Dataset Search
Sort By
Search results
85 results found
Trojan Detection Software Challenge - object-detection-jul2022-train
Data provided by National Institute of Standards and Technology
Round 10 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of object detection AIs trained on the COCO dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers. This dataset consists of 144 AI models using a small set of model architectures.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
XSLT Blender
Data provided by National Institute of Standards and Technology
Demonstrations and utilities using XSLT in the web browser. XSLT 1.0 is supported with no dependencies on external libraries. Source code is in XML, XSLT, Javascript and Typescript.
Tags: xml,XSLT,client-side processing,document processing,declarative programming,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - rl-lavaworld-jul2023-train
Data provided by National Institute of Standards and Technology
Round rl-lavaworld-jul2023-train Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of Reinforcement Learning agents trained to navigate the Lavaworld Minigrid environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - nlp-question-answering-aug2023-train
Data provided by National Institute of Standards and Technology
nlp-question-answering-aug2023-trainThis is the train data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - rl-randomized-lavaworld-aug2023-train
Data provided by National Institute of Standards and Technology
Round rl-randomized-lavaworld-aug2023-train Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of Reinforcement Learning agents trained to navigate the Lavaworld Minigrid environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Foreign Trade Zones Manufacturing (T/IM) Database
Data provided by International Trade Administration
This database allows the public to browse and search recent FTZ Board manufacturing approvals.
Tags: foreign trade zone,FTZ,manufacturing,
Modified: 2024-02-22
Views: 0
Cooperative Patent Classification (CPC) Master Classification File (MCF) for U.S. Patent Applications (2001 - Present)
Data provided by United States Patent and Trademark Office
Contains Cooperative Patent Classification (CPC) classification information for all Utility patent applications published by the U.S. Patent and Trademark Office (USPTO) from 2001 to present. It is available as XML with schemas or text monthly (usually by the 15th of the month).
Tags: ascii,xml,uspto,patent application,cooperative,class,classification,subclass,subclassification,
Modified: 2024-02-22
Views: 0
Cooperative Patent Classification (CPC) Master Classification File (MCF) for U.S. Patent Grants (1790 - Present)
Data provided by United States Patent and Trademark Office
Contains Cooperative Patent Classification (CPC) classification information for all Utility patent grants issued by the U.S. Patent and Trademark Office (USPTO) from 1790 to present. It is available as XML with schemas or text monthly (usually by the 15th of the month).
Tags: ascii,xml,uspto,patent,cooperative,class,classification,subclass,subclassification,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - nlp-sentiment-classification-mar2021-test
Data provided by National Institute of Standards and Technology
Round 5 Test DatasetThis is the test data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0
Trojan Detection Software Challenge - nlp-sentiment-classification-mar2021-holdout
Data provided by National Institute of Standards and Technology
Round 5 Holdout DatasetThis is the holdout data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform text sentiment classification on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2024-02-22
Views: 0