Journal of Systems Architecture

(The TQCC of Journal of Systems Architecture is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
A Survey on Deep Transfer Learning to Edge Computing for Mitigating the COVID-19 Pandemic109
TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning109
A survey on machine learning-based malware detection in executable files100
A Survey on Task Offloading in Multi-access Edge Computing99
A survey on data center cooling systems: Technology, power consumption modeling and control strategy optimization80
Blockchain-based batch authentication protocol for Internet of Vehicles67
Time-Sensitive Networking in automotive embedded systems: State of the art and research opportunities66
A survey of deep learning techniques for vehicle detection from UAV images66
Resource provisioning in edge/fog computing: A Comprehensive and Systematic Review65
Cooperative computation offloading and resource allocation for delay minimization in mobile edge computing65
A survey and taxonomy on energy management schemes in wireless sensor networks60
A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance59
Task allocation algorithm and optimization model on edge collaboration57
A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing56
A survey on security and authentication in wireless body area networks55
A survey on intrusion detection and prevention in wireless ad-hoc networks53
LAKAF: Lightweight authentication and key agreement framework for smart grid network52
Certificateless authenticated key agreement for blockchain-based WBANs49
Energy-aware scheduling for dependent tasks in heterogeneous multiprocessor systems48
Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability46
Accelerating CNN Inference on ASICs: A Survey45
Attacking vision-based perception in end-to-end autonomous driving models45
PHDFS: Optimizing I/O performance of HDFS in deep learning cloud computing platform45
Edge-based auditing method for data security in resource-constrained Internet of Things44
A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography43
Design optimization of confidentiality-critical cyber physical systems with fault detection43
RISC-V based virtual prototype: An extensible and configurable platform for the system-level42
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain40
A semi-autonomous distributed blockchain-based framework for UAVs system39
IoTSim-Osmosis: A framework for modeling and simulating IoT applications over an edge-cloud continuum39
Rahasak—Scalable blockchain architecture for enterprise applications38
Makespan-minimization workflow scheduling for complex networks with social groups in edge computing38
Wireless edge caching based on content similarity in dynamic environments38
A global-energy-aware virtual machine placement strategy for cloud data centers36
Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment36
Optimized co-scheduling of mixed-precision neural network accelerator for real-time multitasking applications35
An Efficient Privacy-preserving Authentication Model based on blockchain for VANETs35
A priority, power and traffic-aware virtual machine placement of IoT applications in cloud data centers35
An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments34
Middleware for the Internet of Things: A survey on requirements, enabling technologies, and solutions34
Software-defined vehicular network (SDVN): A survey on architecture and routing33
IntMA: Dynamic Interaction-aware resource allocation for containerized microservices in cloud environments32
Cost and makespan scheduling of workflows in clouds using list multiobjective optimization technique32
On blockchain integration into mobile crowdsensing via smart embedded devices: A comprehensive survey32
A survey of SRAM-based in-memory computing techniques and applications31
Contention-aware optimal scheduling of real-time precedence-constrained task graphs on heterogeneous distributed systems31
A survey on hardware accelerators: Taxonomy, trends, challenges, and perspectives30
A survey of accelerator architectures for 3D convolution neural networks30
SparkNoC: An energy-efficiency FPGA-based accelerator using optimized lightweight CNN for edge computing29
A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems29
Task scheduling with precedence and placement constraints for resource utilization improvement in multi-user MEC environment29
MMDA: Multidimensional and multidirectional data aggregation for edge computing-enhanced IoT29
MEALPY: An open-source library for latest meta-heuristic algorithms in Python28
A smart cyber physical multi-source energy system for an electric vehicle prototype27
Tracking and analysing social interactions in dairy cattle with real-time locating system and machine learning27
Towards dynamic safety assurance for Industry 4.027
Real-Time scheduling and analysis of parallel tasks on heterogeneous multi-cores26
Scheduling energy consumption-constrained workflows in heterogeneous multi-processor embedded systems26
Online user allocation in mobile edge computing environments:A decentralized reactive approach26
TOPSIS inspired Budget and Deadline Aware Multi-Workflow Scheduling for Cloud computing26
Using Xen and KVM as real-time hypervisors26
An efficient signcryption of heterogeneous systems for Internet of Vehicles26
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks25
Blockchain-assisted searchable attribute-based encryption for e-health systems24
A novel frame preemption model in TSN networks24
A perspective on 6G: Requirement, technology, enablers, challenges and future road map24
Security analysis of Pan et al.’s “Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability”24
A survey and taxonomy of consensus protocols for blockchains24
Developing graphical detection techniques for maintaining state estimation integrity against false data injection attack in integrated electric cyber-physical system23
Pairing-free certificateless authenticated encryption with keyword search23
EVFL: An explainable vertical federated learning for data-oriented Artificial Intelligence systems23
Towards holistic secure networking in connected vehicles through securing CAN-bus communication and firmware-over-the-air updating23
A survey On hardware accelerators and optimization techniques for RNNs23
Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks22
Jellyfish dynamic routing protocol with mobile sink for location privacy and congestion avoidance in wireless sensor networks22
VPAMS: Verifiable and practical attribute-based multi-keyword search over encrypted cloud data22
A review of 6G autonomous intelligent transportation systems: Mechanisms, applications and challenges22
Bus network assisted drone scheduling for sustainable charging of wireless rechargeable sensor network21
Benchmarking vision kernels and neural network inference accelerators on embedded platforms21
Fast-convergent federated learning with class-weighted aggregation21
A survey on vision-based driver distraction analysis21
Smart contract-based security architecture for collaborative services in municipal smart cities21
Storage as a service in Fog computing : A systematic review21
Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support21
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives20
Real-time scheduling of parallel tasks with tight deadlines20
A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT20
ADHD fMRI short-time analysis method for edge computing based on multi-instance learning20
Certificateless public key encryption with cryptographic reverse firewalls19
A Hidden Markov Model based smartphone heterogeneity resilient portable indoor localization framework19
IoT Device security through dynamic hardware isolation with cloud-Based update19
An open source framework based on Kafka-ML for Distributed DNN inference over the Cloud-to-Things continuum19
Privacy-preserving incentive mechanism for multi-leader multi-follower IoT-edge computing market: A reinforcement learning approach19
Computation-transferable authenticated key agreement protocol for smart healthcare19
URMILA: Dynamically trading-off fog and edge resources for performance and mobility-aware IoT services19
SEAMERS: A Semi-partitioned Energy-Aware scheduler for heterogeneous MulticorE Real-time Systems19
Enhancing Internet of Things Security using Software-Defined Networking19
Optimizing deep neural networks on intelligent edge accelerators via flexible-rate filter pruning18
TS-ABOS-CMS: time-bounded secure attribute-based online/offline signature with constant message size for IoT systems18
SimEdgeIntel: A open-source simulation platform for resource management in edge intelligence18
An Efficient Certificateless Ring Signcryption Scheme With Conditional Privacy-Preserving in VANETs18
IPDALight: Intensity- and phase duration-aware traffic signal control based on Reinforcement Learning18
Safe and secure platooning of Automated Guided Vehicles in Industry 4.018
Worst-case traversal time analysis of TSN with multi-level preemption17
Guiding assurance of architectural design patterns for critical applications17
Light-weight AI and IoT collaboration for surveillance video pre-processing17
An identity-based proxy re-encryption for data deduplication in cloud17
AucSwap: A Vickrey auction modeled decentralized cross-blockchain asset transfer protocol17
Multi-range bidirectional mask graph convolution based GRU networks for traffic prediction16
A lightweight verifiable trust based data collection approach for sensor–cloud systems16
Distributed task allocation in Mobile Device Cloud exploiting federated learning and subjective logic16
A multi-model based microservices identification approach16
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes16
Joint task offloading and resource optimization in NOMA-based vehicular edge computing: A game-theoretic DRL approach16
A federated deep learning framework for privacy preservation and communication efficiency16
Efficient location privacy-preserving range query scheme for vehicle sensing systems16
A survey and taxonomy of congestion control mechanisms in wireless network on chip16
Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography15
A survey on hardware security of DNN models and accelerators15
ClarifyNet: A high-pass and low-pass filtering based CNN for single image dehazing15
An interoperable and flat Industrial Internet of Things architecture for low latency data collection in manufacturing systems14
DMSE: Dynamic Multi-keyword Search Encryption based on inverted index14
IDERES: Intrusion detection and response system using machine learning and attack graphs14
Efficient stereo matching on embedded GPUs with zero-means cross correlation14
ID-CEPPA: Identity-based Computationally Efficient Privacy-Preserving Authentication scheme for vehicle-to-vehicle communications14
MBBNet: An edge IoT computing-based traffic light detection solution for autonomous bus14
BZIP: A compact data memory system for UTXO-based blockchains14
A systematic analysis of power saving techniques for wireless network-on-chip architectures14
Domain-specific scenarios for refinement-based methods14
Hybrid differential privacy based federated learning for Internet of Things14
EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles14
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system14
Dynamic resource allocation for jointing vehicle-edge deep neural network inference14
A survey on FANET routing from a cross-layer design perspective14
Energy efficient EDF-VD-based mixed-criticality scheduling with shared resources14
A survey of energy-aware scheduling in mixed-criticality systems13
A survey on silicon PUFs13
Binary convolutional neural network acceleration framework for rapid system prototyping13
JORA: Blockchain-based efficient joint computing offloading and resource allocation for edge video streaming systems13
Distributed learning dynamics of Multi-Armed Bandits for edge intelligence13
Secure content based image retrieval for mobile users with deep neural networks in the cloud13
Achieving safety and performance with reconfiguration protocol for ethernet TSN in automotive systems13
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters13
GraphA: An efficient ReRAM-based architecture to accelerate large scale graph processing13
Blockchain-based authentication for IIoT devices with PUF13
Intrusion detection based on improved density peak clustering for imbalanced data on sensor-cloud systems13
Palisade: A framework for anomaly detection in embedded systems13
Reconfigurable on-chip interconnection networks for high performance embedded SoC design12
Anomaly detection in bitcoin information networks with multi-constrained meta path12
Teegraph: A Blockchain consensus algorithm based on TEE and DAG for data sharing in IoT12
Dynamic task allocation and scheduling with contention-awareness for Network-on-Chip based multicore systems12
A privacy-preserving resource trading scheme for Cloud Manufacturing with edge-PLCs in IIoT12
Autoware_Perf: A tracing and performance analysis framework for ROS 2 applications12
HDA: Hierarchical and dependency-aware task mapping for network-on-chip based embedded systems12
Memory-efficient deep learning inference with incremental weight loading and data layout reorganization on edge systems12
Towards fault adaptive routing in metasurface controller networks12
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT12
FastHand: Fast monocular hand pose estimation on embedded systems12
TARTS: A Temperature-Aware Real-Time Deadline-Partitioned Fair Scheduler12
A genetic algorithm based energy efficient group paging approach for IoT over 5G12
Dynamic-weighted simplex strategy for learning enabled cyber physical systems12
Fault-Tolerant Application Mapping on Mesh-of-Tree based Network-on-Chip11
Energy-cognizant scheduling for preference-oriented fixed-priority real-time tasks11
Federated scheduling for Typed DAG tasks scheduling analysis on heterogeneous multi-cores11
Cooperative task assignment in spatial crowdsourcing via multi-agent deep reinforcement learning11
ESSA: An energy-Aware bit-Serial streaming deep convolutional neural network accelerator11
A blockchain-based fine-grained data sharing scheme for e-healthcare system11
A survey of techniques for intermittent computing11
A flexible attribute based data access management scheme for sensor-cloud system11
CURATING: A multi-objective based pruning technique for CNNs11
DRL-GAT-SA: Deep reinforcement learning for autonomous driving planning based on graph attention networks and simplex architecture11
A time-predictable open-source TTEthernet end-system11
Build real-time communication for hybrid dual-OS system11
How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation11
A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges10
Bridging the gap between formal verification and schedulability analysis: The case of robotics10
Edge based authentication protocol for vehicular communications without trusted party communication10
Latency upper bound for data chains of real-time periodic tasks10
Optimal computational resource pricing in vehicular edge computing: A Stackelberg game approach10
SSBAS-FA: A secure sealed-bid e-auction scheme with fair arbitration based on time-released blockchain10
Task migration optimization for guaranteeing delay deadline with mobility consideration in mobile edge computing10
Efficient Reservation-based Fault-Tolerant Scheduling for IEEE 802.1Qbv Time-Sensitive Networking10
Efficient algorithms for task mapping on heterogeneous CPU/GPU platforms for fast completion time10
Formal modeling and verification of UML Activity Diagrams (UAD) with FoCaLiZe10
Hybrid short-term traffic forecasting architecture and mechanisms for reservation-based Cooperative ITS10
A QoS-guaranteed online user data deployment method in edge cloud computing environment10
SSD internal cache management policies: A survey10
Democratic learning: hardware/software co-design for lightweight blockchain-secured on-device machine learning9
A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking9
Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems9
ML-driven classification scheme for dynamic interference-aware resource scheduling in cloud infrastructures9
ICAS: Two-factor identity-concealed authentication scheme for remote-servers9
Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud9
Optimized partitioning and priority assignment of real-time applications on heterogeneous platforms with hardware acceleration9
On-demand deployment for IoT applications9
Stackelberg game-based task offloading and pricing with computing capacity constraint in mobile edge computing9
Energy efficient backup overloading schemes for fault tolerant scheduling of real-time tasks9
A faster outsourced medical image retrieval scheme with privacy preservation9
Formalization of continuous Fourier transform in verifying applications for dependable cyber-physical systems9
A survey and experimental analysis of checkpointing techniques for energy harvesting devices9