Xinan Tang

CTO

San Jose, California, United States24 yrs experience
AI ML PractitionerAI Enabled

Key Highlights

  • Expert in AI-driven cybersecurity solutions.
  • Led development of high-performance networking products.
  • Strong background in parallel computing and system architecture.
Stackforce AI infers this person is a cybersecurity and AI expert specializing in high-performance networking solutions.

Contact

Skills

Core Skills

Artificial Intelligence (ai)CybersecurityParallel Computing

Other Skills

Text2SQLText2LaTeXContent Management EngineeringProject PlanningReinforcement LearningCompiler optimizations and performance tuningEmbedded SystemsDPDKParallel TCP flow-affinity modelELK stackDevice DriversCompilersArchitectureAlgorithmsSimulations

About

Goals: (1) Focus on continuous monitoring of network traffic and application logs to enable a zero-trust defense strategy and strengthen layered security across enterprise and cloud-native infrastructures. (2) Apply expertise in computer architecture, compilers, operating systems, computer networks, and parallelization to the design of high-performance parallel and distributed systems. I have architected and built three high-performance networking products for enterprise and cloud-native environments: • NDR: Network Detection and Response • NPM: Network Performance Monitoring • IPAM: IP Address Management Through leading and contributing to product development, I have gained expertise in: • Deep-depth networking knowledge: TCP/IP, HTTP, UDP, DNS, VLAN, ARP, ICMP, DHCP, RDMA, RoCE • knowledge of cryptography and secure protocols: IPsec, TLS, AD, HTTPs • Parallel TCP/IP stack for network monitoring and IDS/IPS and SIEM and SOC • Parallel nfdump to filter and aggregate flows for sFlow, Netflow, and IPFIX • ELK for log processing and data cleaning, analytics, and visualization • KQL and SQL for analytic modeling and abnormal alarming • Hardware–software–algorithm co-design on multi-core architectures • Linux (CentOS, Ubuntu, Kali), WSL, and Docker containers • Project planning, execution coordination, and team communication • Vulnerability discovery using Valgrind (runtime) and Rational (static analysis) Working with enterprise and cloud-native customers, I lead a cross-disciplinary team focused on cybersecurity analytics, gaining experience in: • Balancing short-term response with long-term product planning for improved customer relations • Leveraging MITRE ATT&CK-aligned frameworks to build analytic models for anomaly detection • Applying OWASP principles for DDoS mitigation and API/SQL-injection detection to deliver real-time threat visibility and resilient network defense • Adopting continuous monitoring and AI-driven detection as the cornerstone of zero-trust architecture Languages: C/C++, Python, Go, Bash, SQL, Groovy Tools: GCC, GDB, DPDK, IO_URING, ELK, Wireshark, CUDA, PyTorch, Git, Jenkins, Microsoft Office, LaTeX Technical writing topics (LinkedIn posts): • Large Language Models: Parallel Matrix Multiplication, 5D-Parallelism (EP, SP, DP, TP, PP), Quantization • SDN Networking: AI Clouds, DPU, RDMA • Cybersecurity: AI Security, Analytic Models, TCP Analysis • Computer Architecture: Out-of-Order Execution Please ask for Top-conference and Journal publications including PPoPP and SPAA.

Experience

24 yrs
Total Experience
4 yrs 5 mos
Average Tenure
1 yr 8 mos
Current Experience

Self-employed

2 roles

Agentic Consultant

Jan 2025Present · 1 yr 4 mos · San Jose, California, United States · Remote

  • My recent work focuses on leveraging open-source large language models (LLMs) to automatically generate cybersecurity analysis reports that both read and appear as if written by humans—rich in quantitative insight, narrative coherence, and visualization quality. To achieve this, I have developed three key AI techniques:
  • 1. Text2SQL —Integrates domain-specific enterprise log data directly into cyber-security analytic content by translating natural-language queries into executable SQL statements.
  • 2. Text2LaTeX—Produces publication-quality reports beyond the expressiveness of Markdown by using LLMs to enrich cybersecurity analysis content while ensuring syntactic correctness in LaTeX. By leveraging tables, figures, linear curves, and π-graphs, the generated content has rich expressiveness for vivid data visualization.
  • 3. Content Management Engineering: Addresses LLM limitations in managing long, complex, and information rich cybersecurity documents.
  • Since the cybersecurity reports can be modified directly at the natural-language level, they eliminate the CIO’s dependency on the development team to manually extract weekly or monthly aggregated data through SQL scripts. This approach significantly improves usability and reduces time-to-delivery, making the domain reporting system far more efficient and accessible.
Artificial Intelligence (AI)Cybersecurity

Information Technology Consultant

Sep 2024Present · 1 yr 8 mos · United States · Remote

  • When I shifted my startup’s focus in 2022—moving from product development to consulting due to the COVID-19 shutdowns—I honestly felt that the challenges of rule-based systems were unsolvable for the foreseeable future.
  • During that time, I returned to my roots in SOC design and performance tuning, working on DPUs (DataPath Units) and developing high-performance applications for long-distance data transport (FTP 10GB data on 100Gbps network across Pacific less than 1s). But as I worked with more customers, I noticed a clear trend: demand was shifting rapidly toward AI-driven applications.
  • That realization brought me back to the U.S., where I decided to focus fully on AI and LLM consulting. My work has centered on using open-source LLMs to automatically generate analytic reports that read and look like they were written by humans—rich in both analysis and visualization. To achieve this, I developed three key techniques:
  • o Text2SQL → tightly integrating domain-specific enterprise data into analytic content
  • o Text2LaTeX → producing publication-quality reports beyond what Markdown can deliver
  • o Content management engineering → overcoming LLM limitations in handling long, complex text
  • My journey now continues into Reinforcement Learning (RL), with the goal of building lightweight models that can:
  • o Achieve 100% accuracy in Text2SQL transformation
  • o Incorporate domain-specific enterprise knowledge
  • o Be easily deployed on low-cost hardware with efficient LLM inference
  • This evolution—from network systems to LLM consulting to RL research—reflects both my resilience as a founder and my conviction that AI can finally solve the problems that once felt unsolvable. I fully believe that if we can transform yesterday’s rule-based expert systems into adaptive LLM-driven analytic models, we will revolutionize the entire enterprise application field.
Artificial Intelligence (AI)CybersecurityParallel ComputingProject Planning

Clearclouds-global inc.

CTO

Aug 2015Aug 2024 · 9 yrs · Hybrid

  • Fund raising and technology road mapping. Applying project management skills for planning tasks while keeping initiatives on track, and communicating and driving across organizations to achieve desired product delivery on time and within the budget:
  • NPM and NDR: led a team of 30-engineers to develop two high-performance products: NDR and NPR. Teaching the team to adhere to the principles of the HW/SW co-design for high performance.
  • Implemented a high-performance DPDK-based network traffic analysis system using lock-free parallelization techniques. The design applies parallel transformations to convert sequential C parser into a parallelized one. Network traffic is analyzed through a parallel TCP flow-affinity model, extracting protocol-level metadata (VLAN, ARP, DHCP, IP, TCP, HTTP, UDP, DNS) for downstream analytics.
  • Deployed an ELK data-pipeline to process over 1 TB of network telemetry per day: Kafka for data buffering, Logstash for normalization, Elasticsearch for indexing and querying, Kibana for analysis visualization, and Ansible for cluster deployment.
  • Designed a SQL-like rule language for easily building models and retrieving heterogeneous log data. A parallel Go-based interpreter could execute over 10,000+ security rules in real time.
  • NDR is deployed either within an enterprise or at cloud-native infrastructure. I led analytic team performing compliance, security, risk detection through hierarchical analysis guided by the MITRE ATT&CK framework. We correlate multi-events to identify coordinated attacks (APT) for supporting zero-trust network defense.
  • To protect cloud-native infrastructure, we collect data sources like logs from authorization system, security control, VPC policing, and container security for the MDR analysis.
Artificial Intelligence (AI)CybersecurityParallel ComputingCompiler optimizations and performance tuningEmbedded SystemsProject Planning

Clearclouds inc.

Chief Technology Officer

Jan 2013Jun 2015 · 2 yrs 5 mos · Wuxi, Jiangsu, China and Silicon Valley

  • Fund raising and product definition and technology roadmap.
  • Sole founder to pull the company from 0 to 1. This might be China's first 20Gbps network aware NPM, I am really proud of my team's achievement.
Parallel ComputingEmbedded Systems

Intel corp.

Staff Engineer

Jan 2005Dec 2012 · 7 yrs 11 mos · Santa Clara, California, United States · On-site

  • Practicing HW/SW co-optimization for Intel IXP NPU (Network Processing Unit) architecture.
  • Participated in a parallelizing compiler development for Intel IXP NPU, focus on automatically thread partitioning
  • Helped porting Cisco’s 20-Million lines of C code successfully from big-endian MIPS/Power onto little endian X86 CPU by leveraging the industry’s first Intel Bi-endian compiler and by working with Cisco engineers on site.
  • Developed high-performance multithreaded algorithms for TCP/IP processing
  • Two patents were filed and one of them is the key to supporting TCP flow-affinity based packet load balance for Intel 40Gbps NIC.
Parallel ComputingCompiler optimizations and performance tuningEmbedded Systems

Consentry

MTS

Jan 2004Jan 2005 · 1 yr · San Jose, California, United States · On-site

  • Designing multi-core based deep-content inspection system for enterprise security, integrating switching and security into one BOX.
  • Using compiler technology to generate Verilog from System-C for easy chip development and FPGA verification.
  • Designing a multi-threaded protocol parser to generate protocol metadata for network security analysis.
Parallel ComputingCompiler optimizations and performance tuningEmbedded Systems

Xambala inc.

Senior MTS

Jan 2002Jan 2004 · 2 yrs · San Jose, California, United States · On-site

  • Applying HW/SW co-design for XML web processing based on a multi-core + FPGA architecture.
  • Architected an SOC (4-ARC core + FPGA) for efficient XML processing
  • Designed FPGA parser based on LEX/YACC parsing technology for analyzing HTTP and XML protocols
  • Developed an efficient runtime system on top of the SOC for network security analysis
CybersecurityParallel ComputingCompiler optimizations and performance tuningEmbedded Systems

Education

University of Delaware

Ph.D — EE

Jan 1997Jan 1999

University of Science and Technology of China

Bachelor of Science (BS) — Computer Science

Jan 1981Jan 1986

Hefei No. 1 High School

Jan 1979Jan 1981

Stackforce found 100+ more professionals with Artificial Intelligence (ai) & Cybersecurity

Explore similar profiles based on matching skills and experience