414 computer-security-"https:"-"https:"-"https:"-"https:"-"https:"-"https:"-"LGEF" positions at Monash University in Australia
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
- Computer Science
- Medical Sciences
- Economics
- Engineering
- Science
- Business
- Law
- Biology
- Education
- Humanities
- Linguistics
- Materials Science
- Mathematics
- Arts and Literature
- Environment
- Psychology
- Chemistry
- Philosophy
- Sports and Recreation
- Design
- Earth Sciences
- Electrical Engineering
- Social Sciences
- 13 more »
- « less
-
"A picture is worth a thousands words"... or so the saying goes. How much information can we extract from an image of an insect on a flower? What species is the insect? What species is the flower? Where was the photograph taken? And at what time of the year? What time of the day? What was the...
-
Ensembles over Continuous Data", PETS 2022 - "Privacy-Preserving Video Classification with Convolutional Neural Networks", ICML 2021 - "Privacy-Preserving Feature Selection with Secure Multiparty Computation
-
-disciplinary team of clinician scientists and computer scientists to develop diagnosis/predictive/treatment/robotics surgery models of diseases of interest using multimodal medical data, consisting of images
-
- Climate Change, Thriving Communities, and Geopolitical Security. The Research and Enterprise Portfolio is key to the delivery of our strategic vision, ensuring Monash delivers meaningful outcomes
-
data Reporting and Research Program (CORRP). Based at 553 St Kilda Road, this role contributes to a Commonwealth Government funded national clinical quality registry that monitors outcomes of procedures
-
Geopolitical Security. The Research and Enterprise Portfolio is key to the delivery of our strategic vision, ensuring Monash delivers meaningful outcomes to the communities we serve, and remains at the forefront
-
. Wallace", Computer Journal, Vol. 51, No. 5 (Sept. 2008) [Christopher Stewart WALLACE (1933-2004) memorial special issue [and front cover and back cover]], pp523-560 (and here). www.doi.org: 10.1093/comjnl
-
privacy-enhancing techniques such as secure multi-party computation, homomorphic encryption, differential privacy, and trusted execution to design algorithms and protocols to secure ML models within
-
checks required for the role, as determined by the University. Enquiries: Dr Belinda Comerford, Education Program and Safety Manager, School of Biological Sciences, 9905 1856 Position Description: Teaching
-
their performance evaluated in terms of classification accuracy, computational speed, and overall usability. Required knowledge Deep learning (CNNs, Transformers) and computer vision Knowledge distillation for model