Dataset Search
Sort By
Search results
43 results found
Absolute 13C/12C Isotope Amount Ratio for Vienna Pee Dee Belemnite from Infrared Absorption Spectroscopy
Data provided by National Institute of Standards and Technology
Data set from peer-reviewed publication: A. J. Fleisher et al., Absolute 13C/12C Isotope Amount Ratio for Vienna Pee Dee Belemnite from Infrared Absorption Spectroscopy, Nature Physics. Measurements of isotope ratios are predominantly made with reference to standard specimens that have been characterized in the past. In the 1950s, the carbon isotope ratio was referenced to a belemnite sample collected by Heinz Lowenstam and Harold Urey in South Carolina?s Pee Dee region.
Tags: greenhouse gases,carbon dioxide,oceans,ph,marine mammals,remote sensing,seabirds,Environment and Climate,
Modified: 2025-04-06
Trojan Detection Software Challenge - image-classification-feb2021-test
Data provided by National Institute of Standards and Technology
Round 4 Test DatasetThe data being generated and disseminated is the test data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2025-04-06
Trojan Detection Software Challenge - image-classification-feb2021-holdout
Data provided by National Institute of Standards and Technology
Round 4 Holdout DatasetThe data being generated and disseminated is the holdout data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2025-04-06