default search action
Cheng Tan 0005
Person information
- affiliation: Northeastern University, USA
- affiliation (former): New York University, NY, USA
- affiliation (former): Shanghai Jiao Tong University, China
Other persons with the same name
- Cheng Tan — disambiguation page
- Cheng Tan 0001 — QuFu Normal University, Rizhao, Shandong, China (and 1 more)
- Cheng Tan 0002 — Pacific Northwest National Laboratory, Richland, WA, US (and 2 more)
- Cheng Tan 0003 — University of New South Wales, Sydney, NSW, Australia
- Cheng Tan 0004 — RIKEN, Kobe, Japan (and 2 more)
- Cheng Tan 0006 — Wuhan University, Wuhan, China
- Cheng Tan 0007 — Canon Information Technology Co. Ltd., Beijing, China
- Cheng Tan 0008 — Shandong University, Jinan, Shandong, China
- Cheng Tan 0009 — Beihang University, Beijing, China
- Cheng Tan 0010 — Computational Aerodynamics Institute, Mianyang, China
- Cheng Tan 0011 — Aerospace Information Research Institute, Chinese Academy of Sciences, China
- Cheng Tan 0012 — Westlake University, AI Lab, School of Engineering, Hangzhou, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Matthew Casey, Rajmohan Rajaraman, David Stalfa, Cheng Tan:
Scheduling Splittable Jobs on Configurable Machines. APPROX/RANDOM 2024: 22:1-22:20 - [c13]Jian Zhang, Cheng Tan:
Simplifying Snapshot Isolation: A New Definition, Equivalence, and Efficient Checking. PaPoC@EuroSys 2024: 23-29 - 2023
- [c12]Jiawei Liu, Jinkun Lin, Fabian Ruffy, Cheng Tan, Jinyang Li, Aurojit Panda, Lingming Zhang:
NNSmith: Generating Diverse and Valid Test Cases for Deep Learning Compilers. ASPLOS (2) 2023: 530-543 - [c11]Jian Zhang, Ye Ji, Shuai Mu, Cheng Tan:
Viper: A Fast Snapshot Isolation Checker. EuroSys 2023: 654-671 - [c10]Mingyu Li, Xuyang Zhao, Le Chen, Cheng Tan, Huorong Li, Sheng Wang, Zeyu Mi, Yubin Xia, Feifei Li, Haibo Chen:
Encrypted Databases Made Secure Yet Maintainable. OSDI 2023: 117-133 - [c9]Heting Liu, Zhichao Li, Cheng Tan, Rongqiu Yang, Guohong Cao, Zherui Liu, Chuanxiong Guo:
Predicting GPU Failures With High Precision Under Deep Learning Workloads. SYSTOR 2023: 124-135 - 2022
- [i6]Heting Liu, Zhichao Li, Cheng Tan, Rongqiu Yang, Guohong Cao, Zherui Liu, Chuanxiong Guo:
Prediction of GPU Failures Under Deep Learning Workloads. CoRR abs/2201.11853 (2022) - [i5]Jiawei Liu, Jinkun Lin, Fabian Ruffy, Cheng Tan, Jinyang Li, Aurojit Panda, Lingming Zhang:
Finding Deep-Learning Compilation Bugs with NNSmith. CoRR abs/2207.13066 (2022) - 2021
- [c8]Cheng Tan, Yibo Zhu, Chuanxiong Guo:
Building verified neural networks with specifications for systems. APSys 2021: 42-47 - [c7]Mingyu Li, Jinhao Zhu, Tianxu Zhang, Cheng Tan, Yubin Xia, Sebastian Angel, Haibo Chen:
Bringing Decentralized Search to Decentralized Services. OSDI 2021: 331-347 - [i4]Cheng Tan, Zhichao Li, Jian Zhang, Yu Cao, Sikai Qi, Zherui Liu, Yibo Zhu, Chuanxiong Guo:
Serving DNN Models with Multi-Instance GPUs: A Case of the Reconfigurable Machine Scheduling Problem. CoRR abs/2109.11067 (2021) - 2020
- [b1]Cheng Tan:
Auditing Outsourced Services. New York University, USA, 2020 - [c6]Cheng Tan, Changgeng Zhao, Shuai Mu, Michael Walfish:
Cobra: Making Transactional Key-Value Stores Verifiably Serializable. OSDI 2020: 63-80
2010 – 2019
- 2019
- [c5]Cheng Tan, Ze Jin, Chuanxiong Guo, Tianrong Zhang, Haitao Wu, Karl Deng, Dongming Bi, Dong Xiang:
NetBouncer: Active Device and Link Failure Localization in Data Center Networks. NSDI 2019: 599-614 - [i3]Yubin Xia, Qingyuan Liu, Cheng Tan, Jing Leng, Shangning Xu, Binyu Zang, Haibo Chen:
Taming Distrust in the Decentralized Internet with PIXIU. CoRR abs/1901.06095 (2019) - [i2]Cheng Tan, Changgeng Zhao, Shuai Mu, Michael Walfish:
Detecting Incorrect Behavior of Cloud Databases as an Outsider. CoRR abs/1912.09018 (2019) - 2017
- [c4]Cheng Tan, Lingfan Yu, Joshua B. Leners, Michael Walfish:
The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web. SOSP 2017: 546-564 - [i1]Cheng Tan, Lingfan Yu, Joshua B. Leners, Michael Walfish:
The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web. CoRR abs/1709.08501 (2017) - 2015
- [c3]Yubin Xia, Yutao Liu, Cheng Tan, Mingyang Ma, Haibing Guan, Binyu Zang, Haibo Chen:
TinMan: eliminating confidential mobile data exposure with security oriented offloading. EuroSys 2015: 27:1-27:16 - 2014
- [c2]Cheng Tan, Haibo Li, Yubin Xia, Binyu Zang, Cheng-Kang Chu, Tieyan Li:
PreCrime to the rescue: defeating mobile malware one-step ahead. APSys 2014: 5:1-5:7 - 2012
- [c1]Cheng Tan, Yubin Xia, Haibo Chen, Binyu Zang:
TinyChecker: Transparent protection of VMs against hypervisor failures with nested virtualization. DSN Workshops 2012: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint