Journal of Systems Architecture

Papers
(The TQCC of Journal of Systems Architecture is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
SHREG: Mitigating register redundancy in GPUs178
Efficient CUDA stream management for multi-DNN real-time inference on embedded GPUs166
Electric vehicle charging network security: A survey153
A genetic simulation strategy: Application to single-fault analysis of TTEthernet synchronization protocol132
Editorial Board103
Crown-scheduling of sets of parallelizable tasks for robustness and energy-elasticity on many-core systems with discrete dynamic voltage and frequency scaling100
The MicroRV32 framework: An accessible and configurable open source RISC-V cross-level platform for education and research93
Implementing synchronous reactive components upon multiprocessor platforms84
CURATING: A multi-objective based pruning technique for CNNs82
Guest Editorial: Special issue on parallel, distributed, and network-based processing in next-generation embedded systems74
HEA-PAS: A hybrid energy allocation strategy for parallel applications scheduling on heterogeneous computing systems66
Active and passive virtual machine introspection on AMD and ARM processors63
The BH-mixed scheduling algorithm for DAG tasks with constrained deadlines62
Lifetime improvement through adaptive reconfiguration for nonvolatile FPGAs62
Energy efficient mixed task handling on real-time embedded systems using FreeRTOS60
Loop interchange and tiling for multi-dimensional loops to minimize write operations on NVMs60
CREW: Computation reuse and efficient weight storage for hardware-accelerated MLPs and RNNs57
BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations55
DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN54
Balancing I/O and wear-out distribution inside SSDs with optimized cache management52
A survey and experimental analysis of checkpointing techniques for energy harvesting devices52
LAG-based schedulability analysis for preemptive global EDF scheduling with dynamic cache allocation51
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives51
Blockchain-based decentralized data dissemination scheme in smart transportation51
Machine learning-based computation offloading in multi-access edge computing: A survey51
IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework50
Editorial Board48
IPCAS: An improved conditional privacy-preserving certificateless aggregate signature scheme without bilinear pairing for VANETs48
CoAxNN: Optimizing on-device deep learning with conditional approximate neural networks47
PMSort: An adaptive sorting engine for persistent memory47
Joint optimization of layering and power allocation for scalable VR video in 6G networks based on Deep Reinforcement Learning47
Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme46
DAC: A dynamic active and collaborative cache management scheme for solid state disks46
Component-based architectural regression test selection for modularized software systems45
Special issue on advances in reliable software technologies (AdaEurope20)44
A Multi-hashing Index for hybrid DRAM-NVM memory systems44
Editorial Board43
Computation-transferable authenticated key agreement protocol for smart healthcare42
Dynamic task allocation and scheduling with contention-awareness for Network-on-Chip based multicore systems42
Safe and secure platooning of Automated Guided Vehicles in Industry 4.039
Optimized partitioning and priority assignment of real-time applications on heterogeneous platforms with hardware acceleration37
An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT35
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage34
CoqMatrix: Formal matrix library with multiple models in Coq33
Energy-efficient scheduling of imprecise mixed-criticality real-time tasks based on genetic algorithm33
Energy-efficient scheduling for parallel applications with reliability and time constraints on heterogeneous distributed systems32
Towards a real-time IoT: Approaches for incoming packet processing in cyber–physical systems32
Digital signature with cryptographic reverse firewalls32
Adaptive simulation with Virtual Prototypes in an open-source RISC-V evaluation platform32
Process variation aware DRAM-Cache resizing32
Preference-oriented partitioning for multiprocessor real-time systems32
Hardware accelerator for an accurate local stereo matching algorithm using binary neural network32
Special issue on Reliable Software Technologies (AEiC2021)31
Improving live migration efficiency in QEMU: An eBPF-based paravirtualized approach31
A generalized approach to real-time, non-intrusive instrumentation and monitoring of standards-based distributed middleware30
PADP-FedMeta: A personalized and adaptive differentially private federated meta learning mechanism for AIoT30
A lightweight verifiable trust based data collection approach for sensor–cloud systems30
Energy-efficient acceleration of convolutional neural networks using computation reuse29
Editorial Board29
Editorial Board28
An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification28
Pflow: An end-to-end heterogeneous acceleration framework for CNN inference on FPGAs28
Editorial Board28
Editorial Board28
Hardware-software co-exploration with racetrack memory based in-memory computing for CNN inference in embedded systems27
Cloud security in the age of adaptive adversaries: A game theoretic approach to hypervisor-based intrusion detection27
Editorial Board27
Parametric WCET as a function of procedure arguments: Analysis and applications26
On the methodology of three-way structured merge in version control systems: Top-down, bottom-up, or both26
Complex event models for automotive embedded systems25
EDF-based Energy-Efficient Probabilistic Imprecise Mixed-Criticality Scheduling25
Gradient descent algorithm for the optimization of fixed priorities in real-time systems25
A public key encryption scheme based on a new variant of LWE with small cipher size25
Fine-grained parallelism framework with predictable work-stealing for real-time multiprocessor systems25
Subversion resistant identity-based signature24
REALISM: Reliability-aware energy management in multi-level mixed-criticality systems with service level degradation24
Secure pairing-free certificateless aggregate signcryption scheme for IoT24
VCSA: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption24
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation24
PEPA: Paillier cryptosystem-based efficient privacy-preserving authentication scheme for VANETs24
PatternS: An intelligent hybrid memory scheduler driven by page pattern recognition24
Hybrid differential privacy based federated learning for Internet of Things23
BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles23
Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems23
Structured precision skipping: Accelerating convolutional neural networks with budget-aware dynamic precision selection22
A comprehensive survey of digital twins: Applications, technologies and security challenges22
Network traffic classification based on federated semi-supervised learning22
Editorial Board22
SparkNoC: An energy-efficiency FPGA-based accelerator using optimized lightweight CNN for edge computing22
Process scenario discovery from event logs based on activity and timing information21
NLTSP: A cost model for tensor program tuning using nested loop trees21
EVFL: An explainable vertical federated learning for data-oriented Artificial Intelligence systems21
SAMFL: Secure Aggregation Mechanism for Federated Learning with Byzantine-robustness by functional encryption20
DiVIT: Algorithm and architecture co-design of differential attention in vision transformer20
A QoS-guaranteed online user data deployment method in edge cloud computing environment20
Reformulating the direct convolution for high-performance deep learning inference on ARM processors20
MPTO-MT: A multi-period vehicular task offloading method in 5G HetNets20
TCADer: A Tightly Coupled Accelerator Design framework for heterogeneous system with hardware/software co-design19
Blockchain-based privacy-preserving public key searchable encryption with strong traceability19
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio19
Dynamic computation scheduling for hybrid energy mobile edge computing networks19
Gated-CNN: Combating NBTI and HCI aging effects in on-chip activation memories of Convolutional Neural Network accelerators19
A cache-aware DAG scheduling method on multicores: Exploiting node affinity and deferred executions19
Cooperative computation offloading and resource allocation for delay minimization in mobile edge computing18
Input/mapping precision controllable digital CIM with adaptive adder tree architecture for flexible DNN inference18
Blockchain-based authentication for IIoT devices with PUF18
Towards correctness proof for hybrid Simulink block diagrams18
Towards transferable adversarial attacks on vision transformers for image classification18
Thermal-aware adaptive VM allocation considering server locations in heterogeneous data centers18
Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing18
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking18
Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things18
Editorial Board18
Feasibility interval and sustainable scheduling simulation with CRPD on uniprocessor platform18
The price of schedulability in cyclic workloads: The history-vs.-response-time-vs.-accuracy trade-off17
Robust communication-efficient decentralized learning with heterogeneity17
Conflict-aware compiler for hierarchical register file on GPUs17
Efficient stereo matching on embedded GPUs with zero-means cross correlation17
Provably secure public key encryption with keyword search for data outsourcing in cloud environments17
ZNS-Cleaner: Enhancing lifespan by reducing empty erase in ZNS SSDs16
GraphA: An efficient ReRAM-based architecture to accelerate large scale graph processing16
Cross-domain access control based on trusted third-party and attribute mapping center16
HB-ReTriple: Mobile rendering optimization based on efficient history reusing16
Secure fuzzy identity-based public verification for cloud storage16
Evaluating single event upsets in deep neural networks for semantic segmentation: An embedded system perspective16
A survey on FANET routing from a cross-layer design perspective15
Optimizing encoding and repair for wide-stripe minimum bandwidth regenerating codes in in-memory key-value stores15
Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing15
Blockchain-based auditing with data self-repair: From centralized system to distributed storage15
Lyapunov optimized energy-efficient dynamic offloading with queue length constraints15
EXPPO: EXecution Performance Profiling and Optimization for CPS Co-simulation-as-a-Service15
Mobile Crowdsensing Model: A survey15
Secure and privacy-preserving quantum authentication scheme using blockchain identifiers in metaverse environment15
Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review15
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth14
Editorial Board14
RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage14
Non-interactive set intersection for privacy-preserving contact tracing14
Interactive and targeted runtime verification using a debugger-based architecture14
A survey on techniques for improving Phase Change Memory (PCM) lifetime14
A lattice-based designated-server public-key authenticated encryption with keyword search14
GTA: Generating high-performance tensorized program with dual-task scheduling14
Towards Linux based safety systems—A statistical approach for software execution path coverage14
A global-energy-aware virtual machine placement strategy for cloud data centers14
Guest editorial: Special issue on design architecture and applications of smart embedded devices in internet of things14
A qualitative cybersecurity analysis of time-triggered communication networks in automotive systems14
An Analyzable Inter-core Communication Framework for High-Performance Multicore Embedded Systems14
S-CNN-ESystem: An end-to-end embedded CNN inference system with low hardware cost and hardware-software time-balancing14
Enabling PIM-based AES encryption for online video streaming13
Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things13
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT13
Achieving low write latency through new stealth program operation supporting early write completion in NAND flash memory13
Symbolic identification of shared memory based bank conflicts for GPUs13
SmartDeCoup: Decoupling the STT-RAM LLC for even write distribution and lifetime improvement13
MTS-LSTDM: Multi-Time-Scale Long Short-Term Double Memory for power load forecasting13
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT13
CFIO: A conflict-free I/O mechanism to fully exploit internal parallelism for Open-Channel SSDs13
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks13
Litmus-RT plugins for global static scheduling of mixed criticality systems12
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters12
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems12
Lightweight asynchronous scheduling in heterogeneous reconfigurable systems12
Low-latency service function chain migration in edge-core networks based on open Jackson networks12
Dynamic resource allocation for jointing vehicle-edge deep neural network inference12
BIDS: An efficient Intrusion Detection System for in-vehicle networks using a two-stage Binarised Neural Network on low-cost FPGA12
ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor12
Editorial Board12
A dual-index Boolean retrieval scheme with dynamic and revocable attribute-based policies12
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges12
Fast post-quantum private set intersection from oblivious pseudorandom function for mobile social networks12
Optimum: Runtime optimization for multiple mixed model deployment deep learning inference12
A redesigned secure and efficient data transaction protocol for mobile payment system11
An energy-efficient near-data processing accelerator for DNNs to optimize memory accesses11
The rCOS framework for multi-dimensional separation of concerns in model-driven engineering11
Fast-convergent federated learning with class-weighted aggregation11
A survey and taxonomy of consensus protocols for blockchains11
Optimal computational resource pricing in vehicular edge computing: A Stackelberg game approach11
A hybrid controller for safe and efficient longitudinal collision avoidance control11
A convolutional autoencoder architecture for robust network intrusion detection in embedded systems11
Comparing timed-division multiplexing and best-effort networks-on-chip11
Multi-objective uplink data transmission optimization for edge computing in UAV-assistant mobile wireless sensor networks11
Online energy-efficient scheduling of DAG tasks on heterogeneous embedded platforms11
A memory footprint optimization framework for Python applications targeting edge devices11
QBLKe: Host-side flash translation layer management for Open-Channel SSDs11
Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer11
Corrigendum to ‘Fine-Grained Parallelism Framework with Predictable Work-Stealing for Real-Time Multiprocessor Systems’ Journal of Systems Architecture Vol. 124, March 2022, Article Number 10239311
Towards efficient and robust intelligent mobile vision system via small object aware parallel offloading11
BDACD: Blockchain-based decentralized auditing supporting ciphertext deduplication11
Computation of tight bounds for the worst-case end-to-end delay on Avionics Full-Duplex Switched Ethernet11
An efficient bandwidth-adaptive gradient compression algorithm for distributed training of deep neural networks10
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control10
Communication compression techniques in distributed deep learning: A survey10
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system10
Enabling memory access isolation in real-time cloud systems using Intel’s detection/regulation capabilities10
Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption10
Packet-in request redirection: A load-balancing mechanism for minimizing control plane response time in SDNs10
ATTEST: Automating the review and update of assurance case arguments10
Editorial Board10
Formal domain-driven system development in Event-B: Application to interactive critical systems10
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network10
Resource-aware Montgomery modular multiplication optimization for digital signal processing10
Federated time persistency in intermittently powered IoT systems10
Migration-aware slot-based memory request scheduler to guarantee QoS in DRAM-PCM hybrid memories10
Achieving safety and performance with reconfiguration protocol for ethernet TSN in automotive systems10
Bus-contention aware WCRT analysis for the 3-phase task model considering a work-conserving bus arbitration scheme10
Unishyper: A Rust-based unikernel enhancing reliability and efficiency of embedded systems10
Improving the robustness of industrial Cyber–Physical Systems through machine learning-based performance anomaly identification10
A survey on privacy preservation techniques for blockchain interoperability10
Rahasak—Scalable blockchain architecture for enterprise applications10
A quantitative blind area risks assessment method for safe driving assistance10
Maximising mobile user experience through self-adaptive content- and ambient-aware display brightness scaling10
Editorial Board10
IRO: Integrity–Reliability enhanced Ring ORAM10
0.084610939025879