U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

52 results found

Trojan Detection Software Challenge - image-classification-jun2020-train

Data provided by  National Institute of Standards and Technology

Round 1 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Comparison of primary laser spectroscopy and mass spectrometry methods for measuring mass concentration of gaseous elemental mercury

Data provided by  National Institute of Standards and Technology

Data for mass concentration analysis and spectral analysis for the paper titled, "Comparison of primary laser spectroscopy and mass spectrometry methods for measuring mass concentration of gaseous elemental mercury"

Tags: mercury,laser absorption spectroscopy,Standard Generator,SI traceability,ID-CV-ICP-MS,primary measurement method,Environment and Climate,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-jun2020-test

Data provided by  National Institute of Standards and Technology

Round 1 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-jun2020-holdout

Data provided by  National Institute of Standards and Technology

Round1 Holdout DatasetThe data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-aug2020-train

Data provided by  National Institute of Standards and Technology

Round 2 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

SRM 3133 Mercury (Hg) Standard Solution Lot No. 160921

Data provided by  National Institute of Standards and Technology

This Standard Reference Material (SRM) is intended for use as a primary calibration standard for the quantitative determination of mercury. A unit of SRM 3133 consists of five 10 mL sealed borosilicate glass ampoules of an acidified aqueous solution prepared gravimetrically to contain a known mass fraction of mercury. The solution contains nitric acid at an approximate mass fraction of 10 %. This data is public in the Certificate of Analysis for this material.

Tags: mercury,pure materials,cations,metals,single element solutions,spectrometry,Advanced Materials,

Modified: 2024-02-22

Views: 0

Albatross Species Chemical Database and Annotated Bibliography

Data provided by  National Institute of Standards and Technology

Database and annotated bibliography of contaminants in tissues from albatross (Family Diomedeidae) species. Database is saved as current Microsoft Access 365 .accdb file and a backward compatible to Access 2000 .mdb file and a Microsoft Excel .xlsx file which has the database output information, introduction with description of headers, and some derived data. A free viewer for Excel is at: https://www.microsoft.com/en-us/p/xlsx-viewer-free/9nblggh6hbf4?activet….

Tags: seabird,tissues,PAHs,PBDEs,PCBs,PCDDs,PCDF,perflourinated acids,phenols,toxicology pesticides,mercury,trace elements,heavy metals,organic,inorganic,chemistry,stable isotopes,Environment and Climate,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-train

Data provided by  National Institute of Standards and Technology

Round 3 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-aug2020-test

Data provided by  National Institute of Standards and Technology

Round 2 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-aug2020-holdout

Data provided by  National Institute of Standards and Technology

Round 2 Holdout DatasetThe data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0