Journal of Systems Architecture

Papers
(The TQCC of Journal of Systems Architecture is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-07-01 to 2024-07-01.)
ArticleCitations
TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning119
A Survey on Task Offloading in Multi-access Edge Computing116
A survey on machine learning-based malware detection in executable files116
A Survey on Deep Transfer Learning to Edge Computing for Mitigating the COVID-19 Pandemic111
A survey on data center cooling systems: Technology, power consumption modeling and control strategy optimization102
A survey of deep learning techniques for vehicle detection from UAV images78
Time-Sensitive Networking in automotive embedded systems: State of the art and research opportunities75
Blockchain-based batch authentication protocol for Internet of Vehicles74
Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review69
Cooperative computation offloading and resource allocation for delay minimization in mobile edge computing68
A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance67
A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing65
A survey on security and authentication in wireless body area networks63
A survey and taxonomy on energy management schemes in wireless sensor networks61
Task allocation algorithm and optimization model on edge collaboration60
LAKAF: Lightweight authentication and key agreement framework for smart grid network57
Energy-aware scheduling for dependent tasks in heterogeneous multiprocessor systems52
A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography52
Accelerating CNN Inference on ASICs: A Survey51
Certificateless authenticated key agreement for blockchain-based WBANs49
Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability49
Attacking vision-based perception in end-to-end autonomous driving models48
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain47
MEALPY: An open-source library for latest meta-heuristic algorithms in Python46
Edge-based auditing method for data security in resource-constrained Internet of Things45
PHDFS: Optimizing I/O performance of HDFS in deep learning cloud computing platform45
Design optimization of confidentiality-critical cyber physical systems with fault detection45
A semi-autonomous distributed blockchain-based framework for UAVs system44
RISC-V based virtual prototype: An extensible and configurable platform for the system-level44
A global-energy-aware virtual machine placement strategy for cloud data centers42
Wireless edge caching based on content similarity in dynamic environments42
Rahasak—Scalable blockchain architecture for enterprise applications41
IoTSim-Osmosis: A framework for modeling and simulating IoT applications over an edge-cloud continuum41
Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment41
A priority, power and traffic-aware virtual machine placement of IoT applications in cloud data centers41
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems39
Makespan-minimization workflow scheduling for complex networks with social groups in edge computing39
An Efficient Privacy-preserving Authentication Model based on blockchain for VANETs39
IntMA: Dynamic Interaction-aware resource allocation for containerized microservices in cloud environments38
A survey of SRAM-based in-memory computing techniques and applications38
Middleware for the Internet of Things: A survey on requirements, enabling technologies, and solutions37
A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems37
An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments37
Software-defined vehicular network (SDVN): A survey on architecture and routing37
Optimized co-scheduling of mixed-precision neural network accelerator for real-time multitasking applications35
On blockchain integration into mobile crowdsensing via smart embedded devices: A comprehensive survey34
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives34
Cost and makespan scheduling of workflows in clouds using list multiobjective optimization technique34
SparkNoC: An energy-efficiency FPGA-based accelerator using optimized lightweight CNN for edge computing32
A survey and taxonomy of consensus protocols for blockchains32
Task scheduling with precedence and placement constraints for resource utilization improvement in multi-user MEC environment31
A review of 6G autonomous intelligent transportation systems: Mechanisms, applications and challenges31
EVFL: An explainable vertical federated learning for data-oriented Artificial Intelligence systems31
Towards dynamic safety assurance for Industry 4.030
A survey of accelerator architectures for 3D convolution neural networks30
An efficient signcryption of heterogeneous systems for Internet of Vehicles29
Blockchain-assisted searchable attribute-based encryption for e-health systems29
A survey on vision-based driver distraction analysis28
Tracking and analysing social interactions in dairy cattle with real-time locating system and machine learning28
Smart contract-based security architecture for collaborative services in municipal smart cities28
TOPSIS inspired Budget and Deadline Aware Multi-Workflow Scheduling for Cloud computing28
A perspective on 6G: Requirement, technology, enablers, challenges and future road map28
A survey On hardware accelerators and optimization techniques for RNNs27
A novel frame preemption model in TSN networks27
A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT27
A smart cyber physical multi-source energy system for an electric vehicle prototype27
Security analysis of Pan et al.’s “Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability”26
Pairing-free certificateless authenticated encryption with keyword search26
Online user allocation in mobile edge computing environments:A decentralized reactive approach26
Bus network assisted drone scheduling for sustainable charging of wireless rechargeable sensor network25
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks25
Towards holistic secure networking in connected vehicles through securing CAN-bus communication and firmware-over-the-air updating24
Jellyfish dynamic routing protocol with mobile sink for location privacy and congestion avoidance in wireless sensor networks23
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives23
IPDALight: Intensity- and phase duration-aware traffic signal control based on Reinforcement Learning23
An Efficient Certificateless Ring Signcryption Scheme With Conditional Privacy-Preserving in VANETs23
Optimizing deep neural networks on intelligent edge accelerators via flexible-rate filter pruning23
Fast-convergent federated learning with class-weighted aggregation22
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system22
Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks22
Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support22
Safe and secure platooning of Automated Guided Vehicles in Industry 4.022
VPAMS: Verifiable and practical attribute-based multi-keyword search over encrypted cloud data22
Certificateless public key encryption with cryptographic reverse firewalls22
Benchmarking vision kernels and neural network inference accelerators on embedded platforms22
SEAMERS: A Semi-partitioned Energy-Aware scheduler for heterogeneous MulticorE Real-time Systems22
ADHD fMRI short-time analysis method for edge computing based on multi-instance learning22
Joint task offloading and resource optimization in NOMA-based vehicular edge computing: A game-theoretic DRL approach22
Privacy-preserving incentive mechanism for multi-leader multi-follower IoT-edge computing market: A reinforcement learning approach22
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters21
Storage as a service in Fog computing : A systematic review21
Real-time scheduling of parallel tasks with tight deadlines21
AucSwap: A Vickrey auction modeled decentralized cross-blockchain asset transfer protocol20
An interoperable and flat Industrial Internet of Things architecture for low latency data collection in manufacturing systems20
TS-ABOS-CMS: time-bounded secure attribute-based online/offline signature with constant message size for IoT systems20
An open source framework based on Kafka-ML for Distributed DNN inference over the Cloud-to-Things continuum20
URMILA: Dynamically trading-off fog and edge resources for performance and mobility-aware IoT services20
Multi-range bidirectional mask graph convolution based GRU networks for traffic prediction20
An identity-based proxy re-encryption for data deduplication in cloud20
Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography19
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes19
IoT Device security through dynamic hardware isolation with cloud-Based update19
Light-weight AI and IoT collaboration for surveillance video pre-processing19
SimEdgeIntel: A open-source simulation platform for resource management in edge intelligence19
Computation-transferable authenticated key agreement protocol for smart healthcare19
A federated deep learning framework for privacy preservation and communication efficiency19
A Hidden Markov Model based smartphone heterogeneity resilient portable indoor localization framework19
Enhancing Internet of Things Security using Software-Defined Networking19
A survey on FANET routing from a cross-layer design perspective18
Worst-case traversal time analysis of TSN with multi-level preemption18
A multi-model based microservices identification approach18
ClarifyNet: A high-pass and low-pass filtering based CNN for single image dehazing17
JORA: Blockchain-based efficient joint computing offloading and resource allocation for edge video streaming systems17
Stackelberg game-based task offloading and pricing with computing capacity constraint in mobile edge computing17
A lightweight verifiable trust based data collection approach for sensor–cloud systems17
BZIP: A compact data memory system for UTXO-based blockchains17
A survey and taxonomy of congestion control mechanisms in wireless network on chip17
Hybrid differential privacy based federated learning for Internet of Things17
Guiding assurance of architectural design patterns for critical applications17
Dynamic resource allocation for jointing vehicle-edge deep neural network inference17
Distributed task allocation in Mobile Device Cloud exploiting federated learning and subjective logic17
A survey on hardware security of DNN models and accelerators17
A survey of energy-aware scheduling in mixed-criticality systems16
EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles16
GraphA: An efficient ReRAM-based architecture to accelerate large scale graph processing16
Teegraph: A Blockchain consensus algorithm based on TEE and DAG for data sharing in IoT16
ID-CEPPA: Identity-based Computationally Efficient Privacy-Preserving Authentication scheme for vehicle-to-vehicle communications16
IDERES: Intrusion detection and response system using machine learning and attack graphs16
Blockchain-based authentication for IIoT devices with PUF15
ESSA: An energy-Aware bit-Serial streaming deep convolutional neural network accelerator15
MBBNet: An edge IoT computing-based traffic light detection solution for autonomous bus15
DMSE: Dynamic Multi-keyword Search Encryption based on inverted index15
DRL-GAT-SA: Deep reinforcement learning for autonomous driving planning based on graph attention networks and simplex architecture15
Energy efficient EDF-VD-based mixed-criticality scheduling with shared resources15
Optimal computational resource pricing in vehicular edge computing: A Stackelberg game approach15
A systematic analysis of power saving techniques for wireless network-on-chip architectures15
Efficient stereo matching on embedded GPUs with zero-means cross correlation15
Domain-specific scenarios for refinement-based methods15
A flexible attribute based data access management scheme for sensor-cloud system15
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT15
Autoware_Perf: A tracing and performance analysis framework for ROS 2 applications14
Intrusion detection based on improved density peak clustering for imbalanced data on sensor-cloud systems14
ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor14
A blockchain-based fine-grained data sharing scheme for e-healthcare system14
Secure content based image retrieval for mobile users with deep neural networks in the cloud14
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges14
FastHand: Fast monocular hand pose estimation on embedded systems14
Efficient Reservation-based Fault-Tolerant Scheduling for IEEE 802.1Qbv Time-Sensitive Networking14
CURATING: A multi-objective based pruning technique for CNNs14
Task migration optimization for guaranteeing delay deadline with mobility consideration in mobile edge computing13
A survey on silicon PUFs13
Achieving safety and performance with reconfiguration protocol for ethernet TSN in automotive systems13
Dynamic-weighted simplex strategy for learning enabled cyber physical systems13
Distributed learning dynamics of Multi-Armed Bandits for edge intelligence13
HDA: Hierarchical and dependency-aware task mapping for network-on-chip based embedded systems13
Memory-efficient deep learning inference with incremental weight loading and data layout reorganization on edge systems13
Palisade: A framework for anomaly detection in embedded systems13
Anomaly detection in bitcoin information networks with multi-constrained meta path13
Binary convolutional neural network acceleration framework for rapid system prototyping13
A privacy-preserving resource trading scheme for Cloud Manufacturing with edge-PLCs in IIoT13
TARTS: A Temperature-Aware Real-Time Deadline-Partitioned Fair Scheduler12
Dynamic task allocation and scheduling with contention-awareness for Network-on-Chip based multicore systems12
A survey of techniques for intermittent computing12
SSD internal cache management policies: A survey12
Cooperative task assignment in spatial crowdsourcing via multi-agent deep reinforcement learning12
A comprehensive systematic review of integration of time sensitive networking and 5G communication12
A genetic algorithm based energy efficient group paging approach for IoT over 5G12
ML-driven classification scheme for dynamic interference-aware resource scheduling in cloud infrastructures12
Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud11
Build real-time communication for hybrid dual-OS system11
A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse11
SSBAS-FA: A secure sealed-bid e-auction scheme with fair arbitration based on time-released blockchain11
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking11
Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems11
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network11
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth11
Energy-cognizant scheduling for preference-oriented fixed-priority real-time tasks11
A time-predictable open-source TTEthernet end-system11
Federated scheduling for Typed DAG tasks scheduling analysis on heterogeneous multi-cores11
How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation11
Fault-Tolerant Application Mapping on Mesh-of-Tree based Network-on-Chip11
Edge based authentication protocol for vehicular communications without trusted party communication10
Reformulating the direct convolution for high-performance deep learning inference on ARM processors10
Latency upper bound for data chains of real-time periodic tasks10
Accelerating DNNs from local to virtualized FPGA in the Cloud: A survey of trends10
On-demand deployment for IoT applications10
Formal modeling and verification of UML Activity Diagrams (UAD) with FoCaLiZe10
Democratic learning: hardware/software co-design for lightweight blockchain-secured on-device machine learning10
DVFS-based energy-aware scheduling of imprecise mixed-criticality real-time tasks10
Optimized partitioning and priority assignment of real-time applications on heterogeneous platforms with hardware acceleration10
Adversarial attacks and defenses in Speaker Recognition Systems: A survey10
Hybrid short-term traffic forecasting architecture and mechanisms for reservation-based Cooperative ITS10
Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things10
A QoS-guaranteed online user data deployment method in edge cloud computing environment10
Efficient algorithms for task mapping on heterogeneous CPU/GPU platforms for fast completion time10
A survey and experimental analysis of checkpointing techniques for energy harvesting devices10
Bridging the gap between formal verification and schedulability analysis: The case of robotics10
A more efficient public-key authenticated encryption scheme with keyword search9
CUPID: A labeled dataset with Pentesting for evaluation of network intrusion detection9
A survey on program-state retention for transiently-powered systems9
Low-latency service function chain migration in edge-core networks based on open Jackson networks9
Understanding security failures of anonymous authentication schemes for cloud environments9
A survey of techniques for optimizing transformer inference9
Privacy attacks against deep learning models and their countermeasures9
Efficient and provably secure multi-receiver signcryption scheme using implicit certificate in edge computing9
A survey on privacy preservation techniques for blockchain interoperability9
A review of sensory interactions between autonomous vehicles and drivers9
The MicroRV32 framework: An accessible and configurable open source RISC-V cross-level platform for education and research9
ICAS: Two-factor identity-concealed authentication scheme for remote-servers9
Queue assignment for fixed-priority real-time flows in time-sensitive networks: Hardness and algorithm9
A faster outsourced medical image retrieval scheme with privacy preservation9
Digital signature with cryptographic reverse firewalls9
Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer9
Energy efficient mixed task handling on real-time embedded systems using FreeRTOS9
MTS-LSTDM: Multi-Time-Scale Long Short-Term Double Memory for power load forecasting9
Energy efficient backup overloading schemes for fault tolerant scheduling of real-time tasks9
SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems9
0.34063410758972