Developing grid integration #technologies for grid-forming and grid-following inverters and converters.
__
Work under a supervisor with a team of experts to develop a set of power system and control component models for power system E#MT simulation.
__
Implementing different grid-forming con......
Continuous #Research Surveillance: Actively monitor, identify, and track significant advancements, breakthroughs, and trends in reinforcement learning and related fields (e.g., deep learning, robotics, game theory).
__
Critical #Analysis & #Synthesis: Deeply analyze research papers, comprehendin......
We engage in diverse activities, including vulnerability research, binary exploitation, security tooling development, fuzzing, machine learning, and many more. By developing and harnessing state-of-the-art technologies, we amplify our impact on Apple's product security. We cover a wide range of spec......
Work with cross-functional teams to push advanced #esearch on Embodied #AI topics (#robotic foundation model, task planning, imitation learning)
Collaborate with HQ and 3rd-party research labs for technical integration of robotics products into LG ecosystems.
Invent and improve paradigms for e......
• Research and discover zero-day vulnerabilities in cloud environments and associated technologies. Develop and implement proof-of-concept exploits to demonstrate potential risks and work closely with engineering teams to address findings.
• Analyze a wide array of data sources to identify potentia......
Design and maintain scalable threat graphs that model entities such as devices, identity, threat actors, TTPs, infrastructure, and campaigns.
Lead and execute advanced research to develop algorithms and heuristics to detect malicious patterns and relationships within graph data on emerging cloud-ba......
Analyze and understand the internals of authentication/network protocols and be able to independently reproduce identity-based attacks for investigation, study and research purposes.
Become a subject matter expert of investigation, collection, analysis and forensic of identity logs, including deep ......
Responsibility:
1.Carry out fundamental study and #research on cooperative perception for networked vehicles.
2.Study the principle and content of #transmitted data between different connected autonomous driving cars.
3.Basic machine learning knowledge of sensor fusion and perception models......
Participate in the innovative #LLMs reasoning and LLMs empowered Agent #research #project;
Implement #algorithms for proposed models and #applications, deploy into internal product;
__
Work closely with researchers in the team;
Keeping up-to-date on selected areas of ML and write insight rep......
Hiring In Markham, Ontario, Montreal Quebec, Edmonton ......
We are looking for #engineers who are passionate about #building #systems that push the frontier of deep learning in terms of scaling, efficiency, and flexibility and delight millions of users in #Apple #products! Further, you will have opportunities to identify and develop novel #applications of de......
Corgan is actively recruiting a dynamic Design Researcher to join the firm as part of our Hugo team. Tackle these responsibilities alongside a team of creative, highly motivated individuals who are passionate about their work and ready to collaborate to achieve outstanding results. Our ideal team me......
Regularly #publish your results in the main relevant #conferences, and make sure that your #research results are of high quality and reproducible. You will define your research plan to advance our understanding of #machine #learning and execute it through implementation and experimentation, in colla......
You will collaborate closely with an extraordinary team of vulnerability #researchers to gain a deep understanding of the attack surface across #Apple's #full-stack – from silicon and boot #ROMs to #firmware, #kernels, and user #applications.
__
As the primary focus, you will #design, #develop, #m......
NVIDIA is looking for security researchers passionate about offensive research across different platforms. Do you have experience with identifying hardware and software vulnerabilities, developing PoC, and tools for automation in vulnerability research? Are you creative and devious in your offensive......