U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

81 results found

Trojan Detection Software Challenge - rl-lavaworld-jul2023-train

Data provided by  National Institute of Standards and Technology

Round rl-lavaworld-jul2023-train Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of Reinforcement Learning agents trained to navigate the Lavaworld Minigrid environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-question-answering-aug2023-train

Data provided by  National Institute of Standards and Technology

nlp-question-answering-aug2023-trainThis is the train data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - rl-randomized-lavaworld-aug2023-train

Data provided by  National Institute of Standards and Technology

Round rl-randomized-lavaworld-aug2023-train Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of Reinforcement Learning agents trained to navigate the Lavaworld Minigrid environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Process-structure-properties investigations for laser powder bed fused IN718 in the as-built condition

Data provided by  National Institute of Standards and Technology

This data repository provides a central location for a body of work using one build of nickel-based alloy 718 (IN718) material and resulted in three different studies. The IN718 parts were manufactured by laser powder bed fusion using a range of laser energy densities (manipulation of processing variables) and orientations with respect to the build direction. The influence of processing variables on resulting grain structures, pore structures, and mechanical properties were studied in the as-built (not heat treated) condition.

Tags: additive manufacturing,Laser Powder Bed Fusion,Inconel 718,High-cycle fatigue life,Fractography,surface roughness,microstructure,defects,porosity,Tensile properties,Characterization,Ductile fracture,x-ray computed tomography,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-sentiment-classification-mar2021-test

Data provided by  National Institute of Standards and Technology

Round 5 Test DatasetThis is the test data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-sentiment-classification-mar2021-holdout

Data provided by  National Institute of Standards and Technology

Round 5 Holdout DatasetThis is the holdout data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-sentiment-classification-apr2021-train

Data provided by  National Institute of Standards and Technology

Round 6 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

MAUD-Tutorial Files for "MAUD Rietveld Refinement Software for Neutron Diffraction Texture Studies of Single and Dual-Phase Materials"

Data provided by  National Institute of Standards and Technology

This data set contains files included in the detailed instructional demonstration paper submitted to Integrating Materials and Manufacturing Innovation. The detailed instructional demonstration paper includes documentation detailing how to configure and carry out a repeatable Rietveld Refinement with the software MAUD. The data set provides: diffraction data from two different neutron diffraction measurements, crystallographic information files, and configuration files for the refinement process.

Tags: additive manufacturing,rietveld refinement,Titanium alloys,neutron diffraction,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-sentiment-classification-apr2021-test

Data provided by  National Institute of Standards and Technology

Round 6 Test DatasetThis is the test data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-sentiment-classification-apr2021-train part2

Data provided by  National Institute of Standards and Technology

Round 6 Train Dataset part2This is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0