Journal of Systems Architecture

Papers
(The TQCC of Journal of Systems Architecture is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Loop interchange and tiling for multi-dimensional loops to minimize write operations on NVMs195
LAG-based schedulability analysis for preemptive global EDF scheduling with dynamic cache allocation100
Active and passive virtual machine introspection on AMD and ARM processors98
Editorial Board94
Lifetime improvement through adaptive reconfiguration for nonvolatile FPGAs84
The BH-mixed scheduling algorithm for DAG tasks with constrained deadlines78
Blockchain-based decentralized data dissemination scheme in smart transportation76
Mul_STK: Efficient and privacy-preserving query with spatio-temporal-keyword multiple attributes in cloud computing73
DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN71
Energy efficient mixed task handling on real-time embedded systems using FreeRTOS66
SHREG: Mitigating register redundancy in GPUs64
Electric vehicle charging network security: A survey63
Balancing I/O and wear-out distribution inside SSDs with optimized cache management63
BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations60
HEA-PAS: A hybrid energy allocation strategy for parallel applications scheduling on heterogeneous computing systems57
Efficient maximum reaction time analysis for data chains of real-time tasks in multiprocessor systems52
The MicroRV32 framework: An accessible and configurable open source RISC-V cross-level platform for education and research48
A survey and experimental analysis of checkpointing techniques for energy harvesting devices45
Machine learning-based computation offloading in multi-access edge computing: A survey45
CATS: Clean-label backdoor attack on speech recognition via speech synthesis45
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives40
CREW: Computation reuse and efficient weight storage for hardware-accelerated MLPs and RNNs40
An FPGA-based accelerator design methodology for smart UAVs in precision agriculture: A case study40
Efficient CUDA stream management for multi-DNN real-time inference on embedded GPUs40
Sample-adaptive multi-branch network for efficient inference under time constraints40
Component-based architectural regression test selection for modularized software systems39
Editorial Board39
IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework39
IPCAS: An improved conditional privacy-preserving certificateless aggregate signature scheme without bilinear pairing for VANETs38
Joint optimization of layering and power allocation for scalable VR video in 6G networks based on Deep Reinforcement Learning37
TMI: Two-dimensional maintainability index for automotive software maintainability measurement37
CoAxNN: Optimizing on-device deep learning with conditional approximate neural networks37
Edge-assisted lightweight message authentication for Industrial Internet of Things37
Editorial Board37
DAC: A dynamic active and collaborative cache management scheme for solid state disks36
A Multi-hashing Index for hybrid DRAM-NVM memory systems35
Contention-aware workflow scheduling on heterogeneous computing systems with shared buses35
Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme35
CoqMatrix: Formal matrix library with multiple models in Coq34
Process variation aware DRAM-Cache resizing34
Improving live migration efficiency in QEMU: An eBPF-based paravirtualized approach34
An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT34
Special issue on Reliable Software Technologies (AEiC2021)34
Optimized partitioning and priority assignment of real-time applications on heterogeneous platforms with hardware acceleration33
Preference-oriented partitioning for multiprocessor real-time systems33
Energy-efficient scheduling of imprecise mixed-criticality real-time tasks based on genetic algorithm33
Towards a real-time IoT: Approaches for incoming packet processing in cyber–physical systems32
An efficient and compatible authenticated key exchange protocol with leakage resilience for heterogeneous client–server environments32
PADP-FedMeta: A personalized and adaptive differentially private federated meta learning mechanism for AIoT31
Energy-efficient scheduling for parallel applications with reliability and time constraints on heterogeneous distributed systems30
A secure data sharing scheme based on searchable public key encryption for authorized multi-receiver30
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage29
Editorial Board28
Editorial Board28
Subversion resistant identity-based signature27
PEPA: Paillier cryptosystem-based efficient privacy-preserving authentication scheme for VANETs27
Fine-grained parallelism framework with predictable work-stealing for real-time multiprocessor systems26
EDF-based Energy-Efficient Probabilistic Imprecise Mixed-Criticality Scheduling26
On the methodology of three-way structured merge in version control systems: Top-down, bottom-up, or both26
Synchronous VS asynchronous reconfiguration of Memory Bandwidth Management Schemes: A comparative analysis26
Editorial Board25
Editorial Board25
Energy-efficient acceleration of convolutional neural networks using computation reuse24
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation24
Efficient Dropout-resilient and Verifiable Federated learning scheme for AIoT healthcare system24
Hardware-software co-exploration with racetrack memory based in-memory computing for CNN inference in embedded systems24
PatternS: An intelligent hybrid memory scheduler driven by page pattern recognition23
Complex event models for automotive embedded systems23
Cloud security in the age of adaptive adversaries: A game theoretic approach to hypervisor-based intrusion detection23
Secure pairing-free certificateless aggregate signcryption scheme for IoT23
Network traffic classification based on federated semi-supervised learning22
Gradient descent algorithm for the optimization of fixed priorities in real-time systems22
Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems22
A comprehensive survey of digital twins: Applications, technologies and security challenges22
VCSA: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption22
TCADer: A Tightly Coupled Accelerator Design framework for heterogeneous system with hardware/software co-design21
Hybrid differential privacy based federated learning for Internet of Things21
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio21
Bit-level compiler optimization for ultra low-power embedded systems21
Parametric WCET as a function of procedure arguments: Analysis and applications21
On container vulnerabilities in edge computing: A fix-on-deployment approach21
Pflow: An end-to-end heterogeneous acceleration framework for CNN inference on FPGAs21
BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles21
Structured precision skipping: Accelerating convolutional neural networks with budget-aware dynamic precision selection20
Input/mapping precision controllable digital CIM with adaptive adder tree architecture for flexible DNN inference20
Blockchain-based privacy-preserving public key searchable encryption with strong traceability20
PBR: An efficient rounding and branch-and-bound-based task offloading approach for Low Earth Orbit Satellite Edge Computing20
FedMQ+: Towards efficient heterogeneous federated learning with multi-grained quantization20
SAMFL: Secure Aggregation Mechanism for Federated Learning with Byzantine-robustness by functional encryption20
NLTSP: A cost model for tensor program tuning using nested loop trees20
SecScale : A Scalable and Secure Trusted Execution Environment for Servers20
Editorial Board19
Gated-CNN: Combating NBTI and HCI aging effects in on-chip activation memories of Convolutional Neural Network accelerators19
Reformulating the direct convolution for high-performance deep learning inference on ARM processors19
Towards transferable adversarial attacks on vision transformers for image classification18
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking18
A cache-aware DAG scheduling method on multicores: Exploiting node affinity and deferred executions18
SAR-DetAttack: GAN-based adversarial attack with transfer learning for ship detection in satellite SAR images18
Dynamic computation scheduling for hybrid energy mobile edge computing networks18
MPTO-MT: A multi-period vehicular task offloading method in 5G HetNets18
LARDM: Lightweight and aggregation-driven real-time detection and mitigation of volumetric DDoS attacks in the programmable data plane18
Data clustering on hybrid classical-quantum NISQ architecture with generative-based variational and parallel algorithms18
Engineering SRAM-PUF on Arduino microcontroller18
DiVIT: Algorithm and architecture co-design of differential attention in vision transformer17
Optimizing encoding and repair for wide-stripe minimum bandwidth regenerating codes in in-memory key-value stores17
Process scenario discovery from event logs based on activity and timing information17
EVFL: An explainable vertical federated learning for data-oriented Artificial Intelligence systems17
Blockchain-based auditing with data self-repair: From centralized system to distributed storage17
Balancing privacy and fairness: Client selection in differential privacy-based federated learning17
Secure and privacy-preserving quantum authentication scheme using blockchain identifiers in metaverse environment17
Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things17
Provably secure public key encryption with keyword search for data outsourcing in cloud environments16
Towards correctness proof for hybrid Simulink block diagrams16
HB-ReTriple: Mobile rendering optimization based on efficient history reusing16
Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing16
Conflict-aware compiler for hierarchical register file on GPUs16
Lyapunov optimized energy-efficient dynamic offloading with queue length constraints16
Editorial Board16
Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review16
Blockchain-based authentication for IIoT devices with PUF15
Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing15
ZNS-Cleaner: Enhancing lifespan by reducing empty erase in ZNS SSDs15
Secure fuzzy identity-based public verification for cloud storage15
Log2Evt: Constructing high-level events for IoT Systems through log-code execution path correlation15
Scheduling virtual machines and containers: A comparative review of techniques, performance, and future trends15
Robust communication-efficient decentralized learning with heterogeneity15
GraphA: An efficient ReRAM-based architecture to accelerate large scale graph processing14
Mobile Crowdsensing Model: A survey14
SADDLE: A runtime feedback control architecture for adaptive distributed deep learning in heterogeneous GPU clusters14
A lattice-based designated-server public-key authenticated encryption with keyword search14
Eidos revisited: Expanding Efficient, imperceptible adversarial attacks on 3D point clouds14
HeterScale: A hierarchical task scheduling framework for intelligent edge collaboration in IIOT14
Evaluating single event upsets in deep neural networks for semantic segmentation: An embedded system perspective14
GTA: Generating high-performance tensorized program with dual-task scheduling14
CFIO: A conflict-free I/O mechanism to fully exploit internal parallelism for Open-Channel SSDs14
Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things14
Non-interactive set intersection for privacy-preserving contact tracing14
Efficient stereo matching on embedded GPUs with zero-means cross correlation14
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth14
A survey on techniques for improving Phase Change Memory (PCM) lifetime14
SmartDeCoup: Decoupling the STT-RAM LLC for even write distribution and lifetime improvement14
A dual-index Boolean retrieval scheme with dynamic and revocable attribute-based policies14
A survey on routing algorithm and router microarchitecture of three-dimensional Network-on-Chip14
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT13
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT13
RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage13
MADDPG-based task offloading and resource pricing in edge collaboration environment13
Enabling PIM-based AES encryption for online video streaming13
Achieving low write latency through new stealth program operation supporting early write completion in NAND flash memory13
MTS-LSTDM: Multi-Time-Scale Long Short-Term Double Memory for power load forecasting13
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems13
Symbolic identification of shared memory based bank conflicts for GPUs13
A qualitative cybersecurity analysis of time-triggered communication networks in automotive systems13
Nis-PoW: Non-interactive secure Proof of Ownership for cloud storage13
Accelerating on-device visual task adaptation by exploiting hybrid sparsity in DNN training13
A quantitative blind area risks assessment method for safe driving assistance12
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges12
Resource-aware Montgomery modular multiplication optimization for digital signal processing12
μScope: Evaluating storage stack robustness against SSD’s latency va12
A memory footprint optimization framework for Python applications targeting edge devices12
Unmixing gradients: Uncovering persistent leakage in Federated Learning via Independent Component Analysis12
BIDS: An efficient Intrusion Detection System for in-vehicle networks using a two-stage Binarised Neural Network on low-cost FPGA12
Computation of tight bounds for the worst-case end-to-end delay on Avionics Full-Duplex Switched Ethernet12
The rCOS framework for multi-dimensional separation of concerns in model-driven engineering12
Optimum: Runtime optimization for multiple mixed model deployment deep learning inference12
Low-latency service function chain migration in edge-core networks based on open Jackson networks12
Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer12
Communication compression techniques in distributed deep learning: A survey12
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system12
A redesigned secure and efficient data transaction protocol for mobile payment system12
A convolutional autoencoder architecture for robust network intrusion detection in embedded systems11
Lightweight asynchronous scheduling in heterogeneous reconfigurable systems11
Towards efficient and robust intelligent mobile vision system via small object aware parallel offloading11
Multi-objective uplink data transmission optimization for edge computing in UAV-assistant mobile wireless sensor networks11
A survey and taxonomy of consensus protocols for blockchains11
An energy-efficient near-data processing accelerator for DNNs to optimize memory accesses11
A hybrid controller for safe and efficient longitudinal collision avoidance control11
Editorial Board11
Corrigendum to ‘Fine-Grained Parallelism Framework with Predictable Work-Stealing for Real-Time Multiprocessor Systems’ Journal of Systems Architecture Vol. 124, March 2022, Article Number 10239311
Reducing Errors and Powers in LPDDR for DNN Inference: A Compression and IECC-Based Approach11
Online energy-efficient scheduling of DAG tasks on heterogeneous embedded platforms11
ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor11
Editorial Board11
Comparing timed-division multiplexing and best-effort networks-on-chip11
Fast post-quantum private set intersection from oblivious pseudorandom function for mobile social networks11
A survey on privacy preservation techniques for blockchain interoperability11
BDACD: Blockchain-based decentralized auditing supporting ciphertext deduplication11
Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage10
An online dynamic pricing framework for resource allocation in edge computing10
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control10
Migration-aware slot-based memory request scheduler to guarantee QoS in DRAM-PCM hybrid memories10
Efficient registration-based signature schemes10
ADCIM: scalable construction of approximate digital compute-in-memory MACRO for energy-efficient attention computation10
BANSIM: A new discrete-event simulator for wireless body area networks with deep reinforcement learning in Python10
Efficient one-to-one sharing: Public key matchmaking encryption10
Enabling memory access isolation in real-time cloud systems using Intel’s detection/regulation capabilities10
Formal domain-driven system development in Event-B: Application to interactive critical systems10
Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption10
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network10
IEmu: Interrupt modeling from the logic hidden in the firmware10
Federated time persistency in intermittently powered IoT systems10
Exploiting intra-chip locality for multi-chip GPUs via two-level shared L1 cache10
Editorial Board10
Packet-in request redirection: A load-balancing mechanism for minimizing control plane response time in SDNs10
Attribute-based searchable encryption with decentralized key management for healthcare data sharing10
Blocking analysis of real-time tasks with parallel critical sections under federated scheduling10
Maximising mobile user experience through self-adaptive content- and ambient-aware display brightness scaling10
TaintGuard: Preventing implicit privilege leakage in smart contract based on taint tracking at abstract syntax tree level10
A framework for static analysis and verification of low-level RTOS code9
A comprehensive survey of hardware-based security techniques from an architectural perspective9
IRO: Integrity–Reliability enhanced Ring ORAM9
A federated deep learning framework for privacy preservation and communication efficiency9
Performance and reliability optimization for high-density flash-based hybrid SSDs9
LB-CLBS: Lattice-based certificateless blind signature scheme for vehicle sensing within intelligent transportation9
Implications of architecture and implementation choices on timing analysis of automotive CAN networks9
Unishyper: A Rust-based unikernel enhancing reliability and efficiency of embedded systems9
ATTEST: Automating the review and update of assurance case arguments9
Improving the robustness of industrial Cyber–Physical Systems through machine learning-based performance anomaly identification9
FedPillarNet: Unifying personalized and global features for federated 3D LiDAR object detection9
Bridging TSN and 5G networks: Prototype design and evaluation for real-time embedded systems9
SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks9
An efficient bandwidth-adaptive gradient compression algorithm for distributed training of deep neural networks9
SMCCA: A sharded multi-task collaborative consensus algorithm for unmanned vehicle networks9
Secure task-worker matching and privacy-preserving scheme for blockchain-based federated crowdsourcing9
Distrusting cores by separating computation from isolation9
Certificateless public auditing scheme with sensitive information hiding for data sharing in cloud storage9
Bus-contention aware WCRT analysis for the 3-phase task model considering a work-conserving bus arbitration scheme9
DLLPM: Dual-layer location privacy matching in V2V energy trading9
Multi-client functional encryption for set intersection with non-monotonic access structures in federated learning9
MCED-H: An efficient scheduling policy for energy harvesting mixed-criticality real-time systems9
0.15627002716064