U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

70 results found

Trojan Detection Software Challenge - nlp-named-entity-recognition-may2021-test

Data provided by  National Institute of Standards and Technology

Round 7 Test DatasetThis is the test data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform named entity recognition (NER) on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-named-entity-recognition-may2021-holdout

Data provided by  National Institute of Standards and Technology

Round 7 Holdout DatasetThis is the holdout data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform named entity recognition (NER) on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-question-answering-sep2021-train

Data provided by  National Institute of Standards and Technology

Round 8 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform extractive question answering (QA on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Datasets from an interlaboratory comparison to characterize a multi-modal polydisperse sub-micrometer bead dispersion

Data provided by  National Institute of Standards and Technology

These four data files contain datasets from an interlaboratory comparison that characterized a polydisperse five-population bead dispersion in water. A more detailed version of this description is available in the ReadMe file (PdP-ILC_datasets_ReadMe_v1.txt), which also includes definitions of abbreviations used in the data files. Paired samples were evaluated, so the datasets are organized as pairs associated with a randomly assigned laboratory number.

Tags: Biosciences and Health,particle,protein particle,sub-micrometer particle,subvisible particle,particle tracking analysis,resonant mass measurement,electrical sensing zone,holographic particle characterization,flow imaging,laser diffraction,flow cytometry,

Modified: 2024-02-22

Views: 0

NIST Inorganic Crystal Structure Database (ICSD)

Data provided by  National Institute of Standards and Technology

Materials discovery and development necessarily begins with the preparation and identification of product phase(s). Crystalline compounds can be identified by their characteristic diffraction patterns using X-rays, neutrons, and or electrons. An estimated 20,000 X-ray diffractometers and a comparable number of electron microscopes are used daily in materials research and development laboratories for this purpose.

Tags: chemical structures,crystallography,crystal structures,diffraction,disorder,electrons,identification,inorganic,neutrons,magnetic,metals,minerals,materials,Rietveld,synchrotron,twinned,x-rays,Advanced Materials,manufacturing,Safety,Security and Forensics,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-jun2020-train

Data provided by  National Institute of Standards and Technology

Round 1 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Aggregation of Purified Protein Reference Materials Characterized by Asymmetric Flow Field Flow Fractionation

Data provided by  National Institute of Standards and Technology

This is a file containing aggregation data for two proteins that were thermomechanically aggregated. The aggregated proteins were separated by asymmetric flow field flow fractionation and separated protein fractions were detected and quantified by UV spectrophotometry and multi-angle light scattering. The UV spectrophotometry was used to quantify the amount of residual monomer, which is reported herein. The multi-angle light scattering was fitted to a relevant model to calculate the molecular weight of the aggregated protein, also reported herein.

Tags: electrical sensing zone,flow imaging,light obscuration,particle,protein aggregate,protein particle,subvisible particle,visible particle,Biosciences and Health,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-jun2020-test

Data provided by  National Institute of Standards and Technology

Round 1 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-jun2020-holdout

Data provided by  National Institute of Standards and Technology

Round1 Holdout DatasetThe data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-aug2020-train

Data provided by  National Institute of Standards and Technology

Round 2 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0