U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Trojan Detection Software Challenge - Leftovers

This collection of AI models consists of the trained yet unreleased models constructed for the TrojAI program. These models were not required for the published round they come from for some reason. Some were simply extras, others did not meet the release criteria for accuracy or trojan attack success rate, or other reasons. These models should not be considered high quality. They might be poorly trained and unfit for their stated purpose. Examine the metadata released with each model to determine whether you can leverage it.

About this Dataset

Updated: 2025-09-09
Metadata Last Updated: 2025-03-17 00:00:00
Date Created: N/A
Data Provided by:
Dataset Owner: N/A

Access this data

Contact dataset owner Access URL
Table representation of structured data
Title Trojan Detection Software Challenge - Leftovers
Description This collection of AI models consists of the trained yet unreleased models constructed for the TrojAI program. These models were not required for the published round they come from for some reason. Some were simply extras, others did not meet the release criteria for accuracy or trojan attack success rate, or other reasons. These models should not be considered high quality. They might be poorly trained and unfit for their stated purpose. Examine the metadata released with each model to determine whether you can leverage it.
Modified 2025-03-17 00:00:00
Publisher Name National Institute of Standards and Technology
Contact mailto:[email protected]
Keywords Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;
{
    "identifier": "ark:\/88434\/mds2-3764",
    "accessLevel": "public",
    "contactPoint": {
        "hasEmail": "mailto:[email protected]",
        "fn": "Michael Paul Majurski"
    },
    "programCode": [
        "006:045"
    ],
    "landingPage": "",
    "title": "Trojan Detection Software Challenge - Leftovers",
    "description": "This collection of AI models consists of the trained yet unreleased models constructed for the TrojAI program. These models were not required for the published round they come from for some reason. Some were simply extras, others did not meet the release criteria for accuracy or trojan attack success rate, or other reasons. These models should not be considered high quality. They might be poorly trained and unfit for their stated purpose. Examine the metadata released with each model to determine whether you can leverage it.",
    "language": [
        "en"
    ],
    "distribution": [
        {
            "accessURL": "https:\/\/drive.google.com\/drive\/folders\/1aajbFNn3njowHsWDI4kJ4cfM3n_8rVTV?usp=sharing",
            "title": "TrojAI Leftovers"
        }
    ],
    "bureauCode": [
        "006:55"
    ],
    "modified": "2025-03-17 00:00:00",
    "publisher": {
        "@type": "org:Organization",
        "name": "National Institute of Standards and Technology"
    },
    "theme": [
        "Information Technology:Cybersecurity",
        "Information Technology:Software research"
    ],
    "keyword": [
        "Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;"
    ]
}