U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

85 results found

Trojan Detection Software Challenge - nlp-named-entity-recognition-may2021-test

Data provided by  National Institute of Standards and Technology

Round 7 Test DatasetThis is the test data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform named entity recognition (NER) on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-named-entity-recognition-may2021-holdout

Data provided by  National Institute of Standards and Technology

Round 7 Holdout DatasetThis is the holdout data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform named entity recognition (NER) on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-question-answering-sep2021-train

Data provided by  National Institute of Standards and Technology

Round 8 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform extractive question answering (QA on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

MAM Consortium Interlaboratory Study Raw Data

Data provided by  National Institute of Standards and Technology

These LC-MS and LC-MS/MS raw data were collected for purposes of an interlaboratory study evaluating the multi-attribute method (MAM). Tryptic digests of native NISTmAb (the "Reference" and the "Unknown" samples), degraded NISTmAb (the "pH Stress" sample) and NISTmAb spiked with 15 heavy-labeled synthetic peptides (the "Spike" sample) were sent to each participating laboratory. One injection of each digest was acquired in MS-only mode, while a second injection was acquired in MS/MS mode.

Tags: attribute analytics,interlaboratory study,multi-attribute method,MAM Consortium,mass spectrometry,new peak detection,NPD,purity testing,round robin,targeted analytics,NISTmAb,

Modified: 2024-02-22

Views: 0

Measurement Dataset for A Wireless Gantry System

Data provided by  National Institute of Standards and Technology

This dataset includes the position data of a two-dimensional gantry system experiment in which the G-code commands for the gantry were transmitted through a wireless communications link. The testbed is composed of four main components related to the operation of the gantry system. These components are the gantry system, the Wi-Fi network, the RF channel emulator, and the supervisory computer. In the experimental study, we run a scenario in which the gantry tool moves sequentially between four positions and has a preset dwell at each of the positions.

Tags: wireless,manufacturing,cyber-physical systems,robotics,gantry,

Modified: 2024-02-22

Views: 0

NIST Inorganic Crystal Structure Database (ICSD)

Data provided by  National Institute of Standards and Technology

Materials discovery and development necessarily begins with the preparation and identification of product phase(s). Crystalline compounds can be identified by their characteristic diffraction patterns using X-rays, neutrons, and or electrons. An estimated 20,000 X-ray diffractometers and a comparable number of electron microscopes are used daily in materials research and development laboratories for this purpose.

Tags: chemical structures,crystallography,crystal structures,diffraction,disorder,electrons,identification,inorganic,neutrons,magnetic,metals,minerals,materials,Rietveld,synchrotron,twinned,x-rays,Advanced Materials,manufacturing,Safety,Security and Forensics,

Modified: 2024-02-22

Views: 0

Construction of a Dual-enzyme, Subzero (-30 degree C) Chromatography System and Multi-channel Precision Temperature Controller for Hydrogen-Deuterium Exchange Mass Spectrometry

Data provided by  National Institute of Standards and Technology

This tutorial provides mechanical drawings, electrical schematics, parts lists, STL files for 3D-printed parts, IGS files, and instructions for automated machining necessary for construction of a dual-protease, subzero, liquid chromatography system for hydrogen-deuterium exchange mass spectrometry. Electrical schematics for construction of a multi-zone temperature controller that regulate to ±0.1 oC are also included in this tutorial.

Tags: liquid chromatography,hydrogen-deuterium exchange,mass spectrometry,precision,peptide,protein,proteolysis,proteomics,reference material,temperature control.,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-jun2020-train

Data provided by  National Institute of Standards and Technology

Round 1 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Smart Investment Tool

Data provided by  National Institute of Standards and Technology

This tool calculates metrics for investment analysis documented in NIST Advanced manufacturing Series 200-5. It calculates net present value, internal rate of return, and payback period along with executing sensitivity analysis using Monte Carlo techniques. The tool helps to identify the most economical projects/investments. For instance, it could be used to identify the most economical heating and cooling system or it might be used to rank a set of potential investments.

Tags: net present value,internal rate of return,payback,investment,monte carlo,manufacturing,cost effective,economics,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-jun2020-test

Data provided by  National Institute of Standards and Technology

Round 1 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0