Journal of Systems Architecture

Papers
(The TQCC of Journal of Systems Architecture is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-10-01 to 2024-10-01.)
ArticleCitations
A Survey on Task Offloading in Multi-access Edge Computing136
TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning128
A survey on machine learning-based malware detection in executable files126
A survey on data center cooling systems: Technology, power consumption modeling and control strategy optimization118
Blockchain-based batch authentication protocol for Internet of Vehicles87
Time-Sensitive Networking in automotive embedded systems: State of the art and research opportunities84
A survey of deep learning techniques for vehicle detection from UAV images84
A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance76
Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review71
Cooperative computation offloading and resource allocation for delay minimization in mobile edge computing70
A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing68
A survey on security and authentication in wireless body area networks67
MEALPY: An open-source library for latest meta-heuristic algorithms in Python63
LAKAF: Lightweight authentication and key agreement framework for smart grid network62
A survey and taxonomy on energy management schemes in wireless sensor networks62
Task allocation algorithm and optimization model on edge collaboration61
Energy-aware scheduling for dependent tasks in heterogeneous multiprocessor systems58
A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography57
Accelerating CNN Inference on ASICs: A Survey56
Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability52
Certificateless authenticated key agreement for blockchain-based WBANs51
Attacking vision-based perception in end-to-end autonomous driving models50
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems50
Edge-based auditing method for data security in resource-constrained Internet of Things47
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain47
EVFL: An explainable vertical federated learning for data-oriented Artificial Intelligence systems46
A global-energy-aware virtual machine placement strategy for cloud data centers46
Rahasak—Scalable blockchain architecture for enterprise applications45
IoTSim-Osmosis: A framework for modeling and simulating IoT applications over an edge-cloud continuum45
PHDFS: Optimizing I/O performance of HDFS in deep learning cloud computing platform45
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives43
Wireless edge caching based on content similarity in dynamic environments43
RISC-V based virtual prototype: An extensible and configurable platform for the system-level43
An Efficient Privacy-preserving Authentication Model based on blockchain for VANETs42
A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems42
IntMA: Dynamic Interaction-aware resource allocation for containerized microservices in cloud environments41
A priority, power and traffic-aware virtual machine placement of IoT applications in cloud data centers41
Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment41
A survey of SRAM-based in-memory computing techniques and applications41
Middleware for the Internet of Things: A survey on requirements, enabling technologies, and solutions40
A review of 6G autonomous intelligent transportation systems: Mechanisms, applications and challenges40
Software-defined vehicular network (SDVN): A survey on architecture and routing40
An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments37
SparkNoC: An energy-efficiency FPGA-based accelerator using optimized lightweight CNN for edge computing37
Cost and makespan scheduling of workflows in clouds using list multiobjective optimization technique37
A survey and taxonomy of consensus protocols for blockchains36
Optimized co-scheduling of mixed-precision neural network accelerator for real-time multitasking applications36
On blockchain integration into mobile crowdsensing via smart embedded devices: A comprehensive survey35
Smart contract-based security architecture for collaborative services in municipal smart cities34
Towards dynamic safety assurance for Industry 4.033
Blockchain-assisted searchable attribute-based encryption for e-health systems33
A survey on vision-based driver distraction analysis32
A perspective on 6G: Requirement, technology, enablers, challenges and future road map31
Task scheduling with precedence and placement constraints for resource utilization improvement in multi-user MEC environment31
TOPSIS inspired Budget and Deadline Aware Multi-Workflow Scheduling for Cloud computing31
An efficient signcryption of heterogeneous systems for Internet of Vehicles31
A survey of accelerator architectures for 3D convolution neural networks31
A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT31
Tracking and analysing social interactions in dairy cattle with real-time locating system and machine learning29
An Efficient Certificateless Ring Signcryption Scheme With Conditional Privacy-Preserving in VANETs29
Online user allocation in mobile edge computing environments:A decentralized reactive approach29
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks28
A novel frame preemption model in TSN networks28
Joint task offloading and resource optimization in NOMA-based vehicular edge computing: A game-theoretic DRL approach28
Pairing-free certificateless authenticated encryption with keyword search28
A survey On hardware accelerators and optimization techniques for RNNs27
ADHD fMRI short-time analysis method for edge computing based on multi-instance learning27
Security analysis of Pan et al.’s “Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability”27
Towards holistic secure networking in connected vehicles through securing CAN-bus communication and firmware-over-the-air updating27
A smart cyber physical multi-source energy system for an electric vehicle prototype27
Optimizing deep neural networks on intelligent edge accelerators via flexible-rate filter pruning26
Benchmarking vision kernels and neural network inference accelerators on embedded platforms25
Bus network assisted drone scheduling for sustainable charging of wireless rechargeable sensor network25
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives25
Jellyfish dynamic routing protocol with mobile sink for location privacy and congestion avoidance in wireless sensor networks24
IPDALight: Intensity- and phase duration-aware traffic signal control based on Reinforcement Learning24
Fast-convergent federated learning with class-weighted aggregation24
Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks24
Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support24
Certificateless public key encryption with cryptographic reverse firewalls24
An open source framework based on Kafka-ML for Distributed DNN inference over the Cloud-to-Things continuum24
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system24
AucSwap: A Vickrey auction modeled decentralized cross-blockchain asset transfer protocol23
SEAMERS: A Semi-partitioned Energy-Aware scheduler for heterogeneous MulticorE Real-time Systems23
Privacy-preserving incentive mechanism for multi-leader multi-follower IoT-edge computing market: A reinforcement learning approach23
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters23
Safe and secure platooning of Automated Guided Vehicles in Industry 4.023
A survey of techniques for optimizing transformer inference22
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes22
Multi-range bidirectional mask graph convolution based GRU networks for traffic prediction21
TS-ABOS-CMS: time-bounded secure attribute-based online/offline signature with constant message size for IoT systems21
A multi-model based microservices identification approach21
An identity-based proxy re-encryption for data deduplication in cloud21
Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography21
Storage as a service in Fog computing : A systematic review21
Distributed task allocation in Mobile Device Cloud exploiting federated learning and subjective logic21
Light-weight AI and IoT collaboration for surveillance video pre-processing20
Computation-transferable authenticated key agreement protocol for smart healthcare20
An interoperable and flat Industrial Internet of Things architecture for low latency data collection in manufacturing systems20
Enhancing Internet of Things Security using Software-Defined Networking20
A federated deep learning framework for privacy preservation and communication efficiency20
SimEdgeIntel: A open-source simulation platform for resource management in edge intelligence19
Guiding assurance of architectural design patterns for critical applications19
A survey on FANET routing from a cross-layer design perspective19
Worst-case traversal time analysis of TSN with multi-level preemption19
A lightweight verifiable trust based data collection approach for sensor–cloud systems19
IoT Device security through dynamic hardware isolation with cloud-Based update19
Efficient stereo matching on embedded GPUs with zero-means cross correlation19
Hybrid differential privacy based federated learning for Internet of Things19
BZIP: A compact data memory system for UTXO-based blockchains19
ClarifyNet: A high-pass and low-pass filtering based CNN for single image dehazing19
A survey of energy-aware scheduling in mixed-criticality systems19
FastHand: Fast monocular hand pose estimation on embedded systems18
A systematic analysis of power saving techniques for wireless network-on-chip architectures18
Autoware_Perf: A tracing and performance analysis framework for ROS 2 applications18
ID-CEPPA: Identity-based Computationally Efficient Privacy-Preserving Authentication scheme for vehicle-to-vehicle communications18
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT18
Stackelberg game-based task offloading and pricing with computing capacity constraint in mobile edge computing18
A survey on hardware security of DNN models and accelerators18
JORA: Blockchain-based efficient joint computing offloading and resource allocation for edge video streaming systems18
A comprehensive systematic review of integration of time sensitive networking and 5G communication17
Teegraph: A Blockchain consensus algorithm based on TEE and DAG for data sharing in IoT17
Dynamic resource allocation for jointing vehicle-edge deep neural network inference17
EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles17
IDERES: Intrusion detection and response system using machine learning and attack graphs17
Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things17
Optimal computational resource pricing in vehicular edge computing: A Stackelberg game approach17
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges17
GraphA: An efficient ReRAM-based architecture to accelerate large scale graph processing16
Anomaly detection in bitcoin information networks with multi-constrained meta path16
Efficient Reservation-based Fault-Tolerant Scheduling for IEEE 802.1Qbv Time-Sensitive Networking16
Energy efficient EDF-VD-based mixed-criticality scheduling with shared resources16
Intrusion detection based on improved density peak clustering for imbalanced data on sensor-cloud systems16
DMSE: Dynamic Multi-keyword Search Encryption based on inverted index16
DRL-GAT-SA: Deep reinforcement learning for autonomous driving planning based on graph attention networks and simplex architecture16
Domain-specific scenarios for refinement-based methods16
SSD internal cache management policies: A survey16
A flexible attribute based data access management scheme for sensor-cloud system15
Task migration optimization for guaranteeing delay deadline with mobility consideration in mobile edge computing15
A blockchain-based fine-grained data sharing scheme for e-healthcare system15
MBBNet: An edge IoT computing-based traffic light detection solution for autonomous bus15
ML-driven classification scheme for dynamic interference-aware resource scheduling in cloud infrastructures15
ESSA: An energy-Aware bit-Serial streaming deep convolutional neural network accelerator15
A survey on silicon PUFs15
ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor15
Blockchain-based authentication for IIoT devices with PUF15
Achieving safety and performance with reconfiguration protocol for ethernet TSN in automotive systems15
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network14
SSBAS-FA: A secure sealed-bid e-auction scheme with fair arbitration based on time-released blockchain14
Memory-efficient deep learning inference with incremental weight loading and data layout reorganization on edge systems14
Blockchain-based decentralized data dissemination scheme in smart transportation14
Secure content based image retrieval for mobile users with deep neural networks in the cloud14
CURATING: A multi-objective based pruning technique for CNNs14
A privacy-preserving resource trading scheme for Cloud Manufacturing with edge-PLCs in IIoT14
Distributed learning dynamics of Multi-Armed Bandits for edge intelligence13
Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems13
Dynamic-weighted simplex strategy for learning enabled cyber physical systems13
Reformulating the direct convolution for high-performance deep learning inference on ARM processors13
A survey of techniques for intermittent computing13
Cooperative task assignment in spatial crowdsourcing via multi-agent deep reinforcement learning13
Binary convolutional neural network acceleration framework for rapid system prototyping13
A genetic algorithm based energy efficient group paging approach for IoT over 5G13
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth12
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control12
A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse12
Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud12
TARTS: A Temperature-Aware Real-Time Deadline-Partitioned Fair Scheduler12
Dynamic task allocation and scheduling with contention-awareness for Network-on-Chip based multicore systems12
Democratic learning: hardware/software co-design for lightweight blockchain-secured on-device machine learning12
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking12
Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks12
Efficient algorithms for task mapping on heterogeneous CPU/GPU platforms for fast completion time12
Privacy attacks against deep learning models and their countermeasures11
A survey on cybersecurity attacks and defenses for unmanned aerial systems11
Anomaly detection based on multi-teacher knowledge distillation11
Energy efficient mixed task handling on real-time embedded systems using FreeRTOS11
A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance11
Energy efficient backup overloading schemes for fault tolerant scheduling of real-time tasks11
On-demand deployment for IoT applications11
SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems11
Efficient and provably secure multi-receiver signcryption scheme using implicit certificate in edge computing11
Optimized partitioning and priority assignment of real-time applications on heterogeneous platforms with hardware acceleration11
How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation11
The MicroRV32 framework: An accessible and configurable open source RISC-V cross-level platform for education and research11
MTS-LSTDM: Multi-Time-Scale Long Short-Term Double Memory for power load forecasting11
Fault-Tolerant Application Mapping on Mesh-of-Tree based Network-on-Chip11
A QoS-guaranteed online user data deployment method in edge cloud computing environment11
Federated scheduling for Typed DAG tasks scheduling analysis on heterogeneous multi-cores11
A survey on privacy preservation techniques for blockchain interoperability11
Palisade: A framework for anomaly detection in embedded systems11
A survey and experimental analysis of checkpointing techniques for energy harvesting devices11
DVFS-based energy-aware scheduling of imprecise mixed-criticality real-time tasks11
Secure fuzzy identity-based public verification for cloud storage10
A more efficient public-key authenticated encryption scheme with keyword search10
Secure auditing and deduplication with efficient ownership management for cloud storage10
Accelerating DNNs from local to virtualized FPGA in the Cloud: A survey of trends10
Formal modeling and verification of UML Activity Diagrams (UAD) with FoCaLiZe10
Understanding security failures of anonymous authentication schemes for cloud environments10
Queue assignment for fixed-priority real-time flows in time-sensitive networks: Hardness and algorithm10
Latency upper bound for data chains of real-time periodic tasks10
An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage10
Adversarial attacks and defenses in Speaker Recognition Systems: A survey10
Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things10
Edge based authentication protocol for vehicular communications without trusted party communication10
A faster outsourced medical image retrieval scheme with privacy preservation10
Digital signature with cryptographic reverse firewalls10
A review of sensory interactions between autonomous vehicles and drivers10
Bridging the gap between formal verification and schedulability analysis: The case of robotics10
Hybrid short-term traffic forecasting architecture and mechanisms for reservation-based Cooperative ITS10
A survey on Attribute-Based Signatures9
A survey on program-state retention for transiently-powered systems9
Towards Linux based safety systems—A statistical approach for software execution path coverage9
HEA-PAS: A hybrid energy allocation strategy for parallel applications scheduling on heterogeneous computing systems9
CLARINET: A quire-enabled RISC-V-based framework for posit arithmetic empiricism9
ICAS: Two-factor identity-concealed authentication scheme for remote-servers9
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems9
On-chip hyperspectral image segmentation with fully convolutional networks for scene understanding in autonomous driving9
Resource-aware multi-task offloading and dependency-aware scheduling for integrated edge-enabled IoV9
Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer9
Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber–physical systems9
Cost-effective fixed-point hardware support for RISC-V embedded systems9
FedDQ: A communication-efficient federated learning approach for Internet of Vehicles9
REALISM: Reliability-aware energy management in multi-level mixed-criticality systems with service level degradation9
SymEx-VP: An open source virtual prototype for OS-agnostic concolic testing of IoT firmware9
An efficient real-time accelerator for high-accuracy DNN-based optical flow estimation in FPGA9
A two-layer optimal scheduling framework for energy savings in a data center for Cyber–Physical–Social Systems9
Low-latency service function chain migration in edge-core networks based on open Jackson networks9
Efficient heterogeneous signcryption scheme based on Edge Computing for Industrial Internet of Things9
Edge intelligence in motion: Mobility-aware dynamic DNN inference service migration with downtime in mobile edge computing9
CUPID: A labeled dataset with Pentesting for evaluation of network intrusion detection9
0.03618597984314