U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

76 results found

Trojan Detection Software Challenge - nlp-sentiment-classification-apr2021-train part2

Data provided by  National Institute of Standards and Technology

Round 6 Train Dataset part2This is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-sentiment-classification-apr2021-holdout

Data provided by  National Institute of Standards and Technology

Round 6 Holdout DatasetThis is the holdout data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-named-entity-recognition-may2021-train

Data provided by  National Institute of Standards and Technology

Round 7 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform named entity recognition (NER) on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Exoskeleton Performance Data

Data provided by  National Institute of Standards and Technology

The National Institute of Standards and Technology, Intelligent Systems Division has collected data measuring human subjects, while performing common, simulated industrial manufacturing tasks with and without wearing an exoskeleton. Five tests were completed as part of a research study to develop measurement science towards standard test methods. For simulated industrial manufacturing tasks were performed using a novel, now standardized apparatus, called the Position and Load Test Apparatus for Exoskeletons (PoLoTAE).

Tags: Exoskeleton,Exosuits Research,Standard Test Methods,robotics,manufacturing,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-named-entity-recognition-may2021-test

Data provided by  National Institute of Standards and Technology

Round 7 Test DatasetThis is the test data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform named entity recognition (NER) on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-named-entity-recognition-may2021-holdout

Data provided by  National Institute of Standards and Technology

Round 7 Holdout DatasetThis is the holdout data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform named entity recognition (NER) on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-question-answering-sep2021-train

Data provided by  National Institute of Standards and Technology

Round 8 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform extractive question answering (QA on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trademark Application Images (2009 - Present)

Data provided by  United States Patent and Trademark Office

The 24 Hour Box zipfile contains images of daily Trademark applications in either JPG format (black and white, grayscale, or color) or TIFF format (black and white) processed through the Trademark Image Capture and Retrieval System (TICRS) and viewable using any standard image viewer. JPG images are accompanied by an XML file that contains text information about the application. TIFF images contain the application number embedded in the image (stamped prior to scan).

Tags: 24,uspto,applicant,application,box,commerce,hour,image,jpeg,jpg,supplemental,tiff,trademark,xml,

Modified: 2024-02-22

Views: 0

Trademark Application XML (1884 - Present)

Data provided by  United States Patent and Trademark Office

Pending and registered trademark text data (no images) to include word mark, serial number, registration number, filing date, registration date, goods and services, classification number(s), status code(s), and design search code(s).

Tags: trademark,uspto,xml,application,classification number,design search code,filing date,goods and services,pending,registered,registration date,registration number,serial number,status code,word mark,

Modified: 2024-02-22

Views: 0

Trademark Assignment XML (1955 - Present)

Data provided by  United States Patent and Trademark Office

Assignment (ownership) text data (no images).

Tags: trademark,uspto,xml,application,assignment,change,ownership,pending,recordation,registered,text,

Modified: 2024-02-22

Views: 0