Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
of social media trends, algorithms, and audience behaviours. Comfortable working with multiple stakeholders in a complex environment. Strong organisation and time management skills. A team player who
-
mission standards. Core challenges: translating advanced algorithms into field deployable and operational systems managing complex technical integration across multiple consortium partners and international
-
countermeasures. The successful applicant will work closely with collaborators and co-investigators across multiple schools within SET on theoretical and algorithm development and implementation, assist
-
healthcare application needs to analyze sensitive patient data across distributed nodes. Researchers and students can explore privacy-preserving algorithms and technologies like federated learning and zero
-
formula is true or false (EXPTIME vs NP). Can we develop and implement efficient algorithms for this problem? This problem has been attacked using multiple different methods for the past 40 years, without
-
within a species, going beyond the limitations of single-reference genomes. By integrating multiple genomes from different individuals or populations, pangenomes can provide a more comprehensive
-
software is not on the blacklist" (without revealing the exact software). There are multiple aspects of this project. For all aspects, some cryptography background is required. Design and analysis of new
-
guarantees of FL. In this project, we aim at an ambitious goal - designing secure and privacy-enhancing algorithms and framework for FL and applying our designs into real-world applications. To achieve
-
Anomaly detection is an important task in data mining. Traditionally most of the anomaly detection algorithms have been designed for ‘static’ datasets, in which all the observations are available