Journal Information
Information Sciences
https://www.sciencedirect.com/journal/information-sciencesImpact Factor: |
6.8 |
Publisher: |
Elsevier |
ISSN: |
0020-0255 |
Viewed: |
103778 |
Tracked: |
163 |
Call For Papers
Informatics and Computer Science Intelligent Systems Applications An International Journal Information Sciences will publish original, innovative and creative research results. A smaller number of timely tutorial and surveying contributions will be published from time to time. The journal is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in information, knowledge engineering and intelligent systems. Readers are assumed to have a common interest in information science, but with diverse backgrounds in fields such as engineering, mathematics, statistics, physics, computer science, cell biology, molecular biology, management science, cognitive science, neurobiology, behavioural sciences and biochemistry. The journal publishes high-quality, refereed articles. It emphasizes a balanced coverage of both theory and practice. It fully acknowledges and vividly promotes a breadth of the discipline of Informations Sciences. Topics include: Foundations of Information Science: Information Theory, Mathematical Linguistics, Automata Theory, Cognitive Science, Theories of Qualitative Behaviour, Artificial Intelligence, Computational Intelligence, Soft Computing, Semiotics, Computational Biology and Bio-informatics. Implementations and Information Technology: Intelligent Systems, Genetic Algorithms and Modelling, Fuzzy Logic and Approximate Reasoning, Artificial Neural Networks, Expert and Decision Support Systems, Learning and Evolutionary Computing, Expert and Decision Support Systems, Learning and Evolutionary Computing, Biometrics, Moleculoid Nanocomputing, Self-adaptation and Self-organisational Systems, Data Engineering, Data Fusion, Information and Knowledge, Adaptive ad Supervisory Control, Discrete Event Systems, Symbolic / Numeric and Statistical Techniques, Perceptions and Pattern Recognition, Design of Algorithms, Software Design, Computer Systems and Architecture Evaluations and Tools, Human-Computer Interface, Computer Communication Networks and Modelling and Computing with Words Applications: Manufacturing, Automation and Mobile Robots, Virtual Reality, Image Processing and Computer Vision Systems, Photonics Networks, Genomics and Bioinformatics, Brain Mapping, Language and Search Engine Design, User-friendly Man Machine Interface, Data Compression and Text Abstraction and Summarization, Virtual Reality, Finance and Economics Modelling and Optimisation Executive Editors-in-Chief can be reached at the following: Prof. Dr. Tofigh TA Allahviranloo- tofigh.allahviranloo@istinye.edu.tr Professor Sabrina S. Senatore- ssenatore@unisa.it Professor Zheng Z. Yan- zhengyan.pz@gmail.com
Last updated by Dou Sun in 2025-08-02
Special Issues
Special Issue on LLMs-Empowered Security and Privacy: Pioneering Next-Generation Solutions in Cybersecurity ResearchSubmission Date: 2026-01-31Large language models (LLMs), exemplified by systems like GPT-4 and DeepSeek, are fundamentally reshaping the field of cybersecurity. Their advanced natural language interaction capabilities are driving a paradigm shift in security methodologies, with significant applications in automated vulnerability detection, formal verification of security protocols, and privacy-enhancing technologies. Furthermore, in security architecture design, LLMs can autonomously generate high-precision detection rules and response strategies from textual threat descriptions. In cryptographic protocol design, they assist in constructing initial frameworks by interpreting complex natural language requirements. More critically, LLMs emulate adversarial reasoning to perform offensive analysis, systematically generating attack variants to identify implementation vulnerabilities. Within the research ecosystem, LLMs act as collaborative co-designers by automating routine tasks like literature review and code generation, which reduces time overhead, minimizes human error, and allows researchers to concentrate on high-level innovation.
Although LLMs have demonstrated significant advancements in cybersecurity applications, their deployment introduces critical challenges necessitating systematic mitigation. Key concerns include: hallucinations in the design and validation of cryptographic protocols, confidentiality risks from model inversion attacks, and operational threats introducing covert backdoors. These limitations highlight substantial gaps in current LLM utilization for security-critical domains. This special issue seeks to explore how LLMs can amplify human creativity in cybersecurity, bridging the gap between empirical practice and theoretical discovery. The aim is to promote research and reflect the latest advances in security and privacy technologies related to the cybersecurity.
Guest editors:
Prof. Fagen Li (Executive Guest Editor), University of Electronic Science and Technology of China, P.R.China; E-mail: fagenli@uestc.edu.cn
Assoc. Prof. Tianwei Zhang, Nanyang Technological University, Singapore; E-mail: tianwei.zhang@ntu.edu.sg
Prof. Yong Ma, Jiangxi Normal University, P.R.China; E-mail:may@jxnu.edu.cn
Assist. Prof. Alzubair Hassan, University College Dublin, Ireland; E-mail: alzubair.hassan@ucd.ie
Dr. Tieyan Li, Singapore Research Center, Huawei Technologies; E-mail: Li.Tieyan@huawei.com
Special issue information:
We are particularly interested in submissions on, but not limited to, the following topics:
LLM-augmented threat intelligence and analysis
AI-human collaboration in security system design
Privacy-preserving LLMs for secure collaboration
Formal verification and explainability in LLM-aided cybersecurity
Real-world applications of LLMs in cybersecurity
Security foundations in LLMs-aided cybersecurity solution design and analysis
Cryptographic applications in LLMs-aided cybersecurity solution design and analysis
Security management and threat-related aspects in LLMs-aided cybersecurity
Forensics and digital evidence in LLMs-aided cybersecurity
Research infrastructure and standardization for LLMs in cybersecurity
Domain-specific security and privacy solutions with LLMs
Manuscript submission information:
Important Dates:
Submission Open Date: December 1, 2025
Submission Deadline: January 31, 2026
Notification of Acceptance: April 30, 2026
Manuscripts must be submitted via the Information Sciences online submission system (https://www.editorialmanager.com/ins/default.aspx). Please select the article type “VSI: LLMs-Empowered Security” when submitting your manuscript online.
Please refer to the Guide for Authors to prepare your manuscript.
All submitted papers under this call will undergo the standard review process of the journal.
For any further information, the authors may contact the Guest Editors.
Keywords:
Large language models; Cybersecurity; Privacy; Attacks; DefensesLast updated by Dou Sun in 2025-12-13
Special Issue on Graph-based solutions for Artificial IntelligenceSubmission Date: 2026-06-30Graph-based Artificial Intelligence (AI) is a term used to describe methodologies in which graphs play a central role in representing and enhancing intelligent systems. Graphs, as mathematical structures composed of nodes and edges, naturally encode relationships, dependencies, and interactions among entities. This intrinsic property makes them not only suitable for modeling data with an explicit relational structure (e.g., molecules, social networks, or transportation systems) but also particularly effective in providing an additional layer of abstraction, organization, and reasoning in complex AI scenarios.
A particular perspective of graph-based AI is one that focuses on approaches in which graphs are employed as complementary or internal representations to support and enrich AI models. These graph-augmented approaches leverage the expressive power of graphs to integrate external knowledge, enhance interpretability, and provide structural insights into the functioning of AI systems. Notable examples include the integration of knowledge graphs into Large Language Models (LLMs) to provide factual grounding and reduce hallucinations, or the use of graphs to improve explainability by explicitly representing dependencies among features, layers, or attention mechanisms. Beyond the integration of external knowledge, graphs also offer a unifying framework for the representation and analysis of the internal structure of AI models. Neural networks and deep learning models can be described as graphs that capture tasks, data flows, and interlayer relationships, including attention mechanisms. This perspective offers a potential avenue for enhancing efficiency through model compression and reduced computational costs, while concurrently promoting transparency and interpretability by making information flows and feature interactions explicit.
Guest editors:
Prof. Domenico Ursino (Executive Guest Editor)
Polytechnic University of Marche, Ancona, Italy
Email: d.ursino@univpm.it
Fields of Interest: Cooperative Information Systems, Artificial Intelligence, Social Network Analysis, Complex Network Analysis, Data Engineering, Data Science, Deep Learning
Prof. Luca Virgili
Polytechnic University of Marche, Ancona, Italy
Email: luca.virgili@univpm.it
Fields of interest: Artificial Intelligence, Complex Network Analysis, Data Science, Deep Learning
Prof. Alessia Amelio
University of Chieti-Pescara, Chieti, Italy
Email: alessia.amelio@unich.it
Fields of interest: data mining, artificial intelligence, machine learning, deep learning, pattern recognition, complex networks
Prof. Gianluca Bonifazi
Polytechnic University of Marche, Ancona, Italy
Email: g.bonifazi@univpm.it
Fields of interest: Complex Network Analysis, Artificial Intelligence, Blockchain
Dr. Michele Marchetti
Polytechnic University of Marche, Ancona, Italy
Email: michele.marchetti@staff.univpm.it
Fields of interest: Social Network Analysis, Natural Language Processing, Artificial Intelligence, Vision Transformers, Deep Learning
Prof. Radu Tudor Ionescu
University of Bucharest, Bucureşti, Romania
Email: radu.ionescu@fmi.unibuc.ro
Fields of interest: Computer Vision, Machine Learning, Artificial Intelligence, Computational Linguistics, Medical Imaging
Special issue information:
Despite the substantial advancements in Artificial Intelligence (AI) witnessed in recent years, contemporary AI systems continue to grapple challenges pertaining to interpretability, efficiency, and reliability. Conventional deep learning models frequently function as black boxes, which complicates the interpretation of their decisions and the assurance of their reliability in practical real-world applications. Concurrently, the accelerated development of Large Language Models (LLMs) and generative AI has given rise to concerns regarding factual grounding, hallucinations, and computational costs. Graph-based approaches offer potential solutions to these limitations by encoding entities and their relationships, thereby providing an abstraction layer that can support AI models. This property can be leveraged to address the current open issues of AI models. Indeed:
• As for interpretability, graphs can make dependencies transparent. For example, they can model how features, layers, or tokens influence one another. In this manner, implicit neural computations can be turned into explicit relational explanations.
• As for factual grounding and reliability, knowledge graphs integrated into LLMs provide external, curated sources of truth. In this manner, hallucinations can be reduced and trustworthiness can be improved.
• As for efficiency, graphs enable compact structural representations. These representations can guide model compression, pruning, and scalable inference. In this manner, both training and inference costs can be reduced.
• As for robustness, graph formulations can highlight anomalies or inconsistencies in data. In this manner, more resilient and bias-aware AI systems can be supported.
• As for multimodal integration, graphs act as a unifying layer. In this layer, information from text, images, and signals can be aligned into coherent structures. In this manner, richer connections across modalities can be enabled.
The objective of this special issue is to provide a forum for researchers from diverse scientific communities to present their recent findings on graph-based approaches to addressing the aforementioned open problems regarding AI. In particular, it aims to collect papers that illustrate how the inherent flexibility of graph-based frameworks (including traditional graphs, multiplex networks, and multilayer networks) can be utilized to effectively address and overcome these challenges. Authors are encouraged to highlight innovative techniques and methodologies that relate graph theory and Artificial Intelligence systems, as well as to identify perspectives for future generations in this rapidly evolving field.
This special issue is interested in, but not limited to, the following topics:
• Graphs in the design and optimization of Artificial Intelligence models;
• Graph-based approaches for explainable Artificial Intelligence;
• Optimization strategies for graph-based models in AI;
• Graph-augmented methods for Generative Artificial Intelligence;
• Graph-based techniques to mitigate hallucinations in Generative AI systems;
• Applications of graph-based Artificial Intelligence across domains;
• Graph-based Artificial Intelligence for Social Network Analysis;
• Graph-based Artificial Intelligence for Complex Network Analysis;
• Graph-based Artificial Intelligence in educational technologies;
• Graph-based Artificial Intelligence in biomedical domains;
• Graph-inspired approaches for neuromorphic and brain-inspired systems.
Manuscript submission information:
Important Dates:
Submission Open Date: November 1, 2025
Submission Deadline: June 30, 2026
Notification of Acceptance: October 31, 2026
Manuscripts must be submitted via the Information Sciences online submission system (https://www.editorialmanager.com/ins/default.aspx). Please select the article type “VSI: Graph solutions for AI” when submitting your manuscript online.
Please refer to the Guide for Authors to prepare your manuscript.
All submitted papers under this call will undergo the standard review process of the journal.
For any further information, the authors may contact the Guest Editors.
Keywords:
Graph-Based Solutions; Artificial intelligence; Deep Learning; Generative AI; Explainable AILast updated by Dou Sun in 2025-12-13
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| b | Information Sciences | 6.8 | Elsevier | 0020-0255 |
| Journal of Information Science | 1.800 | SAGE | 0165-5515 | |
| The Information Society | 3.000 | Taylor & Francis | 0197-2243 | |
| Journal of Interaction Science | Springer | 2194-0827 | ||
| Journal of Spatial Information Science | NCGIA | 1948-660X | ||
| International Journal of Information Sciences and Techniques | AIRCC | 2319-409X | ||
| a | ACM Transactions on Information Systems | 5.400 | ACM | 1046-8188 |
| b | Information Systems | 3.4 | Elsevier | 0306-4379 |
| Brain Sciences | 2.700 | MDPI | 2076-3425 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| Information Sciences | 6.8 | Elsevier |
| Journal of Information Science | 1.800 | SAGE |
| The Information Society | 3.000 | Taylor & Francis |
| Journal of Interaction Science | Springer | |
| Journal of Spatial Information Science | NCGIA | |
| International Journal of Information Sciences and Techniques | AIRCC | |
| ACM Transactions on Information Systems | 5.400 | ACM |
| Information Systems | 3.4 | Elsevier |
| Brain Sciences | 2.700 | MDPI |
| IET Information Security | 1.300 | IET |
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| b | ITW | Information Theory Workshop | 2013-07-12 | 2013-09-09 | |||
| b | b1 | ISIT | International Symposium on Information Theory | 2019-01-20 | 2019-03-31 | 2019-07-07 | |
| c | ISA' | International Conference on Information Security and Assurance | 2016-01-30 | 2016-02-15 | 2016-03-24 | ||
| a | a2 | ICCS | International Conference on Computational Science | 2026-01-23 | 2026-03-23 | 2026-06-29 | |
| c | b1 | FUSION | International Conference on Information Fusion | 2024-03-01 | 2024-05-01 | 2024-07-07 | |
| c | b1 | IH | Information Hiding Conference | 2012-02-05 | 2012-04-01 | 2012-05-15 | |
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| a* | ICIS | International Conference on Information Systems | 2017-05-05 | 2017-08-07 | 2017-12-10 | ||
| c | ICIS''' | International Conference on Computer and Information Science | 2020-08-10 | 2020-08-27 | 2020-11-18 | ||
| c | b2 | ISCIS | International Symposium on Computer and Information Sciences | 2015-03-30 | 2015-05-21 | 2015-09-21 |
| Short | Full Name | Conference |
|---|---|---|
| ITW | Information Theory Workshop | 2013-09-09 |
| ISIT | International Symposium on Information Theory | 2019-07-07 |
| ISA' | International Conference on Information Security and Assurance | 2016-03-24 |
| ICCS | International Conference on Computational Science | 2026-06-29 |
| FUSION | International Conference on Information Fusion | 2024-07-07 |
| IH | Information Hiding Conference | 2012-05-15 |
| ISC | Information Security Conference | 2025-10-20 |
| ICIS | International Conference on Information Systems | 2017-12-10 |
| ICIS''' | International Conference on Computer and Information Science | 2020-11-18 |
| ISCIS | International Symposium on Computer and Information Sciences | 2015-09-21 |