ACM Journal on Emerging Technologies in Computing Systems

Papers
(The median citation count of ACM Journal on Emerging Technologies in Computing Systems is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-07-01 to 2025-07-01.)
ArticleCitations
Introduction to the Special Issue on Hardware-Assisted Security for Emerging Internet of Things40
STAP: An Architecture and Design Tool for Automata Processing on Memristor TCAMs36
EM-X-DL: Efficient Cross-device Deep Learning Side-channel Attack With Noisy EM Signatures32
Breaking On-Chip Communication Anonymity Using Flow Correlation Attacks32
Test Points for Online Monitoring of Quantum Circuits22
Defending against Adversarial Attacks in Deep Learning with Robust Auxiliary Classifiers Utilizing Bit-plane Slicing21
Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses20
Low-Rank Gradient Descent for Memory-Efficient Training of Deep In-Memory Arrays20
All-spin PUF: An Area-efficient and Reliable PUF Design with Signature Improvement for Spin-transfer Torque Magnetic Cell-based All-spin Circuits19
Sorting in Memristive Memory19
A Cost-Effective Built-In Self-Test Mechanism for Post-Manufacturing TSV Defects in 3D ICs19
ANT-UNet: Accurate and Noise-Tolerant Segmentation for Pathology Image Processing19
STIFT: A Spatio-Temporal Integrated Folding Tree for Efficient Reductions in Flexible DNN Accelerators19
NORM: An FPGA-based Non-volatile Memory Emulation Framework for Intermittent Computing18
The Bitlet Model: A Parameterized Analytical Model to Compare PIM and CPU Systems18
OpenQL: A Portable Quantum Programming Framework for Quantum Accelerators15
Secure and Lightweight Authentication Protocol Using PUF for the IoT-based Wireless Sensor Network14
SkyBridge 2.0: A Fine-grained Vertical 3D-IC Technology for Future ICs14
Introduction to the Special Issue on Hardware and Algorithms for Efficient Machine Learning—Part 213
DINOS: Data INspired Oligo Synthesis for DNA Data Storage13
Hardware-accelerated Simulation-based Inference of Stochastic Epidemiology Models for COVID-1911
Unsupervised Digit Recognition Using Cosine Similarity In A Neuromemristive Competitive Learning System11
Compressing RNNs to Kilobyte Budget for IoT Devices Using Kronecker Products10
A Fast Object Detection-Based Framework for Via Modeling on PCB X-Ray CT Images10
Integrated Power Signature Generation Circuit for IoT Abnormality Detection10
Introduction to the Special Issue on Monolithic 3D: Technology, Design and Computing Systems Applications Perspectives10
Diverse, Neural Trojan Resilient Ecosystem of Neural Network IP10
Characterization of Timing-based Software Side-channel Attacks and Mitigations on Network-on-Chip Hardware10
Image Complexity Guided Network Compression for Biomedical Image Segmentation10
Accelerating On-Chip Training with Ferroelectric-Based Hybrid Precision Synapse9
Introduction to the Special Issue on Design Automation for Quantum Computing9
Analyzing Security Vulnerabilities Induced by High-level Synthesis9
Virtualizing Existing Fluidic Programs9
A Neoteric Approach for Logic with Embedded Memory Leveraging Crosstalk Computing9
Low-overhead Hardware Supervision for Securing an IoT Bluetooth-enabled Device: Monitoring Radio Frequency and Supply Voltage8
B-open Defect: A Novel Defect Model in FinFET Technology8
Enhancing Privacy in PUF-Cash through Multiple Trusted Third Parties and Reinforcement Learning8
SAT-Based Exact Modulo Scheduling Mapping for Resource-Constrained CGRAs8
HDRLPIM: A Simulator for Hyper-Dimensional Reinforcement Learning Based on Processing In-Memory7
Applications and Challenges of AI in PCB X-ray Inspection: A Comprehensive Study7
NN-Lock : A Lightweight Authorization to Prevent IP Threats of Deep Learning Models7
PUF-based Digital Money with Propagation-of-Provenance and Offline Transfers between Two Parties7
SRLL: Improving Security and Reliability with User-Defined Constraint-Aware Logic Locking7
Dynamic Reliability Management in Neuromorphic Computing6
F-Bypass: A Low-Power Network-on-Chip Design Utilizing Bypass to Improve Network Connectivity6
Towards Certified Safe Personalization in Learning Enabled Human-in-the-loop Human-in-the-plant Systems6
Spiking-NeRF: Spiking Neural Network for Energy-Efficient Neural Rendering6
A Quasi-digital QPSK Modulator Design for Biomedical Devices6
Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA6
A Quality-assured Approximate Hardware Accelerators–based on Machine Learning and Dynamic Partial Reconfiguration6
A Spiking Neuromorphic Architecture Using Gated-RRAM for Associative Memory6
Digital Fault-based Built-in Self-test and Evaluation of Low Dropout Voltage Regulators5
A Novel Highly-Efficient Inexact Full Adder Cell for Motion and Edge Detection Systems of Image Processing in CNFET Technology5
Towards a Truly Integrated Vector Processing Unit for Memory-bound Applications Based on a Cost-competitive Computational SRAM Design Solution5
Extreme Partial-Sum Quantization for Analog Computing-In-Memory Neural Network Accelerators5
A ReRAM Memory Compiler for Monolithic 3D Integrated Circuits in a Carbon Nanotube Process5
Fusing In-storage and Near-storage Acceleration of Convolutional Neural Networks5
Building an Open Representation for Biological Protocols5
Guest Editorial: ACM JETC Special Issue on Hardware-Aware Learning for Medical Applications5
AroMa : Evaluating Deep Learning Systems for Stealthy Integrity Attacks on Multi-tenant Accelerators4
AccHashtag : Accelerated Hashing for Detecting Fault-Injection Attacks on Embedded Neural Networks4
Repercussions of Using DNN Compilers on Edge GPUs for Real Time and Safety Critical Systems: A Quantitative Audit4
Demonstration of a Scalable DNA Computing Platform: Writing and Selection4
Photonic Networks-on-Chip Employing Multilevel Signaling: A Cross-Layer Comparative Study4
Generation of Black-box Audio Adversarial Examples Based on Gradient Approximation and Autoencoders4
Genetic Cache: A Machine Learning Approach to Designing DRAM Cache Controllers in HBM Systems4
Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images4
Guest Editorial: Computation-In-Memory (CIM): from Device to Applications4
Optimizing 3D U-Net-based Brain Tumor Segmentation with Integer-arithmetic Deep Learning Accelerators4
Toward the Generation of Test Vectors for the Detection of Hardware Trojan Targeting Effective Switching Activity3
Direction-aggregated Attack for Transferable Adversarial Examples3
Towards All-optical Stochastic Computing Using Photonic Crystal Nanocavities3
Toward Practical Superconducting Accelerators for Machine Learning Using U-SFQ3
On Securing Cryptographic ICs against Scan-based Attacks: A Hamming Weight Distribution Perspective3
A Genetic-algorithm-based Approach to the Design of DCT Hardware Accelerators3
Built-in Self-Test and Fault Localization for Inter-Layer Vias in Monolithic 3D ICs3
Hardware Trojan Detection Potential and Limits with the Quantum Diamond Microscope3
Towards Compact Modeling of Noisy Quantum Computers: A Molecular-Spin-Qubit Case of Study3
A Deep Neural Network Accelerator using Residue Arithmetic in a Hybrid Optoelectronic System3
Introduction to the Special Issue on CAD for Security: Pre-silicon Security Sign-off Solutions Through Design Cycle3
0.035629034042358