U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

81 results found

Trojan Detection Software Challenge - object-detection-jul2022-train

Data provided by  National Institute of Standards and Technology

Round 10 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of object detection AIs trained on the COCO dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers. This dataset consists of 144 AI models using a small set of model architectures.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Supplemental Data and Source Code for ILSA Research

Data provided by  National Institute of Standards and Technology

Source code associated with the Inverted Library Search Algorithm (ILSA) for identifying mixture components using is-CID mass spectra. This source code is frozen to accompany the manuscript titled "Updates to the Inverted Library Search Algorithm for mixture analysis" by Moorthy et. al.

Tags: mass spectrometry,Mixture Analysis,Search Algorithms,seized drug analysis,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-summary-jan2022-test

Data provided by  National Institute of Standards and Technology

Round 9 Test DatasetThis is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform one of three tasks, sentiment classification, named entity recognition, or extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-summary-jan2022-holdout

Data provided by  National Institute of Standards and Technology

Round 9 Holdout DatasetThis is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform one of three tasks, sentiment classification, named entity recognition, or extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

MAM Consortium Interlaboratory Study Raw Data

Data provided by  National Institute of Standards and Technology

These LC-MS and LC-MS/MS raw data were collected for purposes of an interlaboratory study evaluating the multi-attribute method (MAM). Tryptic digests of native NISTmAb (the "Reference" and the "Unknown" samples), degraded NISTmAb (the "pH Stress" sample) and NISTmAb spiked with 15 heavy-labeled synthetic peptides (the "Spike" sample) were sent to each participating laboratory. One injection of each digest was acquired in MS-only mode, while a second injection was acquired in MS/MS mode.

Tags: attribute analytics,interlaboratory study,multi-attribute method,MAM Consortium,mass spectrometry,new peak detection,NPD,purity testing,round robin,targeted analytics,NISTmAb,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-question-answering-sep2021-train

Data provided by  National Institute of Standards and Technology

Round 8 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform extractive question answering (QA on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

SRM 2969 Vitamin D Metabolites in Frozen Human Serum (Total 25-Hydroxyvitamin D Low Level) Data

Data provided by  National Institute of Standards and Technology

SRM 2969 Electronic files containing certified values and their uncertainties, and the data used to assign those values

Tags: vitamin D,25-hydroxyvitamin D,serum,mass spectrometry,

Modified: 2024-02-22

Views: 0

SRM 2970 Vitamin D Metabolites in Frozen Human Serum (25-Hydroxyvitamin D2 High Level) Data

Data provided by  National Institute of Standards and Technology

Electronic files containing certified values and their uncertainties, and the data used to assign those values.

Tags: vitamin D,25-hydroxyvitamin D,serum,mass spectrometry,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-named-entity-recognition-may2021-holdout

Data provided by  National Institute of Standards and Technology

Round 7 Holdout DatasetThis is the holdout data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform named entity recognition (NER) on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-named-entity-recognition-may2021-train

Data provided by  National Institute of Standards and Technology

Round 7 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform named entity recognition (NER) on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0