ACM Journal on Emerging Technologies in Computing Systems

Papers
(The median citation count of ACM Journal on Emerging Technologies in Computing Systems is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
A Survey on Silicon Photonics for Deep Learning45
Extracting Success from IBM’s 20-Qubit Machines Using Error-Aware Compilation44
Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives44
The Big Hack Explained42
Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach38
A Side-Channel-Resistant Implementation of SABER30
OpenQL: A Portable Quantum Programming Framework for Quantum Accelerators18
NxTF: An API and Compiler for Deep Spiking Neural Networks on Intel Loihi18
Toward Multi-FPGA Acceleration of the Neural Networks17
Defects, Fault Modeling, and Test Development Framework for RRAMs16
Design of Adiabatic Logic-Based Energy-Efficient and Reliable PUF for IoT Devices16
Dynamic Reliability Management in Neuromorphic Computing16
QCOR14
A Flexible Multichannel EEG Artifact Identification Processor using Depthwise-Separable Convolutional Neural Networks14
Approximate Memristive In-Memory Hamming Distance Circuit13
Towards Synaptic Behavior of Nanoscale ReRAM Devices for Neuromorphic Computing Applications13
Design and Analysis of FPGA-based PUFs with Enhanced Performance for Hardware-oriented Security13
Mitigate Parasitic Resistance in Resistive Crossbar-based Convolutional Neural Networks12
Sorting in Memristive Memory11
Impact of On-chip Interconnect on In-memory Acceleration of Deep Neural Networks11
The Bitlet Model: A Parameterized Analytical Model to Compare PIM and CPU Systems10
CONCEALING-Gate: Optical Contactless Probing Resilient Design10
Design of a Robust Memristive Spiking Neuromorphic System with Unsupervised Learning in Hardware9
Exploiting Data Resilience in Wireless Network-on-chip Architectures9
BPLight-CNN: A Photonics-Based Backpropagation Accelerator for Deep Learning9
Guarding Machine Learning Hardware Against Physical Side-channel Attacks9
EM-X-DL: Efficient Cross-device Deep Learning Side-channel Attack With Noisy EM Signatures9
Computational Capacity of Complex Memcapacitive Networks8
Cryptography with Analog Scheme Using Memristors8
Resilient and Secure Hardware Devices Using ASL8
A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems8
Analyzing Security Vulnerabilities Induced by High-level Synthesis8
A Voltage-Controlled, Oscillation-Based ADC Design for Computation-in-Memory Architectures Using Emerging ReRAMs8
Fortifying Vehicular Security through Low Overhead Physically Unclonable Functions8
Robust and Attack Resilient Logic Locking with a High Application-Level Impact8
MNEMOSENE: Tile Architecture and Simulator for Memristor-based Computation-in-memory7
A Survey on Memory-centric Computer Architectures7
A Review and Comparison of AI-enhanced Side Channel Analysis7
A Genetic-algorithm-based Approach to the Design of DCT Hardware Accelerators7
An Electro-Photonic System for Accelerating Deep Neural Networks7
A Cost-Efficient Digital ESN Architecture on FPGA for OFDM Symbol Detection7
ScatterVerif: Verification of Electronic Boards Using Reflection Response of Power Distribution Network7
A Survey Describing Beyond Si Transistors and Exploring Their Implications for Future Processors7
Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images7
Timing-Optimized Hardware Implementation to Accelerate Polynomial Multiplication in the NTRU Algorithm6
PUF based Secure and Lightweight Authentication and Key-Sharing Scheme for Wireless Sensor Network6
ASIE6
Machine Learning Vulnerability Analysis of FPGA-based Ring Oscillator PUFs and Counter Measures6
Artificial Intelligence–based Computed Tomography Processing Framework for Surgical Telementoring of Congenital Heart Disease6
Making a Case for Partially Connected 3D NoC6
NORM: An FPGA-based Non-volatile Memory Emulation Framework for Intermittent Computing6
RNNFast6
Hardware Security in Spin-based Computing-in-memory5
Binary Precision Neural Network Manycore Accelerator5
Device-aware Circuit Design for Robust Memristive Neuromorphic Systems with STDP-based Learning5
Low Overhead Online Data Flow Tracking for Intermittently Powered Non-Volatile FPGAs5
Power-efficient Spike Sorting Scheme Using Analog Spiking Neural Network Classifier5
Time-varying Metamaterial-enabled Directional Modulation Schemes for Physical Layer Security in Wireless Communication Links4
Thermal and Performance Efficient On-Chip Surface-Wave Communication for Many-Core Systems in Dark Silicon Era4
Dynamic Behavior Predictions for Fast and Efficient Hybrid STT-MRAM Caches4
CLU4
DTA-PUF: Dynamic Timing-aware Physical Unclonable Function for Resource-constrained Devices4
Victims Can Be Saviors4
SILVerIn: Systematic Integrity Verification of Printed Circuit Board Using JTAG Infrastructure4
Write Back Energy Optimization for STT-MRAM-based Last-level Cache with Data Pattern Characterization4
A Global Routing Method for Graphene Nanoribbons Based Circuits and Interconnects4
STAP: An Architecture and Design Tool for Automata Processing on Memristor TCAMs4
A Quality-assured Approximate Hardware Accelerators–based on Machine Learning and Dynamic Partial Reconfiguration4
Towards Compact Modeling of Noisy Quantum Computers: A Molecular-Spin-Qubit Case of Study4
Hardware Trojan Horse Detection through Improved Switching of Dormant Nets4
multiPULPly4
Towards a Truly Integrated Vector Processing Unit for Memory-bound Applications Based on a Cost-competitive Computational SRAM Design Solution4
Compressing RNNs to Kilobyte Budget for IoT Devices Using Kronecker Products4
Built-in Self-Test and Fault Localization for Inter-Layer Vias in Monolithic 3D ICs4
Graphene-Based Artificial Synapses with Tunable Plasticity4
Towards on-node Machine Learning for Ultra-low-power Sensors Using Asynchronous Σ Δ Streams4
Integrated Power Signature Generation Circuit for IoT Abnormality Detection3
Image Complexity Guided Network Compression for Biomedical Image Segmentation3
Attack Mitigation of Hardware Trojans for Thermal Sensing via Micro-ring Resonator in Optical NoCs3
Improving Deep Learning Networks for Profiled Side-channel Analysis Using Performance Improvement Techniques3
Architecting for Artificial Intelligence with Emerging Nanotechnology3
Quantization of Deep Neural Networks for Accurate Edge Computing3
GPUOPT3
FPIC: A Novel Semantic Dataset for Optical PCB Assurance3
A Cost-Effective Built-In Self-Test Mechanism for Post-Manufacturing TSV Defects in 3D ICs3
Neural Network-based Inherently Fault-tolerant Hardware Cryptographic Primitives without Explicit Redundancy Checks3
Taming Molecular Field-Coupling for Nanocomputing Design3
Hardware-accelerated Simulation-based Inference of Stochastic Epidemiology Models for COVID-193
Projection of Dual-Rail DPA Countermeasures in Future FinFET and Emerging TFET Technologies3
A Reconfigurable Multiplier for Signed Multiplications with Asymmetric Bit-Widths3
Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA3
LosPem3
The Uncertainty of Side-channel Analysis: A Way to Leverage from Heuristics3
NN-Lock : A Lightweight Authorization to Prevent IP Threats of Deep Learning Models3
Power Management of Monolithic 3D Manycore Chips with Inter-tier Process Variations3
DeepPeep3
Fast Linear Interpolation3
A Novel Highly-Efficient Inexact Full Adder Cell for Motion and Edge Detection Systems of Image Processing in CNFET Technology3
Bridging the Gap between RTL and Software Fault Injection3
Hardware Trojan Attack in Embedded Memory3
Accelerating Deep Neuroevolution on Distributed FPGAs for Reinforcement Learning Problems3
Direction-aggregated Attack for Transferable Adversarial Examples3
Temporal State Machines: Using Temporal Memory to Stitch Time-based Graph Computations3
Depth-bounded Graph Partitioning Algorithm and Dual Clocking Method for Realization of Superconducting SFQ Circuits3
Network-on-Chip Intellectual Property Protection Using Circular Path--based Fingerprinting3
0.10412383079529