U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

83 results found

Trojan Detection Software Challenge - rl-randomized-lavaworld-aug2023-train

Data provided by  National Institute of Standards and Technology

Round rl-randomized-lavaworld-aug2023-train Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of Reinforcement Learning agents trained to navigate the Lavaworld Minigrid environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-question-answering-aug2023-train

Data provided by  National Institute of Standards and Technology

nlp-question-answering-aug2023-trainThis is the train data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - rl-lavaworld-jul2023-train

Data provided by  National Institute of Standards and Technology

Round rl-lavaworld-jul2023-train Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of Reinforcement Learning agents trained to navigate the Lavaworld Minigrid environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Sim-PROCESD: Simulated-Production Resource for Operations and Conditions Evaluation to Support Decision-making

Data provided by  National Institute of Standards and Technology

Sim-PROCESD is a discrete event simulation package written in Python that is designed to model the behavior of discrete manufacturing systems. Specifically, it focuses on asynchronous production lines. It also provides functionality for modeling the degradation and maintenance of machines in these systems. Sim-PROCESD provides class definitions for manufacturing devices/components that can be configured by the user to model various real-world manufacturing systems.

Tags: discrete-event simulation,manufacturing,production,maintenance,python,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - object-detection-feb2023-train

Data provided by  National Institute of Standards and Technology

Round 13 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of object detection AIs trained both on synthetic image data build from Cityscapes and the DOTA_v2 dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers. This dataset consists of 128 AI models using a small set of model architectures.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Hestia Fossil Fuel Carbon Dioxide Emissions Inventory for Urban Regions

Data provided by  National Institute of Standards and Technology

Hestia Fossil Fuel Carbon Dioxide Emissions Inventory for Urban Regions (Hestia FFCO2) provides data products for Los Angeles Basin, Northeast corridor, Indianapolis, and other U.S. Cities. Hestia FFCO2 datasets quantify greenhouse gases (GHG), such as carbon dioxide, emitted by urban regions, since cities are major contributors of anthropogenic GHG emissions. The Hestia FFCO2 datasets provide high spatial and temporal resolution CO2 concentrations at sub-county resolutions and annual/hourly time scales, specific to the region.

Tags: Greenhouse Gas,carbon dioxide,CO2,Urban Emissions,Carbon Monitoring,Atmospheric Modeling,Los Angeles Basin,Megacities,California,Indianapolis,Indiana,Baltimore,Maryland,Salt Lake City,Utah,Fossil Fuel,Bottom-up Inventory,

Modified: 2024-02-22

Views: 0

Thermal Drift Monitoring Experiment 01

Data provided by  National Institute of Standards and Technology

An experiment was set up within a machine tool at the National Institute of Standards and Technology (NIST) to test vision-based thermal drift tracking methods. A wireless microscope within a tool holder in the spindle is used to capture videos of image targets attached to the worktable. For each target, one video is captured during spindle rotation orthogonal to the worktable and another video is captured during axis translation orthogonal to the worktable.

Tags: Thermal error,machine tool,monitoring,manufacturing,Microscope,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - cyber-pdf-dec2022-train

Data provided by  National Institute of Standards and Technology

Round 12 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of pdf malware classification AIs trained Contaigio dataset feature vectors. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers. This dataset consists of 120 AI models using a small set of model architectures.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-sep2022-train

Data provided by  National Institute of Standards and Technology

Round 11 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of image classification AIs trained on synthetic image data build from Cityscapes. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers. This dataset consists of 288 AI models using a small set of model architectures.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Thermodynamic Data from Unpublished Sources to Support the New Reference Equation of State for Carbon Dioxide

Data provided by  National Institute of Standards and Technology

During work on the new reference equation of state for carbon dioxide [A.H. Harvey, S.A. Tashkun, R. Hellmann, and E.W. Lemmon, J. Phys. Chem. Ref. Data, in preparation], we obtained unpublished data from several sources. These represent numerical values for data only presented graphically in a publication, or in some cases data not present in the publication at all. With the permission of the authors, we document and deposit these data here so they will be available for future workers.

Tags: CO2,carbon dioxide,thermodynamics,melting,heat capacity,sound speed,vapor pressure,virial coefficients,equation of state,

Modified: 2024-02-22

Views: 0