Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
completion); Applied for admission to a PhD program at an Australian university or be a student enrolled in their first 12 months of study in a PhD program at an Australian University; A university supervisor
-
This PhD project is part of a larger project that aims to explain the uncertainty of Machine Learning (ML) predictions. To this effect, we must quantify uncertainty, devise algorithms that explain ML predictions and their uncertainty to different stakeholders, and evaluate the effect of the...
-
Scholar, 2022 Future Leader Alex Wulff The Westpac Scholars Program is more than just a scholarship to me; it is an amazing opportunity to connect and collaborate with a supportive, diverse and inclusive
-
Bachelor of Occupational Therapy (Honours) The Betty Amsden program helped me gain clarity about my career pathway and increase my confidence. I think these were strong contributing factors to excelling in
-
. Leveraging techniques such as federated learning, differential privacy, and secure multiparty computation, the goal is to enable collaborative ML tasks without compromising the privacy of individual data
-
the different actors' beliefs and intentions. We will study the properties of such explanations, present algorithms for automatically computing them as well as extensions to existing frameworks and evaluate
-
Computer Systems Engineering ● Materials Science and Engineering ● Mechanical and Aerospace Engineering For further information, please follow the link for each Graduate Research Degree ● 3291 - Doctor
-
and Computer Systems Engineering ● Materials Science and Engineering ● Mechanical and Aerospace Engineering To be eligible to apply for domestic postgraduate research scholarships an applicant must be
-
program (or ability to foster research collaboration) is considered along with records of achievement. Those with joint Monash-Museums Victoria supervision will be highly regarded. To retain
-
In recent years, the rise in cybercrimes has significantly increased the vulnerability of the open internet to various threats and cyber-attacks. Among these, phishing stands out as one of the most perilous crimes worldwide. In a phishing attack, perpetrators create fraudulent websites that...