Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
Large vision–language models (LVLMs) can describe driving scenes and support decisions [Li25], but they sometimes hallucinate objects, relations, or events that are not present [Liu24,Liu25]. In a
-
malicious behaviors implemented in Smali code. Adversarial attack development: you will design and implement adversarial attacks by manipulating localized malicious payloads against malware detection models
-
highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud
-
that provides insights into model decision-making processes. Human-in-the-loop system design: you will develop innovative approaches for integrating human expertise with LLM capabilities, including alignment
-
research focused on biomedical image computing. Our work involves developing state-of-the-art methods for image segmentation, detection, classification, predictive modelling, and image enhancement. We aim
-
order to better understand, explain and advance society and environment we live in. Your role The PhD student will develop and apply computational multiscale models to investigate brain energy metabolism
-
understand, explain and advance society and environment we live in. Your role Conduct research and prepare a doctoral thesis in metabolic network modelling and computational epigenomics Develop novel methods
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security