Journal of Systems Architecture

Papers
(The TQCC of Journal of Systems Architecture is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
A Survey on Deep Transfer Learning to Edge Computing for Mitigating the COVID-19 Pandemic107
TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning102
A survey on machine learning-based malware detection in executable files97
A Survey on Task Offloading in Multi-access Edge Computing96
A survey on modeling and improving reliability of DNN algorithms and accelerators80
A survey on data center cooling systems: Technology, power consumption modeling and control strategy optimization79
Blockchain-based batch authentication protocol for Internet of Vehicles66
Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review65
A survey of deep learning techniques for vehicle detection from UAV images65
Time-Sensitive Networking in automotive embedded systems: State of the art and research opportunities63
Cooperative computation offloading and resource allocation for delay minimization in mobile edge computing62
A survey and taxonomy on energy management schemes in wireless sensor networks59
Task allocation algorithm and optimization model on edge collaboration57
A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance57
A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing53
LAKAF: Lightweight authentication and key agreement framework for smart grid network51
A survey on intrusion detection and prevention in wireless ad-hoc networks50
A survey on security and authentication in wireless body area networks50
Certificateless authenticated key agreement for blockchain-based WBANs49
Energy-aware scheduling for dependent tasks in heterogeneous multiprocessor systems46
PHDFS: Optimizing I/O performance of HDFS in deep learning cloud computing platform45
Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability45
Attacking vision-based perception in end-to-end autonomous driving models44
Edge-based auditing method for data security in resource-constrained Internet of Things43
Design optimization of confidentiality-critical cyber physical systems with fault detection43
Accelerating CNN Inference on ASICs: A Survey43
A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography42
IoTSim-Osmosis: A framework for modeling and simulating IoT applications over an edge-cloud continuum39
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain39
A semi-autonomous distributed blockchain-based framework for UAVs system39
Makespan-minimization workflow scheduling for complex networks with social groups in edge computing38
Wireless edge caching based on content similarity in dynamic environments38
RISC-V based virtual prototype: An extensible and configurable platform for the system-level38
Rahasak—Scalable blockchain architecture for enterprise applications36
Optimized co-scheduling of mixed-precision neural network accelerator for real-time multitasking applications35
A global-energy-aware virtual machine placement strategy for cloud data centers35
An Efficient Privacy-preserving Authentication Model based on blockchain for VANETs35
A priority, power and traffic-aware virtual machine placement of IoT applications in cloud data centers34
Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment34
Middleware for the Internet of Things: A survey on requirements, enabling technologies, and solutions33
Software-defined vehicular network (SDVN): A survey on architecture and routing33
IntMA: Dynamic Interaction-aware resource allocation for containerized microservices in cloud environments32
An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments31
Contention-aware optimal scheduling of real-time precedence-constrained task graphs on heterogeneous distributed systems31
On blockchain integration into mobile crowdsensing via smart embedded devices: A comprehensive survey31
Cost and makespan scheduling of workflows in clouds using list multiobjective optimization technique31
A survey of SRAM-based in-memory computing techniques and applications29
A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems29
Task scheduling with precedence and placement constraints for resource utilization improvement in multi-user MEC environment28
MMDA: Multidimensional and multidirectional data aggregation for edge computing-enhanced IoT28
A survey of accelerator architectures for 3D convolution neural networks27
SparkNoC: An energy-efficiency FPGA-based accelerator using optimized lightweight CNN for edge computing27
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives27
Using Xen and KVM as real-time hypervisors26
Tracking and analysing social interactions in dairy cattle with real-time locating system and machine learning26
A smart cyber physical multi-source energy system for an electric vehicle prototype26
TOPSIS inspired Budget and Deadline Aware Multi-Workflow Scheduling for Cloud computing26
Towards dynamic safety assurance for Industry 4.025
Real-Time scheduling and analysis of parallel tasks on heterogeneous multi-cores25
An efficient signcryption of heterogeneous systems for Internet of Vehicles25
Online user allocation in mobile edge computing environments:A decentralized reactive approach25
Security analysis of Pan et al.’s “Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability”24
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks24
Blockchain-assisted searchable attribute-based encryption for e-health systems24
A novel frame preemption model in TSN networks24
MEALPY: An open-source library for latest meta-heuristic algorithms in Python24
Towards holistic secure networking in connected vehicles through securing CAN-bus communication and firmware-over-the-air updating23
Pairing-free certificateless authenticated encryption with keyword search23
A survey On hardware accelerators and optimization techniques for RNNs23
A survey and taxonomy of consensus protocols for blockchains23
Developing graphical detection techniques for maintaining state estimation integrity against false data injection attack in integrated electric cyber-physical system23
EVFL: An explainable vertical federated learning for data-oriented Artificial Intelligence systems23
Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks22
Bus network assisted drone scheduling for sustainable charging of wireless rechargeable sensor network21
Benchmarking vision kernels and neural network inference accelerators on embedded platforms21
VPAMS: Verifiable and practical attribute-based multi-keyword search over encrypted cloud data21
Jellyfish dynamic routing protocol with mobile sink for location privacy and congestion avoidance in wireless sensor networks21
Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support21
A survey on vision-based driver distraction analysis21
Storage as a service in Fog computing : A systematic review21
A perspective on 6G: Requirement, technology, enablers, challenges and future road map21
ADHD fMRI short-time analysis method for edge computing based on multi-instance learning20
Real-time scheduling of parallel tasks with tight deadlines20
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems20
Fast-convergent federated learning with class-weighted aggregation20
Enhancing Internet of Things Security using Software-Defined Networking19
An open source framework based on Kafka-ML for Distributed DNN inference over the Cloud-to-Things continuum19
Privacy-preserving incentive mechanism for multi-leader multi-follower IoT-edge computing market: A reinforcement learning approach19
Computation-transferable authenticated key agreement protocol for smart healthcare19
Certificateless public key encryption with cryptographic reverse firewalls19
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives19
A Hidden Markov Model based smartphone heterogeneity resilient portable indoor localization framework19
IoT Device security through dynamic hardware isolation with cloud-Based update19
A review of 6G autonomous intelligent transportation systems: Mechanisms, applications and challenges19
URMILA: Dynamically trading-off fog and edge resources for performance and mobility-aware IoT services19
IPDALight: Intensity- and phase duration-aware traffic signal control based on Reinforcement Learning18
Safe and secure platooning of Automated Guided Vehicles in Industry 4.018
SimEdgeIntel: A open-source simulation platform for resource management in edge intelligence18
SEAMERS: A Semi-partitioned Energy-Aware scheduler for heterogeneous MulticorE Real-time Systems18
AucSwap: A Vickrey auction modeled decentralized cross-blockchain asset transfer protocol17
Guiding assurance of architectural design patterns for critical applications17
A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT17
Optimizing deep neural networks on intelligent edge accelerators via flexible-rate filter pruning17
An Efficient Certificateless Ring Signcryption Scheme With Conditional Privacy-Preserving in VANETs17
Worst-case traversal time analysis of TSN with multi-level preemption17
Smart contract-based security architecture for collaborative services in municipal smart cities17
TS-ABOS-CMS: time-bounded secure attribute-based online/offline signature with constant message size for IoT systems17
Efficient location privacy-preserving range query scheme for vehicle sensing systems16
A survey and taxonomy of congestion control mechanisms in wireless network on chip16
A multi-model based microservices identification approach16
Distributed task allocation in Mobile Device Cloud exploiting federated learning and subjective logic16
Light-weight AI and IoT collaboration for surveillance video pre-processing16
An identity-based proxy re-encryption for data deduplication in cloud16
Multi-range bidirectional mask graph convolution based GRU networks for traffic prediction16
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes15
A federated deep learning framework for privacy preservation and communication efficiency15
ClarifyNet: A high-pass and low-pass filtering based CNN for single image dehazing15
A survey on hardware security of DNN models and accelerators15
Energy efficient EDF-VD-based mixed-criticality scheduling with shared resources14
MBBNet: An edge IoT computing-based traffic light detection solution for autonomous bus14
Dynamic resource allocation for jointing vehicle-edge deep neural network inference14
A survey on FANET routing from a cross-layer design perspective14
ID-CEPPA: Identity-based Computationally Efficient Privacy-Preserving Authentication scheme for vehicle-to-vehicle communications14
EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles14
Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography14
A lightweight verifiable trust based data collection approach for sensor–cloud systems14
DMSE: Dynamic Multi-keyword Search Encryption based on inverted index14
A survey of energy-aware scheduling in mixed-criticality systems13
Domain-specific scenarios for refinement-based methods13
Binary convolutional neural network acceleration framework for rapid system prototyping13
Achieving safety and performance with reconfiguration protocol for ethernet TSN in automotive systems13
JORA: Blockchain-based efficient joint computing offloading and resource allocation for edge video streaming systems13
Joint task offloading and resource optimization in NOMA-based vehicular edge computing: A game-theoretic DRL approach13
Distributed learning dynamics of Multi-Armed Bandits for edge intelligence13
Intrusion detection based on improved density peak clustering for imbalanced data on sensor-cloud systems13
Hybrid differential privacy based federated learning for Internet of Things13
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system13
IDERES: Intrusion detection and response system using machine learning and attack graphs13
Efficient stereo matching on embedded GPUs with zero-means cross correlation13
A survey on silicon PUFs13
An interoperable and flat Industrial Internet of Things architecture for low latency data collection in manufacturing systems13
Secure content based image retrieval for mobile users with deep neural networks in the cloud13
BZIP: A compact data memory system for UTXO-based blockchains13
Palisade: A framework for anomaly detection in embedded systems13
Autoware_Perf: A tracing and performance analysis framework for ROS 2 applications12
TARTS: A Temperature-Aware Real-Time Deadline-Partitioned Fair Scheduler12
A genetic algorithm based energy efficient group paging approach for IoT over 5G12
Dynamic task allocation and scheduling with contention-awareness for Network-on-Chip based multicore systems12
Towards fault adaptive routing in metasurface controller networks12
Dynamic-weighted simplex strategy for learning enabled cyber physical systems12
Reconfigurable on-chip interconnection networks for high performance embedded SoC design12
Teegraph: A Blockchain consensus algorithm based on TEE and DAG for data sharing in IoT12
ECG heartbeat classification in compressive domain for wearable devices12
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters12
A systematic analysis of power saving techniques for wireless network-on-chip architectures12
Blockchain-based authentication for IIoT devices with PUF12
Anomaly detection in bitcoin information networks with multi-constrained meta path12
An inaudible voice attack to context-based device authentication in smart IoT systems12
Memory-efficient deep learning inference with incremental weight loading and data layout reorganization on edge systems12
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT12
A privacy-preserving resource trading scheme for Cloud Manufacturing with edge-PLCs in IIoT12
Fault-Tolerant Application Mapping on Mesh-of-Tree based Network-on-Chip11
A time-predictable open-source TTEthernet end-system11
Build real-time communication for hybrid dual-OS system11
Cooperative task assignment in spatial crowdsourcing via multi-agent deep reinforcement learning11
Energy-cognizant scheduling for preference-oriented fixed-priority real-time tasks11
Federated scheduling for Typed DAG tasks scheduling analysis on heterogeneous multi-cores11
How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation11
CURATING: A multi-objective based pruning technique for CNNs11
DRL-GAT-SA: Deep reinforcement learning for autonomous driving planning based on graph attention networks and simplex architecture11
FastHand: Fast monocular hand pose estimation on embedded systems11
HDA: Hierarchical and dependency-aware task mapping for network-on-chip based embedded systems11
A flexible attribute based data access management scheme for sensor-cloud system11
Formal modeling and verification of UML Activity Diagrams (UAD) with FoCaLiZe10
Edge based authentication protocol for vehicular communications without trusted party communication10
A blockchain-based fine-grained data sharing scheme for e-healthcare system10
SSD internal cache management policies: A survey10
Bridging the gap between formal verification and schedulability analysis: The case of robotics10
ESSA: An energy-Aware bit-Serial streaming deep convolutional neural network accelerator10
Latency upper bound for data chains of real-time periodic tasks10
Hybrid short-term traffic forecasting architecture and mechanisms for reservation-based Cooperative ITS10
SSBAS-FA: A secure sealed-bid e-auction scheme with fair arbitration based on time-released blockchain10
Task migration optimization for guaranteeing delay deadline with mobility consideration in mobile edge computing10
A QoS-guaranteed online user data deployment method in edge cloud computing environment10
Efficient Reservation-based Fault-Tolerant Scheduling for IEEE 802.1Qbv Time-Sensitive Networking10
A survey and experimental analysis of checkpointing techniques for energy harvesting devices9
ICAS: Two-factor identity-concealed authentication scheme for remote-servers9
A faster outsourced medical image retrieval scheme with privacy preservation9
Formalization of continuous Fourier transform in verifying applications for dependable cyber-physical systems9
On-demand deployment for IoT applications9
ML-driven classification scheme for dynamic interference-aware resource scheduling in cloud infrastructures9
Democratic learning: hardware/software co-design for lightweight blockchain-secured on-device machine learning9
A survey of techniques for intermittent computing9
Efficient algorithms for task mapping on heterogeneous CPU/GPU platforms for fast completion time9
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges9
Energy efficient backup overloading schemes for fault tolerant scheduling of real-time tasks9
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking9
Optimized partitioning and priority assignment of real-time applications on heterogeneous platforms with hardware acceleration9
Optimal computational resource pricing in vehicular edge computing: A Stackelberg game approach9
0.031911134719849