U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

54 results found

SRM 131h Refined Cast Iron

Data provided by  National Institute of Standards and Technology

Standard Reference Material 131h Refined Cast Iron - This Standard Reference Material (SRM) is intended primarily for use in validation of chemical and instrumental methods of analysis. It can be used to validate value assignment of in-house reference materials and, if necessary, to calibrate carbon/sulfur analyzers. A unit of SRM 131h consists of a bottle containing 100 g of chips. This data is public in the Certificate of Analysis for this material.

Tags: low alloy steel,cast iron,carbon,sulfur,Standard Reference Material,SRM,SRM 131h,combustion,infrared detection,manufacturing specification,manufacturing,

Modified: 2024-02-22

Views: 0

NIST Atomic Spectra Database - SRD 78

Data provided by  National Institute of Standards and Technology

This database provides access and search capability for NIST critically evaluated data on atomic energy levels, wavelengths, and transition probabilities that are reasonably up-to-date. The Atomic Spectroscopy Data Center has carried out these critical compilations. The Data Center is located in the Physical Measurement Laboratory at the National Institute of Standards and Technology (NIST).

Tags: cesium,chlorine,chromium,cobalt,columbium,copernicium,copper,curium,darmstadtium,database,deuterium,doubly-charged,dubnium,dysprosium,einsteinium,element,energy levels,erbium,europium,fermium,flerovium,fluorine,francium,gadolinium,gallium,germanium,gold,ground states,hafnium,hassium,helium,holmium,hydrogen,indium,iodine,ionization potentials,ionization-energies,ionization-limits,ionized-atoms,iridium,iron,mendelevium,mercury,molybdenum,multiply-charged,neodymium,neon,neptunium,neutral,nickel,niobium,nitrogen,nobelium,osmium,oxygen,palladium,phosphorus,platinum,plutonium,polonium,potassium,praseodymium,promethium,protactinium,quadruply-charged,radium,rhenium,rhodium,roentgenium,rubidium,ruthenium,rutherfordium,samarium,scandium,seaborgium,selenium,silicium,silicon,silver,singly-charged,sodium,spectra,spectral lines,spectroscopy,spectrum,strontium,sulfur,sulphur,tantalum,technetium,tellurium,terbium,thallium,thorium,thulium,tin,titanium,transition probabilities,triply-charged,tritium,tungsten,ununbium,ununhexium,ununoctium,ununpentium,ununquadium,ununseptium,ununtrium,unununium,uranium,vanadium,wavelengths,xenon,ytterbium,yttrium,zinc,zirconium,krypton,kurchatovium,lawrencium,lanthanum,lead,lithium,livermorium,lutetium,magnesium,manganese,meitnerium,Atomic,Atomic Spectroscopy,Radon,actinium,aluminium,aluminum,americium,antimony,argon,arsenic,astatine,atom,atomic physics,atomic property,atomic-ions,barium,berkelium,beryllium,bismuth,bohrium,boron,bromine,cadmium,calcium,californium,carbon,cerium,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-jun2020-test

Data provided by  National Institute of Standards and Technology

Round 1 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-jun2020-train

Data provided by  National Institute of Standards and Technology

Round 1 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-jun2020-holdout

Data provided by  National Institute of Standards and Technology

Round1 Holdout DatasetThe data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-aug2020-train

Data provided by  National Institute of Standards and Technology

Round 2 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-test

Data provided by  National Institute of Standards and Technology

Round 3 Test DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-holdout

Data provided by  National Institute of Standards and Technology

Round 3 Holdout DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-train

Data provided by  National Institute of Standards and Technology

Round 3 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-aug2020-test

Data provided by  National Institute of Standards and Technology

Round 2 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0