Electrical Engineering and Computer Science

EECS in the News

Beyond the threshold

Prof. David Blaauw and his team is recognized for their potential solution in providing a stable voltage to overcome a large hurdle in the design of small electronics. [Full Story]

Related Topics:  Blaauw, David  Electronic devices  

3D Printing Technology Facilitates Fabrication Of A Curved Organic Photodetector For Image Sensing Devices

Prof. Jerzy Kanicki and his team developed a new fabrication method for curved substrates using a 3D printing process. The technique will enable next-generation camera systems or artificial eyes, as well as high performance image sensing devices for breast cancer detection and other more. Read the paper in Advanced Materials Technologies. [Full Story]

Related Topics:  Health  Kanicki, Jerzy  Solid-State Devices and Nanotechnology  

An afternoon with U-M Robotics' newest robot

WDIV visited Jessy Grizzle's team and Cassie, their bipedal robot, and put her in the spotlight with a live feed to Facebook. [Full Story]

Related Topics:  Control Systems  Grizzle, Jessy  Robotics and Autonomous Systems  

Cassie Blue Makes Her Debut

Prof. Jessie Grizzle invited the Associated Press to record the new bipedal robot's first steps around North Campus. Watch the video. [Full Story]

Related Topics:  Grizzle, Jessy  Robotics and Autonomous Systems  

Securing the vote: How 'paper' can protect US elections from foreign invaders

This story on security problems with voting quotes Prof. J. Alex Halderman, who says that "Although there is no evidence that any past election in the United States has been changed by hacking, it is in my opinion only a matter of time until one is." [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

FDA Spells Out When Medical Device Modifications Need Review

Bill Aerts, Deputy Director at the Archimedes Center in CSE, is quoted in the article about new FDA guidance for manufacturers of medical devices regarding software patches for security purposes. Also quoted is Ben Ransford, co-founder and CEO of cybersecurity firm Virta Laboratories, a CSE spinout. [Full Story]

The newest AlphaGo mastered the game with no human input

In this article, Prof. Satinder Singh Baveja is quoted from his commentary on the Nature article regarding DeepMind's use of unassisted reinforcement learning in the AlphaGo Zero system. He points out that AI programs like AlphaGo Zero, which can gain mastery of tasks without human input, may be able to solve problems where human expertise falls short. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Lab-Artificial Intelligence  

DeepMind has a bigger plan for its newest Go-playing AI

In this article, Prof. Satinder Singh Baveja comments on DeepMind's findings published in Nature regarding AlphaGo Zero. Prof. Baveja reinforces the notion that with reinforcement learning, AI systems do not necessarily need human expertise. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Lab-Artificial Intelligence  

DeepMinds Go-playing AI doesnt need human help to beat us anymore

In this article, Prof. Satinder Singh Baveja comments on DeepMind's findings published in Nature regarding AlphaGo Zero. "Over the past five, six years, reinforcement learning has emerged from academia to have much more broader impact in the wider world, and DeepMind can take some of the credit for that," says Prof. Baveja. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Lab-Artificial Intelligence  

DeepMind's latest AI breakthrough is its most significant yet

In this article, reinforcement learning expert Prof. Satinder Singh Baveja comments on DeepMind's findings published in Nature regarding AlphaGo Zero's breakthrough performance and indicates that it could be one of the biggest AI advances so far. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Lab-Artificial Intelligence  

Why the Krack Wi-Fi Mess Will Take Decades to Clean Up

This article quotes Prof. Kevin Fu, who says "For the general sphere of IoT devices, like security cameras, we're not just underwater. We're under quicksand under water." [Full Story]

Related Topics:  Fu, Kevin  Lab-Software Systems  Security (Computing)  

VAuth tech feels your voice in your skin

This article describes VAuth, the new thechnology that supplements voice authorization developed in the lab of Prof. Kang G. Shin. [Full Story]

Related Topics:  Lab-Software Systems  Networking, Operating Systems, and Distributed Systems  Security (Computing)  Shin, Kang G.  

Hacking North Korea is Easy. Its Nukes? Not So Much

This article reports on how difficult it is for hackers to invade North Korea's nuclear program. CSE research fellow Will Scott talks about the country's limited connections, and says that any successful attack would require a human agent working to manually sabotage target systems. [Full Story]

Related Topics:  Security (Computing)  

Scribe: Deep Integration of Human and Machine Intelligence to Caption Speech in Real Time

Research by Prof. Walter Lasecki and his collaborators is highlighted in the Sept. issue of Communications of the ACM. The researchers describe Scribe, a system that combines human labor and machine intelligence to caption speech in real time. [Full Story]

Related Topics:  Artificial Intelligence  Assistive Technology  Lab-Artificial Intelligence  Lab-Interactive Systems  Language and Text Processing  Lasecki, Walter  

The Internet of Things: From Hype to Reality

Get some insights into the future of the Internet of Things including the so-called Industrial Internet of Things (IIoT) in this article featuring commentary by Prof. David Blaauw. Read The Internet of Things: From Hype to Reality, by Edwin Cartlidge, Optics & Photonics News, September 2017 - Online or download the PDF. [Full Story]

Related Topics:  Blaauw, David  Internet of Things  

Phone Browsing Could Become Faster, May Use Less Data With Smart Code

This article reports on Vroom, software developed by computer scientists including Prof. Harsha Madhyastha and CSE graduate student Vaspol Ruamviboonsuk. Vroom improves mobile browsing speed by optimizing the end-to-end interaction between smart devices and web servers. [Full Story]

Related Topics:  Lab-Software Systems  Madhyastha, Harsha  Mobile and Networked Computing  

After Y Combinator, May Mobility Ready to Test Self-Driving Fleets

May Mobility, founded by Prof. Edwin Olson, is focused on real-world implementations of autonomous driving technology, with a specific emphasis on whats possible today, not what might be doable five or ten years from now. [Full Story]

Related Topics:  Autonomous Vehicles  Lab-Artificial Intelligence  Olson, Edwin  

May Mobility is a self-driving startup with a decade of experience

May Mobility, founded by Prof. Edwin Olson, is focused on real-world implementations of autonomous driving technology, with a specific emphasis on whats possible today, not what might be doable five or ten years from now. [Full Story]

Related Topics:  Autonomous Vehicles  Lab-Artificial Intelligence  Olson, Edwin  

In fight for free speech, researchers test anti-censorship tool built into the internet's core

This article describes an implementation of TapDance, a method of anticensorship deployment that is built into the very core of the internet itself. By building TapDance into the servers and routers that underpin the Internet, censorship would become impractical. TapDance's development has been led by Prof. J. Alex Halderman. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

A New Kind of Classroom: No Grades, No Failing, No Hurry

This article on reports on the recent popularity of mastery-based learning in K-12 schools. Thurnau Professor Elliot Soloway is quoted in the article. He questions the approach, and contends that students learn by building on knowledge and frequently returning to it, not by working to mastery and then moving on. [Full Story]

Related Topics:  Lab-Interactive Systems  Soloway, Elliot  Technology for Education  

Youd Never Have to Plug in This Battery-Free Cell Phone

Prof. David Blaauw offers feedback on this concept for a batteryless cellphone. Overall what they are doing is very interesting and they are pursuing a goal that everyone would love and kill for." [Full Story]

Related Topics:  Blaauw, David  

U.S. elections are an easier target for Russian hackers than once thought

This article on voting system security quotes Prof. J. Alex Halderman, who says of the prospect of election tampering that "the technical ability is there and we wouldn't be able to catch it. The state of technical defense is very primitive in our election system now." [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Where the Jobs Are: 2017

Hot fields in the United States include embedded engineering, control engineering, and robotics. ECE's the place to be! [Full Story]

Related Topics:  Control Systems  Embedded Computing and Systems  Robotics and Autonomous Systems  

Heres exactly how Russia can hack the 2018 elections

Vulnerabilities in our voting system need to be addressed swiftly, according to experts in the field, including Prof. J. Alex Halderman. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Let's Encrypt Issues 100 Millionth Security Certificate

The Internet is more secure thanks to Let's Encrypt, the certificate authority founded by Prof. J. Alex Halderman and his collaborators. Since launching in Jan. 2016, Let's Encrypt has issued 100 million certificates. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

How to prevent Russian hackers from attacking the 2018 election

In this commentary piece in the Chicago Tribune, Prof. J. Alex Halderman and Justin Talbot-Zorn make the case for a straightforward policy agenda to secure America's voting systems against the threat of hackers. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

If Voting Machines Were Hacked, Would Anyone Know?

In the article, Prof. J. Alex Halderman points out how electronic voting systems even those not connected to the Internet can be compromised. One path for hackers is to attack the computers that are used to program the ballots, which are later transferred to voting machines via memory cards. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

New Computer Chips That See Data Will Enable Energy-Efficient Supercomputers

Drawing inspiration from how mammalian brains process sight, Prof. Wei Lu has found a way to mimic the functions of biological neural networks on a next-gen memristor chip. [Full Story]

Related Topics:  Computer-Aided Design & VLSI  Lu, Wei  Memristor  

Neuromorphic Chips Offer Neural Networks That Actually Work Like the Brain

Engineers at the University of Michigan are onto something rather more brainlike, however, with help from a peculiar electrical component known as a memristor. They've developed a new "sparse coding" algorithm that uses grids of memristors to approximate the pattern recognition abilities of mammalian brains. [Full Story]

Related Topics:  Computer-Aided Design & VLSI  Lu, Wei  Memristor  

U.S. Hospitals Not Immune to Crippling Cyber Attacks

In this article, Prof. Kevin Fu comments on the vulnerabilities that exist in hospital and healthcare systems and devices. The recent strike by the ransomware program called WannaCry demonstrates that these shortcomings. [Full Story]

Related Topics:  Fu, Kevin  Health  Lab-Computer Engineering (CE Lab)  Medical Device Security  

Apple Just Acquired This Little-Known Artificial Intelligence Startup

CSE Prof. Michael Cafarella is a co-founder of the startup Lattice Data, which builds on statistical inference and machine learning to solve problems using dark data. Apple has acquired Lattice, which recently emerged from stealth mode, for $200M. [Full Story]

Related Topics:  Cafarella, Michael  Data and Computing  Lab-Software Systems  

Apple acquires AI company Lattice Data, a specialist in unstructured dark data, for $200M

CSE Prof. Michael Cafarella is a co-founder of the startup Lattice Data, which builds on statistical inference and machine learning to solve problems using dark data. Apple has acquired Lattice, which recently emerged from stealth mode, for $200M. [Full Story]

Related Topics:  Cafarella, Michael  Data and Computing  Lab-Software Systems  

Smartphone security hole: "Open port" backdoors are common

The College of Engineering reports on work by computer science security researchers which has revealed that so-called "open ports" are much more vulnerable to security breaches than previously thought. [Full Story]

Related Topics:  Lab-Software Systems  Mao, Zhuoqing Morley  Mobile and Networked Computing  Networking, Operating Systems, and Distributed Systems  Security (Computing)  

Picting, not Writing, is the Literacy of Todays Youth

This blog post by Thurnau Prof. Elliot Soloway and his collaborator Cathie Norris looks at the disconnect between existing instructional materials (90% text) and how K-12 students communicate and consume (90% image-based), with ramifications for educational practices. [Full Story]

Related Topics:  Lab-Interactive Systems  Soloway, Elliot  Technology for Education  

Wellman and Rajan on the Ethics of Automated Trading

In this audio interview at Algocracy and the Transhumanist Project, Prof. Michael Wellman and Business Administration Prof. Uday Rajan comment on the ethics of autonomous trading agents on financial markets. The discussion encompasses algorithmic trading, high frequency trading, market manipulation, the AI control problem, and more. [Full Story]

Related Topics:  Artificial Intelligence  Lab-Artificial Intelligence  Wellman, Michael  

Hundreds of popular Android apps have open ports, making them prime targets for hacking

This article reports on the work done by CSE researchers Yunhan Jack Jia, Qi Alfred Chen, Yikai Lin, Chao Kong, and Prof. Z. Morley Mao in characterizing a widespread vulnerability in popular Android apps. [Full Story]

Related Topics:  Graduate Students  Lab-Software Systems  Mao, Zhuoqing Morley  Mobile and Networked Computing  Networking, Operating Systems, and Distributed Systems  Security (Computing)  

Rackham Student Spotlight: Elizabeth Dreyer

Liz is a Rackham Merit Fellow and has always been intentional about her status as a first generation college student, wanting to find whatever ways to increase her chance for success as much as possible. Liz examines magneto-electric scattering, shining high-powered lasers and controlling input light to focus on the scattered light and determine whats happening to the material, particularly exploring what makes one material better than another. [Full Story]

Related Topics:  Graduate Students  Lab-Optics and Photonics  Rand, Stephen  

Open Ports Create Backdoors in Millions of Smartphones

This article reports on work by CSE researchers who have characterized a widespread vulnerability in the software that runs on mobile devices which could allow attackers to steal contact information, security credentials, photos, and other sensitive data by using open ports to create backdoors. [Full Story]

Related Topics:  Graduate Students  Lab-Software Systems  Mao, Zhuoqing Morley  Mobile and Networked Computing  Networking, Operating Systems, and Distributed Systems  Security (Computing)  

Hacking with Sound Waves

CSE researchers have demonstrated a new way of using sound to interfere with devices containing accelerometers, such as smartphones and self-driving cars. This presents a new avenue for hackers to use in compromising devices to steal information or disrupt communication. [Full Story]

Related Topics:  Embedded Computing and Systems  Fu, Kevin  Internet of Things  Lab-Computer Engineering (CE Lab)  Lab-Software Systems  Security (Computing)  

An Obscure Flaw Creates Backdoors in Millions of Smartphones

CSE researchers have characterized a widespread vulnerability in the software that runs on mobile devices which could allow attackers to steal contact information, security credentials, photos, and other sensitive data, and also to install malware and to perform malicious code execution which could be used in large-scale attacks. [Full Story]

Related Topics:  Graduate Students  Lab-Software Systems  Mao, Zhuoqing Morley  Mobile and Networked Computing  Networking, Operating Systems, and Distributed Systems  Security (Computing)  

Why India Needs A Paper Trail For Free And Fair Elections

This article in the Indian edition of the Huffington Post, references the work that Prof. J. Alex Halderman and his collaborators did in 2010 to demonstrate vulnerabilities in India's "tamper-proof" electronic voting machines. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Need a job? How about engineering a driverless car?

As Michigan accelerates toward leadership in the emerging driverless car technology, industry experts say its workforce needs to catch up. Gov. Rick Snyder signed legislation in December allowing the public to buy and use fully self-driving cars when they are available. Jessy Grizzle, the director of Michigan Robotics, said the problem of finding talent in self-driving cars lies in the lack of integrated capability to develop the industry. But that is also where the solution lies. [Full Story]

Related Topics:  Autonomous Vehicles  Grizzle, Jessy  

University researchers develop ultra-thin silver film to improve touch-screen technology

Prof. Jay Guo's research team succeeded in creating a tarnish-proof silver film whose properties allow for various uses such as high-tech screens. The teams paper, published last Monday, details the films versatility. [Full Story]

Related Topics:  Electronic devices  Flexible electronics  Guo, L. Jay  Lab-Optics and Photonics  

Michigan Allots $87 Million to Replace Flints Tainted Water Pipes

Prof. Jacob Abernethy collaborated with Flint officials and colleagues at UM Flint on a study last year that analyzed the Flint water system and the undertaking required to identify and replace lead pipes in homes. He said that the state's just-announced plan for finishing the replacement of thousands of targeted lead pipes in three years seemed possible with enough money and resources. [Full Story]

Related Topics:  Abernethy, Jake  Big Data  Lab-Artificial Intelligence  

The next cyberattack could render your anti-virus and encryption software useless

Researchers including Prof. Kevin Fu and CSE graduate student Timothy Trippel have demonstrated a new way of using sound to interfere with devices containing accelerometers, such as smartphones. This presents a new avenue for hackers to use in compromising devices to steal information or disrupt communication. [Full Story]

Related Topics:  Fu, Kevin  Lab-Computer Engineering (CE Lab)  Lab-Software Systems  Security (Computing)  

Speck-Size Computers: Now With Deep Learning

The author describes the Michigan Micro Mote and research by David Blaauw and Dennis Sylvester presented at the 2017 IEEE International Solid-State Circuits Conference. They presented 10 papers in all related to the micromote computers. [Full Story]

Related Topics:  Blaauw, David  Integrated Circuits and VLSI  Lab-Michigan Integrated Circuits (MICL)  Millimeter-scale Computing  Sylvester, Dennis  

Screens of the future could be made with transparent silver

Prof. Jay Guo just published new research in the journal Advanced Materials that suggests using a seven-nanometer-thick film made of silver could replace indium tin oxide as a transparent conductive surface for touch screens. Indium is growing more expensive as its use increases, so this could be a valuable alternative. [Full Story]

Related Topics:  Flexible electronics  Guo, L. Jay  Lab-Optics and Photonics  

University presidents: Prepare for global economy

President Mark Schlissel writes with two other Michigan university presidents on the need to prepare graduates to compete in the global market. The article mentions ECE professor Kamal Sarabandi, a world leader in radar sensing whose work is used by NASA and other government agencies. [Full Story]

Related Topics:  Lab-Radiation (RADLAB)  Remote Sensing  Sarabandi, Kamal  

Smartphone Accelerometers Can Be Fooled by Sound Waves

This article features work done by Prof. Kevin Fu and his collaborators in which they demonstrate a way to take control of or influence devices such as smartphones through the use of sound waves. [Full Story]

Related Topics:  Embedded Computing and Systems  Fu, Kevin  Internet of Things  Lab-Computer Engineering (CE Lab)  Lab-Software Systems  Security (Computing)  

Optical Magnetism: Photons induce high levels of magnetism in optical materials

Prof. Steve Rand's group at the MURI Center for Dynamic Magneto-Optics (DYNAMO) have both observed and explained the presence of photon-induced magnetic dipole (MD) scattering (optical magnetism) in certain crystalline materials that is just as intense as ordinary Rayleigh scattering. The experiments show for the first time an alternative way of controlling magnetic properties of materials with light. [Full Story]

Related Topics:  Lab-Optics and Photonics  Metamaterials  Optics and Photonics  Rand, Stephen  

Show All