Bryant Wysocki
Bryant Wysocki
AFRL
Verified email at cornell.edu
Title
Cited by
Cited by
Year
A write-time based memristive PUF for hardware security applications
GS Rose, N McDonald, LK Yan, B Wysocki
2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 830-833, 2013
1102013
Compact method for modeling and simulation of memristor devices: Ion conductor chalcogenide-based memristor devices
RE Pino, JW Bohl, N McDonald, B Wysocki, P Rozwood, KA Campbell, ...
2010 IEEE/ACM International Symposium on Nanoscale Architectures, 1-4, 2010
1012010
Nano meets security: Exploring nanoelectronic devices for security applications
J Rajendran, R Karri, JB Wendt, M Potkonjak, N McDonald, GS Rose, ...
Proceedings of the IEEE 103 (5), 829-849, 2015
912015
Design and analysis of a neuromemristive reservoir computing architecture for biosignal processing
D Kudithipudi, Q Saleh, C Merkel, J Thesing, B Wysocki
Frontiers in neuroscience 9, 502, 2016
692016
Foundations of memristor based PUF architectures
GS Rose, N McDonald, LK Yan, B Wysocki, K Xu
2013 IEEE/ACM International Symposium on Nanoscale Architectures (NANOARCH …, 2013
662013
A compact modeling of TiO2-TiO2–x memristor
L Zhang, Z Chen, J Joshua Yang, B Wysocki, N McDonald, Y Chen
Applied Physics Letters 102 (15), 153503, 2013
552013
Analysis of dynamic linear and non-linear memristor device models for emerging neuromorphic computing hardware design
NR McDonald, RE Pino, PJ Rozwood, BT Wysocki
The 2010 International Joint Conference on Neural Networks (IJCNN), 1-5, 2010
502010
Hardware security strategies exploiting nanoelectronic circuits
GS Rose, J Rajendran, N McDonald, R Karri, M Potkonjak, B Wysocki
2013 18th Asia and South Pacific Design Automation Conference (ASP-DAC), 368-372, 2013
442013
Spike-time-dependent encoding for neuromorphic processors
C Zhao, BT Wysocki, Y Liu, CD Thiem, NR McDonald, Y Yi
ACM Journal on Emerging Technologies in Computing Systems (JETC) 12 (3), 1-21, 2015
352015
Nanoelectronic solutions for hardware security
J Rajendran, R Karri, JB Wendt, M Potkonjak, N McDonald, GS Rose, ...
Cryptology ePrint Archive, 2012
332012
Energy efficient spiking temporal encoder design for neuromorphic computing systems
C Zhao, BT Wysocki, CD Thiem, NR McDonald, J Li, L Liu, Y Yi
IEEE Transactions on Multi-Scale Computing Systems 2 (4), 265-276, 2016
252016
Reconfigurable neuromorphic computing system with memristor-based synapse design
B Liu, Y Chen, B Wysocki, T Huang
Neural Processing Letters 41 (2), 159-167, 2015
252015
The circuit realization of a neuromorphic computing system with memristor-based synapse design
B Liu, Y Chen, B Wysocki, T Huang
International Conference on Neural Information Processing, 357-365, 2012
232012
Neuromorphic encoding system design with chaos based CMOS analog neuron
C Zhao, W Danesh, BT Wysocki, Y Yi
2015 IEEE Symposium on Computational Intelligence for Security and Defense …, 2015
192015
Discrimination between electronic and optical blooming in an InSb focal-plane array under high-intensity excitation
BT Wysocki, MA Marciniak
Infrared physics & technology 51 (3), 137-145, 2008
172008
Write-Time Based Memristive Physical Unclonable Function
G Rose, N McDonald, LK Yan, B Wysocki
US Patent App. 13/868,529, 2014
162014
Realizing green symbol detection via reservoir computing: An energy-efficiency perspective
R Shafin, L Liu, J Ashdown, J Matyjas, M Medley, B Wysocki, Y Yi
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
122018
Network science and cybersecurity
RE Pino
Springer, 2014
122014
Channel estimation in wireless OFDM systems using reservoir computing
W Danesh, C Zhao, BT Wysocki, MJ Medley, NN Thawdar, Y Yi
2015 IEEE Symposium on Computational Intelligence for Security and Defense …, 2015
92015
Design and analysis of neuromemristive echo state networks with limited-precision synapses
C Donahue, C Merkel, Q Saleh, L Dolgovs, YK Ooi, D Kudithipudi, ...
2015 IEEE Symposium on Computational Intelligence for Security and Defense …, 2015
92015
The system can't perform the operation now. Try again later.
Articles 1–20