ref_102","unstructured":"Vatsavai, S.S. (2024). Cross-Layer Design of Highly Scalable and Energy-Efficient AI Accelerator Systems Using Photonic Integrated Circuits, University of Kentucky."},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"074001","DOI":"10.1088\/1361-6633\/aab406","article-title":"Machine learning & artificial intelligence in the quantum domain: A review of recent progress","volume":"81","author":"Dunjko","year":"2018","journal-title":"Rep. Prog. Phys."},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Frank, M., Drikakis, D., and Charissis, V. (2020). Machine-learning methods for computational science and engineering. Computation, 8.","DOI":"10.3390\/computation8010015"},{"key":"ref_105","unstructured":"Cai, Z. (2022). Towards Efficient Training for Large-Scale Deep Learning Models. [Ph.D. Thesis, The Chinese University of Hong Kong]."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Bai, H. (2022, January 23\u201325). Modern distributed data-parallel large-scale pre-training strategies for nlp models. Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications, Jilin, China.","DOI":"10.1145\/3546000.3546007"},{"key":"ref_107","unstructured":"Li, Y. (2024). Accelerating Large Scale Generative AI: A Comprehensive Study. [Ph.D. Thesis, Northeastern University]."},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Haider, M.H., Valarezo-Plaza, S., Muhsin, S., Zhang, H., and Ko, S.B. (2024, January 19\u201322). Optimized Transformer Models: \u2113\u2032 BERT with CNN-like Pruning and Quantization. Proceedings of the 2024 IEEE International Symposium on Circuits and Systems (ISCAS), Singapore.","DOI":"10.1109\/ISCAS58744.2024.10558045"},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Attya, S.M., Jumaa, D.A., Hwezy, N.N.K., Sajid, W.A., Khaleefah, A.M., Zhyrov, G., and Ali, H. (November, January 30). Harnessing Federated Learning for Secure Data Sharing in Healthcare Systems. Proceedings of the 2024 36th Conference of Open Innovations Association (FRUCT), Lappeenranta, Finland.","DOI":"10.23919\/FRUCT64283.2024.10749928"},{"key":"ref_110","unstructured":"Vieira, P.M.R. (2024). A Federated Learning Approach for Data Privacy in Healthcare Applications. [Master\u2019s Thesis, Instituto Politecnico do Porto]."},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"12749","DOI":"10.1109\/JIOT.2023.3254052","article-title":"Fedftha: A fine-tuning and head aggregation method in federated learning","volume":"10","author":"Wang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"3312","DOI":"10.1109\/TKDE.2023.3349323","article-title":"On Data Distribution Leakage in Cross-Silo Federated Learning","volume":"36","author":"Jiang","year":"2024","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/s10462-024-11036-2","article-title":"Landscape of machine learning evolution: Privacy-preserving federated learning frameworks and tools","volume":"58","author":"Nguyen","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1126\/science.aaa8685","article-title":"Advances in natural language processing","volume":"349","author":"Hirschberg","year":"2015","journal-title":"Science"},{"key":"ref_115","first-page":"2493","article-title":"Natural language processing (almost) from scratch","volume":"12","author":"Collobert","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Zhang, H., and Shafiq, M.O. (2024). Survey of transformers and towards ensemble learning using transformers for natural language processing. J. Big Data, 11.","DOI":"10.1186\/s40537-023-00842-0"},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"4335","DOI":"10.1007\/s10462-019-09794-5","article-title":"Sentiment analysis using deep learning architectures: A review","volume":"53","author":"Yadav","year":"2020","journal-title":"Artif. Intell. Rev."},{"key":"ref_118","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/EMR.2022.3208818","article-title":"Combination of GRU and CNN deep learning models for sentiment analysis on French customer reviews using XLNet model","volume":"51","author":"Habbat","year":"2022","journal-title":"IEEE Eng. Manag. Rev."},{"key":"ref_119","unstructured":"Vaswani, A. (2017). Attention is all you need. Adv. Neural Inf. Process. Syst., 30, Available online: https:\/\/arxiv.org\/abs\/1706.03762."},{"key":"ref_120","unstructured":"Kenton, J.D.M.W.C., and Toutanova, L.K. (2019, January 2\u20137). Bert: Pre-training of deep bidirectional transformers for language understanding. Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Minneapolis, MN, USA."},{"key":"ref_121","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_122","unstructured":"Sindhu, B., Prathamesh, R., Sameera, M., and KumaraSwamy, S. (2024, January 8\u20139). The evolution of large language model: Models, applications and challenges. Proceedings of the 2024 International Conference on Current Trends in Advanced Computing (ICCTAC), Bengaluru, India."},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Kotkar, A.D., Mahadik, R.S., More, P.G., and Thorat, S.A. (2024, January 23\u201324). Comparative Analysis of Transformer-based Large Language Models (LLMs) for Text Summarization. Proceedings of the 2024 1st International Conference on Advanced Computing and Emerging Technologies (ACET), Ghaziabad, India.","DOI":"10.1109\/ACET61898.2024.10730348"},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Ahmed, T., and Devanbu, P. (2022, January 16\u201320). Few-shot training LLMs for project-specific code-summarization. Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, Seoul, Republic of Korea.","DOI":"10.1145\/3551349.3559555"},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Bahrami, M., Mansoorizadeh, M., and Khotanlou, H. (2022, January 10\u201314). Few-shot Learning with Prompting Methods. Proceedings of the 2023 6th International Conference on Pattern Recognition and Image Analysis (IPRIA), Rochester, MI, USA.","DOI":"10.1109\/IPRIA59240.2023.10147172"},{"key":"ref_126","unstructured":"Rothman, D. (2022). Transformers for Natural Language Processing: Build, Train, and Fine-Tune Deep Neural Network Architectures for NLP with Python, Hugging Face, and OpenAI\u2019s GPT-3, ChatGPT, and GPT-4, Packt Publishing Ltd."},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Lee, M., Liang, P., and Yang, Q. (May, January 29). Coauthor: Designing a human-ai collaborative writing dataset for exploring language model capabilities. Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA.","DOI":"10.1145\/3491102.3502030"},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Prottasha, N.J., Sami, A.A., Kowsher, M., Murad, S.A., Bairagi, A.K., Masud, M., and Baz, M. (2022). Transfer Learning for Sentiment Analysis Using BERT Based Supervised Fine-Tuning. Sensors, 22.","DOI":"10.3390\/s22114157"},{"key":"ref_129","unstructured":"Dahiya, A. (2021). Transfer Learning for Low Resource Language Processing in Indian Context. [Master\u2019s Thesis, International Institute of Information Technology]."},{"key":"ref_130","first-page":"478","article-title":"Comparison of prompt engineering and fine-tuning strategies in large language models in the classification of clinical notes","volume":"2024","author":"Zhang","year":"2024","journal-title":"AMIA Summits Transl. Sci. Proc."},{"key":"ref_131","doi-asserted-by":"crossref","unstructured":"Li, R., Wang, X., and Yu, H. (2024, January 20\u201325). LlamaCare: An instruction fine-tuned large language model for clinical NLP. Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024), Torino, Italy.","DOI":"10.18653\/v1\/2024.findings-acl.341"},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Garlyal, J.S., Hariharan, B., and Singh, A.K. (2024, January 11\u201312). An Analysis on Integrating Advanced Conversational AI in Legal Summarization and Information Retrieval. Proceedings of the 2024 Second International Conference on Inventive Computing and Informatics (ICICI), Bangalore, India.","DOI":"10.1109\/ICICI62254.2024.00016"},{"key":"ref_133","doi-asserted-by":"crossref","unstructured":"Takale, S.A., Thorat, S.A., and Sajjan, R.S. (2022, January 30\u201331). Legal document summarization using ripple down rules. Proceedings of the 2022 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE), Naya Raipur, India.","DOI":"10.1109\/WIECON-ECE57977.2022.10150974"},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1017\/nlp.2024.33","article-title":"Natural language processing applications for low-resource languages","volume":"31","author":"Pakray","year":"2025","journal-title":"Nat. Lang. Process."},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"e899","DOI":"10.7717\/peerj-cs.899","article-title":"Probing language identity encoded in pre-trained multilingual models: A typological view","volume":"8","author":"Zheng","year":"2022","journal-title":"PeerJ Comput. Sci."},{"key":"ref_136","doi-asserted-by":"crossref","unstructured":"Bhargava, M., Vijayan, K., Anand, O., and Raina, G. (2023, January 28\u201330). Exploration of transfer learning capability of multilingual models for text classification. Proceedings of the 2023 5th International Conference on Pattern Recognition and Intelligent Systems, Shenyang, China.","DOI":"10.1145\/3609703.3609711"},{"key":"ref_137","unstructured":"Pires, T., Schlinger, E., and Garrette, D. (August, January 28). How Multilingual is Multilingual BERT?. Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, Florence, Italy."},{"key":"ref_138","first-page":"13693","article-title":"Energy and policy considerations for modern deep learning research","volume":"34","author":"Strubell","year":"2020","journal-title":"AAAI Conf. Artif. Intell."},{"key":"ref_139","doi-asserted-by":"crossref","unstructured":"Pimenow, S., Pimenowa, O., and Prus, P. (2024). Challenges of Artificial Intelligence Development in the Context of Energy Consumption and Impact on Climate Change. Energies, 17.","DOI":"10.3390\/en17235965"},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Linardatos, P., Papastefanopoulos, V., and Kotsiantis, S. (2020). Explainable ai: A review of machine learning interpretability methods. Entropy, 23.","DOI":"10.3390\/e23010018"},{"key":"ref_141","first-page":"1","article-title":"Explainability for large language models: A survey","volume":"15","author":"Zhao","year":"2024","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_142","doi-asserted-by":"crossref","unstructured":"Yu, S. (2023, January 3\u20136). Towards Trustworthy and Understandable AI: Unraveling Explainability Strategies on Simplifying Algorithms, Appropriate Information Disclosure, and High-level Collaboration. Proceedings of the 26th International Academic Mindtrek Conference, Tampere, Finland.","DOI":"10.1145\/3616961.3616965"},{"key":"ref_143","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3597307","article-title":"Biases in large language models: Origins, inventory, and discussion","volume":"15","author":"Navigli","year":"2023","journal-title":"ACM J. Data Inf. Qual."},{"key":"ref_144","unstructured":"Kazi, F. (2024). Addressing Stereotypes in Large Language Models: A Critical Examination and Mitigation Approach. [Master\u2019s Thesis, University of California]."},{"key":"ref_145","doi-asserted-by":"crossref","first-page":"26430","DOI":"10.1109\/JIOT.2024.3396217","article-title":"Communication-Efficient and Privacy-Preserving Aggregation in Federated Learning with Adaptability","volume":"11","author":"Sun","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_146","doi-asserted-by":"crossref","unstructured":"Alshammari, A., and El Hindi, K. (2024). Privacy-Preserving Deep Learning Framework Based on Restricted Boltzmann Machines and Instance Reduction Algorithms. Appl. Sci., 14.","DOI":"10.3390\/app14031224"},{"key":"ref_147","first-page":"757","article-title":"Artificial Intelligence: Leveraging AI-Based Techniques for Software Quality","volume":"6","author":"Gadani","year":"2024","journal-title":"Int. Res. J. Mod. Eng. Technol. Sci."},{"key":"ref_148","doi-asserted-by":"crossref","first-page":"89933","DOI":"10.1109\/ACCESS.2023.3307310","article-title":"Applying Machine Learning to Estimate the Effort and Duration of Individual Tasks in Software Projects","volume":"11","author":"Sousa","year":"2023","journal-title":"IEEE Access"},{"key":"ref_149","doi-asserted-by":"crossref","unstructured":"Sadaf, S., Iqbal, D., and Buhnova, B. (2022, January 13\u201315). AI-Based Software Defect Prediction for Trustworthy Android Apps. Proceedings of the 26th International Conference on Evaluation and Assessment in Software Engineering, Gothenburg, Sweden.","DOI":"10.1145\/3530019.3531330"},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"114023","DOI":"10.1109\/ACCESS.2024.3443527","article-title":"Enhancing User Trust and Interpretability in AI-Driven Feature Request Detection for Mobile App Reviews: An Explainable Approach","volume":"12","author":"Gambo","year":"2024","journal-title":"IEEE Access"},{"key":"ref_151","doi-asserted-by":"crossref","unstructured":"Meshram, S., Naik, N., Vr, M., More, T., and Kharche, S. (2021, January 25\u201327). Conversational AI: Chatbots. Proceedings of the 2021 International Conference on Intelligent Technologies (CONIT), Hubli, India.","DOI":"10.1109\/CONIT51480.2021.9498508"},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"111540","DOI":"10.1016\/j.jss.2022.111540","article-title":"VIBE: Looking for variability in ambiguous requirements","volume":"195","author":"Fantechi","year":"2023","journal-title":"J. Syst. Softw."},{"key":"ref_153","first-page":"1","article-title":"Enhancing Software Development Efficiency through AI-Powered Code Generation","volume":"5","author":"Sherje","year":"2024","journal-title":"Res. J. Comput. Syst. Eng."},{"key":"ref_154","unstructured":"Danilchenko, Y.B. (2011). Automatic Code Generation Using Artificial Intelligence, Northern Kentucky University."},{"key":"ref_155","doi-asserted-by":"crossref","unstructured":"Xu, F., and Sun, Z. (2024, January 1\u20135). Defect-Introducing Defect Prediction Testing. Proceedings of the 2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C), Cambridge, UK.","DOI":"10.1109\/QRS-C63300.2024.00057"},{"key":"ref_156","doi-asserted-by":"crossref","unstructured":"Liu, P., Luo, R., Jiang, C., Gao, T., and Li, Y. (2024, January 2\u20133). AI-Assisted Bug Detection in Open-Source Software. Proceedings of the 2024 11th International Conference on Dependable Systems and Their Applications (DSA), Suzhou, China.","DOI":"10.1109\/DSA63982.2024.00065"},{"key":"ref_157","doi-asserted-by":"crossref","unstructured":"Svyatkovskiy, A., Deng, S.K., Fu, S., and Sundaresan, N. (2020, January 8\u201313). Intellicode compose: Code generation using transformer. Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Virtual.","DOI":"10.1145\/3368089.3417058"},{"key":"ref_158","doi-asserted-by":"crossref","unstructured":"Grishina, A., Hort, M., and Moonen, L. (2023, January 3\u20139). The earlybird catches the bug: On exploiting early layers of encoder models for more efficient code classification. Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, San Francisco, CA, USA.","DOI":"10.1145\/3611643.3616304"},{"key":"ref_159","doi-asserted-by":"crossref","unstructured":"Avdeenko, T., and Serdyukov, K. (2021). Automated test data generation based on a genetic algorithm with maximum code coverage and population diversity. Appl. Sci., 11.","DOI":"10.3390\/app11104673"},{"key":"ref_160","doi-asserted-by":"crossref","unstructured":"Kovalchuk, S., Fedrushkov, D., Lomshakov, V., and Aliev, A. (2023, January 22\u201322). Test-based and metric-based evaluation of code generation models for practical question answering. Proceedings of the 2023 International Conference on Code Quality (ICCQ), St. Petersburg, Russia.","DOI":"10.1109\/ICCQ57276.2023.10114665"},{"key":"ref_161","doi-asserted-by":"crossref","unstructured":"Dong, Y., Ding, J., Jiang, X., Li, G., Li, Z., and Jin, Z. (2024). CodeScore: Evaluating Code Generation by Learning Code Execution. ACM Trans. Softw. Eng. Methodol.","DOI":"10.1145\/3695991"},{"key":"ref_162","doi-asserted-by":"crossref","unstructured":"Paul, D.G., Zhu, H., and Bayley, I. (2024, January 15\u201318). Benchmarks and Metrics for Evaluations of Code Generation: A Critical Review. Proceedings of the 2024 IEEE International Conference on Artificial Intelligence Testing (AITest), Shanghai, China.","DOI":"10.1109\/AITest62860.2024.00019"},{"key":"ref_163","first-page":"1748","article-title":"Ai-based software defect predictors: Applications and benefits in a case study","volume":"24","author":"Tosun","year":"2010","journal-title":"AAAI Conf. Artif. Intell."},{"key":"ref_164","doi-asserted-by":"crossref","first-page":"168645","DOI":"10.1109\/ACCESS.2024.3490453","article-title":"Test Suite Optimization Using Machine Learning Techniques: A Comprehensive Study","volume":"12","author":"Mehmood","year":"2024","journal-title":"IEEE Access"},{"key":"ref_165","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3232520","article-title":"Automated regression test case generation for web application: A survey","volume":"51","author":"Gupta","year":"2018","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_166","first-page":"1956","article-title":"The Power of AI Driven Reporting in Test Automation","volume":"7","author":"Khankhoje","year":"2018","journal-title":"Int. J. Sci. Res."},{"key":"ref_167","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3653718","article-title":"Automatically Inspecting Thousands of Static Bug Warnings with Large Language Model: How Far Are We?","volume":"18","author":"Wen","year":"2024","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"ref_168","doi-asserted-by":"crossref","unstructured":"Spieker, H., Gotlieb, A., Marijan, D., and Mossige, M. (2017, January 10\u201314). Reinforcement learning for automatic test case prioritization and selection in continuous integration. Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA.","DOI":"10.1145\/3092703.3092709"},{"key":"ref_169","doi-asserted-by":"crossref","first-page":"110787","DOI":"10.1016\/j.jss.2020.110787","article-title":"A systematic study of reward for reinforcement learning based continuous integration testing","volume":"170","author":"Yang","year":"2020","journal-title":"J. Syst. Softw."},{"key":"ref_170","first-page":"114","article-title":"AI-Driven Continuous Feedback Mechanisms in DevOps for Proactive Performance Optimization and User Experience Enhancement in Software Development","volume":"4","author":"Tatineni","year":"2024","journal-title":"J. Healthc. Med."},{"key":"ref_171","first-page":"226","article-title":"Enhancing Cloud-Native CI\/CD Pipelines with AI-Driven Automation and Predictive Analytics","volume":"1","author":"Sivathapandi","year":"2021","journal-title":"Aust. J. Mach. Learn. Res. Appl."},{"key":"ref_172","first-page":"103","article-title":"Leveraging Artificial Intelligence for Predictive Analytics in DevOps: Enhancing Continuous Integration and Continuous Deployment Pipelines for Optimal Performance","volume":"1","author":"Tatineni","year":"2021","journal-title":"J. Artif. Intell. Res. Appl."},{"key":"ref_173","doi-asserted-by":"crossref","first-page":"2728","DOI":"10.1109\/TNSM.2021.3092939","article-title":"Self-healing dilemmas in distributed systems: Fault correction vs. fault tolerance","volume":"18","author":"Jubatyrov","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_174","doi-asserted-by":"crossref","unstructured":"Raharjana, I.K., Aprillya, V., Zaman, B., Justitia, A., and Fauzi, S.S.M. (2021). Enhancing software feature extraction results using sentiment analysis to aid requirements reuse. Computers, 10.","DOI":"10.3390\/computers10030036"},{"key":"ref_175","doi-asserted-by":"crossref","unstructured":"Perko, A., Zhao, H., and Wotawa, F. (2023, January 10\u201311). Optimizing Named Entity Recognition for Improving Logical Formulae Abstraction from Technical Requirements Documents. Proceedings of the 2023 10th International Conference on Dependable Systems and Their Applications (DSA), Tokyo, Japan.","DOI":"10.1109\/DSA59317.2023.00034"},{"key":"ref_176","doi-asserted-by":"crossref","unstructured":"Koscinski, V., Gambardella, C., Gerstner, E., Zappavigna, M., Cassetti, J., and Mirakhorli, M. (2021, January 20\u201324). A Natural Language Processing Technique for Formalization of Systems Requirement Specifications. Proceedings of the 2021 IEEE 29th International Requirements Engineering Conference Workshops (REW), Notre Dame, IN, USA.","DOI":"10.1109\/REW53955.2021.00062"},{"key":"ref_177","doi-asserted-by":"crossref","first-page":"012078","DOI":"10.1088\/1757-899X\/879\/1\/012078","article-title":"Redundancy Detection Of Sentence Pairs In The Software Requirements Specification Documents with Semantic Approach","volume":"879","author":"Oktaviyani","year":"2020","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"ref_178","doi-asserted-by":"crossref","first-page":"111901","DOI":"10.1016\/j.jss.2023.111901","article-title":"Early analysis of requirements using NLP and Petri-nets","volume":"208","year":"2024","journal-title":"J. Syst. Softw."},{"key":"ref_179","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TSE.2014.2372785","article-title":"The Oracle Problem in Software Testing: A Survey","volume":"41","author":"Barr","year":"2015","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_180","doi-asserted-by":"crossref","first-page":"104773","DOI":"10.1016\/j.engappai.2022.104773","article-title":"A systematic literature review on software defect prediction using artificial intelligence: Datasets, Data Validation Methods, Approaches, and Tools","volume":"111","author":"Pachouly","year":"2022","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_181","unstructured":"Swathi, Y., and Challa, M. (2023, January 19\u201320). A Comparative Analysis of Explainable AI Techniques for Enhanced Model Interpretability. Proceedings of the 2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN), Salem, India."},{"key":"ref_182","doi-asserted-by":"crossref","unstructured":"Branco, R., Agostinho, C., Gusmeroli, S., Lavasa, E., Dikopoulou, Z., Monzo, D., and Lampathaki, F. (2023, January 19\u201322). Explainable AI in manufacturing: An analysis of transparency and interpretability methods for the XMANAI platform. Proceedings of the 2023 IEEE International Conference on Engineering, Technology and Innovation (ICE\/ITMC), Edinburgh, UK.","DOI":"10.1109\/ICE\/ITMC58018.2023.10332373"},{"key":"ref_183","doi-asserted-by":"crossref","first-page":"2753","DOI":"10.1109\/TCOMM.2017.2698480","article-title":"Error correction coding meets cyber-physical systems: Message-passing analysis of self-healing interdependent networks","volume":"65","author":"Behfarnia","year":"2017","journal-title":"IEEE Trans. Commun."},{"key":"ref_184","doi-asserted-by":"crossref","unstructured":"Singhal, A., Pratap, P., Dixit, K.K., and Kathuria, K. (2024, January 15\u201316). Advancements in Explainable AI: Bridging the Gap Between Model Complexity and Interpretability. Proceedings of the 2024 2nd International Conference on Disruptive Technologies (ICDT), Greater Noida, India.","DOI":"10.1109\/ICDT61202.2024.10489277"},{"key":"ref_185","doi-asserted-by":"crossref","unstructured":"Sharma, N.A., Chand, R.R., Buksh, Z., Ali, A.S., Hanif, A., and Beheshti, A. (2024). Explainable AI Frameworks: Navigating the Present Challenges and Unveiling Innovative Applications. Algorithms, 17.","DOI":"10.3390\/a17060227"},{"key":"ref_186","doi-asserted-by":"crossref","first-page":"90299","DOI":"10.1109\/ACCESS.2024.3420415","article-title":"Guaranteeing Correctness in Black-Box Machine Learning: A Fusion of Explainable AI and Formal Methods for Healthcare Decision-Making","volume":"12","author":"Khan","year":"2024","journal-title":"IEEE Access"},{"key":"ref_187","doi-asserted-by":"crossref","unstructured":"Dave, D., Sawhney, G., Aggarwal, P., Silswal, N., and Khut, D. (2023, January 8\u20139). The New Frontier of Cybersecurity: Emerging Threats and Innovations. Proceedings of the 2023 29th International Conference on Telecommunications (ICT), Toba, Indonesia.","DOI":"10.1109\/ICT60153.2023.10374044"},{"key":"ref_188","doi-asserted-by":"crossref","unstructured":"Thapa, N., Liu, Z., Kc, D.B., Gokaraju, B., and Roy, K. (2020). Comparison of machine learning and deep learning models for network intrusion detection systems. Future Internet, 12.","DOI":"10.3390\/fi12100167"},{"key":"ref_189","doi-asserted-by":"crossref","unstructured":"Thapa, N., Liu, Z., Shaver, A., Esterline, A., Gokaraju, B., and Roy, K. (2021). Secure cyber defense: An analysis of network intrusion-based dataset CCD-IDSv1 with machine learning and deep learning models. Electronics, 10.","DOI":"10.3390\/electronics10151747"},{"key":"ref_190","doi-asserted-by":"crossref","unstructured":"Ali, M.L., Thakur, K., Schmeelk, S., Debello, J., and Dragos, D. (2025). Deep Learning vs. Machine Learning for Intrusion Detection in Computer Networks: A Comparative Study. Appl. Sci., 15.","DOI":"10.3390\/app15041903"},{"key":"ref_191","doi-asserted-by":"crossref","unstructured":"Pham, D.M., Shao, Y., Li, Z., Makanju, A., and Alomari, Z. (2024, January 24\u201327). Network Intrusion Detection with CNNs: A Comparative Study of Deep Learning and Machine Learning Models. Proceedings of the 2024 2nd International Conference on Computer, Vision and Intelligent Technology (ICCVIT), Huaibei, China.","DOI":"10.1109\/ICCVIT63928.2024.10872423"},{"key":"ref_192","doi-asserted-by":"crossref","unstructured":"Hesham, M., Essam, M., Bahaa, M., Mohamed, A., Gomaa, M., Hany, M., and Elsersy, W. (2024, January 13\u201314). Evaluating Predictive Models in Cybersecurity: A Comparative Analysis of Machine and Deep Learning Techniques for Threat Detection. Proceedings of the 2024 Intelligent Methods, Systems, and Applications (IMSA), Giza, Egypt.","DOI":"10.1109\/IMSA61967.2024.10652833"},{"key":"ref_193","doi-asserted-by":"crossref","unstructured":"Valasev, R.S., Priambodo, A.R., and Anggraini, R.N.E. (2024, January 17\u201318). Evaluating Contemporary Machine Learning and Deep Learning Strategies for Intrusion Detection. Proceedings of the 2024 IEEE International Conference on Control & Automation, Electronics, Robotics, Internet of Things, and Artificial Intelligence (CERIA), Bandung, Indonesia.","DOI":"10.1109\/CERIA64726.2024.10915015"},{"key":"ref_194","doi-asserted-by":"crossref","first-page":"76","DOI":"10.32996\/jcsts.2024.6.2.9","article-title":"AI-driven cybersecurity: Balancing advancements and safeguards","volume":"6","author":"Shahana","year":"2024","journal-title":"J. Comput. Sci. Technol. Stud."},{"key":"ref_195","first-page":"16","article-title":"AI-Driven Threat Intelligence and Automated Incident Response: Enhancing Cyber Resilience through Predictive Analytics","volume":"2","author":"Abdulrahman","year":"2025","journal-title":"Res. J. Civil Ind. Mech. Eng."},{"key":"ref_196","doi-asserted-by":"crossref","first-page":"50","DOI":"10.25299\/itjrd.2024.16852","article-title":"Enhancing cybersecurity through AI-powered security mechanisms","volume":"9","author":"Akhtar","year":"2024","journal-title":"IT J. Res. Dev."},{"key":"ref_197","doi-asserted-by":"crossref","first-page":"4291","DOI":"10.55214\/25768484.v8i6.2930","article-title":"Leveraging Machine Learning for Cybersecurity: Techniques, Challenges, and Future Directions","volume":"8","author":"Bhuiyan","year":"2024","journal-title":"Edelweiss Appl. Sci. Technol."},{"key":"ref_198","doi-asserted-by":"crossref","first-page":"173127","DOI":"10.1109\/ACCESS.2024.3493957","article-title":"Ai enabled threat detection: Leveraging artificial intelligence for advanced security and cyber threat mitigation","volume":"12","author":"Kavitha","year":"2024","journal-title":"IEEE Access"},{"key":"ref_199","first-page":"56","article-title":"Enhancing Cybersecurity and Privacy using Artificial Intelligence: Trends and Future Directions of Research","volume":"13","author":"Dhruvitkumar","year":"2024","journal-title":"Int. J. Innov. Res. Sci. Eng. Technol."},{"key":"ref_200","doi-asserted-by":"crossref","unstructured":"Al Siam, A., Hassan, M.M., and Bhuiyan, T. (2025, January 5\u20137). Artificial Intelligence for Cybersecurity: A State of the Art. Proceedings of the 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC), Houston, TX, USA.","DOI":"10.1109\/ICAIC63015.2025.10848980"},{"key":"ref_201","doi-asserted-by":"crossref","first-page":"24","DOI":"10.54254\/2755-2721\/82\/2024GLG0054","article-title":"Advanced AI and ML techniques in cybersecurity: Supervised and unsupervised learning, and neural networks in threat detection and response","volume":"82","author":"Meng","year":"2024","journal-title":"Appl. Comput. Eng."},{"key":"ref_202","doi-asserted-by":"crossref","first-page":"80218","DOI":"10.1109\/ACCESS.2023.3300381","article-title":"From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy","volume":"11","author":"Gupta","year":"2023","journal-title":"IEEE Access"},{"key":"ref_203","doi-asserted-by":"crossref","first-page":"2796","DOI":"10.54517\/m.v5i2.2796","article-title":"The role of generative AI in cyber security","volume":"5","author":"Curran","year":"2024","journal-title":"Metaverse"},{"key":"ref_204","doi-asserted-by":"crossref","first-page":"46","DOI":"10.61093\/sec.8(3).46-60.2024","article-title":"Pig Butchering in Cybersecurity: A Modern Social Engineering Threat","volume":"8","author":"Burton","year":"2024","journal-title":"Socioecon. Challenges"},{"key":"ref_205","doi-asserted-by":"crossref","first-page":"114187","DOI":"10.1109\/ACCESS.2023.3324901","article-title":"Improved Cyber Defense Modeling Framework for Modeling and Simulating the Lifecycle of Cyber Defense Activities","volume":"11","author":"Kim","year":"2023","journal-title":"IEEE Access"},{"key":"ref_206","doi-asserted-by":"crossref","unstructured":"Salem, A.H., Azzam, S.M., Emam, O., and Abohany, A.A. (2024). Advancing cybersecurity: A comprehensive review of AI-driven detection techniques. J. Big Data, 11.","DOI":"10.1186\/s40537-024-00957-y"},{"key":"ref_207","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.1109\/COMST.2024.3442475","article-title":"Artificial Intelligence-Based Cybersecurity for the Metaverse: Research Challenges and Opportunities","volume":"27","author":"Awadallah","year":"2025","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_208","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/s44196-024-00492-x","article-title":"Application Study on the Reinforcement Learning Strategies in the Network Awareness Risk Perception and Prevention","volume":"17","author":"Xie","year":"2024","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"ref_209","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1109\/TEVC.2002.1011540","article-title":"An artificial immune system architecture for computer security applications","volume":"6","author":"Harmer","year":"2002","journal-title":"IEEE Trans. Evol. Comput."},{"key":"ref_210","doi-asserted-by":"crossref","unstructured":"Truong, T.C., Huynh, T.P., and Zelinka, I. (2020, January 8\u201312). Applications of swarm intelligence algorithms countering the cyber threats. Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion, Canc\u00fan, Mexico.","DOI":"10.1145\/3377929.3398119"},{"key":"ref_211","doi-asserted-by":"crossref","unstructured":"Bergadano, F., and Giacinto, G. (2023). Special Issue \u201cAI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection\u201d. Algorithms, 16.","DOI":"10.3390\/books978-3-0365-8265-8"},{"key":"ref_212","doi-asserted-by":"crossref","unstructured":"Rawindaran, N., Jayal, A., and Prakash, E. (2021). Machine learning cybersecurity adoption in small and medium enterprises in developed countries. Computers, 10.","DOI":"10.3390\/computers10110150"},{"key":"ref_213","doi-asserted-by":"crossref","first-page":"54029","DOI":"10.1109\/ACCESS.2022.3175886","article-title":"An ai-powered network threat detection system","volume":"10","author":"Wang","year":"2022","journal-title":"IEEE Access"},{"key":"ref_214","doi-asserted-by":"crossref","unstructured":"Choi, T., Ko, R.K.L., Saha, T., Scarsbrook, J., Koay, A.M.Y., Wang, S., Zhang, W., and Clair, C.S. (2021, January 5\u20138). Plan2Defend: AI Planning for Cybersecurity in Smart Grids. Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies\u2014Asia (ISGT Asia), Brisbane, Australia.","DOI":"10.1109\/ISGTAsia49270.2021.9715679"},{"key":"ref_215","doi-asserted-by":"crossref","first-page":"83043","DOI":"10.1109\/ACCESS.2024.3409413","article-title":"Analytical Validation and Integration of CIC-Bell-DNS-EXF-2021 Dataset on Security Information & Event Management","volume":"12","author":"Panigrahi","year":"2024","journal-title":"IEEE Access"},{"key":"ref_216","doi-asserted-by":"crossref","unstructured":"Alberternst, S., Anisimov, A., Antakli, A., Duppe, B., Hoffmann, H., Meiser, M., Muaz, M., Spieldenner, D., and Zinnikus, I. (2021). Orchestrating heterogeneous devices and AI services as virtual sensors for secure cloud-based IoT applications. Sensors, 21.","DOI":"10.3390\/s21227509"},{"key":"ref_217","doi-asserted-by":"crossref","unstructured":"Chaowen, C. (2024, January 24\u201326). Research on computer network security situation awareness warning mechanism based on artificial intelligence. Proceedings of the 2024 IEEE 4th International Conference on Electronic Technology, Communication and Information (ICETCI), Changchun, China.","DOI":"10.1109\/ICETCI61221.2024.10594283"},{"key":"ref_218","doi-asserted-by":"crossref","unstructured":"Nankya, M., Chataut, R., and Akl, R. (2023). Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies. Sensors, 23.","DOI":"10.3390\/s23218840"},{"key":"ref_219","doi-asserted-by":"crossref","unstructured":"Hammad, A.A., Ahmed, S.R., Abdul-Hussein, M.K., Ahmed, M.R., Majeed, D.A., and Algburi, S. (2024, January 25\u201326). Deep Reinforcement Learning for Adaptive Cyber Defense in Network Security. Proceedings of the Cognitive Models and Artificial Intelligence Conference, \u0130stanbul, Turkey.","DOI":"10.1145\/3660853.3660930"},{"key":"ref_220","doi-asserted-by":"crossref","unstructured":"Tasneem, S., and Islam, K.A. (2024). Improve Adversarial Robustness of AI Models in Remote Sensing via Data-Augmentation and Explainable-AI Methods. Remote Sens., 16.","DOI":"10.3390\/rs16173210"},{"key":"ref_221","first-page":"4","article-title":"Enhancing Security and Privacy in Healthcare with Generative Artificial Intelligence-Based Detection and Mitigation of Data Poisoning Attacks Software","volume":"58","author":"Mohialden","year":"2024","journal-title":"Jordan Med. J."},{"key":"ref_222","unstructured":"Pan, R., Kim, M., Krishna, R., Pavuluri, R., and Sinha, S. (May, January 27). ASTER: Natural and Multi-language Unit Test Generation with LLMs. Proceedings of the ACM\/IEEE International Conference on Software Engineering, Ottawa, ON, Canada."},{"key":"ref_223","unstructured":"Wanga, W., Hakimzadeh, M., Ruan, H., and Goswami, S. (2025). Accelerating Multiscale Modeling with Hybrid Solvers: Coupling FEM and Neural Operators with Domain Decomposition. arXiv."},{"key":"ref_224","doi-asserted-by":"crossref","unstructured":"De Queiroz, H.J.D.S., and MacLennan, H. (2025). Threat Detection and Anomaly Identification Using Deep Learning. Revolutionizing Cybersecurity with Deep Learning and Large Language Models, IGI Global Scientific Publishing.","DOI":"10.4018\/979-8-3373-3296-3.ch003"},{"key":"ref_225","first-page":"148","article-title":"A Machine Learning Framework for Automatic Detection and Classification of Cyber Attacks in IoT Use Cases","volume":"25","author":"Mohammed","year":"2025","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref_226","doi-asserted-by":"crossref","first-page":"1667","DOI":"10.63332\/joph.v5i3.965","article-title":"AI-Enhanced Cyber Threat Detection and Response Advancing National Security in Critical Infrastructure","volume":"5","author":"Goffer","year":"2025","journal-title":"J. Posthumanism"},{"key":"ref_227","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s12178-020-09600-8","article-title":"Machine learning and artificial intelligence: Definitions, applications, and future directions","volume":"13","author":"Helm","year":"2020","journal-title":"Curr. Rev. Musculoskelet. Med."},{"key":"ref_228","first-page":"1","article-title":"Artificial Intelligence in Computer Science","volume":"2","author":"Khaleel","year":"2024","journal-title":"Int. J. Electr. Eng. Sustain."},{"key":"ref_229","doi-asserted-by":"crossref","first-page":"10","DOI":"10.3850\/978-981-07-1403-1_198","article-title":"A comprehensive study of artificial neural networks","volume":"2","author":"Sharma","year":"2012","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref_230","doi-asserted-by":"crossref","unstructured":"Villegas-Ch, W., Jaramillo-Alc\u00e1zar, A., and Luj\u00e1n-Mora, S. (2024). Evaluating the Robustness of Deep Learning Models against Adversarial Attacks: An Analysis with FGSM, PGD and CW. Big Data Cogn. Comput., 8.","DOI":"10.3390\/bdcc8010008"},{"key":"ref_231","doi-asserted-by":"crossref","first-page":"2, 64","DOI":"10.15421\/192106","article-title":"How human decision-making biases influence health outcomes in patient care","volume":"29","author":"Sibbel","year":"2021","journal-title":"Eur. J. Manag. Issues"},{"key":"ref_232","first-page":"103","article-title":"Sustainability of Large AI Models: Balancing Environmental and Social Impact with Technology and Regulations","volume":"107","author":"Szarmes","year":"2023","journal-title":"Chem. Eng. Trans."},{"key":"ref_233","doi-asserted-by":"crossref","first-page":"154","DOI":"10.3390\/jcp2010010","article-title":"Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey","volume":"2","author":"McCarthy","year":"2022","journal-title":"J. Cybersecur. Priv."},{"key":"ref_234","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1080\/09585192.2022.2035161","article-title":"Artificial intelligence\u2013challenges and opportunities for international HRM: A review and research agenda","volume":"33","author":"Budhwar","year":"2022","journal-title":"Int. J. Hum. Resour. Manag."},{"key":"ref_235","doi-asserted-by":"crossref","unstructured":"De Ara\u00fajo, L.O.N., and Outtagarts, A. (2024, January 29\u201331). Sustainability of AI\u2014Energy consumption estimation of an mMTC admission control. Proceedings of the 2024 7th Conference on Cloud and Internet of Things (CIoT), Montreal, QC, Canada.","DOI":"10.1109\/CIoT63799.2024.10757159"},{"key":"ref_236","first-page":"748","article-title":"The Intersection between Artificial Intelligence and Sustainability: Challenges and Opportunities","volume":"8","year":"2024","journal-title":"EU Comp. Law Issues Challenges Ser."},{"key":"ref_237","doi-asserted-by":"crossref","unstructured":"Blow, C.H., Qian, L., Gibson, C., Obiomon, P., and Dong, X. (2024). Comprehensive Validation on Reweighting Samples for Bias Mitigation via AIF360. Appl. Sci., 14.","DOI":"10.3390\/app14093826"},{"key":"ref_238","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/JPROC.2022.3226481","article-title":"Efficient Acceleration of Deep Learning Inference on Resource-Constrained Edge Devices: A Review","volume":"111","author":"Shuvo","year":"2023","journal-title":"Proc. IEEE"},{"key":"ref_239","doi-asserted-by":"crossref","unstructured":"Ilieva, R., and Stoilova, G. (2024, January 17\u201319). Challenges of AI-Driven Cybersecurity. Proceedings of the 2024 XXXIII International Scientific Conference Electronics (ET), Sozopol, Bulgaria.","DOI":"10.1109\/ET63133.2024.10721572"},{"key":"ref_240","doi-asserted-by":"crossref","unstructured":"Dasgupta, S., Yelikar, B.V., Naredla, S., Ibrahim, R.K., and Alazzam, M.B. (2023, January 12\u201313). AI-powered cybersecurity: Identifying threats in digital banking. Proceedings of the 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India.","DOI":"10.1109\/ICACITE57410.2023.10182479"},{"key":"ref_241","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/3458723","article-title":"Datasheets for Datasets","volume":"64","author":"Gebru","year":"2021","journal-title":"Commun. ACM"},{"key":"ref_242","doi-asserted-by":"crossref","first-page":"4793","DOI":"10.1109\/TNNLS.2020.3027314","article-title":"A Survey on Explainable Artificial Intelligence (XAI): Toward Medical XAI","volume":"32","author":"Tjoa","year":"2021","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_243","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1038\/s42256-019-0048-x","article-title":"Stop Explaining Black Box Machine Learning Models for High Stakes Decisions and Use Interpretable Models Instead","volume":"1","author":"Rudin","year":"2019","journal-title":"Nat. Mach. Intell."},{"key":"ref_244","doi-asserted-by":"crossref","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","article-title":"Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey","volume":"6","author":"Akhtar","year":"2018","journal-title":"IEEE Access"},{"key":"ref_245","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., and Vladu, A. (May, January 30). Towards Deep Learning Models Resistant to Adversarial Attacks. Proceedings of the International Conference on Learning Representations (ICLR), Vancouver, BC, Canada."},{"key":"ref_246","doi-asserted-by":"crossref","unstructured":"Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B., Mironov, I., Talwar, K., and Zhang, L. (2016, January 24\u201328). Deep Learning with Differential Privacy. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), Vienna, Austria.","DOI":"10.1145\/2976749.2978318"},{"key":"ref_247","doi-asserted-by":"crossref","first-page":"1852","DOI":"10.1109\/TNNLS.2020.2991378","article-title":"Watermarking Deep Neural Networks in Image Processing","volume":"32","author":"Quan","year":"2021","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_248","doi-asserted-by":"crossref","first-page":"140699","DOI":"10.1109\/ACCESS.2020.3013541","article-title":"Federated Learning: A Survey on Enabling Technologies, Protocols, and Applications","volume":"8","author":"Aledhari","year":"2020","journal-title":"IEEE Access"},{"key":"ref_249","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MC.2023.3324975","article-title":"Exploring Threats, Defenses, and Privacy-Preserving Techniques in Federated Learning: A Survey","volume":"57","author":"Huang","year":"2024","journal-title":"Computer"},{"key":"ref_250","unstructured":"Kumar, S., and Hans, A. (2024, January 3\u20134). The AI Shield and Red AI Framework: Machine Learning Solutions for Cyber Threat Intelligence(CTI). Proceedings of the 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS), Gurugram, India."},{"key":"ref_251","doi-asserted-by":"crossref","unstructured":"Havenga, W., Bagula, A., and Ajayi, O. (2022, January 9\u201310). Autonomous Threat Detection and Response for Self-Protected Networks. Proceedings of the 2022 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa.","DOI":"10.1109\/ICTAS53252.2022.9744643"},{"key":"ref_252","doi-asserted-by":"crossref","unstructured":"Singh, J., Rani, S., and Srilakshmi, G. (2024, January 18\u201319). Towards Explainable AI: Interpretable Models for Complex Decision-making. Proceedings of the 2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS), Chikkaballapur, India.","DOI":"10.1109\/ICKECS61492.2024.10616500"},{"key":"ref_253","doi-asserted-by":"crossref","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","article-title":"Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI)","volume":"6","author":"Adadi","year":"2018","journal-title":"IEEE Access"},{"key":"ref_254","doi-asserted-by":"crossref","unstructured":"Hossain Faruk, M.J., Tahora, S., Tasnim, M., Shahriar, H., and Sakib, N. (2022, January 24\u201326). A Review of Quantum Cybersecurity: Threats, Risks and Opportunities. Proceedings of the 2022 1st International Conference on AI in Cybersecurity (ICAIC), Victoria, TX, USA.","DOI":"10.1109\/ICAIC53980.2022.9896970"},{"key":"ref_255","doi-asserted-by":"crossref","unstructured":"Radanliev, P. (2024). Artificial intelligence and quantum cryptography. J. Anal. Sci. Technol., 15.","DOI":"10.1186\/s40543-024-00416-6"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/9\/374\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:41:58Z","timestamp":1760035318000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/9\/374"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":255,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["computers14090374"],"URL":"https:\/\/doi.org\/10.3390\/computers14090374","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,8]]}}}