Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Quick Links:

C3.ai DTI Webpage

Events

Information on Call for Proposals

Proposal Matchmaking (Archive from 2020 CFP)

C3.ai DTI Training Materials

C3 Administration (password protected)


Have Questions? Please contact one of us:



Recent space activity

Recently Updated
typespage, comment, blogpost
max5
hideHeadingtrue
themesocial

Space contributors

Contributors
modelist
scopedescendants
limit5
showLastTimetrue
orderupdate


Announcing our Third Call for Proposals:

AI to Transform Cybersecurity and Secure Critical Infrastructure

It is anticipated that up to USD $10 million in Research Awards will be awarded from this Call for Proposals. Proposals can request funding of USD $100,000 to $1,000,000 for an initial period of one (1) year.

C3DTI will also make available up to USD $2 million in Azure Cloud computing resources, supercomputing resources at UIUC’s NCSA and LBNL’s NERSC, and free, unlimited access to the C3 AI Suite hosted on the Microsoft Azure Cloud. 

**** We will be offering a virtual session with information on the CFP including an opportunity to ask questions early in January. Please keep an eye out on you email and this wiki page for more information. ****

Proposals are Due February 7, 2022

Awards will be made in March 2022 with start dates of around June 1, 2022

Announcements

Colloquium on Digital Transformation Science

June 10, 3 pm CT

Security of Cyber-Physical Systems

Jeff Shamma, Professor, Department of Industrial and Enterprise Systems Engineering, University of Illinois at Urbana-Champaign

REGISTER FOR ZOOM WEBINAR

The coming decades may see large-scale deployment of networked cyber-physical systems to address global needs in areas such as energy, water, health care, and transportation. However, as recent events have shown, such systems are vulnerable to cyber attacks. We begin by revisiting classical linear systems theory, developed in more innocent times, from a security-conscious, even paranoid, viewpoint. Then we present a general technique, called “dynamic watermarking,” for detecting any sort of malicious activity in networked systems of sensors and actuators. We then present a field test experimental demonstration of this technique on an automobile on a test track, a process control system, a simulation study of defense against an attack on Automatic Gain Control (AGC) in a synthetic power system, and an emulated attack on a solar-powered home. This is joint work with Bharadwaj Satchidanandan, Jaewon Kim, Woo Hyun Ko, Tong Huang, Lantian Shangguan, Kenny Chour, Jorge Ramos, Prasad Enjeti, Le Xie, and Swaminathan Gopalswamy.

P. R. Kumar is a Professor of Electrical & Computer Engineering and Industrial & Systems Engineering at Texas A&M University. Prior to that, he served in the Department of Mathematics at the University of Maryland, Baltimore County (1977-84) and the Department of Electrical and Computer Engineering and the Coordinated Science Laboratory at the University of Illinois at Urbana-Champaign (1985-2011). His current focus includes Machine Learning (ML), Cyber-Physical Systems (CPS), security, privacy, UTM, 5G, wireless networks, and power systems. He is a member of the U.S. National Academy of Engineering, the World Academy of Sciences, and Indian National Academy of Engineering. Honors include a Doctor Honoris Causa by ETH, the IEEE Field Award for Control Systems, the Eckman Award of AACC, the Ellersick Prize of IEEE ComSoc, the Outstanding Contribution Award of ACM SIGMOBILE, the Infocom Achievement Award, and the SIGMOBILE Test-of-Time Paper Award. He is a Fellow of IEEE and ACM.


Quick Links:

C3.ai DTI Webpage

Events

Information on Call for Proposals

Proposal Matchmaking

C3.ai DTI Training Materials Overview (password protected)

C3 Administration (password protected)


Have Questions? Please contact one of us:



Recent space activity

Recently Updated
typespage, comment, blogpost
max5
hideHeadingtrue
themesocial

Space contributors

Contributors
modelist
scopedescendants
limit5
showLastTimetrue
orderupdate