Hardware-intrinsic security primitives enabled by analogue state and nonlinear conductance variations in integrated memristors H Nili, GC Adam, B Hoskins, M Prezioso, J Kim, MR Mahmoodi, FM Bayat, ... Nature Electronics 1 (3), 197-202, 2018 | 188 | 2018 |
Self-rectifying resistive memory in passive crossbar arrays K Jeon, J Kim, JJ Ryu, SJ Yoo, C Song, MK Yang, DS Jeong, GH Kim Nature communications 12 (1), 2968, 2021 | 60 | 2021 |
Microstructure and dynamics of vacancy-induced nanofilamentary switching network in donor doped SrTiO3− x memristors H Nili, T Ahmed, S Walia, R Ramanathan, AE Kandjani, S Rubanov, J Kim, ... Nanotechnology 27 (50), 505210, 2016 | 49 | 2016 |
Exploiting machine learning for bestowing intelligence to microfluidics J Zheng, T Cole, Y Zhang, J Kim, SY Tang Biosensors and Bioelectronics 194, 113666, 2021 | 37 | 2021 |
A physical unclonable function with redox-based nanoionic resistive memory J Kim, T Ahmed, H Nili, J Yang, DS Jeong, P Beckett, S Sriram, ... IEEE Transactions on Information Forensics and Security 13 (2), 437-448, 2017 | 34 | 2017 |
Nano-intrinsic true random number generation: A device to data study J Kim, H Nili, ND Truong, T Ahmed, J Yang, DS Jeong, S Sriram, ... IEEE Transactions on Circuits and Systems I: Regular Papers 66 (7), 2615-2626, 2019 | 30* | 2019 |
Transparent amorphous strontium titanate resistive memories with transient photo-response T Ahmed, S Walia, J Kim, H Nili, R Ramanathan, ELH Mayes, DWM Lau, ... Nanoscale 9 (38), 14690-14702, 2017 | 24 | 2017 |
Efficient erasable PUFs from programmable logic and memristors Y Gao, C Jin, J Kim, H Nili, X Xu, W Burleson, O Kavehei, M van Dijk, ... Cryptology ePrint Archive, 2018 | 17 | 2018 |
Hardware-efficient emulation of leaky integrate-and-fire model using template-scaling-based exponential function approximation J Kim, V Kornijcuk, C Ye, DS Jeong IEEE Transactions on Circuits and Systems I: Regular Papers 68 (1), 350-362, 2020 | 11 | 2020 |
Area performance tradeoffs in NCL multipliers using two-dimensional pipelining MM Kim, J Kim, P Beckett 2015 International SoC Design Conference (ISOCC), 125-126, 2015 | 11 | 2015 |
Predictive Analysis of 3D ReRAM-based PUF for Securing the Internet of Things J Kim, H Nili, GC Adam, ND Truong, DB Strukov, O Kavehei Proceeding TenSymp 2018, 2018 | 8 | 2018 |
Utilizing IV non-linearity and analog state variations in ReRAM-based security primitives GC Adam, H Nili, J Kim, BD Hoskins, O Kavehei, DB Strukov 2017 47th European Solid-State Device Research Conference (ESSDERC), 74-77, 2017 | 7 | 2017 |
Static leakage control in null convention logic standard cells in 28 nm UTBB-FDSOI CMOS J Kim, MM Kim, P Beckett 2015 International SoC Design Conference (ISOCC), 99-100, 2015 | 6 | 2015 |
Ts-efa: Resource-efficient high-precision approximation of exponential functions based on template-scaling method J Kim, V Kornijcuk, DS Jeong 2020 21st International Symposium on Quality Electronic Design (ISQED), 358-363, 2020 | 5 | 2020 |
Optimal distribution of spiking neurons over multicore neuromorphic processors G Kim, V Kornijcuk, J Kim, CS Hwang, DS Jeong IEEE Access 8, 69426-69437, 2020 | 4 | 2020 |
Optimal Weight‐Splitting in Resistive Random Access Memory‐Based Computing‐in‐Memory Macros C Song, J Kim, DS Jeong Advanced Intelligent Systems 5 (1), 2200289, 2023 | 3 | 2023 |
Combination-Encoding Content-Addressable Memory With High Content Density G Kim, V Kornijcuk, J Kim, D Kim, CS Hwang, DS Jeong IEEE Access 7, 137620-137628, 2019 | 3 | 2019 |
LaCERA: Layer-centric event-routing architecture CM Ye, V Kornijcuk, DH Yoo, J Kim, DS Jeong Neurocomputing 520, 46-59, 2023 | 2 | 2023 |
Nano-intrinsic security primitives for internet of everything J Kim RMIT University, 2019 | 1 | 2019 |
Nano-Intrinsic Security Primitives with Redox-based Resistive Memory J Kim Frontiers in Communications and Networks, 1-21, 2022 | | 2022 |