Journal of Systems Architecture

Papers
(The median citation count of Journal of Systems Architecture is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Mul_STK: Efficient and privacy-preserving query with spatio-temporal-keyword multiple attributes in cloud computing223
DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN117
Blockchain-based decentralized data dissemination scheme in smart transportation114
LAG-based schedulability analysis for preemptive global EDF scheduling with dynamic cache allocation94
Active and passive virtual machine introspection on AMD and ARM processors88
Editorial Board87
Lifetime improvement through adaptive reconfiguration for nonvolatile FPGAs79
The BH-mixed scheduling algorithm for DAG tasks with constrained deadlines78
BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations77
Balancing I/O and wear-out distribution inside SSDs with optimized cache management73
Electric vehicle charging network security: A survey70
The MicroRV32 framework: An accessible and configurable open source RISC-V cross-level platform for education and research64
A survey and experimental analysis of checkpointing techniques for energy harvesting devices63
Energy efficient mixed task handling on real-time embedded systems using FreeRTOS59
Sample-adaptive multi-branch network for efficient inference under time constraints57
Precision boundary modeling for area-efficient Block Floating Point accumulation57
An FPGA-based accelerator design methodology for smart UAVs in precision agriculture: A case study55
CREW: Computation reuse and efficient weight storage for hardware-accelerated MLPs and RNNs54
IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework49
SHREG: Mitigating register redundancy in GPUs49
CATS: Clean-label backdoor attack on speech recognition via speech synthesis46
Efficient maximum reaction time analysis for data chains of real-time tasks in multiprocessor systems45
Loop interchange and tiling for multi-dimensional loops to minimize write operations on NVMs45
Machine learning-based computation offloading in multi-access edge computing: A survey45
Efficient CUDA stream management for multi-DNN real-time inference on embedded GPUs44
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives43
Component-based architectural regression test selection for modularized software systems42
Joint optimization of layering and power allocation for scalable VR video in 6G networks based on Deep Reinforcement Learning40
Editorial Board40
IPCAS: An improved conditional privacy-preserving certificateless aggregate signature scheme without bilinear pairing for VANETs40
Contention-aware workflow scheduling on heterogeneous computing systems with shared buses38
Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme38
A Multi-hashing Index for hybrid DRAM-NVM memory systems37
DAC: A dynamic active and collaborative cache management scheme for solid state disks37
TMI: Two-dimensional maintainability index for automotive software maintainability measurement37
Edge-assisted lightweight message authentication for Industrial Internet of Things35
AIMD: AI-powered android malware detection for securing AIoT devices and networks using graph embedding and ensemble learning35
Preference-oriented partitioning for multiprocessor real-time systems34
CoAxNN: Optimizing on-device deep learning with conditional approximate neural networks34
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage33
CoqMatrix: Formal matrix library with multiple models in Coq33
PADP-FedMeta: A personalized and adaptive differentially private federated meta learning mechanism for AIoT32
A secure data sharing scheme based on searchable public key encryption for authorized multi-receiver31
MetaDTS: Distribution difference-based adaptive test input selection for Deep Neural Networks30
Energy-efficient scheduling of imprecise mixed-criticality real-time tasks based on genetic algorithm30
Towards a real-time IoT: Approaches for incoming packet processing in cyber–physical systems29
CXL shared coherent memory simulation and cross-host synchronization mechanisms design for data sharing28
Energy-efficient scheduling for parallel applications with reliability and time constraints on heterogeneous distributed systems28
Group theory-based differential evolution algorithm for efficient DAG scheduling on heterogeneous clustered multi-core system28
An efficient and compatible authenticated key exchange protocol with leakage resilience for heterogeneous client–server environments27
An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT27
Improving live migration efficiency in QEMU: An eBPF-based paravirtualized approach27
Editorial Board26
Editorial Board26
Thwarting gradient inversion in federated learning via generative shadow mapping defense26
Subversion resistant identity-based signature25
Secure pairing-free certificateless aggregate signcryption scheme for IoT24
Editorial Board24
On the methodology of three-way structured merge in version control systems: Top-down, bottom-up, or both24
Synchronous VS asynchronous reconfiguration of Memory Bandwidth Management Schemes: A comparative analysis24
Energy-efficient acceleration of convolutional neural networks using computation reuse24
Hardware-software co-exploration with racetrack memory based in-memory computing for CNN inference in embedded systems24
Editorial Board24
CADM: Content addressable commodity off-the-shelf DRAM-based genome classifier23
EdgeTrust-Shard: Hierarchical blockchain architecture for federated learning in cross-chain IoT ecosystems23
PatternS: An intelligent hybrid memory scheduler driven by page pattern recognition23
Efficient column-wise N:M pruning on RISC-V CPU23
Network traffic classification based on federated semi-supervised learning22
Cloud security in the age of adaptive adversaries: A game theoretic approach to hypervisor-based intrusion detection22
Parametric WCET as a function of procedure arguments: Analysis and applications22
PEPA: Paillier cryptosystem-based efficient privacy-preserving authentication scheme for VANETs22
EDF-based Energy-Efficient Probabilistic Imprecise Mixed-Criticality Scheduling22
Efficient Dropout-resilient and Verifiable Federated learning scheme for AIoT healthcare system22
BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles22
Gradient descent algorithm for the optimization of fixed priorities in real-time systems21
VCSA: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption21
Pflow: An end-to-end heterogeneous acceleration framework for CNN inference on FPGAs21
A comprehensive survey of digital twins: Applications, technologies and security challenges21
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation21
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking20
Dynamic computation scheduling for hybrid energy mobile edge computing networks20
Data clustering on hybrid classical-quantum NISQ architecture with generative-based variational and parallel algorithms20
LARDM: Lightweight and aggregation-driven real-time detection and mitigation of volumetric DDoS attacks in the programmable data plane20
Balancing privacy and fairness: Client selection in differential privacy-based federated learning20
SAR-DetAttack: GAN-based adversarial attack with transfer learning for ship detection in satellite SAR images20
Engineering SRAM-PUF on Arduino microcontroller20
MPTO-MT: A multi-period vehicular task offloading method in 5G HetNets20
SecScale : A Scalable and Secure Trusted Execution Environment for Servers19
Editorial Board19
NLTSP: A cost model for tensor program tuning using nested loop trees19
Reformulating the direct convolution for high-performance deep learning inference on ARM processors19
Gated-CNN: Combating NBTI and HCI aging effects in on-chip activation memories of Convolutional Neural Network accelerators19
A cache-aware DAG scheduling method on multicores: Exploiting node affinity and deferred executions19
PBR: An efficient rounding and branch-and-bound-based task offloading approach for Low Earth Orbit Satellite Edge Computing19
TCADer: A Tightly Coupled Accelerator Design framework for heterogeneous system with hardware/software co-design19
Bit-level compiler optimization for ultra low-power embedded systems18
FedMQ+: Towards efficient heterogeneous federated learning with multi-grained quantization18
DiVIT: Algorithm and architecture co-design of differential attention in vision transformer18
Blockchain-based privacy-preserving public key searchable encryption with strong traceability18
On container vulnerabilities in edge computing: A fix-on-deployment approach18
SAMFL: Secure Aggregation Mechanism for Federated Learning with Byzantine-robustness by functional encryption18
Peak-memory-aware partitioning and scheduling for multi-tenant DNN model inference17
Input/mapping precision controllable digital CIM with adaptive adder tree architecture for flexible DNN inference17
EVFL: An explainable vertical federated learning for data-oriented Artificial Intelligence systems17
Designing resilient IoT and Edge Computing with federated tinyML17
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio17
RUnQuant: High-resolution weight quantization via unanchored weight decomposition in column-wise granularity for CIM accelerators17
Towards transferable adversarial attacks on vision transformers for image classification17
Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things17
ZNS-Cleaner: Enhancing lifespan by reducing empty erase in ZNS SSDs16
Blockchain-based auditing with data self-repair: From centralized system to distributed storage16
Formal semantics for hierarchical Simulink diagrams in Isabelle/HOL16
GraphA: An efficient ReRAM-based architecture to accelerate large scale graph processing16
Editorial Board16
Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing16
Privacy-preserving access control and trust management for multi-authority in IoMT systems16
A two-layer system architecture for Unmanned Aerial Vehicle (UAV)-assisted offloading: Game-theoretic allocation and CTDE-MADDPG control16
Optimizing encoding and repair for wide-stripe minimum bandwidth regenerating codes in in-memory key-value stores16
Conflict-aware compiler for hierarchical register file on GPUs16
Evaluating single event upsets in deep neural networks for semantic segmentation: An embedded system perspective16
ZJC: Constructing fully local repair in erasure codes for distributed cloud storage16
Provably secure public key encryption with keyword search for data outsourcing in cloud environments15
Secure fuzzy identity-based public verification for cloud storage15
Blockchain-based authentication for IIoT devices with PUF15
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth15
Towards correctness proof for hybrid Simulink block diagrams15
Secure and privacy-preserving quantum authentication scheme using blockchain identifiers in metaverse environment15
Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing15
HB-ReTriple: Mobile rendering optimization based on efficient history reusing15
Robust communication-efficient decentralized learning with heterogeneity15
Lyapunov optimized energy-efficient dynamic offloading with queue length constraints15
Log2Evt: Constructing high-level events for IoT Systems through log-code execution path correlation14
Scheduling virtual machines and containers: A comparative review of techniques, performance, and future trends14
Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things14
SmartDeCoup: Decoupling the STT-RAM LLC for even write distribution and lifetime improvement14
HeterScale: A hierarchical task scheduling framework for intelligent edge collaboration in IIOT14
A survey on routing algorithm and router microarchitecture of three-dimensional Network-on-Chip14
Non-interactive set intersection for privacy-preserving contact tracing14
A qualitative cybersecurity analysis of time-triggered communication networks in automotive systems14
Mobile Crowdsensing Model: A survey14
Enabling PIM-based AES encryption for online video streaming14
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT14
MADDPG-based task offloading and resource pricing in edge collaboration environment14
SADDLE: A runtime feedback control architecture for adaptive distributed deep learning in heterogeneous GPU clusters13
Symbolic identification of shared memory based bank conflicts for GPUs13
TinyATD: Compressing Auxiliary Tag Directories using tag hashing and set-sampling13
Accelerating on-device visual task adaptation by exploiting hybrid sparsity in DNN training13
A lattice-based designated-server public-key authenticated encryption with keyword search13
A dual-index Boolean retrieval scheme with dynamic and revocable attribute-based policies13
Achieving low write latency through new stealth program operation supporting early write completion in NAND flash memory13
Unmixing gradients: Uncovering persistent leakage in Federated Learning via Independent Component Analysis13
CFIO: A conflict-free I/O mechanism to fully exploit internal parallelism for Open-Channel SSDs13
A survey on techniques for improving Phase Change Memory (PCM) lifetime13
Eidos revisited: Expanding Efficient, imperceptible adversarial attacks on 3D point clouds13
Nis-PoW: Non-interactive secure Proof of Ownership for cloud storage13
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems13
μScope: Evaluating storage stack robustness against SSD’s latency va12
An energy-efficient near-data processing accelerator for DNNs to optimize memory accesses12
Editorial Board12
Towards efficient and robust intelligent mobile vision system via small object aware parallel offloading12
GTA: Generating high-performance tensorized program with dual-task scheduling12
Computation of tight bounds for the worst-case end-to-end delay on Avionics Full-Duplex Switched Ethernet12
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network12
Fast post-quantum private set intersection from oblivious pseudorandom function for mobile social networks12
BDACD: Blockchain-based decentralized auditing supporting ciphertext deduplication12
A redesigned secure and efficient data transaction protocol for mobile payment system12
BIDS: An efficient Intrusion Detection System for in-vehicle networks using a two-stage Binarised Neural Network on low-cost FPGA12
RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage12
Corrigendum to ‘Fine-Grained Parallelism Framework with Predictable Work-Stealing for Real-Time Multiprocessor Systems’ Journal of Systems Architecture Vol. 124, March 2022, Article Number 10239312
The rCOS framework for multi-dimensional separation of concerns in model-driven engineering12
Multi-objective uplink data transmission optimization for edge computing in UAV-assistant mobile wireless sensor networks12
A memory footprint optimization framework for Python applications targeting edge devices12
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges12
Comparing timed-division multiplexing and best-effort networks-on-chip12
Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer12
A survey and taxonomy of consensus protocols for blockchains11
Communication compression techniques in distributed deep learning: A survey11
A survey on privacy preservation techniques for blockchain interoperability11
Editorial Board11
An efficient bandwidth-adaptive gradient compression algorithm for distributed training of deep neural networks11
Enabling memory access isolation in real-time cloud systems using Intel’s detection/regulation capabilities11
Optimum: Runtime optimization for multiple mixed model deployment deep learning inference11
Reducing Errors and Powers in LPDDR for DNN Inference: A Compression and IECC-Based Approach11
Resource-aware Montgomery modular multiplication optimization for digital signal processing11
Blocking analysis of real-time tasks with parallel critical sections under federated scheduling11
Certificateless public auditing scheme with sensitive information hiding for data sharing in cloud storage11
IEmu: Interrupt modeling from the logic hidden in the firmware11
A quantitative blind area risks assessment method for safe driving assistance11
Online energy-efficient scheduling of DAG tasks on heterogeneous embedded platforms11
A convolutional autoencoder architecture for robust network intrusion detection in embedded systems11
ADCIM: scalable construction of approximate digital compute-in-memory MACRO for energy-efficient attention computation11
ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor11
IRO: Integrity–Reliability enhanced Ring ORAM11
Maximising mobile user experience through self-adaptive content- and ambient-aware display brightness scaling11
SMCCA: A sharded multi-task collaborative consensus algorithm for unmanned vehicle networks10
Unishyper: A Rust-based unikernel enhancing reliability and efficiency of embedded systems10
Formal domain-driven system development in Event-B: Application to interactive critical systems10
FedPillarNet: Unifying personalized and global features for federated 3D LiDAR object detection10
Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage10
Packet-in request redirection: A load-balancing mechanism for minimizing control plane response time in SDNs10
Migration-aware slot-based memory request scheduler to guarantee QoS in DRAM-PCM hybrid memories10
Efficient registration-based signature schemes10
An online dynamic pricing framework for resource allocation in edge computing10
Federated time persistency in intermittently powered IoT systems10
A framework for static analysis and verification of low-level RTOS code10
A comprehensive survey of hardware-based security techniques from an architectural perspective10
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control10
TaintGuard: Preventing implicit privilege leakage in smart contract based on taint tracking at abstract syntax tree level10
Efficient one-to-one sharing: Public key matchmaking encryption10
Editorial Board10
BANSIM: A new discrete-event simulator for wireless body area networks with deep reinforcement learning in Python10
Exploiting intra-chip locality for multi-chip GPUs via two-level shared L1 cache10
Secure task-worker matching and privacy-preserving scheme for blockchain-based federated crowdsourcing9
SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks9
Improving the robustness of industrial Cyber–Physical Systems through machine learning-based performance anomaly identification9
Efficient persistent memory file systems using virtual superpages with multi-level allocator9
Multi-client functional encryption for set intersection with non-monotonic access structures in federated learning9
Distrusting cores by separating computation from isolation9
Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption9
MCED-H: An efficient scheduling policy for energy harvesting mixed-criticality real-time systems9
Secure olympics games with technology: Intelligent border surveillance for the 2022 Beijing winter olympics9
Subtraction of Hyperledger Fabric: A blockchain-based lightweight storage mechanism for digital evidences9
ATTEST: Automating the review and update of assurance case arguments9
Attribute-based searchable encryption with decentralized key management for healthcare data sharing9
Implications of architecture and implementation choices on timing analysis of automotive CAN networks9
LB-CLBS: Lattice-based certificateless blind signature scheme for vehicle sensing within intelligent transportation9
An efficient privacy-preserving transformer inference scheme for cloud-based intelligent decision-making in AIoT9
Data-driven power modeling and monitoring via hardware performance counter tracking8
Enhancing privacy in cyber–physical systems: An efficient blockchain-assisted data-sharing scheme with deniability8
Performance and reliability optimization for high-density flash-based hybrid SSDs8
DLLPM: Dual-layer location privacy matching in V2V energy trading8
ZoomDB: Building cost-effective key–value store engine on ZNS SSD and SMR HDD8
CAAS-DMSK: A Certificateless Anonymous Authentication Scheme with Dynamic Master Secret Keys in VANETs8
DTB+: An enhanced data management strategy for efficient RMW reduction in IMR drives8
FDAN: Fuzzy deep attention networks for driver behavior recognition8
Cloud-aided practical multi-keyword medical data retrieval based on ABE8
Editorial Board8
Towards mutation testing of Reinforcement Learning systems8
When foresight pruning meets zeroth-order optimization: Efficient federated learning for low-memory devices8
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems8
Bridging TSN and 5G networks: Prototype design and evaluation for real-time embedded systems8
Bridging BPMN and edge-IoT: A reactor-based architecture for real-time, AI-driven workflow orchestration8
Data-driven barrier certificate generation using deep learning and symbolic regression8
VM-PHRs: Efficient and verifiable multi-delegated PHRs search scheme for cloud–edge collaborative services8
HiEval: A scheduling performance estimation approach for spatial accelerators via hierarchical abstraction7
BeeFlow: Behavior tree-based Serverless workflow modeling and scheduling for resource-constrained edge clusters7
Editorial Board7
A contract-based semantics and refinement for hybrid Simulink block diagrams7
E-Audit: Distinguishing and investigating suspicious events for APTs attack detection7
A server-aided secure interval test and comparison protocol with OPRF7
0.094666004180908