U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

79 results found

Data related to the investigation of UUIDs for a standards-based digital thread of product data in ISO 10303-242

Data provided by  National Institute of Standards and Technology

This dataset contains data used in the investigation of Universally Unique Identifiers (UUIDs) that will enable a standards-based digital thread of product data in ISO 10303-242. Included are EXPRESS schema used for implementation and .stp files that were exported from native CAD (CATIA V5, Creo, and NX). UUIDs were assigned to CAD features during .stp export for each of the four design iterations.

Tags: industrial data,standards,native CAD files,derived neutral files,ISO 10303,STEP,interoperability testing,digital thread,manufacturing,model-based enterprise,lifecycle,Universally Unique Identifiers,UUID,Persistent Identifiers,PID,

Modified: 2025-04-06

Human Observational Data in a Production Environment

Data provided by  National Institute of Standards and Technology

A heterogeneous dataset of human measurement data and human-generated text. This dataset was generated by TechSolve Inc. (techsolve.org) as a collaborative effort with NIST. Respondents were asked to observe and evaluate a machining process in which a rotary bit (the "tool") removed layers of a workpiece until the tool was worn to exhaustion. One trial and 19 official experiments were completed, one for each of 20 tools.

Tags: language processing,technical language processing,text,manufacturing,machining,process measurement and control,image and signal processing,

Modified: 2025-04-06

Trojan Detection Software Challenge - llm-pretrain-apr2024-train

Data provided by  National Institute of Standards and Technology

TrojAI llm-pretrain-apr2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists Llama2 Large Language Models refined using fine-tuning and LoRA to perform next token prediction. A known percentage of these trained AI models have been poisoned with triggers which induces modified behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers into the model weights.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2025-04-06

Trojan Detection Software Challenge - cyber-network-c2-mar2024-train

Data provided by  National Institute of Standards and Technology

TrojAI cyber-network-c2-mar2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and ResNet34 neural network models that classify botnet command and control (c2) and benign network traffic packets trained on the USTC-TFC2016 dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2025-04-06

Trojan Detection Software Challenge - rl-randomized-lavaworld-aug2023-train

Data provided by  National Institute of Standards and Technology

Round rl-randomized-lavaworld-aug2023-train Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of Reinforcement Learning agents trained to navigate the Lavaworld Minigrid environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2025-04-06

Trojan Detection Software Challenge - nlp-question-answering-aug2023-train

Data provided by  National Institute of Standards and Technology

nlp-question-answering-aug2023-trainThis is the train data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2025-04-06

Per- and polyfluoroalkyl substances (PFAS) Interferents List

Data provided by  National Institute of Standards and Technology

A table of known interferences for per- and polyfluoroalkyl substances using mass spectrometry.

Tags: per- and polyfluoroalkyl substances,PFAS,mass spectrometry,analytical chemistry,high-resolution mass spectrometry,HRMS,LC-MS/MS,

Modified: 2025-04-06

Trojan Detection Software Challenge - rl-lavaworld-jul2023-train

Data provided by  National Institute of Standards and Technology

Round rl-lavaworld-jul2023-train Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of Reinforcement Learning agents trained to navigate the Lavaworld Minigrid environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2025-04-06

Trojan Detection Software Challenge - cyber-apk-nov2023-train

Data provided by  National Institute of Standards and Technology

TrojAI cyber-apk-nov2023 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of small feed forward multi-layer perceptron type neural network models classifying APK feature vectors as malware or clean. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2025-04-06

Trojan Detection Software Challenge - cyber-network-c2-feb2024-train

Data provided by  National Institute of Standards and Technology

TrojAI cyber-network-c2-feb2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and ResNet34 neural network models that classify botnet command and control (c2) and benign network traffic packets trained on the USTC-TFC2016 dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2025-04-06