Sort by
Refine Your Search
-
safety-critical domain, reducing hallucinations and improving robustness and trustworthiness are essential. This PhD targets principled ways to detect, analyze, and mitigate hallucinations in video-based
-
Luxembourg) Guidance of a team of student assistants Conceptualizing and implementing behavioral analyses of video-recorded parent-child interactions (e.g., development of coding manuals, training and
-
. This PhD targets principled ways to detect, analyze, and mitigate hallucinations in video-based LVLMs for autonomous driving. Objectives Design, develop, and evaluate novel method(s) to detect and localize
-
comprehensive suite of software tools for developing and deploying online studies as well as collecting and processing the resulting datasets. These tools include video games, a modular online survey platform, a
-
machine-learning interatomic potentials • Experience with UFPs • Experience with molecular dynamics, ideally with LAMMPS • Contributions to a public code repository Your LIST benefits An organization with a
-
and TechnologyCountryLuxembourgCityluxembourgGeofield Contact City Esch-Belval Website http://www.list.lu/ Street 5, avenue des Hauts-Fourneaux Postal Code L-4362 E-Mail jobs@list.lu STATUS: EXPIRED X
-
SD- 26053 PHD IN ULTRA-FAST MACHINE-LEARNING INTERATOMIC POTENTIALS FOR NANOINDENTATION OF TIC MA...
: • Experience developing machine-learning interatomic potentials • Experience with UFPs • Experience with molecular dynamics, ideally with LAMMPS • Contributions to a public code repository Your LIST benefits
-
malicious behaviors implemented in Smali code. Adversarial attack development: you will design and implement adversarial attacks by manipulating localized malicious payloads against malware detection models
-
/InstituteLuxembourg Institute of Science and TechnologyCountryLuxembourgGeofield Contact City Esch-Belval Website http://www.list.lu/ Street 5, avenue des Hauts-Fourneaux Postal Code L-4362 E-Mail alexandre.baudet
-
machine learning or trustworthy AI, including experience with robustness assessment and attack/defense mechanisms. Expertise in software security and code analysis, with understanding of common