U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

55 results found

Trojan Detection Software Challenge - image-classification-sep2022-train

Data provided by  National Institute of Standards and Technology

Round 11 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of image classification AIs trained on synthetic image data build from Cityscapes. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers. This dataset consists of 288 AI models using a small set of model architectures.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

analphipy: A python package to analyze pair-potential metrics.

Data provided by  National Institute of Standards and Technology

`analphipy` is a python package to calculate metrics for classical models for pair potentials. It provides a simple and extendable api for pair potentials creation. Several routines to calculate metrics are included in the package. The main features of `analphipy` are 1) Pre-defined spherically symmetric potentials. 2) Simple interface to extended to user defined pair potentials. 3) Routines to calculate Noro-Frenkel effective parameters. 4) Routines to calculate Jensen-Shannon divergence.

Tags: python,statistical mechanics,

Modified: 2024-02-22

Views: 0

CyRSoXS: A GPU-accelerated virtual instrument for Polarized Resonant Soft X-ray Scattering (P-RSoXS)

Data provided by  National Institute of Standards and Technology

Polarized Resonant Soft X-ray scattering (P-RSoXS) has emerged as a powerful synchrotron-based tool to measure structure in complex, chemically heterogeneous systems. P-RSoXS combines principles of X-ray scattering and X-ray spectroscopy; this combination provides unique sensitivity to molecular orientation and chemical heterogeneity in soft materials such as polymers and biomaterials.

Tags: polymer,python,C++,CUDA,polymer nanocomposite,polymer solution,X-ray scattering,software,tool,computation,

Modified: 2024-02-22

Views: 0

tmmc-lnpy: A python package to analyze Transition Matrix Monte Carlo lnPi data.

Data provided by  National Institute of Standards and Technology

A python package to analyze ``lnPi`` data from Transition Matrix Monte Carlo(TMMC) simulation. The main output from TMMC simulations, ``lnPi``, provides a means to calculate a host of thermodynamicproperties. Moreover, if ``lnPi`` is calculated at a specific chemical potential, it can be reweighted to providethermodynamic information at a different chemical potential. The python package``tmmc-lnpy`` provides a wide array of routines to analyze ``lnPi`` data.

Tags: python,molecular simulation,data analysis,Transition Matrix Monte Carlo,statistical mechanics,

Modified: 2024-02-22

Views: 0

FCpy: Feldman-Cousins Confidence Interval Calculator

Data provided by  National Institute of Standards and Technology

Python scripts and Python+Qt graphical user interface for calculating Feldman-Cousins confidence intervals for low-count Poisson processes in the presence of a known background and for Gaussian processes with a physical lower limit of 0.

Tags: python,SIMS,statistics,mass spectrometry,Confidence Interval,CI,Feldman,Cousins,Poisson,Gaussian,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - object-detection-jul2022-train

Data provided by  National Institute of Standards and Technology

Round 10 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of object detection AIs trained on the COCO dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers. This dataset consists of 144 AI models using a small set of model architectures.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Entropy Source Validation Client

Data provided by  National Institute of Standards and Technology

This tool is a Python client that can interact with the NIST Entropy Source Validation Test System.

Tags: python,Entropy Source Validation Test System,NIST,CMVP,ESV Client,

Modified: 2024-02-22

Views: 0

Python tools for measuring filament defects in embedded 3D printing

Data provided by  National Institute of Standards and Technology

In embedded 3D printing, a nozzle is embedded into a support bath and extrudes filaments or droplets into the bath. This repository includes Python code for analyzing and managing images and videos of the printing process during extrusion of single filaments. The zip file contains the state of the code when the associated paper was submitted. The link to the GitHub page goes to version 1.0.0, which is the same as the code attached here. From there, you can also access the current state of the code.Associated with: L. Friedrich, R. Gunther, J.

Tags: python,digital image analysis,computer vision,3D printing,additive manufacturing,openCV,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-summary-jan2022-test

Data provided by  National Institute of Standards and Technology

Round 9 Test DatasetThis is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform one of three tasks, sentiment classification, named entity recognition, or extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-summary-jan2022-holdout

Data provided by  National Institute of Standards and Technology

Round 9 Holdout DatasetThis is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform one of three tasks, sentiment classification, named entity recognition, or extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0