Journal of Systems Architecture

Papers
(The TQCC of Journal of Systems Architecture is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-07-01 to 2025-07-01.)
ArticleCitations
Editorial Board189
Machine learning-based computation offloading in multi-access edge computing: A survey185
Guest Editorial: Special issue on parallel, distributed, and network-based processing in next-generation embedded systems154
HEA-PAS: A hybrid energy allocation strategy for parallel applications scheduling on heterogeneous computing systems109
Active and passive virtual machine introspection on AMD and ARM processors107
Lifetime improvement through adaptive reconfiguration for nonvolatile FPGAs86
The BH-mixed scheduling algorithm for DAG tasks with constrained deadlines85
Loop interchange and tiling for multi-dimensional loops to minimize write operations on NVMs75
Energy efficient mixed task handling on real-time embedded systems using FreeRTOS69
Blockchain-based decentralized data dissemination scheme in smart transportation65
Efficient CUDA stream management for multi-DNN real-time inference on embedded GPUs64
Electric vehicle charging network security: A survey64
LAG-based schedulability analysis for preemptive global EDF scheduling with dynamic cache allocation58
Balancing I/O and wear-out distribution inside SSDs with optimized cache management58
IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework57
BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations56
A genetic simulation strategy: Application to single-fault analysis of TTEthernet synchronization protocol56
A survey and experimental analysis of checkpointing techniques for energy harvesting devices54
CREW: Computation reuse and efficient weight storage for hardware-accelerated MLPs and RNNs53
DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN51
Editorial Board50
SHREG: Mitigating register redundancy in GPUs50
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives50
The MicroRV32 framework: An accessible and configurable open source RISC-V cross-level platform for education and research50
PMSort: An adaptive sorting engine for persistent memory45
Special issue on advances in reliable software technologies (AdaEurope20)44
Editorial Board43
CoAxNN: Optimizing on-device deep learning with conditional approximate neural networks38
A Multi-hashing Index for hybrid DRAM-NVM memory systems37
IPCAS: An improved conditional privacy-preserving certificateless aggregate signature scheme without bilinear pairing for VANETs36
Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme35
Component-based architectural regression test selection for modularized software systems35
DAC: A dynamic active and collaborative cache management scheme for solid state disks35
Safe and secure platooning of Automated Guided Vehicles in Industry 4.034
Computation-transferable authenticated key agreement protocol for smart healthcare34
Joint optimization of layering and power allocation for scalable VR video in 6G networks based on Deep Reinforcement Learning34
Optimized partitioning and priority assignment of real-time applications on heterogeneous platforms with hardware acceleration33
Energy-efficient scheduling of imprecise mixed-criticality real-time tasks based on genetic algorithm33
Energy-efficient scheduling for parallel applications with reliability and time constraints on heterogeneous distributed systems33
CoqMatrix: Formal matrix library with multiple models in Coq32
A lightweight verifiable trust based data collection approach for sensor–cloud systems32
An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT32
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage31
Special issue on Reliable Software Technologies (AEiC2021)30
Process variation aware DRAM-Cache resizing30
Hardware accelerator for an accurate local stereo matching algorithm using binary neural network30
Improving live migration efficiency in QEMU: An eBPF-based paravirtualized approach30
Preference-oriented partitioning for multiprocessor real-time systems30
PADP-FedMeta: A personalized and adaptive differentially private federated meta learning mechanism for AIoT29
Towards a real-time IoT: Approaches for incoming packet processing in cyber–physical systems29
Editorial Board28
Energy-efficient acceleration of convolutional neural networks using computation reuse28
Editorial Board28
Editorial Board28
On the methodology of three-way structured merge in version control systems: Top-down, bottom-up, or both27
Complex event models for automotive embedded systems27
Parametric WCET as a function of procedure arguments: Analysis and applications27
Gradient descent algorithm for the optimization of fixed priorities in real-time systems27
Editorial Board27
Editorial Board27
Subversion resistant identity-based signature26
Fine-grained parallelism framework with predictable work-stealing for real-time multiprocessor systems26
PatternS: An intelligent hybrid memory scheduler driven by page pattern recognition26
A public key encryption scheme based on a new variant of LWE with small cipher size26
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation25
VCSA: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption25
Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems25
PEPA: Paillier cryptosystem-based efficient privacy-preserving authentication scheme for VANETs25
Hardware-software co-exploration with racetrack memory based in-memory computing for CNN inference in embedded systems24
EDF-based Energy-Efficient Probabilistic Imprecise Mixed-Criticality Scheduling24
Cloud security in the age of adaptive adversaries: A game theoretic approach to hypervisor-based intrusion detection24
A generalized approach to real-time, non-intrusive instrumentation and monitoring of standards-based distributed middleware24
REALISM: Reliability-aware energy management in multi-level mixed-criticality systems with service level degradation23
A comprehensive survey of digital twins: Applications, technologies and security challenges23
Network traffic classification based on federated semi-supervised learning23
Secure pairing-free certificateless aggregate signcryption scheme for IoT23
BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles23
Hybrid differential privacy based federated learning for Internet of Things23
Pflow: An end-to-end heterogeneous acceleration framework for CNN inference on FPGAs22
Editorial Board22
Structured precision skipping: Accelerating convolutional neural networks with budget-aware dynamic precision selection21
A cache-aware DAG scheduling method on multicores: Exploiting node affinity and deferred executions21
NLTSP: A cost model for tensor program tuning using nested loop trees21
Dynamic computation scheduling for hybrid energy mobile edge computing networks21
SAMFL: Secure Aggregation Mechanism for Federated Learning with Byzantine-robustness by functional encryption21
Gated-CNN: Combating NBTI and HCI aging effects in on-chip activation memories of Convolutional Neural Network accelerators20
Thermal-aware adaptive VM allocation considering server locations in heterogeneous data centers20
EVFL: An explainable vertical federated learning for data-oriented Artificial Intelligence systems20
MPTO-MT: A multi-period vehicular task offloading method in 5G HetNets20
Input/mapping precision controllable digital CIM with adaptive adder tree architecture for flexible DNN inference20
TCADer: A Tightly Coupled Accelerator Design framework for heterogeneous system with hardware/software co-design20
Reformulating the direct convolution for high-performance deep learning inference on ARM processors20
A QoS-guaranteed online user data deployment method in edge cloud computing environment20
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking20
Process scenario discovery from event logs based on activity and timing information19
Blockchain-based privacy-preserving public key searchable encryption with strong traceability19
Cooperative computation offloading and resource allocation for delay minimization in mobile edge computing19
Towards transferable adversarial attacks on vision transformers for image classification19
Robust communication-efficient decentralized learning with heterogeneity18
Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things18
Provably secure public key encryption with keyword search for data outsourcing in cloud environments18
The price of schedulability in cyclic workloads: The history-vs.-response-time-vs.-accuracy trade-off18
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio18
Conflict-aware compiler for hierarchical register file on GPUs18
Editorial Board18
DiVIT: Algorithm and architecture co-design of differential attention in vision transformer18
EXPPO: EXecution Performance Profiling and Optimization for CPS Co-simulation-as-a-Service17
ZNS-Cleaner: Enhancing lifespan by reducing empty erase in ZNS SSDs17
Efficient stereo matching on embedded GPUs with zero-means cross correlation17
Mobile Crowdsensing Model: A survey17
HB-ReTriple: Mobile rendering optimization based on efficient history reusing17
Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing17
A survey on FANET routing from a cross-layer design perspective17
GraphA: An efficient ReRAM-based architecture to accelerate large scale graph processing17
Optimizing encoding and repair for wide-stripe minimum bandwidth regenerating codes in in-memory key-value stores17
Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing17
Secure and privacy-preserving quantum authentication scheme using blockchain identifiers in metaverse environment17
Lyapunov optimized energy-efficient dynamic offloading with queue length constraints16
Secure fuzzy identity-based public verification for cloud storage16
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth16
Blockchain-based authentication for IIoT devices with PUF16
Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review16
Towards correctness proof for hybrid Simulink block diagrams16
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT15
A lattice-based designated-server public-key authenticated encryption with keyword search15
Blockchain-based auditing with data self-repair: From centralized system to distributed storage15
Achieving low write latency through new stealth program operation supporting early write completion in NAND flash memory15
An Analyzable Inter-core Communication Framework for High-Performance Multicore Embedded Systems15
Symbolic identification of shared memory based bank conflicts for GPUs15
Evaluating single event upsets in deep neural networks for semantic segmentation: An embedded system perspective15
Non-interactive set intersection for privacy-preserving contact tracing15
Enabling PIM-based AES encryption for online video streaming14
SmartDeCoup: Decoupling the STT-RAM LLC for even write distribution and lifetime improvement14
A dual-index Boolean retrieval scheme with dynamic and revocable attribute-based policies14
A survey on techniques for improving Phase Change Memory (PCM) lifetime14
GTA: Generating high-performance tensorized program with dual-task scheduling14
Dynamic resource allocation for jointing vehicle-edge deep neural network inference14
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT14
Low-latency service function chain migration in edge-core networks based on open Jackson networks14
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems14
Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things14
RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage14
A survey on routing algorithm and router microarchitecture of three-dimensional Network-on-Chip13
MTS-LSTDM: Multi-Time-Scale Long Short-Term Double Memory for power load forecasting13
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks13
BIDS: An efficient Intrusion Detection System for in-vehicle networks using a two-stage Binarised Neural Network on low-cost FPGA13
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters13
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges13
Editorial Board13
Litmus-RT plugins for global static scheduling of mixed criticality systems13
A qualitative cybersecurity analysis of time-triggered communication networks in automotive systems13
CFIO: A conflict-free I/O mechanism to fully exploit internal parallelism for Open-Channel SSDs13
Corrigendum to ‘Fine-Grained Parallelism Framework with Predictable Work-Stealing for Real-Time Multiprocessor Systems’ Journal of Systems Architecture Vol. 124, March 2022, Article Number 10239313
Optimal computational resource pricing in vehicular edge computing: A Stackelberg game approach12
QBLKe: Host-side flash translation layer management for Open-Channel SSDs12
The rCOS framework for multi-dimensional separation of concerns in model-driven engineering12
Towards efficient and robust intelligent mobile vision system via small object aware parallel offloading12
Reducing Errors and Powers in LPDDR for DNN Inference: A Compression and IECC-Based Approach12
Comparing timed-division multiplexing and best-effort networks-on-chip12
A convolutional autoencoder architecture for robust network intrusion detection in embedded systems12
A quantitative blind area risks assessment method for safe driving assistance12
Resource-aware Montgomery modular multiplication optimization for digital signal processing12
A hybrid controller for safe and efficient longitudinal collision avoidance control12
Computation of tight bounds for the worst-case end-to-end delay on Avionics Full-Duplex Switched Ethernet12
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system11
A survey and taxonomy of consensus protocols for blockchains11
Online energy-efficient scheduling of DAG tasks on heterogeneous embedded platforms11
Communication compression techniques in distributed deep learning: A survey11
Fast-convergent federated learning with class-weighted aggregation11
Lightweight asynchronous scheduling in heterogeneous reconfigurable systems11
BDACD: Blockchain-based decentralized auditing supporting ciphertext deduplication11
A redesigned secure and efficient data transaction protocol for mobile payment system11
μScope: Evaluating storage stack robustness against SSD’s latency va11
An energy-efficient near-data processing accelerator for DNNs to optimize memory accesses11
Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer11
A memory footprint optimization framework for Python applications targeting edge devices11
Fast post-quantum private set intersection from oblivious pseudorandom function for mobile social networks11
Multi-objective uplink data transmission optimization for edge computing in UAV-assistant mobile wireless sensor networks11
Optimum: Runtime optimization for multiple mixed model deployment deep learning inference11
ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor11
A survey on privacy preservation techniques for blockchain interoperability11
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network11
Formal domain-driven system development in Event-B: Application to interactive critical systems10
SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks10
A framework for static analysis and verification of low-level RTOS code10
Packet-in request redirection: A load-balancing mechanism for minimizing control plane response time in SDNs10
Improving the robustness of industrial Cyber–Physical Systems through machine learning-based performance anomaly identification10
IEmu: Interrupt modeling from the logic hidden in the firmware10
IRO: Integrity–Reliability enhanced Ring ORAM10
Migration-aware slot-based memory request scheduler to guarantee QoS in DRAM-PCM hybrid memories10
EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles10
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control10
Distrusting cores by separating computation from isolation10
Editorial Board10
Enabling memory access isolation in real-time cloud systems using Intel’s detection/regulation capabilities10
Maximising mobile user experience through self-adaptive content- and ambient-aware display brightness scaling10
ATTEST: Automating the review and update of assurance case arguments10
Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption10
An online dynamic pricing framework for resource allocation in edge computing10
Certificateless public auditing scheme with sensitive information hiding for data sharing in cloud storage10
Editorial Board10
Unishyper: A Rust-based unikernel enhancing reliability and efficiency of embedded systems10
Federated time persistency in intermittently powered IoT systems10
Attribute-based searchable encryption with decentralized key management for healthcare data sharing10
0.100252866745