Journal of Systems Architecture

Papers
(The median citation count of Journal of Systems Architecture is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Editorial Board196
Guest Editorial: Special issue on parallel, distributed, and network-based processing in next-generation embedded systems195
Active and passive virtual machine introspection on AMD and ARM processors166
Lifetime improvement through adaptive reconfiguration for nonvolatile FPGAs113
The BH-mixed scheduling algorithm for DAG tasks with constrained deadlines109
Loop interchange and tiling for multi-dimensional loops to minimize write operations on NVMs88
Energy efficient mixed task handling on real-time embedded systems using FreeRTOS87
Blockchain-based decentralized data dissemination scheme in smart transportation79
Balancing I/O and wear-out distribution inside SSDs with optimized cache management69
IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework68
LAG-based schedulability analysis for preemptive global EDF scheduling with dynamic cache allocation68
BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations67
A genetic simulation strategy: Application to single-fault analysis of TTEthernet synchronization protocol67
A survey and experimental analysis of checkpointing techniques for energy harvesting devices60
Electric vehicle charging network security: A survey60
CREW: Computation reuse and efficient weight storage for hardware-accelerated MLPs and RNNs58
DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN58
SHREG: Mitigating register redundancy in GPUs57
The MicroRV32 framework: An accessible and configurable open source RISC-V cross-level platform for education and research55
Efficient CUDA stream management for multi-DNN real-time inference on embedded GPUs54
HEA-PAS: A hybrid energy allocation strategy for parallel applications scheduling on heterogeneous computing systems54
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives53
Efficient maximum reaction time analysis for data chains of real-time tasks in multiprocessor systems50
Machine learning-based computation offloading in multi-access edge computing: A survey50
Editorial Board49
PMSort: An adaptive sorting engine for persistent memory45
DAC: A dynamic active and collaborative cache management scheme for solid state disks44
CoAxNN: Optimizing on-device deep learning with conditional approximate neural networks41
Joint optimization of layering and power allocation for scalable VR video in 6G networks based on Deep Reinforcement Learning38
A Multi-hashing Index for hybrid DRAM-NVM memory systems37
Editorial Board37
Special issue on advances in reliable software technologies (AdaEurope20)37
Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme36
IPCAS: An improved conditional privacy-preserving certificateless aggregate signature scheme without bilinear pairing for VANETs36
Component-based architectural regression test selection for modularized software systems36
Contention-aware workflow scheduling on heterogeneous computing systems with shared buses35
Computation-transferable authenticated key agreement protocol for smart healthcare34
Optimized partitioning and priority assignment of real-time applications on heterogeneous platforms with hardware acceleration34
Safe and secure platooning of Automated Guided Vehicles in Industry 4.034
CoqMatrix: Formal matrix library with multiple models in Coq33
An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT33
Process variation aware DRAM-Cache resizing32
Hardware accelerator for an accurate local stereo matching algorithm using binary neural network32
Preference-oriented partitioning for multiprocessor real-time systems32
PADP-FedMeta: A personalized and adaptive differentially private federated meta learning mechanism for AIoT31
Special issue on Reliable Software Technologies (AEiC2021)31
A lightweight verifiable trust based data collection approach for sensor–cloud systems31
Improving live migration efficiency in QEMU: An eBPF-based paravirtualized approach31
Energy-efficient scheduling of imprecise mixed-criticality real-time tasks based on genetic algorithm30
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage30
Towards a real-time IoT: Approaches for incoming packet processing in cyber–physical systems30
Energy-efficient scheduling for parallel applications with reliability and time constraints on heterogeneous distributed systems29
Editorial Board29
Editorial Board29
Parametric WCET as a function of procedure arguments: Analysis and applications29
Editorial Board29
Editorial Board29
Editorial Board29
VCSA: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption28
A public key encryption scheme based on a new variant of LWE with small cipher size28
Subversion resistant identity-based signature28
Complex event models for automotive embedded systems28
Fine-grained parallelism framework with predictable work-stealing for real-time multiprocessor systems28
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation27
REALISM: Reliability-aware energy management in multi-level mixed-criticality systems with service level degradation26
EDF-based Energy-Efficient Probabilistic Imprecise Mixed-Criticality Scheduling26
Secure pairing-free certificateless aggregate signcryption scheme for IoT25
PEPA: Paillier cryptosystem-based efficient privacy-preserving authentication scheme for VANETs25
A generalized approach to real-time, non-intrusive instrumentation and monitoring of standards-based distributed middleware25
Cloud security in the age of adaptive adversaries: A game theoretic approach to hypervisor-based intrusion detection25
PatternS: An intelligent hybrid memory scheduler driven by page pattern recognition25
On the methodology of three-way structured merge in version control systems: Top-down, bottom-up, or both25
Hardware-software co-exploration with racetrack memory based in-memory computing for CNN inference in embedded systems25
Network traffic classification based on federated semi-supervised learning25
Energy-efficient acceleration of convolutional neural networks using computation reuse24
BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles24
Hybrid differential privacy based federated learning for Internet of Things24
Pflow: An end-to-end heterogeneous acceleration framework for CNN inference on FPGAs24
Gradient descent algorithm for the optimization of fixed priorities in real-time systems23
Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems23
A comprehensive survey of digital twins: Applications, technologies and security challenges22
Editorial Board22
Structured precision skipping: Accelerating convolutional neural networks with budget-aware dynamic precision selection22
NLTSP: A cost model for tensor program tuning using nested loop trees22
Towards transferable adversarial attacks on vision transformers for image classification21
TCADer: A Tightly Coupled Accelerator Design framework for heterogeneous system with hardware/software co-design21
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking21
A cache-aware DAG scheduling method on multicores: Exploiting node affinity and deferred executions21
SAMFL: Secure Aggregation Mechanism for Federated Learning with Byzantine-robustness by functional encryption21
Dynamic computation scheduling for hybrid energy mobile edge computing networks21
Reformulating the direct convolution for high-performance deep learning inference on ARM processors20
MPTO-MT: A multi-period vehicular task offloading method in 5G HetNets20
Input/mapping precision controllable digital CIM with adaptive adder tree architecture for flexible DNN inference20
Data clustering on hybrid classical-quantum NISQ architecture with generative-based variational and parallel algorithms20
Gated-CNN: Combating NBTI and HCI aging effects in on-chip activation memories of Convolutional Neural Network accelerators20
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio20
Process scenario discovery from event logs based on activity and timing information20
A QoS-guaranteed online user data deployment method in edge cloud computing environment20
DiVIT: Algorithm and architecture co-design of differential attention in vision transformer19
Thermal-aware adaptive VM allocation considering server locations in heterogeneous data centers19
Cooperative computation offloading and resource allocation for delay minimization in mobile edge computing19
Blockchain-based privacy-preserving public key searchable encryption with strong traceability19
Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things19
Editorial Board18
Robust communication-efficient decentralized learning with heterogeneity18
HB-ReTriple: Mobile rendering optimization based on efficient history reusing18
EXPPO: EXecution Performance Profiling and Optimization for CPS Co-simulation-as-a-Service18
The price of schedulability in cyclic workloads: The history-vs.-response-time-vs.-accuracy trade-off18
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth18
Secure fuzzy identity-based public verification for cloud storage18
Conflict-aware compiler for hierarchical register file on GPUs18
EVFL: An explainable vertical federated learning for data-oriented Artificial Intelligence systems18
Provably secure public key encryption with keyword search for data outsourcing in cloud environments18
Blockchain-based authentication for IIoT devices with PUF18
Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review17
Evaluating single event upsets in deep neural networks for semantic segmentation: An embedded system perspective17
ZNS-Cleaner: Enhancing lifespan by reducing empty erase in ZNS SSDs17
GraphA: An efficient ReRAM-based architecture to accelerate large scale graph processing17
Efficient stereo matching on embedded GPUs with zero-means cross correlation17
Secure and privacy-preserving quantum authentication scheme using blockchain identifiers in metaverse environment17
Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing17
Blockchain-based auditing with data self-repair: From centralized system to distributed storage17
Towards correctness proof for hybrid Simulink block diagrams16
Lyapunov optimized energy-efficient dynamic offloading with queue length constraints16
Optimizing encoding and repair for wide-stripe minimum bandwidth regenerating codes in in-memory key-value stores16
Achieving low write latency through new stealth program operation supporting early write completion in NAND flash memory15
Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing15
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT15
An Analyzable Inter-core Communication Framework for High-Performance Multicore Embedded Systems15
Mobile Crowdsensing Model: A survey15
Symbolic identification of shared memory based bank conflicts for GPUs15
A lattice-based designated-server public-key authenticated encryption with keyword search15
A survey on FANET routing from a cross-layer design perspective15
SmartDeCoup: Decoupling the STT-RAM LLC for even write distribution and lifetime improvement14
RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage14
A dual-index Boolean retrieval scheme with dynamic and revocable attribute-based policies14
A qualitative cybersecurity analysis of time-triggered communication networks in automotive systems14
Dynamic resource allocation for jointing vehicle-edge deep neural network inference14
A survey on techniques for improving Phase Change Memory (PCM) lifetime14
MTS-LSTDM: Multi-Time-Scale Long Short-Term Double Memory for power load forecasting14
Enabling PIM-based AES encryption for online video streaming14
Low-latency service function chain migration in edge-core networks based on open Jackson networks14
BIDS: An efficient Intrusion Detection System for in-vehicle networks using a two-stage Binarised Neural Network on low-cost FPGA14
MADDPG-based task offloading and resource pricing in edge collaboration environment14
Litmus-RT plugins for global static scheduling of mixed criticality systems14
Non-interactive set intersection for privacy-preserving contact tracing13
GTA: Generating high-performance tensorized program with dual-task scheduling13
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems13
Corrigendum to ‘Fine-Grained Parallelism Framework with Predictable Work-Stealing for Real-Time Multiprocessor Systems’ Journal of Systems Architecture Vol. 124, March 2022, Article Number 10239313
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges13
CFIO: A conflict-free I/O mechanism to fully exploit internal parallelism for Open-Channel SSDs13
Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things13
A survey on routing algorithm and router microarchitecture of three-dimensional Network-on-Chip13
μScope: Evaluating storage stack robustness against SSD’s latency va13
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT13
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks13
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters13
Editorial Board13
Optimum: Runtime optimization for multiple mixed model deployment deep learning inference13
Fast post-quantum private set intersection from oblivious pseudorandom function for mobile social networks12
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system12
BDACD: Blockchain-based decentralized auditing supporting ciphertext deduplication12
The rCOS framework for multi-dimensional separation of concerns in model-driven engineering12
Resource-aware Montgomery modular multiplication optimization for digital signal processing12
Communication compression techniques in distributed deep learning: A survey12
A convolutional autoencoder architecture for robust network intrusion detection in embedded systems12
Lightweight asynchronous scheduling in heterogeneous reconfigurable systems12
Towards efficient and robust intelligent mobile vision system via small object aware parallel offloading12
Reducing Errors and Powers in LPDDR for DNN Inference: A Compression and IECC-Based Approach12
A memory footprint optimization framework for Python applications targeting edge devices12
A redesigned secure and efficient data transaction protocol for mobile payment system12
A hybrid controller for safe and efficient longitudinal collision avoidance control12
Computation of tight bounds for the worst-case end-to-end delay on Avionics Full-Duplex Switched Ethernet12
A quantitative blind area risks assessment method for safe driving assistance11
A survey and taxonomy of consensus protocols for blockchains11
Fast-convergent federated learning with class-weighted aggregation11
Federated time persistency in intermittently powered IoT systems11
Online energy-efficient scheduling of DAG tasks on heterogeneous embedded platforms11
QBLKe: Host-side flash translation layer management for Open-Channel SSDs11
Comparing timed-division multiplexing and best-effort networks-on-chip11
ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor11
A survey on privacy preservation techniques for blockchain interoperability11
Enabling memory access isolation in real-time cloud systems using Intel’s detection/regulation capabilities11
IRO: Integrity–Reliability enhanced Ring ORAM11
An energy-efficient near-data processing accelerator for DNNs to optimize memory accesses11
Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer11
Optimal computational resource pricing in vehicular edge computing: A Stackelberg game approach11
Multi-objective uplink data transmission optimization for edge computing in UAV-assistant mobile wireless sensor networks11
Improving the robustness of industrial Cyber–Physical Systems through machine learning-based performance anomaly identification11
Editorial Board11
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network11
A framework for static analysis and verification of low-level RTOS code10
Certificateless public auditing scheme with sensitive information hiding for data sharing in cloud storage10
Attribute-based searchable encryption with decentralized key management for healthcare data sharing10
Packet-in request redirection: A load-balancing mechanism for minimizing control plane response time in SDNs10
IEmu: Interrupt modeling from the logic hidden in the firmware10
Implications of architecture and implementation choices on timing analysis of automotive CAN networks10
SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks10
Formal domain-driven system development in Event-B: Application to interactive critical systems10
Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage10
Migration-aware slot-based memory request scheduler to guarantee QoS in DRAM-PCM hybrid memories10
ATTEST: Automating the review and update of assurance case arguments10
TaintGuard: Preventing implicit privilege leakage in smart contract based on taint tracking at abstract syntax tree level10
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control10
An online dynamic pricing framework for resource allocation in edge computing10
Unishyper: A Rust-based unikernel enhancing reliability and efficiency of embedded systems10
EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles10
An efficient bandwidth-adaptive gradient compression algorithm for distributed training of deep neural networks10
Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption10
Distrusting cores by separating computation from isolation10
Editorial Board10
A federated deep learning framework for privacy preservation and communication efficiency10
BANSIM: A new discrete-event simulator for wireless body area networks with deep reinforcement learning in Python10
Maximising mobile user experience through self-adaptive content- and ambient-aware display brightness scaling10
Achieving safety and performance with reconfiguration protocol for ethernet TSN in automotive systems10
Bus-contention aware WCRT analysis for the 3-phase task model considering a work-conserving bus arbitration scheme10
FastCache: A write-optimized edge storage system via concurrent merging cache for IoT applications9
FDAN: Fuzzy deep attention networks for driver behavior recognition9
Secure olympics games with technology: Intelligent border surveillance for the 2022 Beijing winter olympics9
Efficient persistent memory file systems using virtual superpages with multi-level allocator9
Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems9
TSSA: Task structure-aware scheduling of energy-constrained parallel applications on heterogeneous distributed embedded platforms9
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems9
Enhancing privacy in cyber–physical systems: An efficient blockchain-assisted data-sharing scheme with deniability9
IPDALight: Intensity- and phase duration-aware traffic signal control based on Reinforcement Learning9
Forward and backward secure updatable ElGamal encryption scheme for cloud storage9
Editorial Board9
Bit-error-rate aware sensing-error correction interaction in spintronic MRAM9
Performance and reliability optimization for high-density flash-based hybrid SSDs9
EBIAC: Efficient biometric identity-based access control for wireless body area networks9
Subtraction of Hyperledger Fabric: A blockchain-based lightweight storage mechanism for digital evidences9
Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay9
Fair and size-scalable participant selection framework for large-scale mobile crowdsensing8
An open source framework based on Kafka-ML for Distributed DNN inference over the Cloud-to-Things continuum8
Error correction and erasure codes for robust network steganography8
E-Audit: Distinguishing and investigating suspicious events for APTs attack detection8
HiEval: A scheduling performance estimation approach for spatial accelerators via hierarchical abstraction8
A survey of SRAM-based in-memory computing techniques and applications8
Data-driven barrier certificate generation using deep learning and symbolic regression8
SOFIA: An automated framework for early soft error assessment, identification, and mitigation8
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain8
BeeFlow: Behavior tree-based Serverless workflow modeling and scheduling for resource-constrained edge clusters8
Computing exact WCRT for typed DAG tasks on heterogeneous multi-core processors8
UAV-assisted dependency-aware computation offloading in device–edge–cloud collaborative computing based on improved actor–critic DRL8
Edge-aided searchable data sharing scheme for IoV in the 5G environment8
Towards mutation testing of Reinforcement Learning systems8
Editorial Board8
A contract-based semantics and refinement for hybrid Simulink block diagrams8
A Survey of Edge Caching Security: Framework, Methods, and Challenges8
An SGX-based online voting protocol with maximum voter privacy7
0.059635877609253