U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

79 results found

Trojan Detection Software Challenge - Leftovers

Data provided by  National Institute of Standards and Technology

This collection of AI models consists of the trained yet unreleased models constructed for the TrojAI program. These models were not required for the published round they come from for some reason. Some were simply extras, others did not meet the release criteria for accuracy or trojan attack success rate, or other reasons. These models should not be considered high quality. They might be poorly trained and unfit for their stated purpose. Examine the metadata released with each model to determine whether you can leverage it.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;

Modified:

Source: https://drive.google.com/drive/folders/1aajbFNn3njowHsWDI4kJ4cfM3n_8rVTV?usp=sharing

Reference functional model for production in a circular economy

Data provided by  National Institute of Standards and Technology

Reference functional model for the activities and processes involved in production (e.g., designing, manufacturing, and recovering products/materials) in a circular economy. The model includes inputs and outputs of each activity, as well as factors that constrain and enable the activities (controls and mechanisms), using the IDEF0 methodology. It provides a baseline scenario that is relevant for stakeholders across product development and supply chain, including business strategists, material suppliers, designers, manufacturers, consumers, and recovers/recyclers.

Tags: circular economy,design,manufacturing,production,end-of-life treatment,functional model,system model

Modified:

Source: https://pages.nist.gov/circular-economy-manufacturing-models/

Trojan Detection Software Challenge - rl-safetygymnasium-oct2024-train

Data provided by  National Institute of Standards and Technology

This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of RL agents operating in the Safety Gymnasium environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting that trigger behavior in the trained AI models.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;

Modified:

Source: https://drive.google.com/drive/folders/1mz_DC1X22hlty3g7OL0YPgteU6h2hjEq?usp=sharing

Trojan Detection Software Challenge - mitigation-llm-instruct-oct2024-train

Data provided by  National Institute of Standards and Technology

This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of instruction fine tuned LLMs. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for mitigating that trigger behavior in the trained AI models.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;

Modified:

Source: https://drive.google.com/drive/folders/1evPD-gD3doNtUH5JTSEwCTz_lGzuus8g?usp=sharing

Trojan Detection Software Challenge - llm-instruct-oct2024-train

Data provided by  National Institute of Standards and Technology

This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of instruction fine tuned LLMs. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting that trigger behavior in the trained AI models.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;

Modified:

Source: https://drive.google.com/drive/folders/1evPD-gD3doNtUH5JTSEwCTz_lGzuus8g?usp=sharing

Trojan Detection Software Challenge - cyber-git-dec2024-train

Data provided by  National Institute of Standards and Technology

This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of models trained to predict whether code from public git repositories would survive in its branch for one month or more as a quantifiable proxy for code quality. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting that trigger behavior in the trained AI models.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;

Modified:

Source: https://drive.google.com/file/d/1_uLyou-nD0DeisrD2yKFOGr5-SaArlnI/view?usp=drive_link

Trojan Detection Software Challenge - rl-colorful-memory-sep2024-train

Data provided by  National Institute of Standards and Technology

This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of RL agents operating in the Colorful Memory environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting that trigger behavior in the trained AI models.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;

Modified:

Source: https://drive.google.com/drive/folders/1NUlgd1uy-GbbgdkXE_AEglC7tR3KZL7k?usp=sharing

Trojan Detection Software Challenge - cyber-pe-aug2024-train

Data provided by  National Institute of Standards and Technology

This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of malware packer classification AIs. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for mitigating/removing that trigger behavior from the trained AI models.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;

Modified:

Source: https://drive.google.com/file/d/1V28kBm3QR0lfk14RRxMMG0FMQCrOk2Ci/view?usp=drive_link

Sim-PROCESD: Simulated-Production Resource for Operations and Conditions Evaluation to Support Decision-making

Data provided by  National Institute of Standards and Technology

Sim-PROCESD is a discrete event simulation package written in Python that is designed to model the behavior of discrete manufacturing systems. Specifically, it focuses on asynchronous production lines. It also provides functionality for modeling the degradation and maintenance of machines in these systems. Sim-PROCESD provides class definitions for manufacturing devices/components that can be configured by the user to model various real-world manufacturing systems.

Tags: discrete-event simulation,manufacturing,production,maintenance,python

Modified:

Source: https://github.com/usnistgov/simprocesd

Trojan Detection Software Challenge - mitigation-image-classification-jun2024-train

Data provided by  National Institute of Standards and Technology

mitigation-image-classification-jun2024-train datasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of image classification AIs. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for mitigating/removing that trigger behavior from the trained AI models. This dataset consists of 288 AI models using a small set of model architectures.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;

Modified:

Source: https://drive.google.com/drive/folders/1VJPQgyydbOifr0UXO2eybxZBN1a5uY6f?usp=sharing