Sort by
Refine Your Search
-
safety-critical domain, reducing hallucinations and improving robustness and trustworthiness are essential. This PhD targets principled ways to detect, analyze, and mitigate hallucinations in video-based
-
Luxembourg) Guidance of a team of student assistants Conceptualizing and implementing behavioral analyses of video-recorded parent-child interactions (e.g., development of coding manuals, training and
-
approaches to transform unstructured bug reports into actionable insights that connect to code, support diagnosis, and improve the speed and quality of fixes. Application areas include developer tooling
-
candidate will work on Bug Report Intelligence for the Generative AI Era (BRIDGE) - exploring approaches to transform unstructured bug reports into actionable insights that connect to code, support diagnosis
-
ML frameworks like PyTorch/JAX Genuine interest in MLFFs, simulation methods, and foundational ML research Desired skills: Experience with atomistic simulation codes: ASE, FHI-aims, VASP, CP2K
-
malicious behaviors implemented in Smali code. Adversarial attack development: you will design and implement adversarial attacks by manipulating localized malicious payloads against malware detection models
-
Institute of Science and TechnologyCountryLuxembourgGeofield Contact City Esch-Belval Website http://www.list.lu/ Street 5, avenue des Hauts-Fourneaux Postal Code L-4362 E-Mail alexandre.baudet@list.lu Phone