Our Sponsors
Website https://www.iccns.org |
Edit Freely
Category Communication and Network Security
Deadline: November 10, 2026 | Date: December 19, 2026-December 21, 2026
Venue/Country: Harbin, China
Updated: 2026-03-13 17:29:47 (GMT+9)
Call for paperTrack 1: Communication and Information EngineeringAd hoc & sensor networksEmbedded networksHigh-speed access networksHome and SOHO networksIPv6 deployment & migrationLocal area networksOptical networksPeer-to-peer networksPersonal and wearable networksRouting and SchedulingUbiquitous networkingWireless networksTrack 2: Information and network securityNetwork Intrusion Detection and PreventionMalware and botnetsCommunication Privacy and AnonymityDistributed denial of servicePublic Key Infrastructures and key managementWeb securitySecure Routing and Network ManagementSecurity & Privacy in Pervasive ComputingSecurity for emerging technologies (VoIP, P2P)Information leakage and theftData tampering and deletionComputer virus and security breachTrack 3: Data security Cryptography and Encryption TechniquesData Integrity and AuthenticityNetwork Security ProtocolsMachine Learning for Threat DetectionApplication SecurityIncident Response and ManagementSecurity in IoT DevicesData Backup and Recovery SolutionsRegulatory ComplianceHomomorphic Encryption for Data ProcessingZero-Knowledge Proofs and ApplicationsPost-Quantum Cryptography and MigrationTrack 4: Privacy ProtectionData Anonymization TechniquesUser Consent and Data CollectionPrivacy by DesignSurveillance and Data PrivacyPrivacy Enhancing Technologies (PETs)Blockchain for Privacy ProtectionEthical Considerations in Data HandlingCross-Border Data TransfersConsumer Privacy RightsImpact of AI on PrivacyDifferential Privacy and its ApplicationsFederated Learning for Privacy PreservationTrack 5: AI, Future Networks and Trusted SystemsAI/ML for Network SecurityAI-Powered Security AnalyticsSecurity of AI SystemsExplainable and Trustworthy AI for Security6G and Next-Generation Network SecurityQuantum-Safe NetworksSecurity in SDN and NFVZero Trust Architecture (ZTA)Secure Access Service Edge (SASE)Trusted Execution Environments (TEEs)Blockchain for Secure SystemsCPS and ICS SecurityFor more topics, please visit https://iccns.org/cfp.html
Submission1. Papers submitted to the conference should be in English.- You will publish the manuscript and deliver paper presentation on ICCNS 2026, orally or poster presentation. You must submit Full-length Manuscript for review before the submission deadline.- You can deliver a presentation on ICCNS 2026, but the presented manuscript WILL NOT be published. Abstract is necessary to submit.2. For submissions intended for publication (full paper):Format your manuscript in accordance with the provided templates.Word template (single-column): minimum 8 pagesLaTeX template (double-column): minimum 4 pages3. For presentation-only submissions (abstract):Full paper is not required; only the abstract formatted according to the template should be submitted.→Submission System: https://www.zmeeting.org/submission/iccns2026
→Email Submission Address: iccns_secretary
young.ac.cnFull Paper Template: https://iccns.org/acm_template.docx
; https://iccns.org/LaTeX-Templates.zip
Abstract Template: https://iccns.org/abstract_template.docx
For more details about submission, please visit https://iccns.org/sub.html
ContactMs. Lesley Lei (Conference Secretary)E-mail: iccns_secretary
young.ac.cnTel: +86-18010667294 | +86-28-86527868Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.