NetBouncer: Active Device and Link Failure Localization in Data Center Networks C Tan, Z Jin, C Guo, T Zhang, H Wu, K Deng, D Bi, D Xiang 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2019 | 108 | 2019 |
Tinychecker: Transparent protection of vms against hypervisor failures with nested virtualization C Tan, Y Xia, H Chen, B Zang IEEE/IFIP International Conference on Dependable Systems and Networks …, 2012 | 41 | 2012 |
Nnsmith: Generating diverse and valid test cases for deep learning compilers J Liu, J Lin, F Ruffy, C Tan, J Li, A Panda, L Zhang Proceedings of the 28th ACM International Conference on Architectural …, 2023 | 37 | 2023 |
Cobra: Making Transactional {Key-Value} Stores Verifiably Serializable C Tan, C Zhao, S Mu, M Walfish 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2020 | 36 | 2020 |
TinMan eliminating confidential mobile data exposure with security oriented offloading Y Xia, Y Liu, C Tan, M Ma, H Guan, B Zang, H Chen Proceedings of the Tenth European Conference on Computer Systems, 1-16, 2015 | 34 | 2015 |
The efficient server audit problem, deduplicated re-execution, and the web C Tan, L Yu, JB Leners, M Walfish Proceedings of the 26th Symposium on Operating Systems Principles, 546-564, 2017 | 28 | 2017 |
Bringing decentralized search to decentralized services M Li, J Zhu, T Zhang, C Tan, Y Xia, S Angel, H Chen 15th {USENIX} Symposium on Operating Systems Design and Implementation …, 2021 | 21 | 2021 |
Serving DNN models with multi-instance gpus: A case of the reconfigurable machine scheduling problem C Tan, Z Li, J Zhang, Y Cao, S Qi, Z Liu, Y Zhu, C Guo arXiv preprint arXiv:2109.11067, 2021 | 19 | 2021 |
Building verified neural networks with specifications for systems C Tan, Y Zhu, C Guo Proceedings of the 12th ACM SIGOPS Asia-Pacific Workshop on Systems, 42-47, 2021 | 9 | 2021 |
Encrypted Databases Made Secure Yet Maintainable M Li, X Zhao, L Chen, C Tan, H Li, S Wang, Z Mi, Y Xia, F Li, H Chen 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2023 | 4 | 2023 |
Characterizing neural network verification for systems with NN4SYSBench H He, T Wei, H Zhang, C Liu, C Tan 1st Workshop on Formal Verification of Machine Learning, 2022 | 4 | 2022 |
Viper: A Fast Snapshot Isolation Checker J Zhang, Y Ji, S Mu, C Tan Proceedings of the Eighteenth European Conference on Computer Systems, 654-671, 2023 | 2 | 2023 |
Precrime to the rescue: defeating mobile malware one-step ahead C Tan, H Li, Y Xia, B Zang, CK Chu, T Li Proceedings of 5th Asia-Pacific Workshop on Systems, 1-7, 2014 | 2 | 2014 |
Dropout attacks A Yuan, A Oprea, C Tan arXiv preprint arXiv:2309.01614, 2023 | 1 | 2023 |
Predicting GPU Failures With High Precision Under Deep Learning Workloads H Liu, Z Li, C Tan, R Yang, G Cao, Z Liu, C Guo Proceedings of the 16th ACM International Conference on Systems and Storage …, 2023 | 1* | 2023 |
Building Verified Neural Networks for Computer Systems with Ouroboros C Tan, C Liu, Z Jia, T Wei Proceedings of Machine Learning and Systems 5, 2023 | 1 | 2023 |
Taming Distrust in the Decentralized Internet with PIXIU Y Xia, Q Liu, C Tan, J Leng, S Xu, B Zang, H Chen arXiv preprint arXiv:1901.06095, 2019 | 1 | 2019 |
Simplifying Snapshot Isolation: A New Definition, Equivalence, and Efficient Checking J Zhang, C Tan Proceedings of the 11th Workshop on Principles and Practice of Consistency …, 2024 | | 2024 |
Exploiting Time Channel Vulnerability of Learned Bloom Filters HS Farwah, G Singh, C Tan The Second Tiny Papers Track at ICLR 2024, 0 | | |