<html><head></head><body><div style="color:#000; background-color:#fff; font-family:Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:13px"><div id="yui_3_16_0_ym19_1_1545295305154_2628" dir="ltr">Information Sciences - Call for Special Issue Papers on Safety and Security for Ubiquitous Computing and Communications<br id="yui_3_16_0_ym19_1_1545295305154_2773"><br id="yui_3_16_0_ym19_1_1545295305154_2774">https://www.journals.elsevier.com/information-sciences/call-for-papers/special-issue-safety-security-ubiquitous-computing<br id="yui_3_16_0_ym19_1_1545295305154_2775"><br id="yui_3_16_0_ym19_1_1545295305154_2776">1. Significance and Description<br id="yui_3_16_0_ym19_1_1545295305154_2777"><br id="yui_3_16_0_ym19_1_1545295305154_2778">Computers are now available anytime, anywhere, by any means, and distributed unobtrusively throughout everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. Such "any" computers open tremendous opportunities to provide numerous novel services/applications in both real world and cyberspaces, and exist ubiquitously in our daily life, working, learning, traveling, entertainment, medicine, etc. Although it is yet unclear what exactly the real-cyber integrated worlds would be, there is no doubt that they must be safe and secure.<br id="yui_3_16_0_ym19_1_1545295305154_2779"><br id="yui_3_16_0_ym19_1_1545295305154_2780">Inspired by this ¡°You (must) be safe¡± vision, ¡°UbiSafe¡± in short, Prof. Jianhua Ma (Hosei University, Japan), Prof. Laurence T. Yang (St. Francis Xavier University, Canada), et. al., started the ¡°UbiSafe Computing¡± conference in 2007, in Niagara Falls, Canada. It aims at bringing together researchers and practitioners in the world working on theories and technologies for ubiquitous artifacts to function safely for different purposes; for ubiquitous systems to work safely in various situations; and for ubiquitous environments to behave safely with all people. We propose this Special Issue in the Information Sciences journal in order to present safety and security issues for ubiquitous computing and communications.<br id="yui_3_16_0_ym19_1_1545295305154_2781"><br id="yui_3_16_0_ym19_1_1545295305154_2782">2. Topics<br id="yui_3_16_0_ym19_1_1545295305154_2783"><br id="yui_3_16_0_ym19_1_1545295305154_2784">This Special Issue on Safety and Security for Ubiquitous Computing and Communications in the Information Sciences journal solicits topics as follows, but not limited to:<br id="yui_3_16_0_ym19_1_1545295305154_2785"><br id="yui_3_16_0_ym19_1_1545295305154_2786">(1) Theoretical Fundamentals on Safety and Security for Ubiquitous Computing and Communications<br id="yui_3_16_0_ym19_1_1545295305154_2787"><br id="yui_3_16_0_ym19_1_1545295305154_2788">(2) Key Technologies to Enable Safety and Security Aspects for Ubiquitous Computing and Communications<br id="yui_3_16_0_ym19_1_1545295305154_2789"><br id="yui_3_16_0_ym19_1_1545295305154_2790">(3) Systems, Services and Applications to Implement Safety and Security for Ubiquitous Computing and Communications<br id="yui_3_16_0_ym19_1_1545295305154_2791"><br id="yui_3_16_0_ym19_1_1545295305154_2792">(4) Measures and Assessments on Safety and Security Components for Ubiquitous Computing and Communications<br id="yui_3_16_0_ym19_1_1545295305154_2793"><br id="yui_3_16_0_ym19_1_1545295305154_2794">(5) Human Factors and Social Issues related to Ubiquitous Computing and Communications<br id="yui_3_16_0_ym19_1_1545295305154_2795"><br id="yui_3_16_0_ym19_1_1545295305154_2796">3. Submissions<br id="yui_3_16_0_ym19_1_1545295305154_2797"><br id="yui_3_16_0_ym19_1_1545295305154_2798">We will publish open Call-for-Papers to receive independent and original submissions, and encourage individual researchers to contribute their papers to this Special Issue. We expect to receive around 60 submissions. Each paper will go through a rigorous peer-review process by at least three international researchers. The acceptance rate will be fairly low (15%) and thus we will accept around 60*15%=9 papers, but we regard quality as our top priority.<br id="yui_3_16_0_ym19_1_1545295305154_2799"><br id="yui_3_16_0_ym19_1_1545295305154_2800">4. Timeline<br id="yui_3_16_0_ym19_1_1545295305154_2801"><br id="yui_3_16_0_ym19_1_1545295305154_2802">Submission deadline: 15 January, 2019, Closing for submission of manuscripts.<br id="yui_3_16_0_ym19_1_1545295305154_2803"><br id="yui_3_16_0_ym19_1_1545295305154_2804">Acceptance notification: 15 June, 2019, Completion of reviews; Determination of acceptance/rejection decisions.<br id="yui_3_16_0_ym19_1_1545295305154_2805"><br id="yui_3_16_0_ym19_1_1545295305154_2806">Tentative publication: 15 July, 2019, The publisher contacts the authors for the final publishing process.<br id="yui_3_16_0_ym19_1_1545295305154_2807"><br id="yui_3_16_0_ym19_1_1545295305154_2808">5. Guest Editors<br id="yui_3_16_0_ym19_1_1545295305154_2809"><br id="yui_3_16_0_ym19_1_1545295305154_2810">Prof. Guojun Wang Guangzhou University, China<br id="yui_3_16_0_ym19_1_1545295305154_2811"><br id="yui_3_16_0_ym19_1_1545295305154_2812">Prof. Jianhua Ma Hosei University, Japan<br id="yui_3_16_0_ym19_1_1545295305154_2813"><br id="yui_3_16_0_ym19_1_1545295305154_2814">Prof. Laurence T. Yang St. Francis Xavier University, Canada<br id="yui_3_16_0_ym19_1_1545295305154_2815"><br id="yui_3_16_0_ym19_1_1545295305154_2816">--<br id="yui_3_16_0_ym19_1_1545295305154_2817">*******************************************************************************************<br id="yui_3_16_0_ym19_1_1545295305154_2818">Dr. Guojun Wang, Pearl River Scholarship Distinguished Professor<br id="yui_3_16_0_ym19_1_1545295305154_2819">Director of Institute of Computer Networks,<br id="yui_3_16_0_ym19_1_1545295305154_2820">Vice Dean of School of Computer Science and Educational Software,<br id="yui_3_16_0_ym19_1_1545295305154_2821">Guangzhou University, Guangzhou, Guangdong Province,<br id="yui_3_16_0_ym19_1_1545295305154_2822">P. R. China, 510006<br id="yui_3_16_0_ym19_1_1545295305154_2823">Tel/Fax: +86-20-39366920, Mobile: +86-13360581866<br id="yui_3_16_0_ym19_1_1545295305154_2824">Email: csgjwang@gzhu.edu.cn; csgjwang@gmail.com<br id="yui_3_16_0_ym19_1_1545295305154_2825">http://www.smart-world.org/2018/<br id="yui_3_16_0_ym19_1_1545295305154_2826">http://trust.gzhu.edu.cn/faculty/~csgjwang/publications.html<br id="yui_3_16_0_ym19_1_1545295305154_2827">*******************************************************************************************<br id="yui_3_16_0_ym19_1_1545295305154_2828"><br></div></div></body></html>