Dataset Search
Sort By
Search results
61 results found
Variation of Surface Topography in Laser Powder Bed Fusion Additive Manufacturing of Nickel Super Alloy 625
Data provided by National Institute of Standards and Technology
This dataset provides surface height data from nickel super alloy 625 experiment samples built through laser powder bed fusion additive manufacturing. The experiment methodically varied part position and orientation relative to the build plate and recoater blade and details of the experiment and dataset are available in a Journal of Research at NIST article.
Tags: additive manufacturing,focus variation,IN625,Laser Powder Bed Fusion,nickel super alloy 625,surface texture,surface topography,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-dec2020-train
Data provided by National Institute of Standards and Technology
Round 3 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-aug2020-test
Data provided by National Institute of Standards and Technology
Round 2 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-aug2020-holdout
Data provided by National Institute of Standards and Technology
Round 2 Holdout DatasetThe data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-dec2020-test
Data provided by National Institute of Standards and Technology
Round 3 Test DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-dec2020-holdout
Data provided by National Institute of Standards and Technology
Round 3 Holdout DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-feb2021-train
Data provided by National Institute of Standards and Technology
Round 4 Train DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Additively manufactured CoCr lattice artifact -- 3D design
Data provided by National Institute of Standards and Technology
SolidWorks Part file (CAD file) for a CoCr "lattice" structure additively manufactured in a laser bed powder fusion (LPBF) system at NIST.
Tags: additive manufacturing,CoCr,lattice structure,CAD drawing,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-feb2021-test
Data provided by National Institute of Standards and Technology
Round 4 Test DatasetThe data being generated and disseminated is the test data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-feb2021-holdout
Data provided by National Institute of Standards and Technology
Round 4 Holdout DatasetThe data being generated and disseminated is the holdout data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0