Journal of Systems Architecture

Papers
(The median citation count of Journal of Systems Architecture is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Editorial Board204
Active and passive virtual machine introspection on AMD and ARM processors201
Lifetime improvement through adaptive reconfiguration for nonvolatile FPGAs172
The BH-mixed scheduling algorithm for DAG tasks with constrained deadlines94
Loop interchange and tiling for multi-dimensional loops to minimize write operations on NVMs89
Balancing I/O and wear-out distribution inside SSDs with optimized cache management81
LAG-based schedulability analysis for preemptive global EDF scheduling with dynamic cache allocation76
BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations73
CREW: Computation reuse and efficient weight storage for hardware-accelerated MLPs and RNNs73
SHREG: Mitigating register redundancy in GPUs69
HEA-PAS: A hybrid energy allocation strategy for parallel applications scheduling on heterogeneous computing systems68
A survey and experimental analysis of checkpointing techniques for energy harvesting devices68
Energy efficient mixed task handling on real-time embedded systems using FreeRTOS59
The MicroRV32 framework: An accessible and configurable open source RISC-V cross-level platform for education and research56
Efficient CUDA stream management for multi-DNN real-time inference on embedded GPUs55
IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework55
DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN54
Blockchain-based decentralized data dissemination scheme in smart transportation53
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives53
Machine learning-based computation offloading in multi-access edge computing: A survey48
Electric vehicle charging network security: A survey48
Editorial Board44
PMSort: An adaptive sorting engine for persistent memory39
Computation-transferable authenticated key agreement protocol for smart healthcare38
Special issue on advances in reliable software technologies (AdaEurope20)38
Safe and secure platooning of Automated Guided Vehicles in Industry 4.038
TMI: Two-dimensional maintainability index for automotive software maintainability measurement37
Editorial Board37
IPCAS: An improved conditional privacy-preserving certificateless aggregate signature scheme without bilinear pairing for VANETs36
A Multi-hashing Index for hybrid DRAM-NVM memory systems36
Component-based architectural regression test selection for modularized software systems35
Contention-aware workflow scheduling on heterogeneous computing systems with shared buses35
Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme35
Joint optimization of layering and power allocation for scalable VR video in 6G networks based on Deep Reinforcement Learning33
CoqMatrix: Formal matrix library with multiple models in Coq33
DAC: A dynamic active and collaborative cache management scheme for solid state disks33
CoAxNN: Optimizing on-device deep learning with conditional approximate neural networks33
Optimized partitioning and priority assignment of real-time applications on heterogeneous platforms with hardware acceleration33
Process variation aware DRAM-Cache resizing32
An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT32
Preference-oriented partitioning for multiprocessor real-time systems32
Improving live migration efficiency in QEMU: An eBPF-based paravirtualized approach31
Special issue on Reliable Software Technologies (AEiC2021)31
A lightweight verifiable trust based data collection approach for sensor–cloud systems31
Energy-efficient scheduling for parallel applications with reliability and time constraints on heterogeneous distributed systems30
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage30
PADP-FedMeta: A personalized and adaptive differentially private federated meta learning mechanism for AIoT30
Energy-efficient scheduling of imprecise mixed-criticality real-time tasks based on genetic algorithm30
Towards a real-time IoT: Approaches for incoming packet processing in cyber–physical systems30
Editorial Board29
Editorial Board29
Editorial Board29
Editorial Board29
Editorial Board29
Parametric WCET as a function of procedure arguments: Analysis and applications28
Complex event models for automotive embedded systems28
On the methodology of three-way structured merge in version control systems: Top-down, bottom-up, or both27
Hardware-software co-exploration with racetrack memory based in-memory computing for CNN inference in embedded systems26
Fine-grained parallelism framework with predictable work-stealing for real-time multiprocessor systems26
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation25
Cloud security in the age of adaptive adversaries: A game theoretic approach to hypervisor-based intrusion detection25
PatternS: An intelligent hybrid memory scheduler driven by page pattern recognition25
Subversion resistant identity-based signature25
EDF-based Energy-Efficient Probabilistic Imprecise Mixed-Criticality Scheduling25
Energy-efficient acceleration of convolutional neural networks using computation reuse25
Hybrid differential privacy based federated learning for Internet of Things24
PEPA: Paillier cryptosystem-based efficient privacy-preserving authentication scheme for VANETs24
Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems24
A comprehensive survey of digital twins: Applications, technologies and security challenges24
Network traffic classification based on federated semi-supervised learning24
VCSA: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption24
Secure pairing-free certificateless aggregate signcryption scheme for IoT23
Gradient descent algorithm for the optimization of fixed priorities in real-time systems23
Pflow: An end-to-end heterogeneous acceleration framework for CNN inference on FPGAs23
BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles23
TCADer: A Tightly Coupled Accelerator Design framework for heterogeneous system with hardware/software co-design22
Structured precision skipping: Accelerating convolutional neural networks with budget-aware dynamic precision selection22
Editorial Board22
A cache-aware DAG scheduling method on multicores: Exploiting node affinity and deferred executions21
Data clustering on hybrid classical-quantum NISQ architecture with generative-based variational and parallel algorithms21
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio21
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking21
Process scenario discovery from event logs based on activity and timing information21
Dynamic computation scheduling for hybrid energy mobile edge computing networks21
Cooperative computation offloading and resource allocation for delay minimization in mobile edge computing21
Reformulating the direct convolution for high-performance deep learning inference on ARM processors21
Blockchain-based privacy-preserving public key searchable encryption with strong traceability20
A QoS-guaranteed online user data deployment method in edge cloud computing environment20
EVFL: An explainable vertical federated learning for data-oriented Artificial Intelligence systems20
DiVIT: Algorithm and architecture co-design of differential attention in vision transformer20
NLTSP: A cost model for tensor program tuning using nested loop trees20
MPTO-MT: A multi-period vehicular task offloading method in 5G HetNets20
Gated-CNN: Combating NBTI and HCI aging effects in on-chip activation memories of Convolutional Neural Network accelerators20
Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things19
Editorial Board19
SAMFL: Secure Aggregation Mechanism for Federated Learning with Byzantine-robustness by functional encryption19
Input/mapping precision controllable digital CIM with adaptive adder tree architecture for flexible DNN inference19
Blockchain-based authentication for IIoT devices with PUF19
The price of schedulability in cyclic workloads: The history-vs.-response-time-vs.-accuracy trade-off19
Conflict-aware compiler for hierarchical register file on GPUs19
Towards transferable adversarial attacks on vision transformers for image classification19
Robust communication-efficient decentralized learning with heterogeneity19
Towards correctness proof for hybrid Simulink block diagrams18
HB-ReTriple: Mobile rendering optimization based on efficient history reusing18
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth18
Evaluating single event upsets in deep neural networks for semantic segmentation: An embedded system perspective18
EXPPO: EXecution Performance Profiling and Optimization for CPS Co-simulation-as-a-Service18
Efficient stereo matching on embedded GPUs with zero-means cross correlation18
Blockchain-based auditing with data self-repair: From centralized system to distributed storage18
Secure and privacy-preserving quantum authentication scheme using blockchain identifiers in metaverse environment17
Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing17
Lyapunov optimized energy-efficient dynamic offloading with queue length constraints17
A survey on FANET routing from a cross-layer design perspective17
Secure fuzzy identity-based public verification for cloud storage17
Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review16
Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing16
Mobile Crowdsensing Model: A survey16
GraphA: An efficient ReRAM-based architecture to accelerate large scale graph processing15
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT15
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT15
Symbolic identification of shared memory based bank conflicts for GPUs15
ZNS-Cleaner: Enhancing lifespan by reducing empty erase in ZNS SSDs15
An Analyzable Inter-core Communication Framework for High-Performance Multicore Embedded Systems15
SmartDeCoup: Decoupling the STT-RAM LLC for even write distribution and lifetime improvement15
Optimizing encoding and repair for wide-stripe minimum bandwidth regenerating codes in in-memory key-value stores15
Provably secure public key encryption with keyword search for data outsourcing in cloud environments15
Achieving low write latency through new stealth program operation supporting early write completion in NAND flash memory15
A dual-index Boolean retrieval scheme with dynamic and revocable attribute-based policies15
A survey on techniques for improving Phase Change Memory (PCM) lifetime14
BIDS: An efficient Intrusion Detection System for in-vehicle networks using a two-stage Binarised Neural Network on low-cost FPGA14
Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things14
Litmus-RT plugins for global static scheduling of mixed criticality systems14
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks14
Non-interactive set intersection for privacy-preserving contact tracing14
Low-latency service function chain migration in edge-core networks based on open Jackson networks14
RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage14
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters14
MADDPG-based task offloading and resource pricing in edge collaboration environment14
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges14
A survey on routing algorithm and router microarchitecture of three-dimensional Network-on-Chip14
MTS-LSTDM: Multi-Time-Scale Long Short-Term Double Memory for power load forecasting14
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems14
A qualitative cybersecurity analysis of time-triggered communication networks in automotive systems14
Enabling PIM-based AES encryption for online video streaming13
CFIO: A conflict-free I/O mechanism to fully exploit internal parallelism for Open-Channel SSDs13
A hybrid controller for safe and efficient longitudinal collision avoidance control13
A memory footprint optimization framework for Python applications targeting edge devices13
A lattice-based designated-server public-key authenticated encryption with keyword search13
Editorial Board13
The rCOS framework for multi-dimensional separation of concerns in model-driven engineering13
GTA: Generating high-performance tensorized program with dual-task scheduling13
Corrigendum to ‘Fine-Grained Parallelism Framework with Predictable Work-Stealing for Real-Time Multiprocessor Systems’ Journal of Systems Architecture Vol. 124, March 2022, Article Number 10239313
Computation of tight bounds for the worst-case end-to-end delay on Avionics Full-Duplex Switched Ethernet13
BDACD: Blockchain-based decentralized auditing supporting ciphertext deduplication12
Fast post-quantum private set intersection from oblivious pseudorandom function for mobile social networks12
Multi-objective uplink data transmission optimization for edge computing in UAV-assistant mobile wireless sensor networks12
A survey on privacy preservation techniques for blockchain interoperability12
Reducing Errors and Powers in LPDDR for DNN Inference: A Compression and IECC-Based Approach12
Online energy-efficient scheduling of DAG tasks on heterogeneous embedded platforms12
μScope: Evaluating storage stack robustness against SSD’s latency va12
Lightweight asynchronous scheduling in heterogeneous reconfigurable systems12
Comparing timed-division multiplexing and best-effort networks-on-chip12
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network12
QBLKe: Host-side flash translation layer management for Open-Channel SSDs12
ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor12
Optimum: Runtime optimization for multiple mixed model deployment deep learning inference12
Optimal computational resource pricing in vehicular edge computing: A Stackelberg game approach12
Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer12
A redesigned secure and efficient data transaction protocol for mobile payment system12
Towards efficient and robust intelligent mobile vision system via small object aware parallel offloading12
Resource-aware Montgomery modular multiplication optimization for digital signal processing12
Editorial Board11
A convolutional autoencoder architecture for robust network intrusion detection in embedded systems11
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control11
A quantitative blind area risks assessment method for safe driving assistance11
IEmu: Interrupt modeling from the logic hidden in the firmware11
Distrusting cores by separating computation from isolation11
Communication compression techniques in distributed deep learning: A survey11
IRO: Integrity–Reliability enhanced Ring ORAM11
A survey and taxonomy of consensus protocols for blockchains11
Packet-in request redirection: A load-balancing mechanism for minimizing control plane response time in SDNs11
An energy-efficient near-data processing accelerator for DNNs to optimize memory accesses11
Formal domain-driven system development in Event-B: Application to interactive critical systems11
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system11
Enabling memory access isolation in real-time cloud systems using Intel’s detection/regulation capabilities11
Migration-aware slot-based memory request scheduler to guarantee QoS in DRAM-PCM hybrid memories10
An online dynamic pricing framework for resource allocation in edge computing10
A federated deep learning framework for privacy preservation and communication efficiency10
Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage10
Efficient persistent memory file systems using virtual superpages with multi-level allocator10
Performance and reliability optimization for high-density flash-based hybrid SSDs10
Achieving safety and performance with reconfiguration protocol for ethernet TSN in automotive systems10
An efficient bandwidth-adaptive gradient compression algorithm for distributed training of deep neural networks10
Certificateless public auditing scheme with sensitive information hiding for data sharing in cloud storage10
Maximising mobile user experience through self-adaptive content- and ambient-aware display brightness scaling10
Unishyper: A Rust-based unikernel enhancing reliability and efficiency of embedded systems10
Federated time persistency in intermittently powered IoT systems10
Implications of architecture and implementation choices on timing analysis of automotive CAN networks10
ATTEST: Automating the review and update of assurance case arguments10
Efficient registration-based signature schemes10
Bus-contention aware WCRT analysis for the 3-phase task model considering a work-conserving bus arbitration scheme10
SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks10
TaintGuard: Preventing implicit privilege leakage in smart contract based on taint tracking at abstract syntax tree level10
Improving the robustness of industrial Cyber–Physical Systems through machine learning-based performance anomaly identification10
BANSIM: A new discrete-event simulator for wireless body area networks with deep reinforcement learning in Python10
Attribute-based searchable encryption with decentralized key management for healthcare data sharing10
Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption10
A framework for static analysis and verification of low-level RTOS code10
Secure olympics games with technology: Intelligent border surveillance for the 2022 Beijing winter olympics9
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems9
Enhancing privacy in cyber–physical systems: An efficient blockchain-assisted data-sharing scheme with deniability9
Editorial Board9
Data-driven barrier certificate generation using deep learning and symbolic regression9
Multi-client functional encryption for set intersection with non-monotonic access structures in federated learning9
Subtraction of Hyperledger Fabric: A blockchain-based lightweight storage mechanism for digital evidences9
FDAN: Fuzzy deep attention networks for driver behavior recognition9
Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems9
FastCache: A write-optimized edge storage system via concurrent merging cache for IoT applications9
Forward and backward secure updatable ElGamal encryption scheme for cloud storage9
EBIAC: Efficient biometric identity-based access control for wireless body area networks9
IPDALight: Intensity- and phase duration-aware traffic signal control based on Reinforcement Learning9
Bit-error-rate aware sensing-error correction interaction in spintronic MRAM9
Error correction and erasure codes for robust network steganography9
TSSA: Task structure-aware scheduling of energy-constrained parallel applications on heterogeneous distributed embedded platforms9
SOFIA: An automated framework for early soft error assessment, identification, and mitigation8
Edge-aided searchable data sharing scheme for IoV in the 5G environment8
Editorial Board8
HiEval: A scheduling performance estimation approach for spatial accelerators via hierarchical abstraction8
E-Audit: Distinguishing and investigating suspicious events for APTs attack detection8
Towards mutation testing of Reinforcement Learning systems8
Fair and size-scalable participant selection framework for large-scale mobile crowdsensing8
A survey of SRAM-based in-memory computing techniques and applications8
BeeFlow: Behavior tree-based Serverless workflow modeling and scheduling for resource-constrained edge clusters8
Computing exact WCRT for typed DAG tasks on heterogeneous multi-core processors8
An open source framework based on Kafka-ML for Distributed DNN inference over the Cloud-to-Things continuum8
Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay8
UAV-assisted dependency-aware computation offloading in device–edge–cloud collaborative computing based on improved actor–critic DRL8
A contract-based semantics and refinement for hybrid Simulink block diagrams8
A server-aided secure interval test and comparison protocol with OPRF8
SAR: Sharpness-Aware minimization for enhancing DNNs’ Robustness against bit-flip errors7
Cache eviction for SSD-HDD hybrid storage based on sequential packing7
Real-time intelligent on-device monitoring of heart rate variability with PPG sensors7
FSbrain: An intelligent I/O performance tuning system7
Editorial Board7
Cold start latency mitigation mechanisms in serverless computing: Taxonomy, review, and future directions7
An SGX-based online voting protocol with maximum voter privacy7
Memory-efficient deep learning inference with incremental weight loading and data layout reorganization on edge systems7
High performance and energy efficient inference for deep learning on multicore ARM processors using general optimization techniques and BLIS7
Hardware-aware liquid state machine generation for 2D/3D Network-on-Chip platforms7
IDERES: Intrusion detection and response system using machine learning and attack graphs7
0.099385976791382