Follow
Bryant Wysocki
Bryant Wysocki
AFRL
Verified email at cornell.edu
Title
Cited by
Cited by
Year
A write-time based memristive PUF for hardware security applications
GS Rose, N McDonald, LK Yan, B Wysocki
2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 830-833, 2013
1332013
Nano meets security: Exploring nanoelectronic devices for security applications
J Rajendran, R Karri, JB Wendt, M Potkonjak, N McDonald, GS Rose, ...
Proceedings of the IEEE 103 (5), 829-849, 2015
1302015
Compact method for modeling and simulation of memristor devices: Ion conductor chalcogenide-based memristor devices
RE Pino, JW Bohl, N McDonald, B Wysocki, P Rozwood, KA Campbell, ...
2010 IEEE/ACM International Symposium on Nanoscale Architectures, 1-4, 2010
1122010
Design and analysis of a neuromemristive reservoir computing architecture for biosignal processing
D Kudithipudi, Q Saleh, C Merkel, J Thesing, B Wysocki
Frontiers in neuroscience 9, 166603, 2016
1072016
Foundations of memristor based PUF architectures
GS Rose, N McDonald, LK Yan, B Wysocki, K Xu
2013 IEEE/ACM International Symposium on Nanoscale Architectures (NANOARCH …, 2013
802013
A compact modeling of TiO2-TiO2–x memristor
L Zhang, Z Chen, J Joshua Yang, B Wysocki, N McDonald, Y Chen
Applied Physics Letters 102 (15), 2013
602013
Analysis of dynamic linear and non-linear memristor device models for emerging neuromorphic computing hardware design
NR McDonald, RE Pino, PJ Rozwood, BT Wysocki
The 2010 International Joint Conference on Neural Networks (IJCNN), 1-5, 2010
602010
Spike-time-dependent encoding for neuromorphic processors
C Zhao, BT Wysocki, Y Liu, CD Thiem, NR McDonald, Y Yi
ACM Journal on Emerging Technologies in Computing Systems (JETC) 12 (3), 1-21, 2015
542015
Hardware security strategies exploiting nanoelectronic circuits
GS Rose, J Rajendran, N McDonald, R Karri, M Potkonjak, B Wysocki
2013 18th Asia and South Pacific Design Automation Conference (ASP-DAC), 368-372, 2013
482013
Energy efficient spiking temporal encoder design for neuromorphic computing systems
C Zhao, BT Wysocki, CD Thiem, NR McDonald, J Li, L Liu, Y Yi
IEEE Transactions on Multi-Scale Computing Systems 2 (4), 265-276, 2016
422016
Nanoelectronic solutions for hardware security
J Rajendran, R Karri, JB Wendt, M Potkonjak, N McDonald, GS Rose, ...
Cryptology ePrint Archive, 2012
342012
Neuromorphic encoding system design with chaos based CMOS analog neuron
C Zhao, W Danesh, BT Wysocki, Y Yi
2015 IEEE Symposium on Computational Intelligence for Security and Defense …, 2015
322015
Reconfigurable neuromorphic computing system with memristor-based synapse design
B Liu, Y Chen, B Wysocki, T Huang
Neural Processing Letters 41, 159-167, 2015
302015
The circuit realization of a neuromorphic computing system with memristor-based synapse design
B Liu, Y Chen, B Wysocki, T Huang
Neural Information Processing: 19th International Conference, ICONIP 2012 …, 2012
262012
Write-Time Based Memristive Physical Unclonable Function
G Rose, N McDonald, LK Yan, B Wysocki
US Patent App. 13/868,529, 2014
202014
Realizing green symbol detection via reservoir computing: An energy-efficiency perspective
R Shafin, L Liu, J Ashdown, J Matyjas, M Medley, B Wysocki, Y Yi
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
192018
Discrimination between electronic and optical blooming in an InSb focal-plane array under high-intensity excitation
BT Wysocki, MA Marciniak
Infrared physics & technology 51 (3), 137-145, 2008
192008
Design and analysis of neuromemristive echo state networks with limited-precision synapses
C Donahue, C Merkel, Q Saleh, L Dolgovs, YK Ooi, D Kudithipudi, ...
2015 IEEE Symposium on Computational Intelligence for Security and Defense …, 2015
172015
Network science and cybersecurity
RE Pino
Springer, 2014
172014
Channel estimation in wireless OFDM systems using reservoir computing
W Danesh, C Zhao, BT Wysocki, MJ Medley, NN Thawdar, Y Yi
2015 IEEE Symposium on Computational Intelligence for Security and Defense …, 2015
132015
The system can't perform the operation now. Try again later.
Articles 1–20