Sort by
Refine Your Search
-
malicious behaviors implemented in Smali code. Adversarial attack development: you will design and implement adversarial attacks by manipulating localized malicious payloads against malware detection models
-
Institute of Science and TechnologyCountryLuxembourgGeofield Contact City Esch-Belval Website http://www.list.lu/ Street 5, avenue des Hauts-Fourneaux Postal Code L-4362 E-Mail alexandre.baudet@list.lu Phone
-
machine learning or trustworthy AI, including experience with robustness assessment and attack/defense mechanisms. Expertise in software security and code analysis, with understanding of common
-
Luxembourg) Guidance of a team of student assistants Conceptualizing and implementing behavioral analyses of video-recorded parent-child interactions (e.g., development of coding manuals, training and
-
Conceptualizing and implementing behavioral analyses of video-recorded parent-child interactions (e.g., development of coding manuals, training and supervision of coders) Collaboration in an international team