Dataset Search
Sort By
Search results
38 results found
Trojan Detection Software Challenge - rl-randomized-lavaworld-aug2023-train
Data provided by National Institute of Standards and Technology
Round rl-randomized-lavaworld-aug2023-train Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of Reinforcement Learning agents trained to navigate the Lavaworld Minigrid environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2025-04-06
Trojan Detection Software Challenge - nlp-question-answering-aug2023-train
Data provided by National Institute of Standards and Technology
nlp-question-answering-aug2023-trainThis is the train data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2025-04-06
Trojan Detection Software Challenge - rl-lavaworld-jul2023-train
Data provided by National Institute of Standards and Technology
Round rl-lavaworld-jul2023-train Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of Reinforcement Learning agents trained to navigate the Lavaworld Minigrid environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2025-04-06
Trojan Detection Software Challenge - cyber-apk-nov2023-train
Data provided by National Institute of Standards and Technology
TrojAI cyber-apk-nov2023 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of small feed forward multi-layer perceptron type neural network models classifying APK feature vectors as malware or clean. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2025-04-06
Trojan Detection Software Challenge - cyber-network-c2-feb2024-train
Data provided by National Institute of Standards and Technology
TrojAI cyber-network-c2-feb2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and ResNet34 neural network models that classify botnet command and control (c2) and benign network traffic packets trained on the USTC-TFC2016 dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2025-04-06
4D-STEM characterization results from a thermal annealing series of poly(3[2-(2-methoxyethoxy)ethoxy]-methylthiophene-2,5-diyl) organic electrochemical transistor films
Data provided by National Institute of Standards and Technology
This repository contains two types of datasets: 4D-STEM data collected from a thermal annealing series of P3MEEMT films. 4D-STEM data:Dose series: Collected from P3MEEMT film annealed at 115 C. Each HDF5 file was generated from the raw data using the fpdpy software package to reshape and embed metadata. No other preprocessing was performed. Annealing series: Collected from P3MEEMT films annealed at 75 C, 115 C, 145 C, and 175 C. Each temperature contains two sets of 4D-STEM data collected at low and high magnification.
Tags: Advanced Materials,Organic Semiconductors,4D-STEM,OECT,TEM,GIWAXS,
Modified: 2025-04-06
Trojan Detection Software Challenge - object-detection-feb2023-train
Data provided by National Institute of Standards and Technology
Round 13 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of object detection AIs trained both on synthetic image data build from Cityscapes and the DOTA_v2 dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers. This dataset consists of 128 AI models using a small set of model architectures.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2025-04-06
Trojan Detection Software Challenge - cyber-pdf-dec2022-train
Data provided by National Institute of Standards and Technology
Round 12 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of pdf malware classification AIs trained Contaigio dataset feature vectors. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers. This dataset consists of 120 AI models using a small set of model architectures.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2025-04-06
Trojan Detection Software Challenge - image-classification-sep2022-train
Data provided by National Institute of Standards and Technology
Round 11 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of image classification AIs trained on synthetic image data build from Cityscapes. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers. This dataset consists of 288 AI models using a small set of model architectures.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2025-04-06
Thermal Conductivity of Binary Mixtures of 1,1,1,2-Tetrafluoroethane(R-134a), 2,3,3,3-Tetrafluoropropene (R-1234yf), and trans-1,3,3,3-Tetrafluoropropene (R-1234ze(E)) Refrigerants
Data provided by National Institute of Standards and Technology
Workflow: The data that falls into this category are gathered from a measurement program and are published in the archival literature.
Tags: Advanced Materials,Energy,Environment and Climate,Physical Infrastructure,Safety,Security and Forensics,
Modified: 2025-04-06