U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

73 results found

SRM 1450e Fibrous Glass Board

Data provided by  National Institute of Standards and Technology

SRM 1450e Fibrous Glass Board - This Standard Reference Material (SRM) is intended primarily for use in the measurement of the thermal conductivity or thermal resistance of insulation materials. SRM 1450e is a high-density fibrous glass board certified for bulk density and thermal conductivity. The SRM can be used in conjunction with ASTM C177 or ASTM C518. A unit of SRM 1450e consists of a square panel of fibrous glass and phenolic binder molded into a semi-rigid board.

Tags: bulk density,certified reference material,fit,guarded hot plate,high density molded fibrous glass board,model,regression analysis,Standard Reference Material,thermal conductivity,thermal insulation,

Modified: 2022-07-29

Views: 0

Trojan Detection Software Challenge - Round 1 Test Dataset

Data provided by  National Institute of Standards and Technology

The data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2022-07-29

Views: 0

Trojan Detection Software Challenge - Round 1 Holdout Dataset

Data provided by  National Institute of Standards and Technology

The data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2022-07-29

Views: 0

Trojan Detection Software Challenge - Round 2 Training Dataset

Data provided by  National Institute of Standards and Technology

The data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers. This dataset consists of 1104 trained, human level, image classification AI models using a variety of model architectures.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2022-07-29

Views: 0

Trojan Detection Software Challenge - Round 3 Training Dataset

Data provided by  National Institute of Standards and Technology

The data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2022-07-29

Views: 0

Trojan Detection Software Challenge - Round 2 Test Dataset

Data provided by  National Institute of Standards and Technology

The data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2022-07-29

Views: 0

Trojan Detection Software Challenge - Round 2 Holdout Dataset

Data provided by  National Institute of Standards and Technology

The data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2022-07-29

Views: 0

Trojan Detection Software Challenge - Round 3 Test Dataset

Data provided by  National Institute of Standards and Technology

The data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2022-07-29

Views: 0

Trojan Detection Software Challenge - Round 3 Holdout Dataset

Data provided by  National Institute of Standards and Technology

The data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2022-07-29

Views: 0

Trojan Detection Software Challenge - Round 4 Train Dataset

Data provided by  National Institute of Standards and Technology

The data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2022-07-29

Views: 0