Journal of Systems Architecture

Papers
(The TQCC of Journal of Systems Architecture is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
GTA: Generating high-performance tensorized program with dual-task scheduling173
LE-GEMM: A lightweight emulation-based GEMM with precision refinement on GPU156
Real-time scheduling for multi-object tracking tasks in regions with different criticalities147
ProckStore: An NDP-empowered key-value store with asynchronous and multi-threaded compaction scheme for optimized performance127
JORA: Blockchain-based efficient joint computing offloading and resource allocation for edge video streaming systems102
SmartDeCoup: Decoupling the STT-RAM LLC for even write distribution and lifetime improvement100
Privacy-preserving multidimensional data aggregation for diverse electricity data users91
Cache eviction for SSD-HDD hybrid storage based on sequential packing82
A dual-index Boolean retrieval scheme with dynamic and revocable attribute-based policies82
A survey on techniques for improving Phase Change Memory (PCM) lifetime73
A global-energy-aware virtual machine placement strategy for cloud data centers62
Efficiency analysis of artificial vs. Spiking Neural Networks on FPGAs61
A privacy-preserving resource trading scheme for Cloud Manufacturing with edge-PLCs in IIoT59
Joint task offloading and resource optimization in NOMA-based vehicular edge computing: A game-theoretic DRL approach59
SHREG: Mitigating register redundancy in GPUs58
The MicroRV32 framework: An accessible and configurable open source RISC-V cross-level platform for education and research57
DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN54
Hydra: Hybrid-model federated learning for human activity recognition on heterogeneous devices52
A lattice-based designated-server public-key authenticated encryption with keyword search52
Balancing memory-accessing and computing over sparse DNN accelerator via efficient data packaging51
Algorithm/architecture solutions to improve beyond uniform quantization in embedded DNN accelerators51
G-NMP: Accelerating Graph Neural Networks with DIMM-based Near-Memory Processing50
Editorial Board50
An identity-based proxy re-encryption for data deduplication in cloud50
A qualitative cybersecurity analysis of time-triggered communication networks in automotive systems50
Guest editorial: Special issue on design architecture and applications of smart embedded devices in internet of things47
Editorial Board47
Crown-scheduling of sets of parallelizable tasks for robustness and energy-elasticity on many-core systems with discrete dynamic voltage and frequency scaling47
Towards highly-concurrent leaderless state machine replication for distributed systems46
A genetic simulation strategy: Application to single-fault analysis of TTEthernet synchronization protocol46
Utility-driven renewable energy sharing systems for community microgrid46
Editorial Board46
CoDiscard: A revenue model based cross-layer cooperative discarding mechanism for flash memory devices43
Editorial Board43
Improved analysis and optimal priority assignment for communicating threads on uni-processor41
Editorial Board40
Guest editorial: Special issue on the 2020 IEEE symposium on real-time distributed computing (ISORC)40
Editorial Board39
Root cause analysis of soft-error-induced failures from hardware and software perspectives37
Online scheduling algorithms for unbiased distributed learning over wireless edge networks36
Editorial Board34
Editorial Board33
HashC: Making deep learning coverage testing finer and faster33
Guest editorial: Special issue on frontiers in cyber security32
Editorial Board32
Electric vehicle charging network security: A survey31
VelogCPS: A safe blockchain network for cyber–physical systems leveraging block verifiers31
A case study for risk assessment in AR-equipped socio-technical systems31
MPR-QUIC: Multi-path partially reliable transmission for priority and deadline-aware video streaming31
A survey and experimental analysis of checkpointing techniques for energy harvesting devices30
DBDAA: Dual blockchain and decentralized identifiers assisted anonymous authentication for building IoT30
Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things30
CFIO: A conflict-free I/O mechanism to fully exploit internal parallelism for Open-Channel SSDs30
Efficient CUDA stream management for multi-DNN real-time inference on embedded GPUs29
Securing IIoT communications using OPC UA PubSub and Trusted Platform Modules29
Secure Routing Framework for Mitigating Time-Delay Trojan Attack in System-on-Chip28
Blockchain-enabled one-to-many searchable encryption supporting designated server and multi-keywords for Cloud-IoMT27
On-the-fly bisimulation equivalence checking for fresh-register automata27
Active and passive virtual machine introspection on AMD and ARM processors27
Flash controller-based secure execution environment for protecting code confidentiality26
LAG-based schedulability analysis for preemptive global EDF scheduling with dynamic cache allocation26
Real-time intelligent on-device monitoring of heart rate variability with PPG sensors25
Backdoor-resistant certificateless-based message-locked integrity auditing for computing power network25
CURATING: A multi-objective based pruning technique for CNNs25
Reliability-aware scheduling for (m,25
Online cycle detection for models with mode-dependent input and output dependencies24
Implementing synchronous reactive components upon multiprocessor platforms24
A secure index resisting keyword privacy leakage from access and search patterns in searchable encryption24
A cross-layer fault propagation analysis method for edge intelligence systems deployed with DNNs24
Hybrid short-term traffic forecasting architecture and mechanisms for reservation-based Cooperative ITS24
An Analyzable Inter-core Communication Framework for High-Performance Multicore Embedded Systems23
Dynamic resource allocation for jointing vehicle-edge deep neural network inference23
Interactive and targeted runtime verification using a debugger-based architecture23
S-CNN-ESystem: An end-to-end embedded CNN inference system with low hardware cost and hardware-software time-balancing22
A two-layer optimal scheduling framework for energy savings in a data center for Cyber–Physical–Social Systems22
Towards Linux based safety systems—A statistical approach for software execution path coverage22
ML-driven classification scheme for dynamic interference-aware resource scheduling in cloud infrastructures22
RoBMEX: ROS-based modelling framework for end-users and experts21
A generic framework to integrate data caches in the WCET analysis of real-time systems21
MTS-LSTDM: Multi-Time-Scale Long Short-Term Double Memory for power load forecasting21
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters21
A survey of accelerator architectures for 3D convolution neural networks21
Hardware-aware liquid state machine generation for 2D/3D Network-on-Chip platforms21
Cooperative task assignment in spatial crowdsourcing via multi-agent deep reinforcement learning20
HEA-PAS: A hybrid energy allocation strategy for parallel applications scheduling on heterogeneous computing systems20
Symbolic identification of shared memory based bank conflicts for GPUs20
Guest Editorial: Special issue on parallel, distributed, and network-based processing in next-generation embedded systems20
TS-ABOS-CMS: time-bounded secure attribute-based online/offline signature with constant message size for IoT systems20
Coded worn block mechanism to reduce garbage collection in SSD20
Achieving low write latency through new stealth program operation supporting early write completion in NAND flash memory19
The BH-mixed scheduling algorithm for DAG tasks with constrained deadlines19
Enabling PIM-based AES encryption for online video streaming19
Lifetime improvement through adaptive reconfiguration for nonvolatile FPGAs19
SSBAS-FA: A secure sealed-bid e-auction scheme with fair arbitration based on time-released blockchain19
IDERES: Intrusion detection and response system using machine learning and attack graphs19
Lightweight ID-based broadcast signcryption for cloud–fog-assisted IoT18
Non-interactive set intersection for privacy-preserving contact tracing18
Translating a large subset of stateflow to hybrid CSP with code optimization18
Verifying the safety properties of distributed systems via mergeable parallelism18
Energy efficient mixed task handling on real-time embedded systems using FreeRTOS18
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT18
Loop interchange and tiling for multi-dimensional loops to minimize write operations on NVMs18
Compositional verification of embedded real-time systems17
Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system17
FSbrain: An intelligent I/O performance tuning system17
CrowdLoc: Robust image indoor localization with edge-assisted crowdsensing17
A unified proof technique for verifying program correctness with big-step semantics17
An Efficient Certificateless Ring Signcryption Scheme With Conditional Privacy-Preserving in VANETs17
Blockchain-based decentralized data dissemination scheme in smart transportation17
DReP: Deep ReLU pruning for fast private inference16
Siamese Transformer Network: Building an autonomous real-time target tracking system for UAV16
BIDS: An efficient Intrusion Detection System for in-vehicle networks using a two-stage Binarised Neural Network on low-cost FPGA16
Efficient and accurate identification of missing tags for large-scale dynamic RFID systems16
CREW: Computation reuse and efficient weight storage for hardware-accelerated MLPs and RNNs16
PASM: Parallelism Aware Space Management strategy for hybrid SSD towards in-storage DNN training acceleration16
Certificateless integrity auditing scheme for sensitive information protection in cloud storage16
Editorial Board15
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems15
SEDCPT: A secure and efficient Dynamic Searchable Encryption scheme with cluster padding assisted by TEE15
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks15
TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning15
Improving Efficiency and Lifetime of Logic-in-Memory by Combining IMPLY and MAGIC Families15
Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber–physical systems15
A systematic analysis of power saving techniques for wireless network-on-chip architectures15
A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance15
RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage15
MCPAP: A MSIS-based conditional privacy-preserving authentication protocol for smart grids15
Cold start latency mitigation mechanisms in serverless computing: Taxonomy, review, and future directions14
Litmus-RT plugins for global static scheduling of mixed criticality systems14
Low-latency service function chain migration in edge-core networks based on open Jackson networks14
Ability-aware knowledge distillation for resource-constrained embedded devices14
BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations14
Tracking and analysing social interactions in dairy cattle with real-time locating system and machine learning14
LPPA-RCM: A lightweight privacy-preserving authentication scheme for road condition monitoring in fog-based VANETs14
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT14
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges13
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives13
Middleware for the Internet of Things: A survey on requirements, enabling technologies, and solutions13
Enabling blockchain-assisted certificateless public integrity checking for industrial cloud storage systems13
Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment13
Machine learning-based computation offloading in multi-access edge computing: A survey12
PUA-KE: Practical User Authentication with Key Establishment and its Application in Implantable Medical Devices12
IPCAS: An improved conditional privacy-preserving certificateless aggregate signature scheme without bilinear pairing for VANETs12
Optimizing the performance of in-memory file system by thread scheduling and file migration under NUMA multiprocessor systems12
ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor12
ClarifyNet: A high-pass and low-pass filtering based CNN for single image dehazing12
An effective and verifiable secure aggregation scheme with privacy-preserving for federated learning12
Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support12
IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework12
An efficient secure data transmission and node authentication scheme for wireless sensing networks12
LicenseNet: Proactively safeguarding intellectual property of AI models through model license12
Teegraph: A Blockchain consensus algorithm based on TEE and DAG for data sharing in IoT12
DMSE: Dynamic Multi-keyword Search Encryption based on inverted index11
Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing11
Decentralized and expressive data publish-subscribe scheme in cloud based on attribute-based keyword search11
Efficient hybrid polling for ultra-low latency storage devices11
Editorial Board11
A Multi-hashing Index for hybrid DRAM-NVM memory systems11
Stateless forward-secure key-insulated linkable ring signature scheme in ID-based setting11
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system11
In-circuit tuning of deep learning designs11
A cross-platform OpenVX library for FPGA accelerators11
Dynamic task allocation and scheduling with contention-awareness for Network-on-Chip based multicore systems11
An SGX-based online voting protocol with maximum voter privacy11
Lightweight asynchronous scheduling in heterogeneous reconfigurable systems11
A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing11
An efficient GPU-accelerated inference engine for binary neural network on mobile phones11
Graph reductions and partitioning heuristics for multicore DAG scheduling11
A memory footprint optimization framework for Python applications targeting edge devices10
Editorial Board10
MOHAQ: Multi-Objective Hardware-Aware Quantization of recurrent neural networks10
SimplMM: A simplified and abstract multicore h10
PED: Probabilistic Energy-efficient Deadline-aware scheduler for heterogeneous SoCs10
Towards functional safety compliance of matrix–matrix multiplication for machine learning-based autonomous systems10
Editorial Board10
rShare: Alleviating long startup on the Cloud-rendering platform through de-systemization10
Multi-objective uplink data transmission optimization for edge computing in UAV-assistant mobile wireless sensor networks10
Optimum: Runtime optimization for multiple mixed model deployment deep learning inference10
Reducing tail latency with coding-based packet spraying in edge datacenters10
An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage10
A perspective on 6G: Requirement, technology, enablers, challenges and future road map10
AnoPas: Practical anonymous transit pass from group signatures with time-bound keys10
Editorial Board10
Editorial Board10
Editorial Board10
A redesigned secure and efficient data transaction protocol for mobile payment system10
VPSS: A DAG scheduling heuristic with improved response time bound10
An efficient real-time accelerator for high-accuracy DNN-based optical flow estimation in FPGA10
MobileRE: A replicas prioritized hybrid fault tolerance strategy for mobile distributed system10
Editorial Board10
Special issue on advances in reliable software technologies (AdaEurope20)10
Shift-and-Safe: Addressing permanent faults in aggressively undervolted CNN accelerators9
BBS: A secure and autonomous blockchain-based big-data sharing system9
Automated level-based clustering of dataflow actors for controlled scheduling complexity9
Optimization of block-scaled integer GeMMs for efficient DNN deployment on scalable in-order vector processors9
Using MAST for modeling and response-time analysis of real-time applications with GPUs9
Extensibility-aware Fog Computing Platform configuration for mixed-criticality applications9
The rCOS framework for multi-dimensional separation of concerns in model-driven engineering9
Rahasak—Scalable blockchain architecture for enterprise applications9
A convolutional autoencoder architecture for robust network intrusion detection in embedded systems9
DUDS: Diversity-aware unbiased device selection for federated learning on Non-IID and unbalanced data9
Sensor attack detection based on active excitation response with uncertain delays9
Computation of tight bounds for the worst-case end-to-end delay on Avionics Full-Duplex Switched Ethernet9
X-Stream: Accelerating streaming segments on MPSoCs for real-time applications9
Energy-aware scheduling for dependent tasks in heterogeneous multiprocessor systems9
Accelerating DNNs from local to virtualized FPGA in the Cloud: A survey of trends9
SymEx-VP: An open source virtual prototype for OS-agnostic concolic testing of IoT firmware9
SAR: Sharpness-Aware minimization for enhancing DNNs’ Robustness against bit-flip errors9
CoAxNN: Optimizing on-device deep learning with conditional approximate neural networks9
Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system9
On the degree of parallelism for parallel real-time tasks9
Comparing timed-division multiplexing and best-effort networks-on-chip9
Distributed differentially-private learning with communication efficiency9
Fast-convergent federated learning with class-weighted aggregation9
0.096747875213623