49 data-"https:" "https:" "https:" "https:" "https:" "https:" "https:" "Fraunhofer Gesellschaft" positions at University of Twente in Netherlands
Sort by
Refine Your Search
-
(such as data annotation, online content creation, or software testing) provide chances for social enterprises – i.e. mission-driven business that prioritize societal impact above maximizing profit, such as
-
of Twente, in close collaboration with the MESA+ Institute for Nanotechnology and clinical and international partners. Information and application You can apply for this position until 31 March 2026 by
-
dynamics and aerodynamics aspects, thereby contributing to the education of the engineers of the future. Information and application For more information about this position, please contact the secretary of
-
in three main areas: Systems Security, Data Security, and AI Security (including both the security of AI systems and AI-driven security techniques). We are looking for a dynamic and ambitious
-
Vacancies PhD Position JUST FUTURES: ReStor(y)ing Multispecies Futures Through Digital Media Key takeaways Your research will engage critically and creatively with environmental data (e.g
-
digital models with varying degrees of detail, integrated into a flexible open-source tool, assimilating monitoring data to give probabilistic predictions. This framework can assess the probability (and
-
as PhD dissertation. Information and application Please apply by 28 February 2026. The application should include: A Curriculum Vitae; A cover letter For more information regarding the topic
-
, 2020 . In this PhD project you will work on applying RNPU networks for solving computational problems that are considered hard. Information and application Are you interested in this position? Please
-
, fundamental research and/or studies involving matters of scientific urgency. Information and application Are you interested in this position? Please send your application via the 'Apply now' button below before
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate