ACM Journal on Emerging Technologies in Computing Systems

Papers
(The TQCC of ACM Journal on Emerging Technologies in Computing Systems is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Introduction to the Special Issue on Hardware-Assisted Security for Emerging Internet of Things65
Breaking On-Chip Communication Anonymity Using Flow Correlation Attacks60
EM-X-DL: Efficient Cross-device Deep Learning Side-channel Attack With Noisy EM Signatures55
STAP: An Architecture and Design Tool for Automata Processing on Memristor TCAMs40
A Reconfigurable Multiplier for Signed Multiplications with Asymmetric Bit-Widths33
Defending against Adversarial Attacks in Deep Learning with Robust Auxiliary Classifiers Utilizing Bit-plane Slicing31
Test Points for Online Monitoring of Quantum Circuits28
STIFT: A Spatio-Temporal Integrated Folding Tree for Efficient Reductions in Flexible DNN Accelerators20
Sorting in Memristive Memory20
Low-Rank Gradient Descent for Memory-Efficient Training of Deep In-Memory Arrays19
Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses19
A Survey Describing Beyond Si Transistors and Exploring Their Implications for Future Processors19
A Cost-Effective Built-In Self-Test Mechanism for Post-Manufacturing TSV Defects in 3D ICs18
A Survey on Silicon Photonics for Deep Learning17
All-spin PUF: An Area-efficient and Reliable PUF Design with Signature Improvement for Spin-transfer Torque Magnetic Cell-based All-spin Circuits17
OpenQL: A Portable Quantum Programming Framework for Quantum Accelerators17
The Bitlet Model: A Parameterized Analytical Model to Compare PIM and CPU Systems17
ANT-UNet: Accurate and Noise-Tolerant Segmentation for Pathology Image Processing17
Introduction to the Special Issue on Hardware and Algorithms for Efficient Machine Learning—Part 216
NORM: An FPGA-based Non-volatile Memory Emulation Framework for Intermittent Computing16
SkyBridge 2.0: A Fine-grained Vertical 3D-IC Technology for Future ICs15
Secure and Lightweight Authentication Protocol Using PUF for the IoT-based Wireless Sensor Network14
Unsupervised Digit Recognition Using Cosine Similarity In A Neuromemristive Competitive Learning System12
The Uncertainty of Side-channel Analysis: A Way to Leverage from Heuristics12
DINOS: Data INspired Oligo Synthesis for DNA Data Storage12
Timing-Optimized Hardware Implementation to Accelerate Polynomial Multiplication in the NTRU Algorithm12
A Fast Object Detection-Based Framework for Via Modeling on PCB X-Ray CT Images11
Hardware-accelerated Simulation-based Inference of Stochastic Epidemiology Models for COVID-1911
Compressing RNNs to Kilobyte Budget for IoT Devices Using Kronecker Products11
Introduction to the Special Issue on Monolithic 3D: Technology, Design and Computing Systems Applications Perspectives11
Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach10
Integrated Power Signature Generation Circuit for IoT Abnormality Detection10
Dynamic Regularization on Activation Sparsity for Neural Network Efficiency Improvement10
Characterization of Timing-based Software Side-channel Attacks and Mitigations on Network-on-Chip Hardware10
Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives10
Image Complexity Guided Network Compression for Biomedical Image Segmentation10
A Neoteric Approach for Logic with Embedded Memory Leveraging Crosstalk Computing9
Diverse, Neural Trojan Resilient Ecosystem of Neural Network IP9
Analyzing Security Vulnerabilities Induced by High-level Synthesis9
Accelerating On-Chip Training with Ferroelectric-Based Hybrid Precision Synapse9
Virtualizing Existing Fluidic Programs8
Enhancing Privacy in PUF-Cash through Multiple Trusted Third Parties and Reinforcement Learning8
SRLL: Improving Security and Reliability with User-Defined Constraint-Aware Logic Locking8
Robust and Attack Resilient Logic Locking with a High Application-Level Impact8
Hardware Trojan Horse Detection through Improved Switching of Dormant Nets7
Low-overhead Hardware Supervision for Securing an IoT Bluetooth-enabled Device: Monitoring Radio Frequency and Supply Voltage7
B-open Defect: A Novel Defect Model in FinFET Technology7
Introduction to the Special Issue on Design Automation for Quantum Computing7
SAT-Based Exact Modulo Scheduling Mapping for Resource-Constrained CGRAs7
0.89002680778503