4th International Conference IOT, Blockchain and Cryptography (IOTBC 2026)
March 30 ~ 31, 2026, Virtual Conference Scope & Topics 4th International Conference IOT, Blockchain and Cryptography (IOTBC 2026) is a fully virtual conference (VC) designed to bring together researchers, practitioners, industry professionals, and innovators from around the world. As a virtual event, IOTBC 2026 provides a highly accessible and interactive platform for sharing cutting edge knowledge, discussing emerging trends, and presenting significant advances in the theory, methodology, and applications of the Internet of Things (IoT), Blockchain technologies, and Cryptography.
IOTBC 2026 welcomes contributions that explore foundational concepts, propose novel algorithms and architectures, demonstrate real world deployments, or present interdisciplinary research that connects IoT, Blockchain, Cryptography, Artificial Intelligence, and modern cybersecurity. Authors are invited to submit high quality research papers, survey articles, project reports, and industrial case studies that illustrate innovative results and practical experiences. Topics of interest include, but are not limited to, the following - Access Control and Intrusion Detection
- Machine Learning Theory and Foundations
- Deep Learning Architectures and Methods
- Self Supervised, Unsupervised, and Semi Supervised Learning
- Transfer Learning, Meta Learning, and Continual Learning
- Reinforcement Learning and Decision Making
- Probabilistic Modeling and Statistical Inference
- Optimization Methods for AI and ML
- Large Language Models (LLMs) and Foundation Models
- Multimodal Learning and Vision Language Models
- Generative AI for Text, Image, Audio, and Video
- Retrieval Augmented Generation (RAG) and Knowledge Enhanced Models
- Efficient AI: Model Compression, Distillation, and Acceleration
- Trustworthy, Robust, and Secure AI
- Adversarial Machine Learning and Model Hardening
- Explainable and Interpretable AI (XAI)
- AI Alignment, AI Safety, and Responsible AI
- Human AI Interaction and Human in the Loop Systems
- Neurosymbolic AI and Hybrid Intelligence
- Causal Inference and Causal Representation Learning
- Knowledge Graphs, Reasoning, and Automated Planning
- Program Synthesis, Code Intelligence, and AI for Software Security
- Federated Learning and Privacy Preserving AI
- Differential Privacy, Secure Multi Party Computation, and Homomorphic Encryption
- Cryptography, Cryptographic Protocols, and Post Quantum Security
- Authentication, Identification, and Access Control
- Key Management, Trust Models, and Reputation Systems
- Data Integrity, System Integrity, and Secure Data Management
- Intrusion Detection, Prevention, and Threat Intelligence
- Malware Analysis, Vulnerability Assessment, and Insider Threat Detection
- Security Engineering, Secure Software Development, and DevSecOps
- Security Requirements, Threat Modeling, and Risk Analysis
- Security Architecture, Design Patterns, and Deployment
- Network Security, Secure Connectivity, and QoS Aware Security
- Security in Distributed Systems, Cloud, Edge, and Fog Computing
- Security and Privacy in IoT and Cyber Physical Systems
- Security and Privacy in Mobile, Ubiquitous, and Web Based Systems
- Sensor Networks and Mobile Ad Hoc Network Security
- Blockchain Foundations, Consensus, and Scalability
- Blockchain Security, Privacy, and Attack Analysis
- Blockchain for IoT, Cloud, Identity, and Digital Forensics
- Smart Contracts, Decentralized Applications, and Secure Ledger Design
- Computational Intelligence for Security and Anomaly Detection
- Bio Inspired and Evolutionary Computation for Security
- Autonomous Agents and Multi Agent Security Systems
- Robotics, Embodied AI, and Autonomous System Security
- AI for Cyber Physical Infrastructure Protection
- AI for Healthcare, Bioinformatics, and Medical Security
- AI for Climate, Sustainability, and Critical Infrastructure
- Cybersecurity Governance, Regulation, and Trust Mechanisms
- Secure E Commerce, Digital Transactions, and Financial AI
- Experimental Security Testbeds, Benchmarks, and Real World Deployments
Paper Submission Authors are invited to submit papers through the conference Submission System by January 24, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by The proceedings of the conference will be published by International Journal on Cybernetics & Informatics (IJCI) series (Confirmed). Selected papers from IOTBC 2026, after further revisions, will be published in the special issue of the following journals. Important Dates | Submission Deadline | : | January 24, 2026 | | Authors Notification | : | February 14, 2026 | | Final Manuscript Due | : | February 21, 2026 |
Co - Located Event ***** The invited talk proposals can be submitted to iotbc@iotbc2026.org
|