Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
School graduates over a thousand students who are ready to take on great ambitions and challenges. For more details, please view: https://www.ntu.edu.sg/eee We are looking for a Research Fellow to focus
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
State University of New York University at Albany | Albany, New York | United States | about 10 hours ago
exponentially more efficient calculations than conventional computers. This would revolutionize fields that involve optimization, modeling and simulation, cryptography, and AI. However, realizing this potential
-
Government of Canada | Government of Canada Ottawa and Gatineau offices, Ontario | Canada | 1 day ago
. Technical competencies: • Cryptography and Cryptanalysis How to apply To apply, visit the CSE Careers page and select the “Strategic Researcher (Machine Learning)” Poster. Note: Be prepared to provide two (2
-
, statistics, systems science and control theory, information theory, operations research and econometrics, theoretical computer science and cryptography, mathematical theory of artificial intelligence, etc
-
Science, Actuarial Sciences, or Cryptography. Additional Assignment has the following Preferred Education & Experience: Five years of teaching experience at the college/university level as the instructor
-
department. The successful candidates will teach a variety of undergraduate courses in Computer Security, including information security, computer forensics, cryptography, biometrics, physical security and
-
Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role The successful candidate is expected to assume a leading role in defining, acquiring, managing, and
-
, especially in relation to cryptography. The exact research topics can be adjusted within the limits set by our current projects according to the interests of the applicant. Your goal in research will be
-
. · Artificial Intelligence, Machine Learning, and Data-Driven Systems – edge AI, embedded intelligence, and neuromorphic computing. · Cybersecurity & Privacy – hardware and IoT security, post-quantum cryptography