ACM Journal on Emerging Technologies in Computing Systems

Papers
(The median citation count of ACM Journal on Emerging Technologies in Computing Systems is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Introduction to the Special Issue on Hardware-Assisted Security for Emerging Internet of Things65
Breaking On-Chip Communication Anonymity Using Flow Correlation Attacks60
EM-X-DL: Efficient Cross-device Deep Learning Side-channel Attack With Noisy EM Signatures55
STAP: An Architecture and Design Tool for Automata Processing on Memristor TCAMs40
A Reconfigurable Multiplier for Signed Multiplications with Asymmetric Bit-Widths33
Defending against Adversarial Attacks in Deep Learning with Robust Auxiliary Classifiers Utilizing Bit-plane Slicing31
Test Points for Online Monitoring of Quantum Circuits28
STIFT: A Spatio-Temporal Integrated Folding Tree for Efficient Reductions in Flexible DNN Accelerators20
Sorting in Memristive Memory20
Low-Rank Gradient Descent for Memory-Efficient Training of Deep In-Memory Arrays19
Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses19
A Survey Describing Beyond Si Transistors and Exploring Their Implications for Future Processors19
A Cost-Effective Built-In Self-Test Mechanism for Post-Manufacturing TSV Defects in 3D ICs18
A Survey on Silicon Photonics for Deep Learning17
All-spin PUF: An Area-efficient and Reliable PUF Design with Signature Improvement for Spin-transfer Torque Magnetic Cell-based All-spin Circuits17
OpenQL: A Portable Quantum Programming Framework for Quantum Accelerators17
The Bitlet Model: A Parameterized Analytical Model to Compare PIM and CPU Systems17
ANT-UNet: Accurate and Noise-Tolerant Segmentation for Pathology Image Processing17
Introduction to the Special Issue on Hardware and Algorithms for Efficient Machine Learning—Part 216
NORM: An FPGA-based Non-volatile Memory Emulation Framework for Intermittent Computing16
SkyBridge 2.0: A Fine-grained Vertical 3D-IC Technology for Future ICs15
Secure and Lightweight Authentication Protocol Using PUF for the IoT-based Wireless Sensor Network14
Unsupervised Digit Recognition Using Cosine Similarity In A Neuromemristive Competitive Learning System12
The Uncertainty of Side-channel Analysis: A Way to Leverage from Heuristics12
DINOS: Data INspired Oligo Synthesis for DNA Data Storage12
Timing-Optimized Hardware Implementation to Accelerate Polynomial Multiplication in the NTRU Algorithm12
A Fast Object Detection-Based Framework for Via Modeling on PCB X-Ray CT Images11
Hardware-accelerated Simulation-based Inference of Stochastic Epidemiology Models for COVID-1911
Compressing RNNs to Kilobyte Budget for IoT Devices Using Kronecker Products11
Introduction to the Special Issue on Monolithic 3D: Technology, Design and Computing Systems Applications Perspectives11
Dynamic Regularization on Activation Sparsity for Neural Network Efficiency Improvement10
Characterization of Timing-based Software Side-channel Attacks and Mitigations on Network-on-Chip Hardware10
Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives10
Image Complexity Guided Network Compression for Biomedical Image Segmentation10
Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach10
Integrated Power Signature Generation Circuit for IoT Abnormality Detection10
A Neoteric Approach for Logic with Embedded Memory Leveraging Crosstalk Computing9
Diverse, Neural Trojan Resilient Ecosystem of Neural Network IP9
Analyzing Security Vulnerabilities Induced by High-level Synthesis9
Accelerating On-Chip Training with Ferroelectric-Based Hybrid Precision Synapse9
Virtualizing Existing Fluidic Programs8
Enhancing Privacy in PUF-Cash through Multiple Trusted Third Parties and Reinforcement Learning8
SRLL: Improving Security and Reliability with User-Defined Constraint-Aware Logic Locking8
Robust and Attack Resilient Logic Locking with a High Application-Level Impact8
Hardware Trojan Horse Detection through Improved Switching of Dormant Nets7
Low-overhead Hardware Supervision for Securing an IoT Bluetooth-enabled Device: Monitoring Radio Frequency and Supply Voltage7
B-open Defect: A Novel Defect Model in FinFET Technology7
Introduction to the Special Issue on Design Automation for Quantum Computing7
SAT-Based Exact Modulo Scheduling Mapping for Resource-Constrained CGRAs7
Spiking-NeRF: Spiking Neural Network for Energy-Efficient Neural Rendering6
A Quasi-digital QPSK Modulator Design for Biomedical Devices6
PUF-based Digital Money with Propagation-of-Provenance and Offline Transfers between Two Parties6
F-Bypass: A Low-Power Network-on-Chip Design Utilizing Bypass to Improve Network Connectivity6
HDRLPIM: A Simulator for Hyper-Dimensional Reinforcement Learning Based on Processing In-Memory6
A Spiking Neuromorphic Architecture Using Gated-RRAM for Associative Memory6
Dynamic Reliability Management in Neuromorphic Computing6
Applications and Challenges of AI in PCB X-ray Inspection: A Comprehensive Study6
NN-Lock : A Lightweight Authorization to Prevent IP Threats of Deep Learning Models6
A Novel Highly-Efficient Inexact Full Adder Cell for Motion and Edge Detection Systems of Image Processing in CNFET Technology5
Digital Fault-based Built-in Self-test and Evaluation of Low Dropout Voltage Regulators5
A Quality-assured Approximate Hardware Accelerators–based on Machine Learning and Dynamic Partial Reconfiguration5
Building an Open Representation for Biological Protocols5
Fusing In-storage and Near-storage Acceleration of Convolutional Neural Networks5
Extreme Partial-Sum Quantization for Analog Computing-In-Memory Neural Network Accelerators5
Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA5
Machine Learning Vulnerability Analysis of FPGA-based Ring Oscillator PUFs and Counter Measures5
A ReRAM Memory Compiler for Monolithic 3D Integrated Circuits in a Carbon Nanotube Process4
Photonic Networks-on-Chip Employing Multilevel Signaling: A Cross-Layer Comparative Study4
Generation of Black-box Audio Adversarial Examples Based on Gradient Approximation and Autoencoders4
Repercussions of Using DNN Compilers on Edge GPUs for Real Time and Safety Critical Systems: A Quantitative Audit4
Towards Compact Modeling of Noisy Quantum Computers: A Molecular-Spin-Qubit Case of Study4
Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images4
AroMa : Evaluating Deep Learning Systems for Stealthy Integrity Attacks on Multi-tenant Accelerators4
Towards a Truly Integrated Vector Processing Unit for Memory-bound Applications Based on a Cost-competitive Computational SRAM Design Solution4
Improving the Quality of FPGA RO-PUF by Principal Component Analysis (PCA)4
Direction-aggregated Attack for Transferable Adversarial Examples4
Guest Editorial: ACM JETC Special Issue on Hardware-Aware Learning for Medical Applications4
Guest Editorial: Computation-In-Memory (CIM): from Device to Applications4
Optimizing 3D U-Net-based Brain Tumor Segmentation with Integer-arithmetic Deep Learning Accelerators4
Genetic Cache: A Machine Learning Approach to Designing DRAM Cache Controllers in HBM Systems4
Graphene-Based Artificial Synapses with Tunable Plasticity4
AccHashtag : Accelerated Hashing for Detecting Fault-Injection Attacks on Embedded Neural Networks4
Impact of On-chip Interconnect on In-memory Acceleration of Deep Neural Networks3
Toward the Generation of Test Vectors for the Detection of Hardware Trojan Targeting Effective Switching Activity3
SPLIT PUF: Efficient PUF Implementation Using Underutilized FPGA Resources3
Towards All-optical Stochastic Computing Using Photonic Crystal Nanocavities3
Built-in Self-Test and Fault Localization for Inter-Layer Vias in Monolithic 3D ICs3
Introduction to the Special Issue on CAD for Security: Pre-silicon Security Sign-off Solutions Through Design Cycle3
Towards Energy-Efficient Spiking Neural Networks: A Robust Hybrid CMOS-Memristive Accelerator3
A Genetic-algorithm-based Approach to the Design of DCT Hardware Accelerators3
Toward Practical Superconducting Accelerators for Machine Learning Using U-SFQ3
A Deep Neural Network Accelerator using Residue Arithmetic in a Hybrid Optoelectronic System3
Zallocator: A High Throughput Write-Optimized Persistent Allocator for Non-Volatile Memory3
Parallel Computing of Graph-based Functions in ReRAM3
On Securing Cryptographic ICs against Scan-based Attacks: A Hamming Weight Distribution Perspective3
Power-based Attacks on Spatial DNN Accelerators3
Hardware Trojan Detection Potential and Limits with the Quantum Diamond Microscope3
Attack Mitigation of Hardware Trojans for Thermal Sensing via Micro-ring Resonator in Optical NoCs3
Design-time Reference Current Generation for Robust Spintronic-based Neuromorphic Architecture3
0.045270204544067