2026³â 01¿ù 08ÀÏ ¸ñ¿äÀÏ
 
 
  ÇöÀçÀ§Ä¡ > ´º½ºÁö´åÄÄ > Science & Technology

·£¼¶¿þ¾îºÎÅÍ µÅÁöµµ»ì±îÁö... ³ë·ÃÇØÁø »ç±âÇà°¢

 

Á¤Ä¡

 

°æÁ¦

 

»çȸ

 

»ýȰ

 

¹®È­

 

±¹Á¦

 

°úÇбâ¼ú

 

¿¬¿¹

 

½ºÆ÷Ã÷

 

ÀÚµ¿Â÷

 

ºÎµ¿»ê

 

°æ¿µ

 

¿µ¾÷

 

¹Ìµð¾î

 

½Å»óǰ

 

±³À°

 

ÇÐȸ

 

½Å°£

 

°øÁö»çÇ×

 

Ä®·³

 

Ä·ÆäÀÎ
Çѻ츲 ¡®¿ì¸®´Â ÇѽҸ²¡¯ ½Ò ¼Òºñ Ä·ÆäÀÎ ½Ã...
1000¸¸¿øÂ¥¸® Àΰø¿Í¿ì, °Ç°­º¸Çè Áö¿ø ¡®Æò...
- - - - - - -
 

C3.ai Digital Transformation Institute Announces Research Awards for AI to Transform Cybersecurity and Secure Critical Infrastructure

´º½ºÀÏÀÚ: 2022-03-25

URBANA, IL & BERKELEY, CA-- March 25, 2022 -- C3.ai Digital Transformation Institute (C3.ai DTI) today announced the third round of C3.ai DTI funded advanced research awards, focused on using artificial intelligence (AI) to harden information security and secure critical infrastructure.

The Institute awarded a total of $6.5 million in cash awards to leading research scientists at University of California, Berkeley, University of Illinois at Urbana-Champaign, Carnegie Mellon, Princeton, University of Chicago, KTH Royal Institute of Technology, and MIT.

“Cybersecurity is an immediate existential issue,” said Thomas M. Siebel, chairman and CEO of C3 AI, a leading enterprise AI software provider. “We are equipping top scientists with the means to advance technology to help secure critical infrastructure.”

Twenty-four projects were awarded $100,000 to $700,000 each, for an initial period of one year:

AI Resilience: Techniques and methods to enable the development of AI algorithms that are resilient to adversarial attacks

· “High Performance Provably Robust AI Methods for Cybersecurity Tasks on Critical Infrastructure,” (Zico Kolter, Carnegie Mellon University)
· “Scalable, Secure Machine Learning in the Presence of Adversaries,” (John Kubiatowicz, University of California, Berkeley)
· “REFL: Resilient Distributed Cybersecurity Learning System,” (Bo Li, University of Illinois at Urbana-Champaign)
· “Fundamental Limits on the Robustness of Supervised Machine Learning Algorithms,” (Ben Zhao, University of Chicago)

Anomaly Detection: AI techniques, including supervised and unsupervised learning, to provide early detection of system and/or network anomalies that might be indicative of unauthorized access, denial of service, or data exfiltration

· “Continuously and Automatically Discovering and Remediating Internet-Facing Security Vulnerabilities,” (Nick Feamster, University of Chicago)
· “AI Techniques for Power Systems Under Cyberattacks,” (Javad Lavaei, University of California, Berkeley)
· “Physics-aware AI-based Approach for Cyber Intrusion Detection in Substation Automation Systems,” (Alberto Sangiovanni-Vincentelli, University of California, Berkeley)

Advanced Persistent Threats: AI techniques to detect the presence of advanced persistent threats

· “Deep-Learning Detection Algorithms for Advanced Persistent Attacks in Mixed-Autonomy Traffic: Design and Experimental Validation,” (Alex Bayen, University of California, Berkeley)
· “AI Support for Cybersecurity,” (David Wagner, University of California, Berkeley)

Securing Critical Cyber-Physical Infrastructure: AI techniques to secure critical infrastructure against cyber threats

· “Cyber Safety Cage for Networks,” (Cyrille Valentin Artho, KTH Royal Institute of Technology)
· “Security for Large-Scale Infrastructure using Probabilistic Programming,” (Nikita Borisov, University of Illinois at Urbana-Champaign)
· “A Compositional Neural Certificate Framework for Securing Critical Networked Infrastructure,” (Chuchu Fan, Massachusetts Institute of Technology)
· “Democratizing AI-Driven Security Workflows for Critical Energy Infrastructure,” (Vyas Sekar, Carnegie Mellon University)
· “Semantic Adversarial Analysis for Secure Critical Infrastructure,” (Sanjit Seshia, University of California, Berkeley)

Forensics: AI forensics and attribution techniques to identify sources of attacks

· “Causal Reasoning for Real-Time Attack Identification in Cyber-Physical Systems,” (György Dán, KTH Royal Institute of Technology)
· “Statistical Learning Theory and Graph Neural Networks for Identifying Attack Sources,” (H. Vincent Poor, Princeton University)
· “Robust and Scalable Forensics for Deep Neural Networks,” (Ben Zhao, University of Chicago)

Securing Emerging Financial Infrastructure: AI techniques to identify attacks on emerging decentralized financial and business infrastructure

· “An Intelligence Platform for Better Security in Decentralized Finance,” (Dawn Song, University of California, Berkeley)
· “Blockchain Forensics,” (Pramod Viswanath, University of Illinois at Urbana-Champaign)

Vulnerability Identification: AI techniques to identify previously unknown malware, ransomware, and zero-day vulnerabilities, enabling isolation and neutralization

· “GAN-Aided Automatic Test Case Generation,” (Giulia Fanti, Carnegie Mellon University)
· “Machine Learning for JavaScript Vulnerability Detection,” (Corina Pasareanu, Carnegie Mellon University)

Insider Threats: Change management techniques to prevent the weaponization of innocent and malicious insiders

· “Protecting Critical Infrastructures Against Evolving Insider Threats,” (Carl Gunter, University of Illinois at Urbana-Champaign)
· “Multi-Facet Rare Event Modeling of Adaptive Insider Threats,” (Jingrui He, University of Illinois at Urbana-Champaign)
· “AI-Supported Nudging for Cyber-Hygiene,” (Cedric Langbort, University of Illinois at Urbana-Champaign)



 Àüü´º½º¸ñ·ÏÀ¸·Î

CES 2026: GIGABYTE is ¡°AI Forward,¡± Showcasing AI Factory, Physical AI, and Agentic AI Solutions
Abu Dhabi¡¯s TII Launches Falcon-H1 Arabic, Establishing the World¡¯s Leading Arabic AI Model
Rising Demand for AI Power Accelerates S-Fuelcell¡¯s Grid-Free, On-Site PEM Expansion
NetApp Expands EMEA, LATAM Reach with Willem Hendrickx Appointment as AI Demand Surges
BRUKINSA Delivers Landmark 74% 6-Year PFS in Patients with Treatment-Naïve Chronic Lymphocytic Leukemia
Semiconductor Quarterly Revenue Surpasses $200bn for the First Time as Industry-Wide Growth Accelerates
From Pilots to Profit: NTT DATA's 2026 Global AI Report Shows How Top Performers Turn AI Vision Into Value

 

AI Won¡¯t Transform Mobility Without Unprecedented Collaboration, Stud...
IBMI SNQ and ICHOM Forms Strategic Partnership in Asia, Advancing Pati...
Sonrotoclax Data at ASH 2025 Confirm Foundational Potential Across B-c...
Hanseo University Expands Aviation Training Program with New Frasca Fl...
University of Maryland Launches Innovative Clinician Training Program ...
Hemato-Oncology Trials: AOP Health Presents New Results at Top Congres...
Famenity's Brain Factor-7¢ç Gains Global Momentum as Clinically Valida...

 


°øÁö»çÇ×
´º½ºÁö ÇÑÀÚ Ç¥±â¿¡ ´ë¸¸½Ä À½Â÷ Ç¥±â '纽ÞÙó¢ ´Ï¿ì½ÃÁö' º´±â
º£³×ÇÁ·Ò º£³×ÀÎÅõ Áß¹® Ç¥±â 宝Ò¬ÜØÙÌ 宝Ò¬ì×öõ(ÜÄÒ¬ÜØÙÌ ÜÄ...
¹Ìµð¾î¾Æ¿ì¾î Mediaour ØÚ体ä²们 ØÚô÷ä²Ùú MO ¿¥¿À ØÚä² ØÚä²
¾Ë¸®¿ìºê Alliuv ä¹备, ¾Ë¶ã Althle ä¹÷åìÌ
¾Ë¸®¾Ë Allial Áß¹® Ç¥±â ä¹××尔 ä¹××ì³
´ºÆÛ½ºÆ® New1st Áß¹® Ç¥±â 纽ììãæ(¹øÃ¼ Òïììãæ), N1 纽1
¿£ÄÚ½º¸ð½º : À̾¾ 'EnCosmos : EC' Áß¹® Ç¥±â ì¤ñµ
¾ÆÀ̵ð¾î·Ð Idearon Áß¹® Ç¥±â ì¤îè论 ì¤îèÖå
¹ÙÀÌ¿ÀÀÌ´Ï Bioini Áß¹® Ç¥±â ù±药研 ù±å·æÚ
¿À½ºÇÁ·Ò Ausfrom 奥ÞÙÜØÙÌ, À£ÇÁ·Ò Welfrom 卫ÜØÙÌ
¿¡³ÊÇÁ·Ò Enerfrom 额ÒöÜØÙÌ ¿¡³ÊÀ¯ºñ Eneruv 额Òöêó备
¾ËÇÁ·Ò Alfrom Áß¹® Ç¥±â ä¹尔ÜØÙÌ ä¹ì³ÜØÙÌ

 

ȸ»ç¼Ò°³ | ÀÎÀçä¿ë | ÀÌ¿ë¾à°ü | °³ÀÎÁ¤º¸Ãë±Þ¹æÄ§ | û¼Ò³âº¸È£Á¤Ã¥ | Ã¥ÀÓÇѰè¿Í ¹ýÀû°íÁö | À̸ÞÀÏÁÖ¼Ò¹«´Ü¼öÁý°ÅºÎ | °í°´¼¾ÅÍ

±â»çÁ¦º¸ À̸ÞÀÏ news@newsji.com, ÀüÈ­ 050 2222 0002, ÆÑ½º 050 2222 0111, ÁÖ¼Ò : ¼­¿ï ±¸·Î±¸ °¡¸¶»ê·Î 27±æ 60 1-37È£

ÀÎÅͳݴº½º¼­ºñ½º»ç¾÷µî·Ï : ¼­¿ï ÀÚ00447, µî·ÏÀÏÀÚ : 2013.12.23., ´º½º¹è¿­ ¹× û¼Ò³âº¸È£ÀÇ Ã¥ÀÓ : ´ëÇ¥ CEO

Copyright ¨Ï All rights reserved..