397 computer-security-"https:"-"https:"-"https:"-"https:"-"https:"-"UCL" positions at Monash University in Australia
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
- Computer Science
- Medical Sciences
- Economics
- Engineering
- Science
- Business
- Law
- Education
- Humanities
- Materials Science
- Biology
- Linguistics
- Mathematics
- Arts and Literature
- Environment
- Psychology
- Philosophy
- Sports and Recreation
- Chemistry
- Design
- Earth Sciences
- Electrical Engineering
- Social Sciences
- 13 more »
- « less
-
of Information Technology has a mission to advance social good through its research. Key to this mission is the AiLECS (Artificial Intelligence for Law Enforcement and Community Safety) research lab. The AiLECS lab is a
-
"A picture is worth a thousands words"... or so the saying goes. How much information can we extract from an image of an insect on a flower? What species is the insect? What species is the flower? Where was the photograph taken? And at what time of the year? What time of the day? What was the...
-
data Reporting and Research Program (CORRP). Based at 553 St Kilda Road, this role contributes to a Commonwealth Government funded national clinical quality registry that monitors outcomes of procedures
-
- Climate Change, Thriving Communities, and Geopolitical Security. The Research and Enterprise Portfolio is key to the delivery of our strategic vision, ensuring Monash delivers meaningful outcomes
-
Ensembles over Continuous Data", PETS 2022 - "Privacy-Preserving Video Classification with Convolutional Neural Networks", ICML 2021 - "Privacy-Preserving Feature Selection with Secure Multiparty Computation
-
checks required for the role, as determined by the University. Enquiries: Dr Belinda Comerford, Education Program and Safety Manager, School of Biological Sciences, 9905 1856 Position Description: Teaching
-
Geopolitical Security. The Research and Enterprise Portfolio is key to the delivery of our strategic vision, ensuring Monash delivers meaningful outcomes to the communities we serve, and remains at the forefront
-
privacy-enhancing techniques such as secure multi-party computation, homomorphic encryption, differential privacy, and trusted execution to design algorithms and protocols to secure ML models within
-
their performance evaluated in terms of classification accuracy, computational speed, and overall usability. Required knowledge Deep learning (CNNs, Transformers) and computer vision Knowledge distillation for model
-
-user devices and software assets, delivering a seamless, secure and customer-centric experience that empowers staff and students to do their best work every day. Positioned at the forefront of strategy