39 data-"https:" "https:" "https:" "https:" "https:" "https:" "https:" "U.S" "U.S" positions at University of Twente
Sort by
Refine Your Search
-
Vacancies Assistant Professor Business Information Systems Key takeaways We are looking for a scholar who is passionate about impact-driven research & teaching. They are able to demonstrably bridge
-
? Join our innovative project where simulated data and real hardware testing create innovative solutions. The work builds on our recent results . You will be at the forefront of developing advanced
-
Vacancies Postdoc position on Federated/Continual Learning for Time-Series IoT Data (TRUMAN Project) Key takeaways In this role, you will address the intricate challenge of enabling AI to learn
-
19 Dec 2025 Job Information Organisation/Company University of Twente Research Field Computer science » Other Engineering » Computer engineering Researcher Profile First Stage Researcher (R1
-
in practicals). Information and application Are you interested in this position? Please send your application via the 'Apply now' button below before February 22 and should include your CV and
-
research prototypes that the community can benefit from. The SCS group is internationally recognized in the broad areas of systems, AI, and data security and is unique for its collaborative and friendly
-
Vacancies PhD Position JUST FUTURES: ReStor(y)ing Multispecies Futures Through Digital Media Key takeaways Your research will engage critically and creatively with environmental data (e.g
-
digital models with varying degrees of detail, integrated into a flexible open-source tool, assimilating monitoring data to give probabilistic predictions. This framework can assess the probability (and
-
as PhD dissertation. Information and application Please apply by 28 February 2026. The application should include: A Curriculum Vitae; A cover letter For more information regarding the topic
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate