Special Issue "Data Science in Ubiquitous Computing: Data Analytics, Data Mining and Data Security"

Submission Deadline: 31 January 2022
Submit to Special Issue
Guest Editors
Dr. Chien-Ming Chen, Shandong University of Science and Technology, China.
Dr. Mohammad Mehedi Hassan, King Saud University, Saudi Arabia.
Dr. Muhammad Asghar khan, Hamdard University, Pakistan.
Dr. Hu Xiong, University of Electronic Science and Technology of China, China.


There has recently been an increasing emphasis on ubiquitous computing, including theories, methodologies, and techniques. Ubiquitous computing is to provide computing and communication services anytime and anywhere. It embeds computational capability into daily objects to effectively communicate and perform practical tasks to minimize the end user's need to interact with computers.


With the significant development of ubiquitous computing, massive raw data are collected from various environments and applications, including social networking, smart manufacturing, financial technologies, search engines, IoT, etc. These data can be related to user behavior, transaction records, the characteristics of products, production lines, etc. The size of data is increasingly grown, leading to an important issue: discovering value from big raw data.


Data science is an interdisciplinary field that combines statistics, scientific methods, mathematics, and algorithms to extract knowledge and meaningful insights from structured and unstructured data. As an emerging discipline, data science aggregates several research topics, including data analytics, data security and privacy, data mining, databases, etc.

Data science is one of the most exciting fields out there today. This Special Issue emphasizes the cutting-edge research of data science for ubiquitous computing. We encourage researchers to share their solutions in data analysis, data security and privacy, data mining, information fusion, knowledge discovery, information aggregation, etc.


Topics of interest include but are not limited to the ones listed below.

1. Data analysis for ubiquitous computing

2. Data security and privacy for ubiquitous computing

3. Data mining for ubiquitous computing

4. Information Fusion for ubiquitous computing

5. Information aggregation for ubiquitous computing

6. Big data analytics techniques and models

7. Trust management in data analytics

8. Access control and authorization

Data science, ubiquitous computing, data analytics, data mining, data security