NCE aims to be the China leading conference of the field of network and communication engineering, covering a broad spectrum of diverse research areas.
Paper Review
All submissions to the NCE will be sent to at least 2 reviewers and evaluated based on originality, technical and research content, relevance to conference, contributions, and readability. The full paper submissions will be chosen based on technical merit, interest, applicability, and how well they fit a coherent and balanced technical program.
Publishing and Indexes
The accepted papers will be published by Conference Proceedings, which will be submitted to Ei Compendex, Scopus, CPCI (ISTP / Web of Science) for indexing.
Important Dates
Registration Deadline: Nov. 10 2019
Conference Date: Nov. 22-24 2019
Organizer and Publisher need to check the quality of the papers, and they can not guarantee that all the conference articles will be published. Publisher sends all of its published materials to the indexing services. But please note that DBLP, Scopus, Engineering Village, EI Compendex, CPCI(Web of Science), etc., are all entirely separate entities from Publisher. As such, we cannot guarantee that a certain proceedings volume content will pass their review process – or, even if it does pass the review process, when exactly that volume will be indexed. They all have their own guidelines for acceptance, independent of Publisher's influence.
Submission & Registration
Committee Member , IETI / IRIEM / IDSAI/ IADSB / APL / INWASCON Member, Student Attendee, frequet Attendee, group attendees, can enjoy a 30 USD or 200 RMB discount. Please contact us by email: NCE@IETI.NET
Each paper is limited to 4-6 pages normally, and additional pages will be charged. Please follow the Conference format.


Keynote Speakers

Call for Papers

We firmly believe that ethical conduct is the most essential virtual of any academic. Hence any act of plagiarism is a totally unacceptable academic misconduct and cannot be tolerated. Please submit your paper via email: NCE@IETI.NET

Topics of interest for submission include, but are not limited to:

Active Defense Systems
Adaptive Defense Systems
Ad - hoc communications
Analysis, Benchmark of Security Systems
Applied Cryptography
Automated Software Engineering
Big data networking
Biometric Security
Bioinformatics and Scientific Computing
Computer Animation
Complex Systems Security
Computer Architecture
Computer Modeling
Computer-aided Design
Computer Networks
Cognitive radio and networks
Cooperative communications
Database and System Security
Data Protection
Data/System Integrity
Digital Signal and Image Processing
Digital System and Logic Design
Distributed Access Control
Distributed Attack Systems
D2D and M2M communications
Expert Systems
Game theory for communications
Green communications and energy efficiency
High Performance Network Virtualization
High Performance Security Systems
Hardware Security
Heterogeneous networks and small cells
ICT for smart cities
Identity Management
Intelligent Defense Systems
Insider Threats
Internet and Network Forensics
Internet and Web Applications
Intrusion Detection and Prevention

Key Distribution and Management
Large-scale Attacks and Defense
Multimedia Applications
Multi - antenna and beamforming systems
Network functions virtualization and software defined networking
Network Resiliency
Network Security
Network Security and Cryptography
Next generation (5G) mobile communications
Network coding techniques
Optical networks and converged optical-wireless networks
Powerline communications
Protocols, architectures and applications for the Internet of Things
RFID Security and Privacy
Standards for communications and networking
Smart grid communications
Social Media
Security Architectures
Security for Critical Infrastructures
Security in P2P systems
Security in Cloud and Grid Systems
Security in E-Commerce
Security in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Policy
Security Protocols
Security Simulation and Tools
Security Theory and Tools
Signal processing for communications
Standards and Assurance Methods
Trusted Computing
Trust Management
World Wide Web Security
Wireless Sensor Network
Wireless communication testbeds, measurements and modelling
Other emerging themes

Registration Fees

GLUT Author can enjoy a 30 USD / 200 RMB discount.

Full Paper (Attendance + Paper Publication + Presentation)

$ 510
  • or
¥ 2800

Abstract (Attendance + Abstract + Presentation)

$ 310
  • or
¥ 1900

Attendance / Listener (No Submission Required)

$ 310
  • or
¥ 1900


Guilin University of Technology, Pingfeng Campus, Qixing District, Jiangan Road, No. 12, Guilin, Guangxi, China

Journals Opportunities

Contact Us


Phone: +86 18571546145; HK Tel: +852-5607-9095


More CFP: