U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

49 results found

Trojan Detection Software Challenge - nlp-sentiment-classification-mar2021-test

Data provided by  National Institute of Standards and Technology

Round 5 Test DatasetThis is the test data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-sentiment-classification-mar2021-holdout

Data provided by  National Institute of Standards and Technology

Round 5 Holdout DatasetThis is the holdout data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-sentiment-classification-apr2021-train

Data provided by  National Institute of Standards and Technology

Round 6 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-sentiment-classification-apr2021-test

Data provided by  National Institute of Standards and Technology

Round 6 Test DatasetThis is the test data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-sentiment-classification-apr2021-train part2

Data provided by  National Institute of Standards and Technology

Round 6 Train Dataset part2This is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-sentiment-classification-apr2021-holdout

Data provided by  National Institute of Standards and Technology

Round 6 Holdout DatasetThis is the holdout data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-sentiment-classification-mar2021-train

Data provided by  National Institute of Standards and Technology

Round 5 Train DatasetThe data being generated and disseminated is the train data used to construct trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Ideal-gas Thermochemical Properties for Carbon Dioxide and its Isotopologues Calculated from Partition Functions

Data provided by  National Institute of Standards and Technology

Tabulations at 1 K intervals from 1 K to 6000 K of the partition function and standard-state isobaric heat capacity, entropy, and enthalpy for the 12 natural isotopologues of CO2, along with their standard uncertainties. Calculations performed with a partition function constructed from spectroscopic and theoretical data as described in the Appendix of the paper by A.H. Harvey, S.A. Tashkun, and E.W. Lemmon, to be submitted to J. Phys. Chem. Ref. Data. Note that the model does not account for dissociation of the CO2 molecule, making the results incomplete above approximately 3500 K.

Tags: carbon dioxide,heat capacity,enthalpy,entropy,ideal-gas properties,equation of state,partition function,thermochemistry,

Modified: 2024-02-22

Views: 0

Absolute 13C/12C Isotope Amount Ratio for Vienna Pee Dee Belemnite from Infrared Absorption Spectroscopy

Data provided by  National Institute of Standards and Technology

Data set from peer-reviewed publication: A. J. Fleisher et al., Absolute 13C/12C Isotope Amount Ratio for Vienna Pee Dee Belemnite from Infrared Absorption Spectroscopy, Nature Physics. Measurements of isotope ratios are predominantly made with reference to standard specimens that have been characterized in the past. In the 1950s, the carbon isotope ratio was referenced to a belemnite sample collected by Heinz Lowenstam and Harold Urey in South Carolina?s Pee Dee region.

Tags: greenhouse gases,carbon dioxide,oceans,ph,marine mammals,remote sensing,seabirds,Environment and Climate,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-feb2021-test

Data provided by  National Institute of Standards and Technology

Round 4 Test DatasetThe data being generated and disseminated is the test data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0