Shojaei, P., Zamani, N., Moieni, R. (2025). Anonymity in the Age of AI. Open Journal of Social Sciences, 13(8), 48-72.
Shojaei, P., Vlahu-Gjorgievska, E., and Chow, Y.-W. (2025). Enhancing privacy in mHealth applications: A user centric model identifying key factors influencing privacy related behaviours. International Journal of Medical Informatics, 199, 105907.
Shojaei, P., and Moieni, R. (2025). Empirical analysis of data privacy concerns in DEI. Open Journal of Social Sciences, 13(6), 83-110.
Shojaei, P., Vlahu-Gjorgievska, E., and Chow, Y.-W. (2024). Security and privacy of technologies in health information systems: A systematic literature review. Computers, 13(2), 41.
Shojaei, P. (Under review). Audit-ready responsible AI security: An ISD method specification linking lifecycle decisions to evidence traceability. Information Processing & Management.
Parisasadat Shojaei, and Lotfi, S. (2016). Fuzzy Imperialist Competitive Algorithm approach to network intrusion detection. Acta Polytechnica Hungarica.
Shojaei, P. S., and Lotfi, S. (2015). Intelligent intrusion detection using fuzzy Imperialist Competitive Algorithm. International Journal of Biology, Pharmacy and Applied Sciences (IJBPAS).
Shojaei, P. (2025). AI-Driven DevSecOps: Automating security for smarter, safer software. Speaker at DevOpsDays Conference, Wollongong.
Shojaei, P., and Shen, J. (2025). Integrating generative AI into cybersecurity curricula: An ethics-aware framework for industry-ready graduates. Early Career Researcher Conference, University of Wollongong.
Shojaei, P., Chow, Y.-W., and Vlahu-Gjorgievska, E. (2025). User privacy concerns and preferences in mHealth applications: Balancing privacy and usability. Studies in Health Technology and Informatics, 329, 229-233.
Shojaei, P. (2025). Designing gender-inclusive privacy frameworks for digital platforms in Australia: Bridging ethics, policy, and practice. WREN Symposium 2025, p. 31.
Shojaei, P., Vlahu-Gjorgievska, E., and Chow, Y.-W. (2025). Privacy challenges in mHealth applications. WREN Symposium 2025, p. 15.
Shojaei, P. S. (2018). An approach to optimized Imperialist Competitive Algorithm for task scheduling in cloud computing. 5th International Conference on Electrical Engineering and Computer Science.
Shojaei, P. S., and Naji, H. R. (2016). A hybrid particle swarm optimization for task scheduling in cloud computing. 3rd International Congress on Electrical Engineering, Computer Sciences and Information Technology.
Shojaei, P. S. (2016). An approach to optimized genetic algorithm for task scheduling in cloud computing. International Conference on Computer Engineering and Information Technology.
Shojaei, P. S. (2016). A hybrid algorithm for task scheduling based on ant colony optimization and local neighborhood search. International Conference on Engineering and Applied Sciences.
Shojaei, P. S. (2016). Threshold acceptance approach for task scheduling in cloud computing. International Conference on Engineering and Applied Sciences.
Saghari, F., Sadegzadeh, M., and Shojaei, P. S. (2014). Provide a new method of fuzzy clustering to assess students in a learning environment. 1st National Conference on Computer Engineering and Information Technology.
Shojaei, P. S. (2014). Improving fuzzy rules of intrusion detection with Imperialist Competitive Algorithm. 12th Iranian Conference on Intelligent Systems.
Shojaei, P. S., Lotfi, S., and Mohammadkhanli, L. (2013). Extraction of fuzzy rules in intrusion detection system with Imperialist Competitive Algorithm. 11th Iranian Conference on Intelligent Systems.
Shojaei, P. S., and Lotfi, S. (2012). Review the different methods of intrusion detection in computer networks. 9th Regional Conference of Computer and Intelligent Systems.
Shojaei, P. S., Pourabasi, E., and Mohammadkhanli, L. (2015). A hybrid algorithm for task scheduling based on binary particle swarm optimization and local neighborhood search. 7th Conference on Information and Knowledge Technology.
Shojaei, P. S., and Peidaei, M. (2014). Improving fuzzy rules of intrusion detection with Imperialist Competitive Algorithm. 12th Iranian Conference on Intelligent Systems.
Shojaei, P. S., and Lotfi, S. (2013). Review the different methods of intrusion detection in computer networks using fuzzy methods. 1st National Conference on Application of Intelligent Systems.
Polouk, P., and Shojaei, P. S. (2012). Find matching patterns, discrete and symmetrical to compress information. Lahijan National Conference on Software Engineering.
PhD research focused on developing practical and user-centred privacy-enhancing guidelines for mHealth applications, with emphasis on privacy-by-design, governance, and user behaviour.
Built repeatable pipelines that transformed heterogeneous operational and risk signals into structured datasets and executive-ready dashboards. Created validation and reconciliation checks to improve reporting reliability under tight timelines and changing requirements.
Delivered an analytics system replacing spreadsheets with structured capture, variance reporting, and KPI-style dashboards. Turned operational data into actionable insights for managers and business users.
Designed evaluation workflows for sensitive-data risk, including leakage detection and policy checks, using measurable metrics, test sets, and repeatable runs. Produced decision-ready reporting on trends, failure modes, and examples to support safer AI adoption and iteration.
Contributed to Responsible AI projects including a privacy-focused Digital ID stack and a long-context safety and privacy evaluator for internal LLM deployments. Worked with evaluation concepts including measurable metrics, privacy-aware AI workflows, explainability, and integration-oriented reporting. First-author research on audit-ready Responsible AI security, focusing on lifecycle decision-making, explainability, and evidence traceability, currently under review at Information Processing & Management.
Built a handwritten digit recognition project using the MNIST dataset with Keras, BatchNormalization, and Dropout.
Worked on Python-based optimisation research focused on algorithm design, evaluation, and performance improvement.
Conducted research and implementation on optimisation approaches for resource allocation and task scheduling in cloud environments.
Ongoing work exploring machine learning methods and their practical applications across security, data, and intelligent systems.
Selected as one of only 10 female Australian PhD candidates nationally, recognising research excellence, leadership potential, and commitment to advancing innovative interdisciplinary impact.
Best Lecturer of the Department of Computer Science at Payame Noor University
Faculty Member of the Engineering Department in the International Society of Communication and Development Between Universities
Member of the Executive Committee in a Computer Science Conference
Best Graduate Student Award and highest GPA during two semesters
Rank 1 in the Nationwide University Entrance Exam among 1000 participants in Islamic Azad University
Rank 1 in the General Pedagogy and Teaching Principles course in Tabriz Institute of Technology