Cheng Tan
(he/him/his)
Assistant Professor

Research interests
- Computer systems
- Systems and networking
- Security
- Operating systems
Education
- PhD in Computer Science, New York University
- MS in Software Engineering, Fudan University — China
- BE in Software Engineering, Nanjing University — China
Biography
Cheng Tan is an assistant professor in the Khoury College of Computer Sciences at Northeastern University, based in Boston.
Tan's research interests are in systems and security, with a focus on building verifiable outsourced services and certified neural networks for systems. His work has earned him the SOSP Best Paper Award and the Janet Fabri Prize for Outstanding Dissertation.
Before joining Khoury College in 2021, Tan was a research scientist at ByteDance Inc.'s AI Lab.
Labs and groups
Recent publications
-
PipeLLM: Fast and Confidential Large Language Model Services with Speculative Pipelined Encryption
Citation: Yifan Tan , Cheng Tan , Zeyu Mi, Haibo Chen . (2025). PipeLLM: Fast and Confidential Large Language Model Services with Speculative Pipelined Encryption ASPLOS (1), 843-857. https://doi.org/10.1145/3669940.3707224 -
Instance-Optimized Mapping with Portfolio Methods
Citation: Yibo Zhao, Panagiotis Manolios, Cheng Tan . (2024). Instance-Optimized Mapping with Portfolio Methods PACMI@SOSP, 11-16. https://doi.org/10.1145/3704742.3704963 -
Scheduling Splittable Jobs on Configurable Machines
Citation: Matthew Casey, Rajmohan Rajaraman, David Stalfa, Cheng Tan . (2024). Scheduling Splittable Jobs on Configurable Machines APPROX/RANDOM, 22:1-22:20. https://doi.org/10.4230/LIPIcs.APPROX/RANDOM.2024.22 -
Encrypted Databases Made Secure Yet Maintainable
Citation: Mingyu Li, Xuyang Zhao, Le Chen, Cheng Tan , Huorong Li, Sheng Wang , Zeyu Mi, Yubin Xia, Feifei Li , Haibo Chen . (2023). Encrypted Databases Made Secure Yet Maintainable OSDI, 117-133. https://www.usenix.org/conference/osdi23/presentation/li-mingyu -
NNSmith: Generating Diverse and Valid Test Cases for Deep Learning Compilers
Citation: Jiawei Liu , Jinkun Lin, Fabian Ruffy, Cheng Tan , Jinyang Li , Aurojit Panda, Lingming Zhang . (2023). NNSmith: Generating Diverse and Valid Test Cases for Deep Learning Compilers ASPLOS (2), 530-543. https://doi.org/10.1145/3575693.3575707 -
Building verified neural networks with specifications for systems
Citation: Cheng Tan, Yibo Zhu, and Chuanxiong Guo. 2021. Building verified neural networks with specifications for systems. Proceedings of the 12th ACM SIGOPS Asia-Pacific Workshop on Systems. Association for Computing Machinery, New York, NY, USA, 42–47. DOI:https://doi.org/10.1145/3476886.3477508 -
Bringing Decentralized Search to Decentralized Services
Citation: Mingyu Li and Jinhao Zhu and Tianxu Zhang and Cheng Tan and Yubin Xia and Sebastian Angel and Haibo Chen, "Bringing Decentralized Search to Decentralized Services", 15th {USENIX} Symposium on Operating Systems Design and Implementation , 2021, i USENIX Association -
Cobra: Making transactional key-value stores verifiably serializable
Citation: Cheng Tan, Changgeng Zhao, Shuai Mu, and Michael Walfish. 2020. COBRA: making transactional key-value stores verifiably serializable. Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation. Article 4, 63–80. -
Detecting Incorrect Behavior of Cloud Databases as an Outsider
Citation: Cheng Tan , Changgeng Zhao, Shuai Mu , Michael Walfish. (2019). Detecting Incorrect Behavior of Cloud Databases as an Outsider CoRR, abs/1912.09018. http://arxiv.org/abs/1912.09018 -
Netbouncer: Active device and link failure localization in data center networks
Citation: Cheng Tan, Ze Jin, Chuanxiong Guo, Tianrong Zhang, Haitao Wu, Karl Deng, Dongming Bi, and Dong Xiang. 2019. Netbouncer: active device and link failure localization in data center networks. In Proceedings of the 16th USENIX Conference on Networked Systems Design and Implementation (NSDI'19). USENIX Association, USA, 599–613. -
Taming Distrust in the Decentralized Internet with PIXIU
Citation: Yubin Xia, Qingyuan Liu, Cheng Tan , Jing Leng, Shangning Xu, Binyu Zang, Haibo Chen . (2019). Taming Distrust in the Decentralized Internet with PIXIU CoRR, abs/1901.06095. http://arxiv.org/abs/1901.06095 -
The efficient server audit problem, deduplicated re-execution, and the web
Citation: Cheng Tan, Lingfan Yu, Joshua B. Leners, and Michael Walfish. 2017. The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web. In Proceedings of the 26th Symposium on Operating Systems Principles (SOSP '17). Association for Computing Machinery, New York, NY, USA, 546–564. DOI:https://doi.org/10.1145/3132747.3132760