Sort by
Refine Your Search
-
malicious behaviors implemented in Smali code. Adversarial attack development: you will design and implement adversarial attacks by manipulating localized malicious payloads against malware detection models
-
/InstituteLuxembourg Institute of Science and TechnologyCountryLuxembourgGeofield Contact City Esch-Belval Website http://www.list.lu/ Street 5, avenue des Hauts-Fourneaux Postal Code L-4362 E-Mail jobs@list.lu STATUS
-
Institute of Science and TechnologyCountryLuxembourgGeofield Contact City Esch-Belval Website http://www.list.lu/ Street 5, avenue des Hauts-Fourneaux Postal Code L-4362 E-Mail alexandre.baudet@list.lu Phone
-
machine learning or trustworthy AI, including experience with robustness assessment and attack/defense mechanisms. Expertise in software security and code analysis, with understanding of common
-
Luxembourg) Guidance of a team of student assistants Conceptualizing and implementing behavioral analyses of video-recorded parent-child interactions (e.g., development of coding manuals, training and
-
Conceptualizing and implementing behavioral analyses of video-recorded parent-child interactions (e.g., development of coding manuals, training and supervision of coders) Collaboration in an international team
-
EdisonL-1445 StrassenLuxembourg Postal Code 1445 STATUS: EXPIRED X (formerly Twitter) Facebook LinkedIn Whatsapp More share options E-mail Pocket Viadeo Gmail Weibo Blogger Qzone YahooMail
-
computational models and data analysis code to process large, multimodal behavioral datasets using both traditional methods (e.g., factor analysis) as well as more modern approaches (e.g., deep learning