
{"id":7117,"date":"2020-03-28T20:47:18","date_gmt":"2020-03-28T11:47:18","guid":{"rendered":"http:\/\/infosec.pusan.ac.kr\/?page_id=7117"},"modified":"2025-12-23T23:05:33","modified_gmt":"2025-12-23T14:05:33","slug":"sub31","status":"publish","type":"page","link":"https:\/\/infosec.pusan.ac.kr\/index.php\/sub31\/","title":{"rendered":"AI\ubcf4\uc548 \ubc0f \uc0b0\uc5c5\uc6a9 AI"},"content":{"rendered":"<div class=\"sub31\">\n<p>\t<!-- sub tab --><\/p>\n<div class=\"sub_tab\">\n<ul>\n<li><a class=\"on\">AI\ubcf4\uc548 \ubc0f \uc0b0\uc5c5\uc6a9 AI <\/a><\/li>\n<li><a href=\"index.php\/sub35\">AI\uae30\ubc18 \uc790\uc5f0\uc5b4\ucc98\ub9ac<\/a><\/li>\n<li><a href=\"index.php\/sub32\">\ubc18\ub3c4\uccb4SoC \ubc0f \ubcf4\uc548<span class=\"pc840_v\"><\/span><\/a><\/li>\n<li><a href=\"index.php\/sub33\">\ube14\ub85d\uccb4\uc778<span class=\"pc840_v\"><\/span><\/a><\/li>\n<li><a href=\"index.php\/sub34\"><span class=\"pc840_v\">\uc591\uc790\ucef4\ud4e8\ud305 \ubc0f \uc554\ud638 \ud574\ub3c5<\/span><\/a><\/li>\n<li><a href=\"index.php\/port-simulation\">\ud56d\ub9cc \uc2dc\ubbac\ub808\uc774\uc158<\/a><\/li>\n<\/ul><\/div>\n<div class=\"space20\"><\/div>\n<h1>Artificial Intelligence &amp; IoT<\/h1>\n<div class=\"line6\"><\/div>\n<div class=\"space20\"><\/div>\n<div class=\"sub_content_title\">\uc801\ub300\uc801 \uc778\uacf5\uc9c0\ub2a5 \uacf5\uaca9 \ubc0f \ubc29\uc5b4 \uae30\uc220 \uc5f0\uad6c(Research on adversarial attack &amp; defense for AI)<\/div>\n<div class=\"sub_content_txt\">\n<dl>\n<dt>\u25a0 <\/dt>\n<dd> \uc801\ub300\uc801 \uacf5\uaca9\/\ubc29\uc5b4 \uae30\uc220 \uc5f0\uad6c<\/dd>\n<dt>\u2013<\/dt>\n<dd>\uc801\ub300\uc801 \uacf5\uaca9 \ub300\uc0c1 \uc601\uc0c1\ubd84\uc11d \ub525\ub7ec\ub2dd \ubaa8\ub378 DB \uad6c\ucd95<\/dd>\n<dt>\u2013<\/dt>\n<dd>\ucd5c\uc2e0 \uc801\ub300\uc801 \uacf5\uaca9 \uae30\uc220 \ubc0f \ubc29\uc5b4 \uae30\uc220 \ubd84\uc11d<\/dd>\n<dt>\u2013<\/dt>\n<dd>\uacf5\uaca9\/\ubc29\uc5b4 \ubaa8\ub378 \ud45c\uc900 \uc778\ud130\ud398\uc774\uc2a4 \uad6c\ud604<\/dd>\n<dt>\u25a0 <\/dt>\n<dd> \uadf8\ub798\ud53d \uc5d4\uc9c4 \uae30\ubc18 3D \uacf5\uaca9 \ubc0f \ubc29\uc5b4 \uc2dc\ubbac\ub808\uc774\uc158 \uc2dc\uc2a4\ud15c \uad6c\ucd95 \uc5f0\uad6c<\/dd>\n<dt>\u2013<\/dt>\n<dd>\ub525\ub7ec\ub2dd \ud504\ub808\uc784\uc6cc\ud06c\uc640 \uadf8\ub798\ud53d \uc5d4\uc9c4 \uc5f0\ub3d9\uc744 \ud1b5\ud55c \ub525\ub7ec\ub2dd \ubaa8\ub378 \ud559\uc2b5 \ubc29\uc548 \uc5f0\uad6c<\/dd>\n<dt>\u2013<\/dt>\n<dd>\uadf8\ub798\ud53d \uc5d4\uc9c4(Unreal Engine), \uc624\ud508\uc18c\uc2a4 \uc2dc\ubbac\ub808\uc774\ud130(CARLA)\ub4f1\uc744 \ud65c\uc6a9\ud55c 3D \uc2dc\ubbac\ub808\uc774\uc158 \uad6c\ucd95<\/dd>\n<dt>\u2013<\/dt>\n<dd>3D \ud658\uacbd\uc5d0\uc11c\uc758 \uc801\ub300\uc801 \uacf5\uaca9 \ubc0f \ubc29\uc5b4 \uac00\uc2dc\ud654 \uae30\uc220 \uc5f0\uad6c<\/dd>\n<dt>\u25a0 <\/dt>\n<dd> 3D \ucd95\uc18c\ubaa8\ud615 \uc81c\uc791\uc744 \ud1b5\ud55c \ubb3c\ub9ac\uc801 \uacf5\uaca9\/\ubc29\uc5b4 \uae30\uc220 \uc5f0\uad6c<\/dd>\n<dt>\u2013<\/dt>\n<dd>3\ucc28\uc6d0 \ucd95\uc18c\ubaa8\ud615 \uc81c\uc791\uc744 \ud1b5\ud55c \uc801\ub300\uc801 \ubb3c\ub9ac\uacf5\uaca9 \ubc0f \ubc29\uc5b4 \uae30\uc220 \uc5f0\uad6c<\/dd>\n<dt>\u2013<\/dt>\n<dd>\uc2e4\uc81c \ud658\uacbd\uc5d0\uc11c\uc758 \uc801\ub300\uc801 \uacf5\uaca9\/\ubc29\uc5b4 \uc2e4\ud5d8\uc744 \uc704\ud55c \ud14c\uc2a4\ud2b8\ubca0\ub4dc \uad6c\ucd95<\/dd>\n<dt>\u25a0 <\/dt>\n<dd>Top-tier AI conference \ub17c\ubb38 \uac8c\uc7ac \uc9c0\uc6d0<\/dd>\n<\/dl><\/div>\n<div class=\"sub_img\">\n<h3>[CVPR 2022 Main Conference \uac8c\uc7ac \ub17c\ubb38 \ud3ec\uc2a4\ud130]<\/h3>\n<div class=\"clear\"><\/div>\n<p>\t\t<img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2022\/12\/figure1.png\" alt=\"CVPR 2022 Main Conference \uac8c\uc7ac \ub17c\ubb38 \ud3ec\uc2a4\ud130\" \/>\n\t<\/div>\n<div class=\"space40\"><\/div>\n<div class=\"sub_content_title\">\uac00\uc0c1 \ub370\uc774\ud130 \uae30\ubc18 \uac1d\uccb4 \uc778\uc2dd\u00b7\ud0d0\uc9c0\u00b7\ucd94\uc801 \uae30\uc220 \uc5f0\uad6c(Research on synthetic data-based object recognition, detection and tracking technology)<\/div>\n<div class=\"sub_content_txt\">\n<dl>\n<dt>\u25a0 <\/dt>\n<dd> \uc778\uacf5\uc9c0\ub2a5 \uae30\ubc18 \uac1d\uccb4 \uc778\uc2dd\u00b7\ud0d0\uc9c0\u00b7\ucd94\uc801 \uae30\uc220 \uc5f0\uad6c<\/dd>\n<dt>\u2013<\/dt>\n<dd>\uac00\uc0c1 \ub370\uc774\ud130 \uae30\ubc18\uc758 \uac1d\uccb4 \uc778\uc2dd\u00b7\ud0d0\uc9c0\u00b7\ucd94\uc801 \uae30\uc220 \uc5f0\uad6c<\/dd>\n<dt>\u2013<\/dt>\n<dd>\ucd5c\uc2e0 \uac1d\uccb4 \uc778\uc2dd\u00b7\ud0d0\uc9c0\u00b7\ucd94\uc801 \uae30\uc220 \ubd84\uc11d \ubc0f \uad6c\ud604<\/dd>\n<dt>\u2013<\/dt>\n<dd>\uadf8\ub798\ud53d \uc5d4\uc9c4(Unreal Engine, Unity)\uacfc \uc624\ud508\uc18c\uc2a4 \uc2dc\ubbac\ub808\uc774\ud130(CARLA, Unity)\ub97c \ud1b5\ud55c \uc790\uc728\uc8fc\ud589 \uc2dc\uc2a4\ud15c \uc5f0\uad6c<\/dd>\n<dt>\u25a0 <\/dt>\n<dd> \uadf8\ub798\ud53d \uc5d4\uc9c4(Unreal Engine) \uae30\ubc18 \uac1d\uccb4 \uc778\uc2dd\u00b7\ud0d0\uc9c0\u00b7\ucd94\uc801 \ud504\ub808\uc784\uc6cc\ud06c \uad6c\ucd95 \uc5f0\uad6c<\/dd>\n<dt>\u2013<\/dt>\n<dd>\uadf8\ub798\ud53d\uc5d4\uc9c4(Unreal Engine) \uae30\ubc18 \uac00\uc0c1 \ub370\uc774\ud130\ub97c \ud65c\uc6a9\ud55c \uac1d\uccb4 \uc778\uc2dd\u00b7\ud0d0\uc9c0\u00b7\ucd94\uc801 \ud504\ub808\uc784\uc6cc\ud06c \uad6c\ud604<\/dd>\n<dt>\u2013<\/dt>\n<dd>\uc624\ud508\uc18c\uc2a4 \uc2dc\ubbac\ub808\uc774\ud130(CARLA)\ub97c \ud1b5\ud55c \uc790\uc728\uc8fc\ud589 \ud2b9\ud654 \uac1d\uccb4 \uc778\uc2dd\u00b7\ud0d0\uc9c0\u00b7\ucd94\uc801 \uae30\uc220 \uac1c\ubc1c<\/dd>\n<dt>\u2013<\/dt>\n<dd>\uac1d\uccb4 \uc778\uc2dd\u00b7\ud0d0\uc9c0\u00b7\ucd94\uc801 \ubaa8\ub378 \uac80\uc99d\uc744 \uc704\ud55c \uc2e4\uc81c \ud658\uacbd\uc5d0\uc11c\uc758 3D \ucd95\uc18c \ud14c\uc2a4\ud2b8 \ubca0\ub4dc \uad6c\ucd95<\/dd>\n<\/dl><\/div>\n<div class=\"sub_img\">\n<h3>[\uac00\uc0c1 \ub370\uc774\ud130 \uae30\ubc18 \uac1d\uccb4 \uc778\uc2dd\/\ud0d0\uc9c0\/\ucd94\uc801 \ud14c\uc2a4\ud2b8 \ud504\ub85c\uc138\uc2a4]<\/h3>\n<div class=\"clear\"><\/div>\n<p>\t\t<img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2022\/12\/figure2.png\" alt=\"\uac00\uc0c1 \ub370\uc774\ud130 \uae30\ubc18 \uac1d\uccb4 \uc778\uc2dd\/\ud0d0\uc9c0\/\ucd94\uc801 \ud14c\uc2a4\ud2b8 \ud504\ub85c\uc138\uc2a4\" \/>\n\t<\/div>\n<div class=\"space40\"><\/div>\n<div class=\"sub_content_title\">\ub525\ub7ec\ub2dd \uae30\ubc18\uc758 \uc720\uccb4 \uc6b4\ub3d9 \uc608\uce21 \uae30\uc220 \uc5f0\uad6c(Research on Fluid Motion Prediction Technology based on Deep Learning)<\/div>\n<div class=\"sub_content_txt\">\n<dl>\n<dt>\u25a0 <\/dt>\n<dd> \uc778\uacf5\uc9c0\ub2a5 \uae30\ubc18 2D\/3D \uc720\uccb4 \uc6b4\ub3d9 \uc608\uce21 \uae30\uc220 \uc5f0\uad6c<\/dd>\n<dt>\u2013<\/dt>\n<dd>CFD \ud574\uc11d \ud504\ub85c\uadf8\ub7a8\uc744 \uc0ac\uc6a9\ud55c \ub370\uc774\ud130\uc218\uc9d1 \ubc0f \ub525\ub7ec\ub2dd \ubaa8\ub378 DB \uad6c\ucd95<\/dd>\n<dt>\u2013<\/dt>\n<dd>\ub2e4\uc591\ud55c \uacbd\uacc4\uc870\uac74\uc5d0\uc11c Laminar Flow\uc640 Turbulent Flow\uc5d0 \ub300\ud55c Steady-State Prediction \uc5f0\uad6c<\/dd>\n<dt>\u2013<\/dt>\n<dd>\ub525\ub7ec\ub2dd\uc744 \uc774\uc6a9\ud55c Time-Dependent \uc720\ub3d9 \ud574\uc11d \uc608\uce21 \uc5f0\uad6c<\/dd>\n<dt>\u25a0 <\/dt>\n<dd> \uc720\uccb4\ub97c \ud3ec\ud568\ud55c \ubaa8\ub4e0 \ubb3c\ub9ac \ubaa8\uc0ac \uae30\uc220 \uc5f0\uad6c<\/dd>\n<dt>\u2013<\/dt>\n<dd>\ubb3c\ub9ac\uc801 \ud604\uc0c1\uc744 \ubaa8\uc0ac\ud558\ub294 \ub525\ub7ec\ub2dd \ubaa8\ub378 \uc5f0\uad6c (e.g. PINN(Physics Informed Neural Network))<\/dd>\n<dt>\u2013<\/dt>\n<dd>\uc5ec\ub7ec \uc9c0\ubc30\ubc29\uc815\uc2dd\uc744 \ud559\uc2b5\/\ucd94\ub860 \uac00\ub2a5\ud558\ub3c4\ub85d Methodology\/Architecture \uc5f0\uad6c <\/dd>\n<dt>\u25a0 <\/dt>\n<dd> 2D\/3D \uc720\uccb4 \uc720\ub3d9 \uac00\uc2dc\ud654 \uc5f0\uad6c<\/dd>\n<dt>\u2013<\/dt>\n<dd>\uadf8\ub798\ud53d \uc5d4\uc9c4(Unreal Engine, Unity)\uc744 \ud65c\uc6a9\ud55c \uc720\ub3d9 \uac00\uc2dc\ud654 \ubc29\uc548 \uc5f0\uad6c<\/dd>\n<dt>\u2013<\/dt>\n<dd>\ub525\ub7ec\ub2dd \ud504\ub808\uc784\uc6cc\ud06c\uc640 \uadf8\ub798\ud53d \uc5d4\uc9c4\uac04 \uc2e4\uc2dc\uac04 \uc5f0\ub3d9\uc744 \uc704\ud55c \ub370\uc774\ud130 \ud30c\uc774\ud504\ub77c\uc778 \uad6c\ucd95<\/dd>\n<\/dl><\/div>\n<div class=\"sub_img\">\n<h3>[\ub525\ub7ec\ub2dd \uae30\ubc18 \uc720\ub3d9 \uc608\uce21 \ubaa8\ub378 \uac1c\ub150\ub3c4]<\/h3>\n<div class=\"clear\"><\/div>\n<p>\t\t<img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2022\/12\/figure3.png\" alt=\"\ub525\ub7ec\ub2dd \uae30\ubc18 \uc720\ub3d9 \uc608\uce21 \ubaa8\ub378 \uac1c\ub150\ub3c4\" \/>\n\t<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>AI\ubcf4\uc548 \ubc0f \uc0b0\uc5c5\uc6a9 AI AI\uae30\ubc18 \uc790\uc5f0\uc5b4\ucc98\ub9ac \ubc18\ub3c4\uccb4SoC \ubc0f \ubcf4\uc548 \ube14\ub85d\uccb4\uc778 \uc591\uc790\ucef4\ud4e8\ud305 \ubc0f \uc554\ud638 \ud574\ub3c5 \ud56d\ub9cc \uc2dc\ubbac\ub808\uc774\uc158 Artificial Intelligence &amp; IoT \uc801\ub300\uc801 \uc778\uacf5\uc9c0\ub2a5 \uacf5\uaca9 \ubc0f \ubc29\uc5b4 \uae30\uc220 \uc5f0\uad6c(Research on adversarial attack &amp; defense for AI) \u25a0 \uc801\ub300\uc801 \uacf5\uaca9\/\ubc29\uc5b4 \uae30\uc220 \uc5f0\uad6c \u2013 \uc801\ub300\uc801 \uacf5\uaca9 \ub300\uc0c1 \uc601\uc0c1\ubd84\uc11d \ub525\ub7ec\ub2dd \ubaa8\ub378 DB \uad6c\ucd95 \u2013 \ucd5c\uc2e0 \uc801\ub300\uc801 \uacf5\uaca9 \uae30\uc220 \ubc0f \ubc29\uc5b4 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-sub3.php","meta":{"footnotes":""},"class_list":["post-7117","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/7117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/comments?post=7117"}],"version-history":[{"count":44,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/7117\/revisions"}],"predecessor-version":[{"id":8418,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/7117\/revisions\/8418"}],"wp:attachment":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/media?parent=7117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}