356 computer-security "https:" "https:" "https:" "https:" "UCL" uni jobs at Monash University
Sort by
Refine Your Search
-
Listed
-
Field
-
who discover them The Opportunity The ARC SRIEAS Securing Antarctica’s Environmental Future (SAEF) program is a leading international research initiative from the Faculty of Science focused
-
Computational simulations are now widely employed to study the behaviour of social systems, examples being market behaviours, and social media population behaviours. These methods rely heavily
-
Research Training Program (RTP) Stipend Research Training Program (RTP) Scholarships, funded by the Australian Government, support both domestic and international students undertaking Research
-
"A picture is worth a thousands words"... or so the saying goes. How much information can we extract from an image of an insect on a flower? What species is the insect? What species is the flower? Where was the photograph taken? And at what time of the year? What time of the day? What was the...
-
data Reporting and Research Program (CORRP). Based at 553 St Kilda Road, this role contributes to a Commonwealth Government funded national clinical quality registry that monitors outcomes of procedures
-
- Climate Change, Thriving Communities, and Geopolitical Security. The Research and Enterprise Portfolio is key to the delivery of our strategic vision, ensuring Monash delivers meaningful outcomes
-
interested in, please apply via our website and complete the online expression of interest form https://www.monash.edu/ research-ethics-and-integrity/ animal-ethics/accordion- content/accordion_1 For further
-
checks required for the role, as determined by the University. Enquiries: Dr Belinda Comerford, Education Program and Safety Manager, School of Biological Sciences, 9905 1856 Position Description: Teaching
-
Ensembles over Continuous Data", PETS 2022 - "Privacy-Preserving Video Classification with Convolutional Neural Networks", ICML 2021 - "Privacy-Preserving Feature Selection with Secure Multiparty Computation
-
privacy-enhancing techniques such as secure multi-party computation, homomorphic encryption, differential privacy, and trusted execution to design algorithms and protocols to secure ML models within