This collection of AI models consists of the trained yet unreleased models constructed for the TrojAI program. These models were not required for the published round they come from for some reason. Some were simply extras, others did not meet the release criteria for accuracy or trojan attack success rate, or other reasons. These models should not be considered high quality. They might be poorly trained and unfit for their stated purpose. Examine the metadata released with each model to determine whether you can leverage it.
About this Dataset
Title | Trojan Detection Software Challenge - Leftovers |
---|---|
Description | This collection of AI models consists of the trained yet unreleased models constructed for the TrojAI program. These models were not required for the published round they come from for some reason. Some were simply extras, others did not meet the release criteria for accuracy or trojan attack success rate, or other reasons. These models should not be considered high quality. They might be poorly trained and unfit for their stated purpose. Examine the metadata released with each model to determine whether you can leverage it. |
Modified | 2025-03-17 00:00:00 |
Publisher Name | National Institute of Standards and Technology |
Contact | mailto:[email protected] |
Keywords | Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning; |
{ "identifier": "ark:\/88434\/mds2-3764", "accessLevel": "public", "contactPoint": { "hasEmail": "mailto:[email protected]", "fn": "Michael Paul Majurski" }, "programCode": [ "006:045" ], "landingPage": "", "title": "Trojan Detection Software Challenge - Leftovers", "description": "This collection of AI models consists of the trained yet unreleased models constructed for the TrojAI program. These models were not required for the published round they come from for some reason. Some were simply extras, others did not meet the release criteria for accuracy or trojan attack success rate, or other reasons. These models should not be considered high quality. They might be poorly trained and unfit for their stated purpose. Examine the metadata released with each model to determine whether you can leverage it.", "language": [ "en" ], "distribution": [ { "accessURL": "https:\/\/drive.google.com\/drive\/folders\/1aajbFNn3njowHsWDI4kJ4cfM3n_8rVTV?usp=sharing", "title": "TrojAI Leftovers" } ], "bureauCode": [ "006:55" ], "modified": "2025-03-17 00:00:00", "publisher": { "@type": "org:Organization", "name": "National Institute of Standards and Technology" }, "theme": [ "Information Technology:Cybersecurity", "Information Technology:Software research" ], "keyword": [ "Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;" ] }