U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

1003 results found

Trojan Detection Software Challenge - image-classification-aug2020-test

Data provided by  National Institute of Standards and Technology

Round 2 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-aug2020-holdout

Data provided by  National Institute of Standards and Technology

Round 2 Holdout DatasetThe data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Blind Calibration of Phase Drift in Millimeter-Wave Channel Sounders

Data provided by  National Institute of Standards and Technology

Millimeter-wave channel sounders are much more sensitive to phase drift than their microwave counterparts by virtue of shorter wavelength. This matters when coherently combining untethered channel measurements ? scanned over multiple antennas either electronically or mechanically in seconds, minutes, or even hours ? to obtain directional information. To eliminate phase drift, a synchronization cable between the transmitter and receiver is required, limiting deployment range and flexibility indoors, and precluding most outdoor and mobile scenarios.

Tags: 5G,beamforming,clock drift,mmWave,phased-array antennas,phase coherence,

Modified: 2024-02-22

Views: 0

On computing elastic registration of two simple curves in d-dimensional space and the elastic shape distance between them.

Data provided by  National Institute of Standards and Technology

A software package for computing the elastic registration of two simple curves in d-dimensional space, d a positive integer, and therefore the elastic shape distance between them. The implementation of the package is in Matlab with the exception of the Dynamic Programming routine which is written in Fortran but is executed as a Matlab mex file. The Dataset includes all the routines in the package and some input data files.

Tags: dynamic programming,elastic shape distance,FFT,rotation matrix,shape analysis,singular value decomposition,trace,

Modified: 2024-02-22

Views: 0

PROperties of FIre Suppressant SYstems: "PROFISSY" - A Spreadsheet Application for Fire-Suppressant Bottle-Filling Calculations

Data provided by  National Institute of Standards and Technology

This spreadsheet and accompanying files are the result of work performed for U.S. Army Ground Vehicle Systems Center by the National Institute of Standards and Technology (NIST), Applied Chemicals and Materials Division on the development of a computer program for fire-suppressant bottle-filling calculations under interagency agreement number 11478007.

Tags: Filling pressure,fire suppressant,refrigerant,vapor liquid equilibrium,

Modified: 2024-02-22

Views: 0

Recipients of the Edward Uhler Condon Award, NIST, 1974-present

Data provided by  National Institute of Standards and Technology

This is a list of the Edward Uhler Condon award recipients and links to their publications, where available, from 1974 to the present.

Tags: Condon Award,Edward Uhler Condon,

Modified: 2024-02-22

Views: 0

precisionFDA Truth Challenge V2: Calling variants from short- and long-reads in difficult-to-map regions

Data provided by  National Institute of Standards and Technology

The precisionFDA Truth Challenge V2 aimed to assess the state-of-the-art of variant calling in difficult-to-map regions and the Major Histocompatibility Complex (MHC). Starting with FASTQ files, 20 challenge participants applied their variant calling pipelines and submitted 64 variant callsets for one or more sequencing technologies (~35X Illumina, ~35X PacBio HiFi, and ~50X Oxford Nanopore Technologies). Submissions were evaluated following best practices for benchmarking small variants with the new GIAB benchmark sets and genome stratifications.

Tags: Variant calling,bioinformatics,whole-genome sequencing,benchmarking,precisionFDA,Genome in a Bottle,

Modified: 2024-02-22

Views: 0

Mapping of NIST Cybersecurity Framework Subcategories to Threat Scenarios from the National Electric Sector Cybersecurity Organization Resource (NESCOR) Electric Sector Failure Scenarios and Impact Analyses - Version 3.0

Data provided by  National Institute of Standards and Technology

This document identifies the NIST Cybersecurity Framework Subcategories that map closely to the potential mitigations within Advanced Metering Infrastructure (AMI), Distributed Energy Resources (DER), and Distribution Grid Management (DGM) threat scenarios in the NESCOR document. This mapping is useful in determining which NIST Cybersecurity Framework Subcategories are most relevant to addressing cyber risks in voltage regulation for the distribution system and is helpful in comparing DER and traditional grid environments.

Tags: cybersecurity framework,Subcategories,voltage regulation,distribution system,smart grid,Advanced Metering Infrastructure,Distributed Energy Resource,Distribution Grid Management,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-test

Data provided by  National Institute of Standards and Technology

Round 3 Test DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-holdout

Data provided by  National Institute of Standards and Technology

Round 3 Holdout DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0