Follow
Jeeson Kim
Jeeson Kim
Lecturer, Biomedical Engineering, University of Sydney
Verified email at sydney.edu.au
Title
Cited by
Cited by
Year
Hardware-intrinsic security primitives enabled by analogue state and nonlinear conductance variations in integrated memristors
H Nili, GC Adam, B Hoskins, M Prezioso, J Kim, MR Mahmoodi, FM Bayat, ...
Nature Electronics 1 (3), 197-202, 2018
1882018
Self-rectifying resistive memory in passive crossbar arrays
K Jeon, J Kim, JJ Ryu, SJ Yoo, C Song, MK Yang, DS Jeong, GH Kim
Nature communications 12 (1), 2968, 2021
602021
Microstructure and dynamics of vacancy-induced nanofilamentary switching network in donor doped SrTiO3− x memristors
H Nili, T Ahmed, S Walia, R Ramanathan, AE Kandjani, S Rubanov, J Kim, ...
Nanotechnology 27 (50), 505210, 2016
492016
Exploiting machine learning for bestowing intelligence to microfluidics
J Zheng, T Cole, Y Zhang, J Kim, SY Tang
Biosensors and Bioelectronics 194, 113666, 2021
372021
A physical unclonable function with redox-based nanoionic resistive memory
J Kim, T Ahmed, H Nili, J Yang, DS Jeong, P Beckett, S Sriram, ...
IEEE Transactions on Information Forensics and Security 13 (2), 437-448, 2017
342017
Nano-intrinsic true random number generation: A device to data study
J Kim, H Nili, ND Truong, T Ahmed, J Yang, DS Jeong, S Sriram, ...
IEEE Transactions on Circuits and Systems I: Regular Papers 66 (7), 2615-2626, 2019
30*2019
Transparent amorphous strontium titanate resistive memories with transient photo-response
T Ahmed, S Walia, J Kim, H Nili, R Ramanathan, ELH Mayes, DWM Lau, ...
Nanoscale 9 (38), 14690-14702, 2017
242017
Efficient erasable PUFs from programmable logic and memristors
Y Gao, C Jin, J Kim, H Nili, X Xu, W Burleson, O Kavehei, M van Dijk, ...
Cryptology ePrint Archive, 2018
172018
Hardware-efficient emulation of leaky integrate-and-fire model using template-scaling-based exponential function approximation
J Kim, V Kornijcuk, C Ye, DS Jeong
IEEE Transactions on Circuits and Systems I: Regular Papers 68 (1), 350-362, 2020
112020
Area performance tradeoffs in NCL multipliers using two-dimensional pipelining
MM Kim, J Kim, P Beckett
2015 International SoC Design Conference (ISOCC), 125-126, 2015
112015
Predictive Analysis of 3D ReRAM-based PUF for Securing the Internet of Things
J Kim, H Nili, GC Adam, ND Truong, DB Strukov, O Kavehei
Proceeding TenSymp 2018, 2018
82018
Utilizing IV non-linearity and analog state variations in ReRAM-based security primitives
GC Adam, H Nili, J Kim, BD Hoskins, O Kavehei, DB Strukov
2017 47th European Solid-State Device Research Conference (ESSDERC), 74-77, 2017
72017
Static leakage control in null convention logic standard cells in 28 nm UTBB-FDSOI CMOS
J Kim, MM Kim, P Beckett
2015 International SoC Design Conference (ISOCC), 99-100, 2015
62015
Ts-efa: Resource-efficient high-precision approximation of exponential functions based on template-scaling method
J Kim, V Kornijcuk, DS Jeong
2020 21st International Symposium on Quality Electronic Design (ISQED), 358-363, 2020
52020
Optimal distribution of spiking neurons over multicore neuromorphic processors
G Kim, V Kornijcuk, J Kim, CS Hwang, DS Jeong
IEEE Access 8, 69426-69437, 2020
42020
Optimal Weight‐Splitting in Resistive Random Access Memory‐Based Computing‐in‐Memory Macros
C Song, J Kim, DS Jeong
Advanced Intelligent Systems 5 (1), 2200289, 2023
32023
Combination-Encoding Content-Addressable Memory With High Content Density
G Kim, V Kornijcuk, J Kim, D Kim, CS Hwang, DS Jeong
IEEE Access 7, 137620-137628, 2019
32019
LaCERA: Layer-centric event-routing architecture
CM Ye, V Kornijcuk, DH Yoo, J Kim, DS Jeong
Neurocomputing 520, 46-59, 2023
22023
Nano-intrinsic security primitives for internet of everything
J Kim
RMIT University, 2019
12019
Nano-Intrinsic Security Primitives with Redox-based Resistive Memory
J Kim
Frontiers in Communications and Networks, 1-21, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20