Journal of Systems Architecture

Papers
(The median citation count of Journal of Systems Architecture is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-10-01 to 2025-10-01.)
ArticleCitations
Editorial Board216
Efficient CUDA stream management for multi-DNN real-time inference on embedded GPUs179
HEA-PAS: A hybrid energy allocation strategy for parallel applications scheduling on heterogeneous computing systems94
Mul_STK: Efficient and privacy-preserving query with spatio-temporal-keyword multiple attributes in cloud computing83
Electric vehicle charging network security: A survey80
Active and passive virtual machine introspection on AMD and ARM processors79
Lifetime improvement through adaptive reconfiguration for nonvolatile FPGAs75
The BH-mixed scheduling algorithm for DAG tasks with constrained deadlines71
DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN70
Loop interchange and tiling for multi-dimensional loops to minimize write operations on NVMs70
A survey and experimental analysis of checkpointing techniques for energy harvesting devices61
The MicroRV32 framework: An accessible and configurable open source RISC-V cross-level platform for education and research59
IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework58
Blockchain-based decentralized data dissemination scheme in smart transportation57
Energy efficient mixed task handling on real-time embedded systems using FreeRTOS57
SHREG: Mitigating register redundancy in GPUs56
LAG-based schedulability analysis for preemptive global EDF scheduling with dynamic cache allocation54
BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations49
Balancing I/O and wear-out distribution inside SSDs with optimized cache management49
CREW: Computation reuse and efficient weight storage for hardware-accelerated MLPs and RNNs44
Machine learning-based computation offloading in multi-access edge computing: A survey43
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives39
PMSort: An adaptive sorting engine for persistent memory38
Editorial Board38
Special issue on advances in reliable software technologies (AdaEurope20)38
Editorial Board37
Component-based architectural regression test selection for modularized software systems37
Contention-aware workflow scheduling on heterogeneous computing systems with shared buses37
CoAxNN: Optimizing on-device deep learning with conditional approximate neural networks37
DAC: A dynamic active and collaborative cache management scheme for solid state disks36
Joint optimization of layering and power allocation for scalable VR video in 6G networks based on Deep Reinforcement Learning36
TMI: Two-dimensional maintainability index for automotive software maintainability measurement35
Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme35
IPCAS: An improved conditional privacy-preserving certificateless aggregate signature scheme without bilinear pairing for VANETs35
A Multi-hashing Index for hybrid DRAM-NVM memory systems35
Safe and secure platooning of Automated Guided Vehicles in Industry 4.034
CoqMatrix: Formal matrix library with multiple models in Coq33
Optimized partitioning and priority assignment of real-time applications on heterogeneous platforms with hardware acceleration33
Improving live migration efficiency in QEMU: An eBPF-based paravirtualized approach32
Special issue on Reliable Software Technologies (AEiC2021)32
A secure data sharing scheme based on searchable public key encryption for authorized multi-receiver32
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage32
Energy-efficient scheduling of imprecise mixed-criticality real-time tasks based on genetic algorithm31
Preference-oriented partitioning for multiprocessor real-time systems31
A lightweight verifiable trust based data collection approach for sensor–cloud systems31
Process variation aware DRAM-Cache resizing31
Editorial Board30
PADP-FedMeta: A personalized and adaptive differentially private federated meta learning mechanism for AIoT30
An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT30
Energy-efficient scheduling for parallel applications with reliability and time constraints on heterogeneous distributed systems30
Towards a real-time IoT: Approaches for incoming packet processing in cyber–physical systems30
Editorial Board28
Editorial Board28
Parametric WCET as a function of procedure arguments: Analysis and applications27
Complex event models for automotive embedded systems27
Editorial Board27
Fine-grained parallelism framework with predictable work-stealing for real-time multiprocessor systems26
Editorial Board26
EDF-based Energy-Efficient Probabilistic Imprecise Mixed-Criticality Scheduling26
Energy-efficient acceleration of convolutional neural networks using computation reuse25
On the methodology of three-way structured merge in version control systems: Top-down, bottom-up, or both25
Cloud security in the age of adaptive adversaries: A game theoretic approach to hypervisor-based intrusion detection25
Subversion resistant identity-based signature25
Hardware-software co-exploration with racetrack memory based in-memory computing for CNN inference in embedded systems25
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation25
PatternS: An intelligent hybrid memory scheduler driven by page pattern recognition25
Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems24
PEPA: Paillier cryptosystem-based efficient privacy-preserving authentication scheme for VANETs24
BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles24
Synchronous VS asynchronous reconfiguration of Memory Bandwidth Management Schemes: A comparative analysis24
Gradient descent algorithm for the optimization of fixed priorities in real-time systems24
VCSA: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption23
Secure pairing-free certificateless aggregate signcryption scheme for IoT22
Hybrid differential privacy based federated learning for Internet of Things22
Editorial Board21
Pflow: An end-to-end heterogeneous acceleration framework for CNN inference on FPGAs21
SecScale: A scalable and secure trusted execution environment for servers21
Network traffic classification based on federated semi-supervised learning21
Structured precision skipping: Accelerating convolutional neural networks with budget-aware dynamic precision selection21
EVFL: An explainable vertical federated learning for data-oriented Artificial Intelligence systems21
A comprehensive survey of digital twins: Applications, technologies and security challenges21
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking21
Process scenario discovery from event logs based on activity and timing information21
FedMQ+: Towards efficient heterogeneous federated learning with multi-grained quantization20
Blockchain-based privacy-preserving public key searchable encryption with strong traceability20
Input/mapping precision controllable digital CIM with adaptive adder tree architecture for flexible DNN inference20
Towards transferable adversarial attacks on vision transformers for image classification20
NLTSP: A cost model for tensor program tuning using nested loop trees20
Engineering SRAM-PUF on Arduino microcontroller20
Data clustering on hybrid classical-quantum NISQ architecture with generative-based variational and parallel algorithms20
DiVIT: Algorithm and architecture co-design of differential attention in vision transformer20
Gated-CNN: Combating NBTI and HCI aging effects in on-chip activation memories of Convolutional Neural Network accelerators19
Dynamic computation scheduling for hybrid energy mobile edge computing networks19
A cache-aware DAG scheduling method on multicores: Exploiting node affinity and deferred executions19
TCADer: A Tightly Coupled Accelerator Design framework for heterogeneous system with hardware/software co-design19
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio19
MPTO-MT: A multi-period vehicular task offloading method in 5G HetNets19
Reformulating the direct convolution for high-performance deep learning inference on ARM processors19
Optimizing encoding and repair for wide-stripe minimum bandwidth regenerating codes in in-memory key-value stores18
SAMFL: Secure Aggregation Mechanism for Federated Learning with Byzantine-robustness by functional encryption18
Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing18
Editorial Board18
GraphA: An efficient ReRAM-based architecture to accelerate large scale graph processing18
Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things18
Evaluating single event upsets in deep neural networks for semantic segmentation: An embedded system perspective17
The price of schedulability in cyclic workloads: The history-vs.-response-time-vs.-accuracy trade-off17
Secure and privacy-preserving quantum authentication scheme using blockchain identifiers in metaverse environment17
Conflict-aware compiler for hierarchical register file on GPUs17
HB-ReTriple: Mobile rendering optimization based on efficient history reusing17
Blockchain-based auditing with data self-repair: From centralized system to distributed storage17
Scheduling virtual machines and containers: A comparative review of techniques, performance, and future trends17
Towards correctness proof for hybrid Simulink block diagrams16
Efficient stereo matching on embedded GPUs with zero-means cross correlation16
Secure fuzzy identity-based public verification for cloud storage16
Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing16
Blockchain-based authentication for IIoT devices with PUF16
Lyapunov optimized energy-efficient dynamic offloading with queue length constraints16
Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review15
Robust communication-efficient decentralized learning with heterogeneity15
ZNS-Cleaner: Enhancing lifespan by reducing empty erase in ZNS SSDs15
Mobile Crowdsensing Model: A survey15
A survey on FANET routing from a cross-layer design perspective15
Provably secure public key encryption with keyword search for data outsourcing in cloud environments15
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth15
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters14
Symbolic identification of shared memory based bank conflicts for GPUs14
CFIO: A conflict-free I/O mechanism to fully exploit internal parallelism for Open-Channel SSDs14
SmartDeCoup: Decoupling the STT-RAM LLC for even write distribution and lifetime improvement14
A dual-index Boolean retrieval scheme with dynamic and revocable attribute-based policies14
A survey on routing algorithm and router microarchitecture of three-dimensional Network-on-Chip14
Enabling PIM-based AES encryption for online video streaming14
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT14
A lattice-based designated-server public-key authenticated encryption with keyword search14
A qualitative cybersecurity analysis of time-triggered communication networks in automotive systems14
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT14
Achieving low write latency through new stealth program operation supporting early write completion in NAND flash memory14
GTA: Generating high-performance tensorized program with dual-task scheduling14
Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things14
Low-latency service function chain migration in edge-core networks based on open Jackson networks14
A survey on techniques for improving Phase Change Memory (PCM) lifetime14
Corrigendum to ‘Fine-Grained Parallelism Framework with Predictable Work-Stealing for Real-Time Multiprocessor Systems’ Journal of Systems Architecture Vol. 124, March 2022, Article Number 10239313
BIDS: An efficient Intrusion Detection System for in-vehicle networks using a two-stage Binarised Neural Network on low-cost FPGA13
MTS-LSTDM: Multi-Time-Scale Long Short-Term Double Memory for power load forecasting13
Editorial Board13
RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage13
Non-interactive set intersection for privacy-preserving contact tracing13
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges13
A convolutional autoencoder architecture for robust network intrusion detection in embedded systems13
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks13
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems13
MADDPG-based task offloading and resource pricing in edge collaboration environment13
A quantitative blind area risks assessment method for safe driving assistance12
An energy-efficient near-data processing accelerator for DNNs to optimize memory accesses12
Online energy-efficient scheduling of DAG tasks on heterogeneous embedded platforms12
Reducing Errors and Powers in LPDDR for DNN Inference: A Compression and IECC-Based Approach12
μScope: Evaluating storage stack robustness against SSD’s latency va12
ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor12
Lightweight asynchronous scheduling in heterogeneous reconfigurable systems12
A survey and taxonomy of consensus protocols for blockchains12
The rCOS framework for multi-dimensional separation of concerns in model-driven engineering12
Fast post-quantum private set intersection from oblivious pseudorandom function for mobile social networks12
BDACD: Blockchain-based decentralized auditing supporting ciphertext deduplication12
A hybrid controller for safe and efficient longitudinal collision avoidance control12
QBLKe: Host-side flash translation layer management for Open-Channel SSDs12
Towards efficient and robust intelligent mobile vision system via small object aware parallel offloading12
A survey on privacy preservation techniques for blockchain interoperability11
Resource-aware Montgomery modular multiplication optimization for digital signal processing11
A memory footprint optimization framework for Python applications targeting edge devices11
Enabling memory access isolation in real-time cloud systems using Intel’s detection/regulation capabilities11
Computation of tight bounds for the worst-case end-to-end delay on Avionics Full-Duplex Switched Ethernet11
Optimum: Runtime optimization for multiple mixed model deployment deep learning inference11
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system11
Comparing timed-division multiplexing and best-effort networks-on-chip11
Communication compression techniques in distributed deep learning: A survey11
IRO: Integrity–Reliability enhanced Ring ORAM11
Multi-objective uplink data transmission optimization for edge computing in UAV-assistant mobile wireless sensor networks11
Optimal computational resource pricing in vehicular edge computing: A Stackelberg game approach11
A redesigned secure and efficient data transaction protocol for mobile payment system11
Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer11
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network11
Packet-in request redirection: A load-balancing mechanism for minimizing control plane response time in SDNs11
A framework for static analysis and verification of low-level RTOS code10
An online dynamic pricing framework for resource allocation in edge computing10
Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage10
TaintGuard: Preventing implicit privilege leakage in smart contract based on taint tracking at abstract syntax tree level10
Federated time persistency in intermittently powered IoT systems10
Efficient one-to-one sharing: Public key matchmaking encryption10
Certificateless public auditing scheme with sensitive information hiding for data sharing in cloud storage10
Improving the robustness of industrial Cyber–Physical Systems through machine learning-based performance anomaly identification10
Formal domain-driven system development in Event-B: Application to interactive critical systems10
ATTEST: Automating the review and update of assurance case arguments10
Editorial Board10
ADCIM: scalable construction of approximate digital compute-in-memory MACRO for energy-efficient attention computation10
A federated deep learning framework for privacy preservation and communication efficiency10
Exploiting intra-chip locality for multi-chip GPUs via two-level shared L1 cache10
Attribute-based searchable encryption with decentralized key management for healthcare data sharing10
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control10
Blocking analysis of real-time tasks with parallel critical sections under federated scheduling10
Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption10
Distrusting cores by separating computation from isolation10
IEmu: Interrupt modeling from the logic hidden in the firmware10
Efficient registration-based signature schemes10
BANSIM: A new discrete-event simulator for wireless body area networks with deep reinforcement learning in Python10
Migration-aware slot-based memory request scheduler to guarantee QoS in DRAM-PCM hybrid memories9
Performance and reliability optimization for high-density flash-based hybrid SSDs9
MCED-H: An efficient scheduling policy for energy harvesting mixed-criticality real-time systems9
Subtraction of Hyperledger Fabric: A blockchain-based lightweight storage mechanism for digital evidences9
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems9
EBIAC: Efficient biometric identity-based access control for wireless body area networks9
An efficient bandwidth-adaptive gradient compression algorithm for distributed training of deep neural networks9
Implications of architecture and implementation choices on timing analysis of automotive CAN networks9
Maximising mobile user experience through self-adaptive content- and ambient-aware display brightness scaling9
LB-CLBS: Lattice-based certificateless blind signature scheme for vehicle sensing within intelligent transportation9
FDAN: Fuzzy deep attention networks for driver behavior recognition9
Efficient persistent memory file systems using virtual superpages with multi-level allocator9
Unishyper: A Rust-based unikernel enhancing reliability and efficiency of embedded systems9
SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks9
Secure olympics games with technology: Intelligent border surveillance for the 2022 Beijing winter olympics9
Multi-client functional encryption for set intersection with non-monotonic access structures in federated learning9
DLLPM: Dual-layer location privacy matching in V2V energy trading9
Enhancing privacy in cyber–physical systems: An efficient blockchain-assisted data-sharing scheme with deniability9
Bus-contention aware WCRT analysis for the 3-phase task model considering a work-conserving bus arbitration scheme9
Forward and backward secure updatable ElGamal encryption scheme for cloud storage8
Bit-error-rate aware sensing-error correction interaction in spintronic MRAM8
Fair and size-scalable participant selection framework for large-scale mobile crowdsensing8
Data-driven barrier certificate generation using deep learning and symbolic regression8
A survey of SRAM-based in-memory computing techniques and applications8
Error correction and erasure codes for robust network steganography8
Editorial Board8
Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay8
Data-driven power modeling and monitoring via hardware performance counter tracking8
SOFIA: An automated framework for early soft error assessment, identification, and mitigation8
Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems8
IPDALight: Intensity- and phase duration-aware traffic signal control based on Reinforcement Learning8
FastCache: A write-optimized edge storage system via concurrent merging cache for IoT applications8
ZoomDB: Building cost-effective key–value store engine on ZNS SSD and SMR HDD8
DTB+: An enhanced data management strategy for efficient RMW reduction in IMR drives8
Towards mutation testing of Reinforcement Learning systems8
Edge-aided searchable data sharing scheme for IoV in the 5G environment8
Hardware-aware liquid state machine generation for 2D/3D Network-on-Chip platforms7
SSBAS-FA: A secure sealed-bid e-auction scheme with fair arbitration based on time-released blockchain7
Assuring the safety of rechargeable energy storage systems in electric vehicles7
FSbrain: An intelligent I/O performance tuning system7
Editorial Board7
MCPAP: A MSIS-based conditional privacy-preserving authentication protocol for smart grids7
Analysis and optimization of communication delay in multi-subscriber environments of ROS 27
Cache eviction for SSD-HDD hybrid storage based on sequential packing7
Improved analysis and optimal priority assignment for communicating threads on uni-processor7
Predictable and optimized single-path code for predicated processors7
A server-aided secure interval test and comparison protocol with OPRF7
0.17065787315369