Follow
Cheng Tan
Cheng Tan
Northeastern
Verified email at northeastern.edu - Homepage
Title
Cited by
Cited by
Year
NetBouncer: Active Device and Link Failure Localization in Data Center Networks
C Tan, Z Jin, C Guo, T Zhang, H Wu, K Deng, D Bi, D Xiang
16th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2019
1072019
Tinychecker: Transparent protection of vms against hypervisor failures with nested virtualization
C Tan, Y Xia, H Chen, B Zang
IEEE/IFIP International Conference on Dependable Systems and Networks …, 2012
412012
Nnsmith: Generating diverse and valid test cases for deep learning compilers
J Liu, J Lin, F Ruffy, C Tan, J Li, A Panda, L Zhang
Proceedings of the 28th ACM International Conference on Architectural …, 2023
352023
Cobra: Making Transactional {Key-Value} Stores Verifiably Serializable
C Tan, C Zhao, S Mu, M Walfish
14th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2020
342020
TinMan eliminating confidential mobile data exposure with security oriented offloading
Y Xia, Y Liu, C Tan, M Ma, H Guan, B Zang, H Chen
Proceedings of the Tenth European Conference on Computer Systems, 1-16, 2015
342015
The efficient server audit problem, deduplicated re-execution, and the web
C Tan, L Yu, JB Leners, M Walfish
Proceedings of the 26th Symposium on Operating Systems Principles, 546-564, 2017
272017
Bringing decentralized search to decentralized services
M Li, J Zhu, T Zhang, C Tan, Y Xia, S Angel, H Chen
15th {USENIX} Symposium on Operating Systems Design and Implementation …, 2021
202021
Serving DNN models with multi-instance gpus: A case of the reconfigurable machine scheduling problem
C Tan, Z Li, J Zhang, Y Cao, S Qi, Z Liu, Y Zhu, C Guo
arXiv preprint arXiv:2109.11067, 2021
182021
Building verified neural networks with specifications for systems
C Tan, Y Zhu, C Guo
Proceedings of the 12th ACM SIGOPS Asia-Pacific Workshop on Systems, 42-47, 2021
92021
Characterizing neural network verification for systems with NN4SYSBench
H He, T Wei, H Zhang, C Liu, C Tan
1st Workshop on Formal Verification of Machine Learning, 2022
42022
Encrypted Databases Made Secure Yet Maintainable
M Li, X Zhao, L Chen, C Tan, H Li, S Wang, Z Mi, Y Xia, F Li, H Chen
17th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2023
32023
Precrime to the rescue: defeating mobile malware one-step ahead
C Tan, H Li, Y Xia, B Zang, CK Chu, T Li
Proceedings of 5th Asia-Pacific Workshop on Systems, 1-7, 2014
22014
Dropout attacks
A Yuan, A Oprea, C Tan
arXiv preprint arXiv:2309.01614, 2023
12023
Predicting GPU Failures With High Precision Under Deep Learning Workloads
H Liu, Z Li, C Tan, R Yang, G Cao, Z Liu, C Guo
Proceedings of the 16th ACM International Conference on Systems and Storage …, 2023
1*2023
Viper: A Fast Snapshot Isolation Checker
J Zhang, Y Ji, S Mu, C Tan
Proceedings of the Eighteenth European Conference on Computer Systems, 654-671, 2023
12023
Building Verified Neural Networks for Computer Systems with Ouroboros
C Tan, C Liu, Z Jia, T Wei
Proceedings of Machine Learning and Systems 5, 2023
12023
Taming Distrust in the Decentralized Internet with PIXIU
Y Xia, Q Liu, C Tan, J Leng, S Xu, B Zang, H Chen
arXiv preprint arXiv:1901.06095, 2019
12019
Exploiting Time Channel Vulnerability of Learned Bloom Filters
HS Farwah, G Singh, C Tan
The Second Tiny Papers Track at ICLR 2024, 0
The system can't perform the operation now. Try again later.
Articles 1–18