Journal of Systems Architecture

Papers
(The median citation count of Journal of Systems Architecture is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Efficient CUDA stream management for multi-DNN real-time inference on embedded GPUs185
Machine learning-based computation offloading in multi-access edge computing: A survey95
Efficient maximum reaction time analysis for data chains of real-time tasks in multiprocessor systems92
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives84
BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations81
Mul_STK: Efficient and privacy-preserving query with spatio-temporal-keyword multiple attributes in cloud computing73
Electric vehicle charging network security: A survey72
SHREG: Mitigating register redundancy in GPUs72
Loop interchange and tiling for multi-dimensional loops to minimize write operations on NVMs61
Balancing I/O and wear-out distribution inside SSDs with optimized cache management61
CREW: Computation reuse and efficient weight storage for hardware-accelerated MLPs and RNNs59
LAG-based schedulability analysis for preemptive global EDF scheduling with dynamic cache allocation59
Active and passive virtual machine introspection on AMD and ARM processors59
A survey and experimental analysis of checkpointing techniques for energy harvesting devices59
IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework57
The MicroRV32 framework: An accessible and configurable open source RISC-V cross-level platform for education and research50
Editorial Board50
Lifetime improvement through adaptive reconfiguration for nonvolatile FPGAs46
DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN45
Energy efficient mixed task handling on real-time embedded systems using FreeRTOS40
HEA-PAS: A hybrid energy allocation strategy for parallel applications scheduling on heterogeneous computing systems39
Contention-aware workflow scheduling on heterogeneous computing systems with shared buses39
The BH-mixed scheduling algorithm for DAG tasks with constrained deadlines39
Blockchain-based decentralized data dissemination scheme in smart transportation39
Component-based architectural regression test selection for modularized software systems38
Editorial Board38
Editorial Board37
IPCAS: An improved conditional privacy-preserving certificateless aggregate signature scheme without bilinear pairing for VANETs37
TMI: Two-dimensional maintainability index for automotive software maintainability measurement37
PMSort: An adaptive sorting engine for persistent memory36
A Multi-hashing Index for hybrid DRAM-NVM memory systems36
CoAxNN: Optimizing on-device deep learning with conditional approximate neural networks36
Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme35
Safe and secure platooning of Automated Guided Vehicles in Industry 4.034
Joint optimization of layering and power allocation for scalable VR video in 6G networks based on Deep Reinforcement Learning34
DAC: A dynamic active and collaborative cache management scheme for solid state disks34
CoqMatrix: Formal matrix library with multiple models in Coq33
An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT33
Improving live migration efficiency in QEMU: An eBPF-based paravirtualized approach33
Preference-oriented partitioning for multiprocessor real-time systems32
Special issue on Reliable Software Technologies (AEiC2021)32
Process variation aware DRAM-Cache resizing32
Energy-efficient scheduling for parallel applications with reliability and time constraints on heterogeneous distributed systems32
A secure data sharing scheme based on searchable public key encryption for authorized multi-receiver31
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage31
Towards a real-time IoT: Approaches for incoming packet processing in cyber–physical systems31
Energy-efficient scheduling of imprecise mixed-criticality real-time tasks based on genetic algorithm30
Optimized partitioning and priority assignment of real-time applications on heterogeneous platforms with hardware acceleration30
PADP-FedMeta: A personalized and adaptive differentially private federated meta learning mechanism for AIoT30
Editorial Board29
Editorial Board28
Cloud security in the age of adaptive adversaries: A game theoretic approach to hypervisor-based intrusion detection28
Subversion resistant identity-based signature28
PatternS: An intelligent hybrid memory scheduler driven by page pattern recognition27
EDF-based Energy-Efficient Probabilistic Imprecise Mixed-Criticality Scheduling27
Complex event models for automotive embedded systems26
Pflow: An end-to-end heterogeneous acceleration framework for CNN inference on FPGAs26
Synchronous VS asynchronous reconfiguration of Memory Bandwidth Management Schemes: A comparative analysis26
Secure pairing-free certificateless aggregate signcryption scheme for IoT26
On the methodology of three-way structured merge in version control systems: Top-down, bottom-up, or both25
Editorial Board25
Fine-grained parallelism framework with predictable work-stealing for real-time multiprocessor systems25
Editorial Board25
Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems25
Energy-efficient acceleration of convolutional neural networks using computation reuse24
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation24
Hardware-software co-exploration with racetrack memory based in-memory computing for CNN inference in embedded systems24
Parametric WCET as a function of procedure arguments: Analysis and applications23
Network traffic classification based on federated semi-supervised learning23
BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles23
Hybrid differential privacy based federated learning for Internet of Things22
Efficient Dropout-resilient and Verifiable Federated learning scheme for AIoT healthcare system22
VCSA: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption22
A comprehensive survey of digital twins: Applications, technologies and security challenges21
Data clustering on hybrid classical-quantum NISQ architecture with generative-based variational and parallel algorithms21
FedMQ+: Towards efficient heterogeneous federated learning with multi-grained quantization21
PEPA: Paillier cryptosystem-based efficient privacy-preserving authentication scheme for VANETs21
Input/mapping precision controllable digital CIM with adaptive adder tree architecture for flexible DNN inference21
Gradient descent algorithm for the optimization of fixed priorities in real-time systems21
Engineering SRAM-PUF on Arduino microcontroller21
Bit-level compiler optimization for ultra low-power embedded systems20
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio20
TCADer: A Tightly Coupled Accelerator Design framework for heterogeneous system with hardware/software co-design20
SAR-DetAttack: GAN-based adversarial attack with transfer learning for ship detection in satellite SAR images20
Towards transferable adversarial attacks on vision transformers for image classification20
NLTSP: A cost model for tensor program tuning using nested loop trees20
Balancing privacy and fairness: Client selection in differential privacy-based federated learning19
Blockchain-based privacy-preserving public key searchable encryption with strong traceability19
A cache-aware DAG scheduling method on multicores: Exploiting node affinity and deferred executions19
PBR: An efficient rounding and branch-and-bound-based task offloading approach for Low Earth Orbit Satellite Edge Computing19
Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things19
Dynamic computation scheduling for hybrid energy mobile edge computing networks19
SAMFL: Secure Aggregation Mechanism for Federated Learning with Byzantine-robustness by functional encryption18
Process scenario discovery from event logs based on activity and timing information18
EVFL: An explainable vertical federated learning for data-oriented Artificial Intelligence systems18
Editorial Board18
Reformulating the direct convolution for high-performance deep learning inference on ARM processors18
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking18
Structured precision skipping: Accelerating convolutional neural networks with budget-aware dynamic precision selection18
Gated-CNN: Combating NBTI and HCI aging effects in on-chip activation memories of Convolutional Neural Network accelerators18
DiVIT: Algorithm and architecture co-design of differential attention in vision transformer18
Optimizing encoding and repair for wide-stripe minimum bandwidth regenerating codes in in-memory key-value stores17
Editorial Board17
On container vulnerabilities in edge computing: A fix-on-deployment approach17
Secure and privacy-preserving quantum authentication scheme using blockchain identifiers in metaverse environment17
Lyapunov optimized energy-efficient dynamic offloading with queue length constraints17
MPTO-MT: A multi-period vehicular task offloading method in 5G HetNets17
Towards correctness proof for hybrid Simulink block diagrams17
Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing17
Secure fuzzy identity-based public verification for cloud storage16
Conflict-aware compiler for hierarchical register file on GPUs16
Blockchain-based auditing with data self-repair: From centralized system to distributed storage16
Blockchain-based authentication for IIoT devices with PUF16
Mobile Crowdsensing Model: A survey15
Robust communication-efficient decentralized learning with heterogeneity15
A survey on FANET routing from a cross-layer design perspective15
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth15
Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review15
HB-ReTriple: Mobile rendering optimization based on efficient history reusing15
Evaluating single event upsets in deep neural networks for semantic segmentation: An embedded system perspective15
The price of schedulability in cyclic workloads: The history-vs.-response-time-vs.-accuracy trade-off15
Log2Evt: Constructing high-level events for IoT Systems through log-code execution path correlation15
Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing15
HeterScale: A hierarchical task scheduling framework for intelligent edge collaboration in IIOT15
Scheduling virtual machines and containers: A comparative review of techniques, performance, and future trends15
Efficient stereo matching on embedded GPUs with zero-means cross correlation15
BIDS: An efficient Intrusion Detection System for in-vehicle networks using a two-stage Binarised Neural Network on low-cost FPGA14
Non-interactive set intersection for privacy-preserving contact tracing14
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters14
MADDPG-based task offloading and resource pricing in edge collaboration environment14
GTA: Generating high-performance tensorized program with dual-task scheduling14
GraphA: An efficient ReRAM-based architecture to accelerate large scale graph processing14
A qualitative cybersecurity analysis of time-triggered communication networks in automotive systems14
RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage14
Provably secure public key encryption with keyword search for data outsourcing in cloud environments14
ZNS-Cleaner: Enhancing lifespan by reducing empty erase in ZNS SSDs14
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems14
Enabling PIM-based AES encryption for online video streaming14
SADDLE: A runtime feedback control architecture for adaptive distributed deep learning in heterogeneous GPU clusters13
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT13
CFIO: A conflict-free I/O mechanism to fully exploit internal parallelism for Open-Channel SSDs13
Low-latency service function chain migration in edge-core networks based on open Jackson networks13
Symbolic identification of shared memory based bank conflicts for GPUs13
Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things13
Achieving low write latency through new stealth program operation supporting early write completion in NAND flash memory13
MTS-LSTDM: Multi-Time-Scale Long Short-Term Double Memory for power load forecasting13
A lattice-based designated-server public-key authenticated encryption with keyword search12
A survey on techniques for improving Phase Change Memory (PCM) lifetime12
Fast post-quantum private set intersection from oblivious pseudorandom function for mobile social networks12
SmartDeCoup: Decoupling the STT-RAM LLC for even write distribution and lifetime improvement12
A dual-index Boolean retrieval scheme with dynamic and revocable attribute-based policies12
Nis-PoW: Non-interactive secure Proof of Ownership for cloud storage12
Accelerating on-device visual task adaptation by exploiting hybrid sparsity in DNN training12
A quantitative blind area risks assessment method for safe driving assistance12
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges12
A survey on routing algorithm and router microarchitecture of three-dimensional Network-on-Chip12
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT12
Resource-aware Montgomery modular multiplication optimization for digital signal processing12
Optimal computational resource pricing in vehicular edge computing: A Stackelberg game approach11
μScope: Evaluating storage stack robustness against SSD’s latency va11
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network11
A redesigned secure and efficient data transaction protocol for mobile payment system11
Editorial Board11
Corrigendum to ‘Fine-Grained Parallelism Framework with Predictable Work-Stealing for Real-Time Multiprocessor Systems’ Journal of Systems Architecture Vol. 124, March 2022, Article Number 10239311
Optimum: Runtime optimization for multiple mixed model deployment deep learning inference11
A survey on privacy preservation techniques for blockchain interoperability11
Communication compression techniques in distributed deep learning: A survey11
The rCOS framework for multi-dimensional separation of concerns in model-driven engineering11
A memory footprint optimization framework for Python applications targeting edge devices11
A hybrid controller for safe and efficient longitudinal collision avoidance control11
Comparing timed-division multiplexing and best-effort networks-on-chip11
Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer11
Online energy-efficient scheduling of DAG tasks on heterogeneous embedded platforms11
A convolutional autoencoder architecture for robust network intrusion detection in embedded systems11
An energy-efficient near-data processing accelerator for DNNs to optimize memory accesses11
Computation of tight bounds for the worst-case end-to-end delay on Avionics Full-Duplex Switched Ethernet11
Lightweight asynchronous scheduling in heterogeneous reconfigurable systems11
Towards efficient and robust intelligent mobile vision system via small object aware parallel offloading11
ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor11
TaintGuard: Preventing implicit privilege leakage in smart contract based on taint tracking at abstract syntax tree level10
Editorial Board10
Blocking analysis of real-time tasks with parallel critical sections under federated scheduling10
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system10
Exploiting intra-chip locality for multi-chip GPUs via two-level shared L1 cache10
Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage10
Improving the robustness of industrial Cyber–Physical Systems through machine learning-based performance anomaly identification10
Maximising mobile user experience through self-adaptive content- and ambient-aware display brightness scaling10
An efficient bandwidth-adaptive gradient compression algorithm for distributed training of deep neural networks10
Efficient one-to-one sharing: Public key matchmaking encryption10
IEmu: Interrupt modeling from the logic hidden in the firmware10
A survey and taxonomy of consensus protocols for blockchains10
Multi-objective uplink data transmission optimization for edge computing in UAV-assistant mobile wireless sensor networks10
A framework for static analysis and verification of low-level RTOS code10
Formal domain-driven system development in Event-B: Application to interactive critical systems10
BANSIM: A new discrete-event simulator for wireless body area networks with deep reinforcement learning in Python10
Migration-aware slot-based memory request scheduler to guarantee QoS in DRAM-PCM hybrid memories10
ADCIM: scalable construction of approximate digital compute-in-memory MACRO for energy-efficient attention computation10
Reducing Errors and Powers in LPDDR for DNN Inference: A Compression and IECC-Based Approach10
BDACD: Blockchain-based decentralized auditing supporting ciphertext deduplication10
A federated deep learning framework for privacy preservation and communication efficiency10
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control10
An online dynamic pricing framework for resource allocation in edge computing10
Efficient registration-based signature schemes9
Attribute-based searchable encryption with decentralized key management for healthcare data sharing9
A comprehensive survey of hardware-based security techniques from an architectural perspective9
Federated time persistency in intermittently powered IoT systems9
Multi-client functional encryption for set intersection with non-monotonic access structures in federated learning9
IRO: Integrity–Reliability enhanced Ring ORAM9
Certificateless public auditing scheme with sensitive information hiding for data sharing in cloud storage9
Packet-in request redirection: A load-balancing mechanism for minimizing control plane response time in SDNs9
Secure task-worker matching and privacy-preserving scheme for blockchain-based federated crowdsourcing9
SMCCA: A sharded multi-task collaborative consensus algorithm for unmanned vehicle networks9
Enabling memory access isolation in real-time cloud systems using Intel’s detection/regulation capabilities9
Bus-contention aware WCRT analysis for the 3-phase task model considering a work-conserving bus arbitration scheme9
SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks9
Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption9
FedPillarNet: Unifying personalized and global features for federated 3D LiDAR object detection9
Unishyper: A Rust-based unikernel enhancing reliability and efficiency of embedded systems9
Implications of architecture and implementation choices on timing analysis of automotive CAN networks9
Distrusting cores by separating computation from isolation9
ATTEST: Automating the review and update of assurance case arguments9
LB-CLBS: Lattice-based certificateless blind signature scheme for vehicle sensing within intelligent transportation8
Bridging TSN and 5G networks: Prototype design and evaluation for real-time embedded systems8
Editorial Board8
Performance and reliability optimization for high-density flash-based hybrid SSDs8
DTB+: An enhanced data management strategy for efficient RMW reduction in IMR drives8
IPDALight: Intensity- and phase duration-aware traffic signal control based on Reinforcement Learning8
DLLPM: Dual-layer location privacy matching in V2V energy trading8
Enhancing privacy in cyber–physical systems: An efficient blockchain-assisted data-sharing scheme with deniability8
Secure olympics games with technology: Intelligent border surveillance for the 2022 Beijing winter olympics8
Subtraction of Hyperledger Fabric: A blockchain-based lightweight storage mechanism for digital evidences8
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems8
MCED-H: An efficient scheduling policy for energy harvesting mixed-criticality real-time systems8
EBIAC: Efficient biometric identity-based access control for wireless body area networks8
FDAN: Fuzzy deep attention networks for driver behavior recognition8
Efficient persistent memory file systems using virtual superpages with multi-level allocator8
Error correction and erasure codes for robust network steganography8
Computing exact WCRT for typed DAG tasks on heterogeneous multi-core processors7
Feasibility of Deep Reinforcement Learning for the real-time attitude control of a satellite system7
Predictable and optimized single-path code for predicated processors7
Reachability analysis of Hybrid Rebeca models7
Prism: An efficient file mapping mechanism across multiple namespaces in mobile systems7
Analysis and optimization of communication delay in multi-subscriber environments of ROS 27
Untraceable blockchain-assisted authentication and key exchange in medical consortiums7
Toward Linux-based safety-critical systems—Execution time variability analysis of Linux system calls7
An exact comparison of global, partitioned, and semi-partitioned fixed-priority real-time multiprocessor schedulers7
A server-aided secure interval test and comparison protocol with OPRF7
Low-energy scheduling of imprecise mixed-criticality systems with standby-sparing7
A Survey of Edge Caching Security: Framework, Methods, and Challenges7
HiEval: A scheduling performance estimation approach for spatial accelerators via hierarchical abstraction7
0.44358992576599