Special Issue: Intelligent Data Analytics and Cross-Domain Security in AIoT

Theme and Scope

Ambient Intelligence of Things (AIoT) technology, which combines the Internet of Things (IoT) and Artificial Intelligence (AI), is realizing real-time intelligence across all industrial sectors, including manufacturing, defense, energy, and healthcare. However, as the AIoT ecosystem expands, data now traverses various network domains with differing security levels (Edge, Private/Public Cloud, Isolated Networks), leading to unprecedented security vulnerabilities.

In particular, in environments implementing strict network isolation policies—such as critical national infrastructure or smart factories—security barriers designed to block external threats are paradoxically causing data isolation, which hinders the flow necessary for intelligent data analysis.

Therefore, this special issue seeks innovative research that explores the synergy between data analysis and perimeter security technologies in the AIoT environment. We aim to go beyond technologies that merely detect security threats and propose an intelligent data pipeline architecture where security is embedded from the design stage (Security-by-Design). Through this, we envision the future of intelligent systems where data flows securely, is highly analyzed, and makes trustworthy decisions.

 

Topics of Interest

This issue welcomes broad research that includes, but is not limited to, the following topics.

Track 1: AI-Driven Advanced Data Analytics in AIoT

  •  Spatio-temporal Data Mining
  •  Intelligent data preprocessing and purification
  •  Multimodal data fusion analysis
  •  Federated Learning for AIoT
  •  Lightweight analysis models and TinyML Analytics for resource-constrained AIoT devices
  •  Predictive maintenance and context-aware analysis based on unstructured/time-series data

Track 2: Cross-Domain Data Pipeline & Security

  •  Intelligent CDS
  •  Data Sovereignty Protection Analysis
  •  Cross-Domain Transfer Learning
  •  Secure Federated Learning Architecture
  •  Data Sandbox and Security Analysis Environments

Track 3: Cybersecurity Analytics for Trustworthy AIoT

  •  Adversarial AI Analysis and Defense
  •  XAI for Security
  •  Threat Hunting
  •  Adversarial Attack Defense and Robustness Assessment for AIoT Sensors and Models
  •  Blockchain-based AIoT Data Integrity Verification and Governance

Keywords

  • Analytics: Deep Learning, Time-series Forecasting, Feature Engineering.
  • Security: Intrusion Detection, Malware Analysis, Zero Trust.
  • Cross-Domain: Network Isolation, Data Diode, Protocol Filtering.

 

Submission Guidelines

  • Submissions of this Special Issue must be directly sent via email to Leading Guest Editor, Prof. Ji Su Park: jisupark7203@gmail.com
  • Each paper for submission must strictly follow the instructions provided in the Author Guidelines of the Journal of Internet Technology (JIT).
  • Manuscripts that are already published or under review by other journals or conferences will not be considered.
  • Each submission will undergo a rigorous peer-review process, typically involving two rounds.
  • Previously published conference papers should be extended by at least 70% new material for the journal version.


Important Dates

  • All manuscripts will be peer-reviewed before their acceptance for publication. The deadline for manuscript submission is Feb 30, 2027.
  • Tentative Publication: The 3rd Quarter, 2028


Guest Editors

  • Prof. Ji Su Park
  • Dept. of Computer Science and Engineering, Jeonju University
  • Email: jisupark7203@gmail.com

  • Prof. Laurence Tianruo Yang
  • Zhengzhou University, China
  • Emil: ltyang@zzu.edu.cn