Sort by
Refine Your Search
-
related discipline • Some knowledge of the theory of materials and experience with computational methods in materials science • Some experience with machine-learning interatomic potentials • Good
-
SD- 26053 PHD IN ULTRA-FAST MACHINE-LEARNING INTERATOMIC POTENTIALS FOR NANOINDENTATION OF TIC MA...
materials science or a related discipline • Some knowledge of the theory of materials and experience with computational methods in materials science • Some experience with machine-learning interatomic
-
. Our research brings together social theory, empirical studies guided by a range of interpretive methodologies, and the critique as well as advancement of interventions and social policies. We
-
/InstituteLuxembourg Institute of Science and TechnologyCountryLuxembourgGeofield Contact City Esch-Belval Website http://www.list.lu/ Street 5, avenue des Hauts-Fourneaux Postal Code L-4362 E-Mail alexandre.baudet
-
malicious behaviors implemented in Smali code. Adversarial attack development: you will design and implement adversarial attacks by manipulating localized malicious payloads against malware detection models
-
familiarity with fundamental concepts) in several of the following topics: Signal processing for wireless communication. Solid background in optimization and information theory. Good understanding
-
utility for a varying range of use cases and data types. The candidate will perform the work together with an interdisciplinary team of postdoctoral researchers who are experts in the field. In general, the
-
/InstituteLuxembourg Institute of Science and TechnologyCountryLuxembourgGeofield Contact City Esch-Belval Website http://www.list.lu/ Street 5, avenue des Hauts-Fourneaux Postal Code L-4362 E-Mail jobs@list.lu STATUS
-
Institute of Science and TechnologyCountryLuxembourgGeofield Contact City Esch-Belval Website http://www.list.lu/ Street 5, avenue des Hauts-Fourneaux Postal Code L-4362 E-Mail alexandre.baudet@list.lu Phone
-
machine learning or trustworthy AI, including experience with robustness assessment and attack/defense mechanisms. Expertise in software security and code analysis, with understanding of common