Journal of Systems Architecture

Papers
(The TQCC of Journal of Systems Architecture is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Electric vehicle charging network security: A survey185
Editorial Board172
Implementing synchronous reactive components upon multiprocessor platforms141
Guest Editorial: Special issue on parallel, distributed, and network-based processing in next-generation embedded systems104
CURATING: A multi-objective based pruning technique for CNNs104
HEA-PAS: A hybrid energy allocation strategy for parallel applications scheduling on heterogeneous computing systems84
Active and passive virtual machine introspection on AMD and ARM processors83
Lifetime improvement through adaptive reconfiguration for nonvolatile FPGAs74
The BH-mixed scheduling algorithm for DAG tasks with constrained deadlines69
Loop interchange and tiling for multi-dimensional loops to minimize write operations on NVMs67
Balancing I/O and wear-out distribution inside SSDs with optimized cache management64
LAG-based schedulability analysis for preemptive global EDF scheduling with dynamic cache allocation64
IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework63
The MicroRV32 framework: An accessible and configurable open source RISC-V cross-level platform for education and research58
BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations55
Blockchain-based decentralized data dissemination scheme in smart transportation55
A genetic simulation strategy: Application to single-fault analysis of TTEthernet synchronization protocol55
CREW: Computation reuse and efficient weight storage for hardware-accelerated MLPs and RNNs54
A survey and experimental analysis of checkpointing techniques for energy harvesting devices54
Efficient CUDA stream management for multi-DNN real-time inference on embedded GPUs53
SHREG: Mitigating register redundancy in GPUs52
DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN52
Machine learning-based computation offloading in multi-access edge computing: A survey49
Energy efficient mixed task handling on real-time embedded systems using FreeRTOS49
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives49
Editorial Board48
Joint optimization of layering and power allocation for scalable VR video in 6G networks based on Deep Reinforcement Learning46
PMSort: An adaptive sorting engine for persistent memory45
Special issue on advances in reliable software technologies (AdaEurope20)45
Safe and secure platooning of Automated Guided Vehicles in Industry 4.043
Editorial Board43
A Multi-hashing Index for hybrid DRAM-NVM memory systems43
IPCAS: An improved conditional privacy-preserving certificateless aggregate signature scheme without bilinear pairing for VANETs36
Component-based architectural regression test selection for modularized software systems35
CoAxNN: Optimizing on-device deep learning with conditional approximate neural networks34
Computation-transferable authenticated key agreement protocol for smart healthcare34
Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme34
PADP-FedMeta: A personalized and adaptive differentially private federated meta learning mechanism for AIoT33
A lightweight verifiable trust based data collection approach for sensor–cloud systems33
DAC: A dynamic active and collaborative cache management scheme for solid state disks33
Energy-efficient scheduling of imprecise mixed-criticality real-time tasks based on genetic algorithm33
Process variation aware DRAM-Cache resizing32
CoqMatrix: Formal matrix library with multiple models in Coq32
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage32
Optimized partitioning and priority assignment of real-time applications on heterogeneous platforms with hardware acceleration32
An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT32
Hardware accelerator for an accurate local stereo matching algorithm using binary neural network31
Preference-oriented partitioning for multiprocessor real-time systems31
Adaptive simulation with Virtual Prototypes in an open-source RISC-V evaluation platform30
Improving live migration efficiency in QEMU: An eBPF-based paravirtualized approach30
Special issue on Reliable Software Technologies (AEiC2021)30
Digital signature with cryptographic reverse firewalls30
Energy-efficient scheduling for parallel applications with reliability and time constraints on heterogeneous distributed systems29
Towards a real-time IoT: Approaches for incoming packet processing in cyber–physical systems29
Editorial Board28
Energy-efficient acceleration of convolutional neural networks using computation reuse28
Editorial Board28
Editorial Board28
Pflow: An end-to-end heterogeneous acceleration framework for CNN inference on FPGAs28
Editorial Board27
On the methodology of three-way structured merge in version control systems: Top-down, bottom-up, or both27
Editorial Board27
Fine-grained parallelism framework with predictable work-stealing for real-time multiprocessor systems26
Parametric WCET as a function of procedure arguments: Analysis and applications26
Complex event models for automotive embedded systems26
Gradient descent algorithm for the optimization of fixed priorities in real-time systems26
PatternS: An intelligent hybrid memory scheduler driven by page pattern recognition25
A public key encryption scheme based on a new variant of LWE with small cipher size25
EDF-based Energy-Efficient Probabilistic Imprecise Mixed-Criticality Scheduling25
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation24
Secure pairing-free certificateless aggregate signcryption scheme for IoT24
VCSA: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption24
Subversion resistant identity-based signature24
PEPA: Paillier cryptosystem-based efficient privacy-preserving authentication scheme for VANETs24
REALISM: Reliability-aware energy management in multi-level mixed-criticality systems with service level degradation24
A generalized approach to real-time, non-intrusive instrumentation and monitoring of standards-based distributed middleware23
A comprehensive survey of digital twins: Applications, technologies and security challenges23
An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification23
Hybrid differential privacy based federated learning for Internet of Things22
Hardware-software co-exploration with racetrack memory based in-memory computing for CNN inference in embedded systems22
Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems22
Cloud security in the age of adaptive adversaries: A game theoretic approach to hypervisor-based intrusion detection22
BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles22
Structured precision skipping: Accelerating convolutional neural networks with budget-aware dynamic precision selection21
SAMFL: Secure Aggregation Mechanism for Federated Learning with Byzantine-robustness by functional encryption21
Editorial Board21
NLTSP: A cost model for tensor program tuning using nested loop trees21
Network traffic classification based on federated semi-supervised learning21
Dynamic computation scheduling for hybrid energy mobile edge computing networks20
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking20
MPTO-MT: A multi-period vehicular task offloading method in 5G HetNets20
Blockchain-based privacy-preserving public key searchable encryption with strong traceability20
Input/mapping precision controllable digital CIM with adaptive adder tree architecture for flexible DNN inference20
Gated-CNN: Combating NBTI and HCI aging effects in on-chip activation memories of Convolutional Neural Network accelerators20
A cache-aware DAG scheduling method on multicores: Exploiting node affinity and deferred executions20
A QoS-guaranteed online user data deployment method in edge cloud computing environment20
Reformulating the direct convolution for high-performance deep learning inference on ARM processors20
DiVIT: Algorithm and architecture co-design of differential attention in vision transformer19
TCADer: A Tightly Coupled Accelerator Design framework for heterogeneous system with hardware/software co-design19
Thermal-aware adaptive VM allocation considering server locations in heterogeneous data centers19
EVFL: An explainable vertical federated learning for data-oriented Artificial Intelligence systems18
Towards transferable adversarial attacks on vision transformers for image classification18
Efficient stereo matching on embedded GPUs with zero-means cross correlation18
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio18
Process scenario discovery from event logs based on activity and timing information18
Editorial Board18
Robust communication-efficient decentralized learning with heterogeneity18
Cooperative computation offloading and resource allocation for delay minimization in mobile edge computing18
Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things18
The price of schedulability in cyclic workloads: The history-vs.-response-time-vs.-accuracy trade-off18
FedMQ+: Towards efficient heterogeneous federated learning with multi-grained quantization18
Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing17
EXPPO: EXecution Performance Profiling and Optimization for CPS Co-simulation-as-a-Service17
Conflict-aware compiler for hierarchical register file on GPUs17
Mobile Crowdsensing Model: A survey17
ZNS-Cleaner: Enhancing lifespan by reducing empty erase in ZNS SSDs17
HB-ReTriple: Mobile rendering optimization based on efficient history reusing17
Secure and privacy-preserving quantum authentication scheme using blockchain identifiers in metaverse environment16
Secure fuzzy identity-based public verification for cloud storage16
Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing16
Lyapunov optimized energy-efficient dynamic offloading with queue length constraints16
Towards correctness proof for hybrid Simulink block diagrams16
Optimizing encoding and repair for wide-stripe minimum bandwidth regenerating codes in in-memory key-value stores16
Blockchain-based auditing with data self-repair: From centralized system to distributed storage15
Cross-domain access control based on trusted third-party and attribute mapping center15
Evaluating single event upsets in deep neural networks for semantic segmentation: An embedded system perspective15
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth15
Provably secure public key encryption with keyword search for data outsourcing in cloud environments15
GraphA: An efficient ReRAM-based architecture to accelerate large scale graph processing15
Editorial Board15
A survey on FANET routing from a cross-layer design perspective15
Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review15
Blockchain-based authentication for IIoT devices with PUF15
A lattice-based designated-server public-key authenticated encryption with keyword search15
An Analyzable Inter-core Communication Framework for High-Performance Multicore Embedded Systems14
S-CNN-ESystem: An end-to-end embedded CNN inference system with low hardware cost and hardware-software time-balancing14
Achieving low write latency through new stealth program operation supporting early write completion in NAND flash memory14
MTS-LSTDM: Multi-Time-Scale Long Short-Term Double Memory for power load forecasting14
Dynamic resource allocation for jointing vehicle-edge deep neural network inference14
Non-interactive set intersection for privacy-preserving contact tracing14
GTA: Generating high-performance tensorized program with dual-task scheduling14
Symbolic identification of shared memory based bank conflicts for GPUs14
Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things14
Towards Linux based safety systems—A statistical approach for software execution path coverage14
Enabling PIM-based AES encryption for online video streaming14
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT14
SmartDeCoup: Decoupling the STT-RAM LLC for even write distribution and lifetime improvement14
RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage13
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks13
A survey on techniques for improving Phase Change Memory (PCM) lifetime13
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges13
A qualitative cybersecurity analysis of time-triggered communication networks in automotive systems13
Low-latency service function chain migration in edge-core networks based on open Jackson networks13
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT13
BIDS: An efficient Intrusion Detection System for in-vehicle networks using a two-stage Binarised Neural Network on low-cost FPGA13
A global-energy-aware virtual machine placement strategy for cloud data centers13
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters13
A dual-index Boolean retrieval scheme with dynamic and revocable attribute-based policies13
CFIO: A conflict-free I/O mechanism to fully exploit internal parallelism for Open-Channel SSDs13
Litmus-RT plugins for global static scheduling of mixed criticality systems13
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems13
Corrigendum to ‘Fine-Grained Parallelism Framework with Predictable Work-Stealing for Real-Time Multiprocessor Systems’ Journal of Systems Architecture Vol. 124, March 2022, Article Number 10239312
Communication compression techniques in distributed deep learning: A survey12
A convolutional autoencoder architecture for robust network intrusion detection in embedded systems12
QBLKe: Host-side flash translation layer management for Open-Channel SSDs12
Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer12
Computation of tight bounds for the worst-case end-to-end delay on Avionics Full-Duplex Switched Ethernet12
Editorial Board12
An energy-efficient near-data processing accelerator for DNNs to optimize memory accesses12
The rCOS framework for multi-dimensional separation of concerns in model-driven engineering12
A hybrid controller for safe and efficient longitudinal collision avoidance control12
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network11
Improving the robustness of industrial Cyber–Physical Systems through machine learning-based performance anomaly identification11
Rahasak—Scalable blockchain architecture for enterprise applications11
Resource-aware Montgomery modular multiplication optimization for digital signal processing11
Comparing timed-division multiplexing and best-effort networks-on-chip11
ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor11
Online energy-efficient scheduling of DAG tasks on heterogeneous embedded platforms11
A survey on privacy preservation techniques for blockchain interoperability11
A survey and taxonomy of consensus protocols for blockchains11
Multi-objective uplink data transmission optimization for edge computing in UAV-assistant mobile wireless sensor networks11
Reducing Errors and Powers in LPDDR for DNN Inference: A Compression and IECC-Based Approach11
Fast-convergent federated learning with class-weighted aggregation11
A redesigned secure and efficient data transaction protocol for mobile payment system11
A quantitative blind area risks assessment method for safe driving assistance11
Lightweight asynchronous scheduling in heterogeneous reconfigurable systems11
Fast post-quantum private set intersection from oblivious pseudorandom function for mobile social networks11
Optimum: Runtime optimization for multiple mixed model deployment deep learning inference11
Optimal computational resource pricing in vehicular edge computing: A Stackelberg game approach11
Towards efficient and robust intelligent mobile vision system via small object aware parallel offloading11
A memory footprint optimization framework for Python applications targeting edge devices11
BDACD: Blockchain-based decentralized auditing supporting ciphertext deduplication11
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system11
A framework for static analysis and verification of low-level RTOS code10
TaintGuard: Preventing implicit privilege leakage in smart contract based on taint tracking at abstract syntax tree level10
Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption10
Editorial Board10
An efficient bandwidth-adaptive gradient compression algorithm for distributed training of deep neural networks10
Enabling memory access isolation in real-time cloud systems using Intel’s detection/regulation capabilities10
IRO: Integrity–Reliability enhanced Ring ORAM10
IEmu: Interrupt modeling from the logic hidden in the firmware10
An online dynamic pricing framework for resource allocation in edge computing10
SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks10
Distrusting cores by separating computation from isolation10
ATTEST: Automating the review and update of assurance case arguments10
Maximising mobile user experience through self-adaptive content- and ambient-aware display brightness scaling10
Formal domain-driven system development in Event-B: Application to interactive critical systems10
Editorial Board10
Attribute-based searchable encryption with decentralized key management for healthcare data sharing10
Certificateless public auditing scheme with sensitive information hiding for data sharing in cloud storage10
A federated deep learning framework for privacy preservation and communication efficiency10
Unishyper: A Rust-based unikernel enhancing reliability and efficiency of embedded systems10
Federated time persistency in intermittently powered IoT systems10
Packet-in request redirection: A load-balancing mechanism for minimizing control plane response time in SDNs10
Migration-aware slot-based memory request scheduler to guarantee QoS in DRAM-PCM hybrid memories10
0.17566108703613