Journal of Systems Architecture

Papers
(The H4-Index of Journal of Systems Architecture is 35. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
A Survey on Deep Transfer Learning to Edge Computing for Mitigating the COVID-19 Pandemic107
TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning102
A survey on machine learning-based malware detection in executable files97
A Survey on Task Offloading in Multi-access Edge Computing96
A survey on modeling and improving reliability of DNN algorithms and accelerators80
A survey on data center cooling systems: Technology, power consumption modeling and control strategy optimization79
Blockchain-based batch authentication protocol for Internet of Vehicles66
Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review65
A survey of deep learning techniques for vehicle detection from UAV images65
Time-Sensitive Networking in automotive embedded systems: State of the art and research opportunities63
Cooperative computation offloading and resource allocation for delay minimization in mobile edge computing62
A survey and taxonomy on energy management schemes in wireless sensor networks59
Task allocation algorithm and optimization model on edge collaboration57
A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance57
A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing53
LAKAF: Lightweight authentication and key agreement framework for smart grid network51
A survey on intrusion detection and prevention in wireless ad-hoc networks50
A survey on security and authentication in wireless body area networks50
Certificateless authenticated key agreement for blockchain-based WBANs49
Energy-aware scheduling for dependent tasks in heterogeneous multiprocessor systems46
PHDFS: Optimizing I/O performance of HDFS in deep learning cloud computing platform45
Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability45
Attacking vision-based perception in end-to-end autonomous driving models44
Edge-based auditing method for data security in resource-constrained Internet of Things43
Design optimization of confidentiality-critical cyber physical systems with fault detection43
Accelerating CNN Inference on ASICs: A Survey43
A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography42
A semi-autonomous distributed blockchain-based framework for UAVs system39
IoTSim-Osmosis: A framework for modeling and simulating IoT applications over an edge-cloud continuum39
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain39
RISC-V based virtual prototype: An extensible and configurable platform for the system-level38
Makespan-minimization workflow scheduling for complex networks with social groups in edge computing38
Wireless edge caching based on content similarity in dynamic environments38
Rahasak—Scalable blockchain architecture for enterprise applications36
Optimized co-scheduling of mixed-precision neural network accelerator for real-time multitasking applications35
A global-energy-aware virtual machine placement strategy for cloud data centers35
An Efficient Privacy-preserving Authentication Model based on blockchain for VANETs35
0.16468000411987