Biblio

Export 27 results:
Filters: Author is Kai Chen  [Clear All Filters]
2024
Zeng C, Liao X, Cheng X, Tian H, Wan X, Wang H, Chen K.  2024.  Accelerating Neural Recommendation Training with Embedding Scheduling. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1141--1156.
Li W, He X, Liu Y, Li K, Chen K, Ge Z, Guan Z, Qi H, Zhang S, Liu G.  2024.  Flow Scheduling with Imprecise Knowledge. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :95--111.
Wang H, Tian H, Chen J, Wan X, Xia J, Zeng G, Bai W, Jiang J, Wang Y, Chen K.  2024.  Towards Domain-Specific Network Transport for Distributed DNN Training. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1421--1443.
2023
Wei C'an, Lee Y, Chen K, Meng G, Lv P.  2023.  Aliasing Backdoor Attacks on Pre-trained Models. 32nd USENIX Security Symposium (USENIX Security 23). :2707--2724.
Hu P, Liang R, Cao Y, Chen K, Zhang R.  2023.  AURC: Detecting Errors in Program Code and Documentation. 32nd USENIX Security Symposium (USENIX Security 23). :1415--1432.
Wang D, Li Y, Zhang Z, Chen K.  2023.  CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing. 32nd USENIX Security Symposium (USENIX Security 23). :1919--1936.
Lv P, Yue C, Liang R, Yang Y, Zhang S, Ma H, Chen K.  2023.  A Data-free Backdoor Injection Approach in Neural Networks. 32nd USENIX Security Symposium (USENIX Security 23). :2671--2688.
Lin M, Chen K, Xiao Y.  2023.  Detecting API Post-Handling Bugs Using Code and Description in Patches. 32nd USENIX Security Symposium (USENIX Security 23). :3709--3726.
Deng Z, Meng G, Chen K, Liu T, Xiang L, Chen C.  2023.  Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities. 32nd USENIX Security Symposium (USENIX Security 23). :7393--7410.
Zhang J, Cheng X, Wang W, Yang L, Hu J, Chen K.  2023.  FLASH: Towards a High-performance Hardware Acceleration Architecture for Cross-silo Federated Learning. 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). :1057--1079.
Wang Z, Luo L, Ning Q, Zeng C, Li W, Wan X, Xie P, Feng T, Cheng K, Geng X et al..  2023.  SRNIC: A Scalable Architecture for RDMA NICs. 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). :1--14.
2022
Zeng C, Luo L, Ning Q, Han Y, Jiang Y, Tang D, Wang Z, Chen K, Guo C.  2022.  FAERY: An FPGA-accelerated Embedding-based Retrieval System. 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). :841--856.
Zeng C, Luo L, Zhang T, Wang Z, Li L, Han W, Chen N, Wan L, Liu L, Ding Z et al..  2022.  Tiara: A Scalable and Efficient Hardware Acceleration Architecture for Stateful Layer-4 Load Balancing. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :1345--1358.
2021
He Y, Meng G, Chen K, Hu X, He J.  2021.  DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks. 30th USENIX Security Symposium (USENIX Security 21). :1901--1918.
2018
Yuan X, Chen Y, Zhao Y, Long Y, Liu X, Chen K, Zhang S, Huang H, Wang XF, Gunter CA.  2018.  CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. 27th USENIX Security Symposium (USENIX Security 18). :49--64.
Chen L, Xia J, Yi B, Chen K.  2018.  PowerMan: An Out-of-Band Management Network for Datacenters Using Power Line Communication. 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). :561--578.
2017
Chen L, Chen K, Zhu Z, Yu M, Porter G, Qiao C, Zhong S.  2017.  Enabling Wide-Spread Communications on Optical Fabric with MegaSwitch. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :577--593.
2016
Bai W, Chen L, Chen K, Wu H.  2016.  Enabling ECN in Multi-Service Multi-Queue Data Centers. 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). :537--549.
2015
Hu S, Chen K, Wu H, Bai W, Lan C, Wang H, Zhao H, Guo C.  2015.  Explicit Path Control in Commodity Data Centers: Design and Applications. 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15). :15--28.
Chen K, Wang P, Lee Y, Wang XF, Zhang N, Huang H, Zou W, Liu P.  2015.  Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. 24th USENIX Security Symposium (USENIX Security 15). :659--674.

Pages