Dataset Search
Sort By
Search results
76 results found
Trojan Detection Software Challenge - nlp-sentiment-classification-apr2021-train part2
Data provided by National Institute of Standards and Technology
Round 6 Train Dataset part2This is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - nlp-sentiment-classification-apr2021-holdout
Data provided by National Institute of Standards and Technology
Round 6 Holdout DatasetThis is the holdout data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - nlp-named-entity-recognition-may2021-train
Data provided by National Institute of Standards and Technology
Round 7 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform named entity recognition (NER) on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Exoskeleton Performance Data
Data provided by National Institute of Standards and Technology
The National Institute of Standards and Technology, Intelligent Systems Division has collected data measuring human subjects, while performing common, simulated industrial manufacturing tasks with and without wearing an exoskeleton. Five tests were completed as part of a research study to develop measurement science towards standard test methods. For simulated industrial manufacturing tasks were performed using a novel, now standardized apparatus, called the Position and Load Test Apparatus for Exoskeletons (PoLoTAE).
Tags: Exoskeleton,Exosuits Research,Standard Test Methods,robotics,manufacturing,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - nlp-named-entity-recognition-may2021-test
Data provided by National Institute of Standards and Technology
Round 7 Test DatasetThis is the test data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform named entity recognition (NER) on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - nlp-named-entity-recognition-may2021-holdout
Data provided by National Institute of Standards and Technology
Round 7 Holdout DatasetThis is the holdout data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform named entity recognition (NER) on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - nlp-question-answering-sep2021-train
Data provided by National Institute of Standards and Technology
Round 8 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform extractive question answering (QA on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trademark Application Images (2009 - Present)
Data provided by United States Patent and Trademark Office
The 24 Hour Box zipfile contains images of daily Trademark applications in either JPG format (black and white, grayscale, or color) or TIFF format (black and white) processed through the Trademark Image Capture and Retrieval System (TICRS) and viewable using any standard image viewer. JPG images are accompanied by an XML file that contains text information about the application. TIFF images contain the application number embedded in the image (stamped prior to scan).
Tags: 24,uspto,applicant,application,box,commerce,hour,image,jpeg,jpg,supplemental,tiff,trademark,xml,
Modified: 2024-02-22
Views: 0
Trademark Application XML (1884 - Present)
Data provided by United States Patent and Trademark Office
Pending and registered trademark text data (no images) to include word mark, serial number, registration number, filing date, registration date, goods and services, classification number(s), status code(s), and design search code(s).
Tags: trademark,uspto,xml,application,classification number,design search code,filing date,goods and services,pending,registered,registration date,registration number,serial number,status code,word mark,
Modified: 2024-02-22
Views: 0
Trademark Assignment XML (1955 - Present)
Data provided by United States Patent and Trademark Office
Assignment (ownership) text data (no images).
Tags: trademark,uspto,xml,application,assignment,change,ownership,pending,recordation,registered,text,
Modified: 2024-02-22
Views: 0