NetBouncer: Active Device and Link Failure Localization in Data Center Networks C Tan, Z Jin, C Guo, T Zhang, H Wu, K Deng, D Bi, D Xiang 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2019 | 127 | 2019 |
Nnsmith: Generating diverse and valid test cases for deep learning compilers J Liu, J Lin, F Ruffy, C Tan, J Li, A Panda, L Zhang Proceedings of the 28th ACM International Conference on Architectural …, 2023 | 63 | 2023 |
Cobra: Making transactional {key-value} stores verifiably serializable C Tan, C Zhao, S Mu, M Walfish 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2020 | 50 | 2020 |
Tinychecker: Transparent protection of vms against hypervisor failures with nested virtualization C Tan, Y Xia, H Chen, B Zang IEEE/IFIP International Conference on Dependable Systems and Networks …, 2012 | 41 | 2012 |
Serving DNN models with multi-instance gpus: A case of the reconfigurable machine scheduling problem C Tan, Z Li, J Zhang, Y Cao, S Qi, Z Liu, Y Zhu, C Guo arXiv preprint arXiv:2109.11067, 2021 | 34 | 2021 |
TinMan eliminating confidential mobile data exposure with security oriented offloading Y Xia, Y Liu, C Tan, M Ma, H Guan, B Zang, H Chen Proceedings of the Tenth European Conference on Computer Systems, 1-16, 2015 | 34 | 2015 |
Bringing decentralized search to decentralized services M Li, J Zhu, T Zhang, C Tan, Y Xia, S Angel, H Chen 15th {USENIX} Symposium on Operating Systems Design and Implementation …, 2021 | 30 | 2021 |
The efficient server audit problem, deduplicated re-execution, and the web C Tan, L Yu, JB Leners, M Walfish Proceedings of the 26th Symposium on Operating Systems Principles, 546-564, 2017 | 29 | 2017 |
Building verified neural networks with specifications for systems C Tan, Y Zhu, C Guo Proceedings of the 12th ACM SIGOPS Asia-Pacific Workshop on Systems, 42-47, 2021 | 11 | 2021 |
Encrypted databases made secure yet maintainable M Li, X Zhao, L Chen, C Tan, H Li, S Wang, Z Mi, Y Xia, F Li, H Chen 17th USENIX symposium on operating systems design and implementation (OSDI …, 2023 | 9 | 2023 |
Viper: A fast snapshot isolation checker J Zhang, Y Ji, S Mu, C Tan Proceedings of the Eighteenth European Conference on Computer Systems, 654-671, 2023 | 8 | 2023 |
Characterizing neural network verification for systems with NN4SYSBench H He, T Wei, H Zhang, C Liu, C Tan Workshop on Formal Verification of Machine Learning, 2022 | 6 | 2022 |
Predicting GPU Failures With High Precision Under Deep Learning Workloads H Liu, Z Li, C Tan, R Yang, G Cao, Z Liu, C Guo Proceedings of the 16th ACM International Conference on Systems and Storage …, 2023 | 4* | 2023 |
Building verified neural networks for computer systems with ouroboros C Tan, C Liu, Z Jia, T Wei Proceedings of Machine Learning and Systems 5, 728-742, 2023 | 4 | 2023 |
Dropout attacks A Yuan, A Oprea, C Tan 2024 IEEE Symposium on Security and Privacy (SP), 1255-1269, 2024 | 2 | 2024 |
Precrime to the rescue: defeating mobile malware one-step ahead C Tan, H Li, Y Xia, B Zang, CK Chu, T Li Proceedings of 5th Asia-Pacific Workshop on Systems, 1-7, 2014 | 2 | 2014 |
Scheduling Splittable Jobs on Configurable Machines M Casey, R Rajaraman, D Stalfa, C Tan arXiv preprint arXiv:2312.05416, 2023 | 1 | 2023 |
Taming Distrust in the Decentralized Internet with PIXIU Y Xia, Q Liu, C Tan, J Leng, S Xu, B Zang, H Chen arXiv preprint arXiv:1901.06095, 2019 | 1 | 2019 |
Specification Generation for Neural Networks in Systems I Chaudhary, S Lin, C Tan, G Singh arXiv preprint arXiv:2412.03028, 2024 | | 2024 |
PipeLLM: Fast and Confidential Large Language Model Services with Speculative Pipelined Encryption Y Tan, C Tan, Z Mi, H Chen arXiv preprint arXiv:2411.03357, 2024 | | 2024 |