Dataset Search
Sort By
Search results
64 results found
SRM 3532 Calcium-Containing Solid Oral Dosage Form
Data provided by National Institute of Standards and Technology
SRM 3532 Calcium-Containing Solid Oral Dosage Form - This Standard Reference Material (SRM) is intended primarily for validation of methods for determining cholecalciferol (vitamin D3) and elements in a calcium dietary supplement and similar materials. This SRM can also be used for quality assurance when assigning values to in-house reference materials. A unit of SRM 3532 consists of five packets, each containing approximately 10 g of material. This data is public in the Certificate of Analysis for this material.
Tags: Standard Reference materials,SRM,SRM 3532,calcium supplement,food,nutrition,dietary supplements,certified value,reference value,Food and Nutrition,
Modified: 2024-02-22
Views: 0
Certified values of iodine in CRMs of food matrices in mg/kg units. The uncertainties are expanded uncertainties at approximately 95% confidence.
Data provided by National Institute of Standards and Technology
A comparison of the expanded uncertainty for certified values of iodine in food matrix CRMs. The CRMS were found by searching The European Virtual Institute for Speciation Analysis (EVISA) database using the terms "Iodine" and "Certified" in the Material category. The uncertainties are expanded uncertainties at approximately 95% confidence.
Tags: food,nutrition,dietary supplements,Standard Reference materials,reference materials,SRM,RM,Food and Nutrition,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-dec2020-train
Data provided by National Institute of Standards and Technology
Round 3 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-aug2020-test
Data provided by National Institute of Standards and Technology
Round 2 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-aug2020-holdout
Data provided by National Institute of Standards and Technology
Round 2 Holdout DatasetThe data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-dec2020-test
Data provided by National Institute of Standards and Technology
Round 3 Test DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-dec2020-holdout
Data provided by National Institute of Standards and Technology
Round 3 Holdout DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-feb2021-train
Data provided by National Institute of Standards and Technology
Round 4 Train DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-feb2021-test
Data provided by National Institute of Standards and Technology
Round 4 Test DatasetThe data being generated and disseminated is the test data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - image-classification-feb2021-holdout
Data provided by National Institute of Standards and Technology
Round 4 Holdout DatasetThe data being generated and disseminated is the holdout data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0