Journal of Systems Architecture

Papers
(The TQCC of Journal of Systems Architecture is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning114
A Survey on Deep Transfer Learning to Edge Computing for Mitigating the COVID-19 Pandemic110
A survey on machine learning-based malware detection in executable files107
A Survey on Task Offloading in Multi-access Edge Computing104
A survey on data center cooling systems: Technology, power consumption modeling and control strategy optimization91
A survey of deep learning techniques for vehicle detection from UAV images71
Blockchain-based batch authentication protocol for Internet of Vehicles70
Time-Sensitive Networking in automotive embedded systems: State of the art and research opportunities69
Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review65
Cooperative computation offloading and resource allocation for delay minimization in mobile edge computing65
A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance62
A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing60
A survey and taxonomy on energy management schemes in wireless sensor networks60
Task allocation algorithm and optimization model on edge collaboration58
A survey on security and authentication in wireless body area networks58
A survey on intrusion detection and prevention in wireless ad-hoc networks55
LAKAF: Lightweight authentication and key agreement framework for smart grid network55
Certificateless authenticated key agreement for blockchain-based WBANs49
Energy-aware scheduling for dependent tasks in heterogeneous multiprocessor systems49
Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability46
Accelerating CNN Inference on ASICs: A Survey46
Attacking vision-based perception in end-to-end autonomous driving models46
A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography45
PHDFS: Optimizing I/O performance of HDFS in deep learning cloud computing platform45
Edge-based auditing method for data security in resource-constrained Internet of Things44
RISC-V based virtual prototype: An extensible and configurable platform for the system-level43
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain43
Design optimization of confidentiality-critical cyber physical systems with fault detection43
A semi-autonomous distributed blockchain-based framework for UAVs system40
Wireless edge caching based on content similarity in dynamic environments40
Makespan-minimization workflow scheduling for complex networks with social groups in edge computing39
A global-energy-aware virtual machine placement strategy for cloud data centers39
Rahasak—Scalable blockchain architecture for enterprise applications39
IoTSim-Osmosis: A framework for modeling and simulating IoT applications over an edge-cloud continuum39
Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment39
An Efficient Privacy-preserving Authentication Model based on blockchain for VANETs38
A priority, power and traffic-aware virtual machine placement of IoT applications in cloud data centers37
IntMA: Dynamic Interaction-aware resource allocation for containerized microservices in cloud environments36
An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments35
Optimized co-scheduling of mixed-precision neural network accelerator for real-time multitasking applications35
Middleware for the Internet of Things: A survey on requirements, enabling technologies, and solutions35
Software-defined vehicular network (SDVN): A survey on architecture and routing35
On blockchain integration into mobile crowdsensing via smart embedded devices: A comprehensive survey33
Cost and makespan scheduling of workflows in clouds using list multiobjective optimization technique33
A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems33
MEALPY: An open-source library for latest meta-heuristic algorithms in Python33
A survey of SRAM-based in-memory computing techniques and applications32
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives31
Contention-aware optimal scheduling of real-time precedence-constrained task graphs on heterogeneous distributed systems31
Task scheduling with precedence and placement constraints for resource utilization improvement in multi-user MEC environment30
MMDA: Multidimensional and multidirectional data aggregation for edge computing-enhanced IoT30
SparkNoC: An energy-efficiency FPGA-based accelerator using optimized lightweight CNN for edge computing30
A survey of accelerator architectures for 3D convolution neural networks30
Using Xen and KVM as real-time hypervisors29
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems29
An efficient signcryption of heterogeneous systems for Internet of Vehicles28
Tracking and analysing social interactions in dairy cattle with real-time locating system and machine learning28
Towards dynamic safety assurance for Industry 4.027
TOPSIS inspired Budget and Deadline Aware Multi-Workflow Scheduling for Cloud computing27
A smart cyber physical multi-source energy system for an electric vehicle prototype27
Real-Time scheduling and analysis of parallel tasks on heterogeneous multi-cores27
A perspective on 6G: Requirement, technology, enablers, challenges and future road map27
A review of 6G autonomous intelligent transportation systems: Mechanisms, applications and challenges26
A survey and taxonomy of consensus protocols for blockchains26
Online user allocation in mobile edge computing environments:A decentralized reactive approach26
Blockchain-assisted searchable attribute-based encryption for e-health systems26
Developing graphical detection techniques for maintaining state estimation integrity against false data injection attack in integrated electric cyber-physical system25
A survey On hardware accelerators and optimization techniques for RNNs25
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks25
A novel frame preemption model in TSN networks24
Towards holistic secure networking in connected vehicles through securing CAN-bus communication and firmware-over-the-air updating24
Security analysis of Pan et al.’s “Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability”24
EVFL: An explainable vertical federated learning for data-oriented Artificial Intelligence systems24
Smart contract-based security architecture for collaborative services in municipal smart cities24
Bus network assisted drone scheduling for sustainable charging of wireless rechargeable sensor network23
Pairing-free certificateless authenticated encryption with keyword search23
A survey on vision-based driver distraction analysis23
Jellyfish dynamic routing protocol with mobile sink for location privacy and congestion avoidance in wireless sensor networks23
Benchmarking vision kernels and neural network inference accelerators on embedded platforms22
Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks22
Privacy-preserving incentive mechanism for multi-leader multi-follower IoT-edge computing market: A reinforcement learning approach22
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives22
VPAMS: Verifiable and practical attribute-based multi-keyword search over encrypted cloud data22
Storage as a service in Fog computing : A systematic review21
Fast-convergent federated learning with class-weighted aggregation21
Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support21
A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT21
Certificateless public key encryption with cryptographic reverse firewalls21
SEAMERS: A Semi-partitioned Energy-Aware scheduler for heterogeneous MulticorE Real-time Systems21
Optimizing deep neural networks on intelligent edge accelerators via flexible-rate filter pruning20
ADHD fMRI short-time analysis method for edge computing based on multi-instance learning20
URMILA: Dynamically trading-off fog and edge resources for performance and mobility-aware IoT services20
An Efficient Certificateless Ring Signcryption Scheme With Conditional Privacy-Preserving in VANETs20
Real-time scheduling of parallel tasks with tight deadlines20
Computation-transferable authenticated key agreement protocol for smart healthcare19
Multi-range bidirectional mask graph convolution based GRU networks for traffic prediction19
Safe and secure platooning of Automated Guided Vehicles in Industry 4.019
TS-ABOS-CMS: time-bounded secure attribute-based online/offline signature with constant message size for IoT systems19
IPDALight: Intensity- and phase duration-aware traffic signal control based on Reinforcement Learning19
IoT Device security through dynamic hardware isolation with cloud-Based update19
Enhancing Internet of Things Security using Software-Defined Networking19
An open source framework based on Kafka-ML for Distributed DNN inference over the Cloud-to-Things continuum19
A Hidden Markov Model based smartphone heterogeneity resilient portable indoor localization framework19
A multi-model based microservices identification approach18
An interoperable and flat Industrial Internet of Things architecture for low latency data collection in manufacturing systems18
AucSwap: A Vickrey auction modeled decentralized cross-blockchain asset transfer protocol18
SimEdgeIntel: A open-source simulation platform for resource management in edge intelligence18
Light-weight AI and IoT collaboration for surveillance video pre-processing18
A survey on FANET routing from a cross-layer design perspective17
A federated deep learning framework for privacy preservation and communication efficiency17
A survey and taxonomy of congestion control mechanisms in wireless network on chip17
Worst-case traversal time analysis of TSN with multi-level preemption17
Guiding assurance of architectural design patterns for critical applications17
JORA: Blockchain-based efficient joint computing offloading and resource allocation for edge video streaming systems17
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes17
An identity-based proxy re-encryption for data deduplication in cloud17
Joint task offloading and resource optimization in NOMA-based vehicular edge computing: A game-theoretic DRL approach17
A survey on hardware security of DNN models and accelerators16
BZIP: A compact data memory system for UTXO-based blockchains16
Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography16
Efficient location privacy-preserving range query scheme for vehicle sensing systems16
Distributed task allocation in Mobile Device Cloud exploiting federated learning and subjective logic16
A lightweight verifiable trust based data collection approach for sensor–cloud systems16
ClarifyNet: A high-pass and low-pass filtering based CNN for single image dehazing16
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters16
EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles15
A systematic analysis of power saving techniques for wireless network-on-chip architectures15
Hybrid differential privacy based federated learning for Internet of Things15
DMSE: Dynamic Multi-keyword Search Encryption based on inverted index15
A survey of energy-aware scheduling in mixed-criticality systems15
ID-CEPPA: Identity-based Computationally Efficient Privacy-Preserving Authentication scheme for vehicle-to-vehicle communications15
IDERES: Intrusion detection and response system using machine learning and attack graphs15
Energy efficient EDF-VD-based mixed-criticality scheduling with shared resources15
Efficient stereo matching on embedded GPUs with zero-means cross correlation14
Secure content based image retrieval for mobile users with deep neural networks in the cloud14
Dynamic resource allocation for jointing vehicle-edge deep neural network inference14
Blockchain-based authentication for IIoT devices with PUF14
MBBNet: An edge IoT computing-based traffic light detection solution for autonomous bus14
GraphA: An efficient ReRAM-based architecture to accelerate large scale graph processing14
Domain-specific scenarios for refinement-based methods14
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system14
Distributed learning dynamics of Multi-Armed Bandits for edge intelligence13
FastHand: Fast monocular hand pose estimation on embedded systems13
Achieving safety and performance with reconfiguration protocol for ethernet TSN in automotive systems13
Palisade: A framework for anomaly detection in embedded systems13
Reconfigurable on-chip interconnection networks for high performance embedded SoC design13
Binary convolutional neural network acceleration framework for rapid system prototyping13
Optimal computational resource pricing in vehicular edge computing: A Stackelberg game approach13
CURATING: A multi-objective based pruning technique for CNNs13
A survey on silicon PUFs13
Intrusion detection based on improved density peak clustering for imbalanced data on sensor-cloud systems13
Teegraph: A Blockchain consensus algorithm based on TEE and DAG for data sharing in IoT13
TARTS: A Temperature-Aware Real-Time Deadline-Partitioned Fair Scheduler12
A flexible attribute based data access management scheme for sensor-cloud system12
Dynamic-weighted simplex strategy for learning enabled cyber physical systems12
Autoware_Perf: A tracing and performance analysis framework for ROS 2 applications12
A blockchain-based fine-grained data sharing scheme for e-healthcare system12
A survey of techniques for intermittent computing12
Memory-efficient deep learning inference with incremental weight loading and data layout reorganization on edge systems12
Dynamic task allocation and scheduling with contention-awareness for Network-on-Chip based multicore systems12
A privacy-preserving resource trading scheme for Cloud Manufacturing with edge-PLCs in IIoT12
DRL-GAT-SA: Deep reinforcement learning for autonomous driving planning based on graph attention networks and simplex architecture12
Anomaly detection in bitcoin information networks with multi-constrained meta path12
Efficient Reservation-based Fault-Tolerant Scheduling for IEEE 802.1Qbv Time-Sensitive Networking12
A genetic algorithm based energy efficient group paging approach for IoT over 5G12
Towards fault adaptive routing in metasurface controller networks12
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT12
ESSA: An energy-Aware bit-Serial streaming deep convolutional neural network accelerator12
HDA: Hierarchical and dependency-aware task mapping for network-on-chip based embedded systems12
Fault-Tolerant Application Mapping on Mesh-of-Tree based Network-on-Chip11
Energy-cognizant scheduling for preference-oriented fixed-priority real-time tasks11
SSD internal cache management policies: A survey11
SSBAS-FA: A secure sealed-bid e-auction scheme with fair arbitration based on time-released blockchain11
Task migration optimization for guaranteeing delay deadline with mobility consideration in mobile edge computing11
Build real-time communication for hybrid dual-OS system11
ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor11
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges11
Stackelberg game-based task offloading and pricing with computing capacity constraint in mobile edge computing11
A time-predictable open-source TTEthernet end-system11
Federated scheduling for Typed DAG tasks scheduling analysis on heterogeneous multi-cores11
How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation11
Cooperative task assignment in spatial crowdsourcing via multi-agent deep reinforcement learning11
DVFS-based energy-aware scheduling of imprecise mixed-criticality real-time tasks10
Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems10
On-demand deployment for IoT applications10
Hybrid short-term traffic forecasting architecture and mechanisms for reservation-based Cooperative ITS10
Democratic learning: hardware/software co-design for lightweight blockchain-secured on-device machine learning10
A QoS-guaranteed online user data deployment method in edge cloud computing environment10
Latency upper bound for data chains of real-time periodic tasks10
ML-driven classification scheme for dynamic interference-aware resource scheduling in cloud infrastructures10
Bridging the gap between formal verification and schedulability analysis: The case of robotics10
Edge based authentication protocol for vehicular communications without trusted party communication10
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking10
Efficient algorithms for task mapping on heterogeneous CPU/GPU platforms for fast completion time10
Formal modeling and verification of UML Activity Diagrams (UAD) with FoCaLiZe10
Energy efficient backup overloading schemes for fault tolerant scheduling of real-time tasks9
A comprehensive systematic review of integration of time sensitive networking and 5G communication9
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network9
A survey of techniques for optimizing transformer inference9
Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud9
Formalization of continuous Fourier transform in verifying applications for dependable cyber-physical systems9
MTS-LSTDM: Multi-Time-Scale Long Short-Term Double Memory for power load forecasting9
ICAS: Two-factor identity-concealed authentication scheme for remote-servers9
A faster outsourced medical image retrieval scheme with privacy preservation9
Optimized partitioning and priority assignment of real-time applications on heterogeneous platforms with hardware acceleration9
A survey and experimental analysis of checkpointing techniques for energy harvesting devices9
0.044784784317017