Dataset Search
Sort By
Search results
73 results found
Trojan Detection Software Challenge - Leftovers
Data provided by National Institute of Standards and Technology
This collection of AI models consists of the trained yet unreleased models constructed for the TrojAI program. These models were not required for the published round they come from for some reason. Some were simply extras, others did not meet the release criteria for accuracy or trojan attack success rate, or other reasons. These models should not be considered high quality. They might be poorly trained and unfit for their stated purpose. Examine the metadata released with each model to determine whether you can leverage it.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;
Modified:
Source: https://drive.google.com/drive/folders/1aajbFNn3njowHsWDI4kJ4cfM3n_8rVTV?usp=sharing
Trojan Detection Software Challenge - rl-safetygymnasium-oct2024-train
Data provided by National Institute of Standards and Technology
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of RL agents operating in the Safety Gymnasium environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting that trigger behavior in the trained AI models.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;
Modified:
Source: https://drive.google.com/drive/folders/1mz_DC1X22hlty3g7OL0YPgteU6h2hjEq?usp=sharing
Trojan Detection Software Challenge - mitigation-llm-instruct-oct2024-train
Data provided by National Institute of Standards and Technology
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of instruction fine tuned LLMs. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for mitigating that trigger behavior in the trained AI models.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;
Modified:
Source: https://drive.google.com/drive/folders/1evPD-gD3doNtUH5JTSEwCTz_lGzuus8g?usp=sharing
Trojan Detection Software Challenge - llm-instruct-oct2024-train
Data provided by National Institute of Standards and Technology
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of instruction fine tuned LLMs. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting that trigger behavior in the trained AI models.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;
Modified:
Source: https://drive.google.com/drive/folders/1evPD-gD3doNtUH5JTSEwCTz_lGzuus8g?usp=sharing
Trojan Detection Software Challenge - cyber-git-dec2024-train
Data provided by National Institute of Standards and Technology
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of models trained to predict whether code from public git repositories would survive in its branch for one month or more as a quantifiable proxy for code quality. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting that trigger behavior in the trained AI models.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;
Modified:
Source: https://drive.google.com/file/d/1_uLyou-nD0DeisrD2yKFOGr5-SaArlnI/view?usp=drive_link
Trojan Detection Software Challenge - rl-colorful-memory-sep2024-train
Data provided by National Institute of Standards and Technology
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of RL agents operating in the Colorful Memory environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting that trigger behavior in the trained AI models.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;
Modified:
Source: https://drive.google.com/drive/folders/1NUlgd1uy-GbbgdkXE_AEglC7tR3KZL7k?usp=sharing
Trojan Detection Software Challenge - cyber-pe-aug2024-train
Data provided by National Institute of Standards and Technology
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of malware packer classification AIs. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for mitigating/removing that trigger behavior from the trained AI models.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;
Modified:
Source: https://drive.google.com/file/d/1V28kBm3QR0lfk14RRxMMG0FMQCrOk2Ci/view?usp=drive_link
Trojan Detection Software Challenge - mitigation-image-classification-jun2024-train
Data provided by National Institute of Standards and Technology
mitigation-image-classification-jun2024-train datasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of image classification AIs. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for mitigating/removing that trigger behavior from the trained AI models. This dataset consists of 288 AI models using a small set of model architectures.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;
Modified:
Source: https://drive.google.com/drive/folders/1VJPQgyydbOifr0UXO2eybxZBN1a5uY6f?usp=sharing
Trojan Detection Software Challenge - llm-pretrain-apr2024-train
Data provided by National Institute of Standards and Technology
TrojAI llm-pretrain-apr2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists Llama2 Large Language Models refined using fine-tuning and LoRA to perform next token prediction. A known percentage of these trained AI models have been poisoned with triggers which induces modified behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers into the model weights.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;
Modified:
Source: https://drive.google.com/drive/folders/1eI7MsVi1qqSHvnfCUWkgNnphTk0Cth5M?usp=sharing
Trojan Detection Software Challenge - cyber-network-c2-mar2024-train
Data provided by National Institute of Standards and Technology
TrojAI cyber-network-c2-mar2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and ResNet34 neural network models that classify botnet command and control (c2) and benign network traffic packets trained on the USTC-TFC2016 dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;
Modified:
Source: https://drive.google.com/drive/folders/1S8LQ2J8pkeq4vX_Fya1aUfqdg7G9GFJL?usp=sharing