U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

76 results found

Trojan Detection Software Challenge - nlp-named-entity-recognition-may2021-holdout

Data provided by  National Institute of Standards and Technology

Round 7 Holdout DatasetThis is the holdout data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform named entity recognition (NER) on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-question-answering-sep2021-train

Data provided by  National Institute of Standards and Technology

Round 8 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform extractive question answering (QA on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

NIST Inorganic Crystal Structure Database (ICSD)

Data provided by  National Institute of Standards and Technology

Materials discovery and development necessarily begins with the preparation and identification of product phase(s). Crystalline compounds can be identified by their characteristic diffraction patterns using X-rays, neutrons, and or electrons. An estimated 20,000 X-ray diffractometers and a comparable number of electron microscopes are used daily in materials research and development laboratories for this purpose.

Tags: chemical structures,crystallography,crystal structures,diffraction,disorder,electrons,identification,inorganic,neutrons,magnetic,metals,minerals,materials,Rietveld,synchrotron,twinned,x-rays,Advanced Materials,manufacturing,Safety,Security and Forensics,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-jun2020-train

Data provided by  National Institute of Standards and Technology

Round 1 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

NeXLCore.jl - A library of basic physics for atomic X-ray processes in the Julia language

Data provided by  National Institute of Standards and Technology

NeXLCore.jl represents the basic physics related data and algorithms necessary to interpret and understand X-ray emission.

Tags: x-ray,physics,Energy,mass absorption,Ionization,bremsstrahlung,characteristic,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-jun2020-test

Data provided by  National Institute of Standards and Technology

Round 1 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-jun2020-holdout

Data provided by  National Institute of Standards and Technology

Round1 Holdout DatasetThe data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-aug2020-train

Data provided by  National Institute of Standards and Technology

Round 2 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

HVAC SIMulation PLUS other systems (HVACSIM+)

Data provided by  National Institute of Standards and Technology

The first version of HVACSIM+, which stands for "HVAC SIMulation PLUS other systems", was introduced by National Institute of Standards and Technology (NIST) in 1985 as a computer simulation tool to simulate entire building systems. Since then, the HVACSIM+ computer program package and manuals have been distributed to researchers, students, and consultants in more than 40 countries around the world.

Tags: Building control systems,Heating,ventilation and air conditioning equipment,Energy,Energy efficiency,cyber-physical systems,Modeling and simulation research and Numerical methods and software,

Modified: 2024-02-22

Views: 0

SRM 3104a Barium (Ba) Standard Solution Lot No. 140909

Data provided by  National Institute of Standards and Technology

This Standard Reference Material (SRM) is intended for use as a primary calibration standard for the quantitative determination of barium. A unit of SRM 3104a consists of five 10 mL sealed borosilicate glass ampoules of an acidified aqueous solution prepared gravimetrically to contain a known mass fraction of barium. The solution contains nitric acid at a volume fraction of approximately 1 %, which is equivalent to a concentration (molarity) of approximately 0.16 mol/L. This data is public in the Certificate of Analysis for this material.

Tags: barium,pure materials,cations,metals,single element solutions,spectrometry,Advanced Materials,

Modified: 2024-02-22

Views: 0