CSE
CSE
CSE CSE

CSE in the News

JPMorgan's latest hire proves the bank is serious about artificial intelligence

This article on the importance of AI to banking giant JP Morgan Chase quotes Prof. Jason Mars, co-founder of the startup Clinc, which makes AI products for the banking industry. [Full Story]

Related Topics:  Artificial Intelligence  Lab-Artificial Intelligence  Mars, Jason  

Possession of ransomware is now a crime in Michigan

There were more than 1,300 reported cases of ransomware attacks in Michigan in 2017, according to FBI statistics. New legislation signed by the governor closes a loophole that hindered the pursuit of suspected cybercriminals. Professor Kang Shin weighs in on the usefulness of these laws and headaches that may arise. [Full Story]

Related Topics:  Cybersecurity  Shin, Kang G.  

How May Mobility Is Spearheading Autonomous Driving In The Form Of Shuttle Services

This article describes how the startup May Mobility, cofounded by Prof. Edwin Olson, to getting to market first by focusing on autonomous shuttle service. [Full Story]

Related Topics:  Autonomous Vehicles  Entrepreneurship and Tech Transfer  Lab-Artificial Intelligence  Olson, Edwin  

Security of State Voter Rolls a Concern as Primaries Begin

This article describes steps being taken in Illinois, the lone state known to have its state election system breached in a hacking effort, regarding its election systems. It quotes Prof. J. Alex Halderman, who points out that many of the same weaknesses present in 2016 remain. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

Election audits to debut in Mich. 2018 race

This article describes new measures to bolster security for Michigans 2018 midterm elections. Prof. J. Alex Halderman points out that additional progress can occur in the stat's process for auditing of paper ballots. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

Hottest Major

In this article, the Ann Arbor Observer reports on the pressures that have emerged due to the exploding enrollments in computer science classes. According to CSE Chair Brian Noble, CSE is constantly recruiting in an attempt to hire more faculty to handle the load. [Full Story]

Related Topics:  Noble, Brian  

U of M computer scientists might have solved mystery behind Cuba 'sonic attacks'

In this local news segment, Prof. Kevin Fu explains why the "sonic attacks" that poisoned diplomats in Cuba may have been the accidental effect of eavesdropping. [Full Story]

Related Topics:  Cybersecurity  Embedded Systems  Fu, Kevin  Lab-Computer Engineering (CE Lab)  

Can sound be used as a weapon? 4 questions answered

Were foreign diplomats and tourists in Cuba attacked with a "sonic weapon" or was it something else? Prof. Kevin Fu and his collaborators demonstrate a rational, evidence-based explanation. [Full Story]

Related Topics:  Embedded Systems  Fu, Kevin  Lab-Computer Engineering (CE Lab)  

Comcast offers 1-gigabit service in SE Mich.

In this news report, Prof. Mosharaf Chowdhury comments on the potential impact of Comcast's forthcoming 1-gigabit residential and business service. [Full Story]

Related Topics:  Chowdhury, Mosharaf  Data and Computing  Lab-Software Systems  Networking, Operating Systems, and Distributed Systems  

How Can We Trust a Robot?

This article by Prof. Benjamin Kuipers is featured in the March 2018 Communications of the ACM. Prof. Kuipers discusses how advances in artificial intelligence and robotics have raised concerns about the impact on our society of intelligent robots, unconstrained by morality or ethics. Includes a video interview with Prof. Kuipers. [Full Story]

Related Topics:  Artificial Intelligence  Kuipers, Benjamin  Lab-Artificial Intelligence  Robotics and Autonomous Systems  

BMW and Toyota are investing in a start-up that makes self-driving shuttles

May Mobility, cofounded by Prof. Edwin Olson, has received additional funding from BMW and Toyota for their autonomous shuttle technology. May hopes to get to market quickly by deploying shuttles on campuses and in other smaller-scale environments. [Full Story]

Related Topics:  Artificial Intelligence  Autonomous Vehicles  Entrepreneurship and Tech Transfer  Lab-Artificial Intelligence  

How Artificial Intelligence Is Going To Affect The Financial Industry In 2018

Prof. Jason Mars, cofounder (with Prof. Lingjia Tang and others) of the AI startup firm Clinc, is interviewed in this article on the AI-driven conversational interface Clinc has developed for the banking industry. Clinc had sales of $4.5M in 2017 and his partnering with USAA to roll out their technology. [Full Story]

Related Topics:  Artificial Intelligence  Entrepreneurship and Tech Transfer  Lab-Artificial Intelligence  Mars, Jason  Tang, Lingjia  

Prof. Michael Wellman participates in Asimov Memorial Debate

Michael Wellman, the Lynn A. Conway Professor of Computer Science and Engineering, participated in the recent Issac Asimov Memorial Debate on Artificial Intelligence, which was hosted by Neil deGrasse Tyson. You can see the entire debate in this video. [Full Story]

Related Topics:  Artificial Intelligence  Lab-Artificial Intelligence  Wellman, Michael  

The Myth of the Hacker-Proof Voting Machine

This article describes the security holes that exist in today's electronic voting machines, including both the shortcomings of voting systems that do not provide paper backup and those of the systems that transmit electronic votes to counting centers. It quotes Prof. J. Alex Halderman, who points to flaws in the protections for vote transmission systems put forth by vendors of paperless systems. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

Pacemakers, defibrillators are potentially hackable

This article on the security of cardiac implants quotes Prof. Kevin Fu, who notes that limiting remote interactions would also address scenarios such as an old computer virus that unintentionally shuts down global operations of remote cardiac telemetry for hundreds of thousands of patients at once. [Full Story]

Related Topics:  Cybersecurity  Electronic devices  Fu, Kevin  Lab-Computer Engineering (CE Lab)  

The Training Of Dr. Robot: Data Wave Hits Medical Care

This article reports on how machine learning is revolutionizing the process of making medical diagnoses. It opens by highlighting the work of Prof. Jenna Wiens and her collaborators in predicting a hospital patient's likelihood of developing a problematic C-diff infection. [Full Story]

Related Topics:  Artificial Intelligence  Big Data  Lab-Artificial Intelligence  Wiens, Jenna  

To Fight Fatal Infections, Hospitals May Turn to Algorithms

This article in Scientific American describes how machine learning is revolutionizing the process of making medical diagnoses. It opens by highlighting the work of Prof. Jenna Wiens and her collaborators in predicting a hospital patient's likelihood of developing a problematic C-diff infection. [Full Story]

Related Topics:  Big Data  Lab-Artificial Intelligence  Wiens, Jenna  

Transducer Sensors Suffer Security Risks Based on Physics, Not Malware

This article references the work of Prof. Kevin, Fu, who has demonstrated that physical manipulation can be used to trick transducers into reporting environmental data that is inaccurate. [Full Story]

Related Topics:  Fu, Kevin  Lab-Computer Engineering (CE Lab)  

As cell phones proliferate in K-12, schools search for smart policies

This article includes a focus on the work of Thurnau Prof. Elliot Soloway, who is a proponent for the use of mobile tech in education. [Full Story]

Related Topics:  Lab-Interactive Systems  Soloway, Elliot  

Persevering through the unknown: my conversation on emotion AI and problem solving with Emily Mower Provost

Prof. Emily Mower Provost was recently interviewed by the non-profit Iridescent - a company that brings science and engineering to underserved communities. [Full Story]

Related Topics:  Artificial Intelligence  Lab-Artificial Intelligence  Mower Provost, Emily  

Ann Arbor's Duo Security announces record-breaking year

Duo Security, the Ann Arbor-based security firm founded by CSE alumni Dug Song and Jon Oberheide, has grown spectacularly. The firm not only met, but exceeded, their 2017 goals. Since 2016, Duo has tripled its staff from 200 to nearly 600. It is now considered a "unicorn" with a valuation of over $1B. [Full Story]

Related Topics:  Alumni  Entrepreneurship and Tech Transfer  

DARPA funds six centers working on computer design alternatives

This article reports on the six centers that DARPA has funded to jumpstart the computer computer architecture development. The $32M Applications Driving Architectures center, based at U-M and led by Prof. Valeria Bertacco, is one of them. [Full Story]

Related Topics:  Bertacco, Valeria  Computer Architecture  Lab-Computer Engineering (CE Lab)  

New bill could finally get rid of paperless voting machines

Prof. J. Alex Halderman is quoted on the the vulnerabilities that exist in voting machines, why paper backup is a practical solution, and the approaches that should be taken in auditing election results. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

Integrity of Data: Medical Device Cybersecurity Concerns

This article highlights the work Prof. Ken Fu is doing to highlight and mitigate security shortcomings in medical devices and other devices that include embedded processing systems. [Full Story]

Related Topics:  Fu, Kevin  Lab-Computer Engineering (CE Lab)  Medical Device Security  

DARPA Takes Chip Route to "Unhackable" Computers

This article in EE Times quotes Prof. Todd Austin on his DARPA-funded MORPHEUS project, which will use computer circuits that are designed to randomly shuffle data around a computer system in order to thwart hackers who are looking for the location of a bug or valuable data. [Full Story]

Related Topics:  Austin, Todd  Computer Architecture  Cybersecurity  Lab-Computer Engineering (CE Lab)  

A New Type of Computer Could Render Many Software Hacks Obsolete

This article quotes Prof. Todd Austin on his DARPA-funded MORPHEUS project, which will use computer circuits that are designed to randomly shuffle data around a computer system in order to thwart hackers who are looking for the location of a bug or valuable data. [Full Story]

Related Topics:  Austin, Todd  Computer Architecture  Cybersecurity  Lab-Computer Engineering (CE Lab)  

A Case Against Net Neutrality

In this opinion piece, Prof. Harsha Madhyastha makes that point that an entirely neutral net is not necessarily an efficient net. In order for us to operate optimally, he says we need to answer the question: How can we legally define the permissible ways an ISP could throttle or prioritize traffic in a manner that does not place undue burden on ISPs, yet is verifiable by third parties? [Full Story]

Related Topics:  Lab-Software Systems  Madhyastha, Harsha  Networking, Operating Systems, and Distributed Systems  

Do Robots Deserve Human Rights?

In this article, Discover reached out to experts in artificial intelligence, computer science and human rights to shed light on whether or not robots should be given human rights. Prof. Kuipers talks about why robots do not deserve the same rights as humans. [Full Story]

Related Topics:  Kuipers, Benjamin  Lab-Artificial Intelligence  

An armed robber's Supreme Court case could affect all Americans digital privacy for decades to come

Prof. HV Jagadish writes in this article for The Conversation about the data privacy challenges presented by a world in which our devices continuously record and track our activities. [Full Story]

Related Topics:  Big Data  Cybersecurity  Jagadish, HV  Lab-Software Systems  Mobile Computing  

Securing the vote: How 'paper' can protect US elections from foreign invaders

This story on security problems with voting quotes Prof. J. Alex Halderman, who says that "Although there is no evidence that any past election in the United States has been changed by hacking, it is in my opinion only a matter of time until one is." [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

FDA Spells Out When Medical Device Modifications Need Review

Bill Aerts, Deputy Director at the Archimedes Center in CSE, is quoted in the article about new FDA guidance for manufacturers of medical devices regarding software patches for security purposes. Also quoted is Ben Ransford, co-founder and CEO of cybersecurity firm Virta Laboratories, a CSE spinout. [Full Story]

The newest AlphaGo mastered the game with no human input

In this article, Prof. Satinder Singh Baveja is quoted from his commentary on the Nature article regarding DeepMind's use of unassisted reinforcement learning in the AlphaGo Zero system. He points out that AI programs like AlphaGo Zero, which can gain mastery of tasks without human input, may be able to solve problems where human expertise falls short. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Lab-Artificial Intelligence  

DeepMind has a bigger plan for its newest Go-playing AI

In this article, Prof. Satinder Singh Baveja comments on DeepMind's findings published in Nature regarding AlphaGo Zero. Prof. Baveja reinforces the notion that with reinforcement learning, AI systems do not necessarily need human expertise. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Lab-Artificial Intelligence  

DeepMinds Go-playing AI doesnt need human help to beat us anymore

In this article, Prof. Satinder Singh Baveja comments on DeepMind's findings published in Nature regarding AlphaGo Zero. "Over the past five, six years, reinforcement learning has emerged from academia to have much more broader impact in the wider world, and DeepMind can take some of the credit for that," says Prof. Baveja. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Lab-Artificial Intelligence  

DeepMind's latest AI breakthrough is its most significant yet

In this article, reinforcement learning expert Prof. Satinder Singh Baveja comments on DeepMind's findings published in Nature regarding AlphaGo Zero's breakthrough performance and indicates that it could be one of the biggest AI advances so far. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Lab-Artificial Intelligence  

Why the Krack Wi-Fi Mess Will Take Decades to Clean Up

This article quotes Prof. Kevin Fu, who says "For the general sphere of IoT devices, like security cameras, we're not just underwater. We're under quicksand under water." [Full Story]

Related Topics:  Cybersecurity  Fu, Kevin  Lab-Software Systems  

VAuth tech feels your voice in your skin

This article describes VAuth, the new thechnology that supplements voice authorization developed in the lab of Prof. Kang G. Shin. [Full Story]

Related Topics:  Cybersecurity  Lab-Software Systems  Networking, Operating Systems, and Distributed Systems  Shin, Kang G.  

Hacking North Korea is Easy. Its Nukes? Not So Much

This article reports on how difficult it is for hackers to invade North Korea's nuclear program. CSE research fellow Will Scott talks about the country's limited connections, and says that any successful attack would require a human agent working to manually sabotage target systems. [Full Story]

Related Topics:  Cybersecurity  

Scribe: Deep Integration of Human and Machine Intelligence to Caption Speech in Real Time

Research by Prof. Walter Lasecki and his collaborators is highlighted in the Sept. issue of Communications of the ACM. The researchers describe Scribe, a system that combines human labor and machine intelligence to caption speech in real time. [Full Story]

Related Topics:  Artificial Intelligence  Assistive Technology  Lab-Artificial Intelligence  Lab-Interactive Systems  Language and Text Processing  Lasecki, Walter  

Phone Browsing Could Become Faster, May Use Less Data With Smart Code

This article reports on Vroom, software developed by computer scientists including Prof. Harsha Madhyastha and CSE graduate student Vaspol Ruamviboonsuk. Vroom improves mobile browsing speed by optimizing the end-to-end interaction between smart devices and web servers. [Full Story]

Related Topics:  Lab-Software Systems  Madhyastha, Harsha  Mobile Computing  

After Y Combinator, May Mobility Ready to Test Self-Driving Fleets

May Mobility, founded by Prof. Edwin Olson, is focused on real-world implementations of autonomous driving technology, with a specific emphasis on whats possible today, not what might be doable five or ten years from now. [Full Story]

Related Topics:  Autonomous Vehicles  Lab-Artificial Intelligence  Olson, Edwin  

May Mobility is a self-driving startup with a decade of experience

May Mobility, founded by Prof. Edwin Olson, is focused on real-world implementations of autonomous driving technology, with a specific emphasis on whats possible today, not what might be doable five or ten years from now. [Full Story]

Related Topics:  Autonomous Vehicles  Lab-Artificial Intelligence  Olson, Edwin  

In fight for free speech, researchers test anti-censorship tool built into the internet's core

This article describes an implementation of TapDance, a method of anticensorship deployment that is built into the very core of the internet itself. By building TapDance into the servers and routers that underpin the Internet, censorship would become impractical. TapDance's development has been led by Prof. J. Alex Halderman. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

A New Kind of Classroom: No Grades, No Failing, No Hurry

This article on reports on the recent popularity of mastery-based learning in K-12 schools. Thurnau Professor Elliot Soloway is quoted in the article. He questions the approach, and contends that students learn by building on knowledge and frequently returning to it, not by working to mastery and then moving on. [Full Story]

Related Topics:  Education  Lab-Interactive Systems  Soloway, Elliot  

U.S. elections are an easier target for Russian hackers than once thought

This article on voting system security quotes Prof. J. Alex Halderman, who says of the prospect of election tampering that "the technical ability is there and we wouldn't be able to catch it. The state of technical defense is very primitive in our election system now." [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

Heres exactly how Russia can hack the 2018 elections

Vulnerabilities in our voting system need to be addressed swiftly, according to experts in the field, including Prof. J. Alex Halderman. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

Let's Encrypt Issues 100 Millionth Security Certificate

The Internet is more secure thanks to Let's Encrypt, the certificate authority founded by Prof. J. Alex Halderman and his collaborators. Since launching in Jan. 2016, Let's Encrypt has issued 100 million certificates. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

How to prevent Russian hackers from attacking the 2018 election

In this commentary piece in the Chicago Tribune, Prof. J. Alex Halderman and Justin Talbot-Zorn make the case for a straightforward policy agenda to secure America's voting systems against the threat of hackers. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

If Voting Machines Were Hacked, Would Anyone Know?

In the article, Prof. J. Alex Halderman points out how electronic voting systems even those not connected to the Internet can be compromised. One path for hackers is to attack the computers that are used to program the ballots, which are later transferred to voting machines via memory cards. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

U.S. Hospitals Not Immune to Crippling Cyber Attacks

In this article, Prof. Kevin Fu comments on the vulnerabilities that exist in hospital and healthcare systems and devices. The recent strike by the ransomware program called WannaCry demonstrates that these shortcomings. [Full Story]

Related Topics:  Fu, Kevin  Health and Safety  Lab-Computer Engineering (CE Lab)  Medical Device Security  

Show All