Advised by Prof. Satish Narayanasamy, with a focus on confidential computing and computer architecture. Privacy is everything!
Course work: EECS470 Computer Architecture (A), EECS281 Data Structures and Algorithms (A), EECS312 Integrated Circuits (A), EECS482 Operating Systems (in progress), Parallele CUDA Programming (in progress)
Course work: VE270 Introduction to Logic Design (A+), VE280 Programming & Elem. Data Struct (A), VE401 Probability Methods in Eng. (A+), VV186/VV285/VV286 Honors Mathematics II/III/IV (A-, A, A)
GPU performance analysis, especially for deep learning workloads.
Specialize in: GPU architecture, memory hierarchy & multi-device communication
Scale trusted memory size from hundreds of MB to tens of TB by expanding the span of trusted from a single trusted processor to an entire platform including intelligent memories.
Design a new scheme of freshness protection that reduces the space requirement by 50x.
Reduce deployment cost by spacing sharing one intelligent memory device among multiple CPUs.
Develop a thousand-core platform on Azure Confidential Computing to conduct multi-institutional GWAS on millions of patients in less than a minute.
Adapt Spark-based Hail genomic analysis framework to run on TEE under obliviousness requirement.
Parallelize GWAS computation on 1k cores to achieve near linear speedup.
πPerformance Boost: Accelerate bottleneck step (chaining) of state-of-art long sequence mapping tool minimap2 by 2.57x-5.33x on GPU.
πScales well: Optimize towards ultra long reads of 50kb+ to accommodate genome sequencing technology trend.
πOpen Sourced! with active maintainance and optimization! Welcome community contributions~
Design an out-of-order, 3-way scalar processor based on R10K design using system verilog. Add additional feature load store queue, advance branch predictor and cache heriachy.
Organize weekly paper reading presentations and discussions.
Host talks from visiting researchers and professors.
Alumni Engagement: Organize alumni and student gatherings.
Relationship Building: Involve in expanding SJTU - UM collaborations, connecting to JI sponsors, and building industry relationships.
Career Advising: Organize students career development workshops.
Welcoming: Host new student orientation events, organize airport pickups, and offer settle down help.
Student Support: Support students during the stressful transition to start in a new university in a new country, and during urgent crisis.
Teach out of order processor design topics including branch prediction, pipelines, prefetching, caches etc. Hold lab sessions and develop exam problems regarding OoO processor design.
Probability theory and statistics is interesting, important but often misunderstood. From a wonderful piecs of data one can draw non-sense conclusion if probabalistic methods are not used in the right way. While dealing with computer security, it’s important that we can come to a conclusion that sensitive data is “almost impossible” to leak.
c/c++ cuda, (system)verilog HIP, bash, Makefile
GPU Tuning: nsight-compute/nsight-sys, omniperf/omnitrace/rocprof
Formal Verification: Murphi
SIMD: avx512, avx2 on Xeon Phi
Simulation: SniperSim, DRAMSim, pinplay
Confidential Computing: Open Enclave SDK, Intel SGX
AMD CDNA2 Instinct GPU, NVIDIA Hopper GPU, Intel Xeon Phi, Out-of-order CPU
jiaochewchew
4844 Bob & Betty Beyster Building
2260 Hayward St
Ann Arbor, MI
48105