Search Data.gov
Found 66776 dataset(s) matching "Inform".
-
HOTA-ReID is a modified version of the Higher Order Tracking Accuracy (HOTA) metric specifically designed to support Re-Identification (ReID) problems while providing significant performance...
-
Security automation reference data is currently housed within the National Vulnerability Database (NVD). The NVD is the U.S. Government repository of security automation data based on security...
-
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of instruction fine tuned LLMs. A known percentage of these...
-
Round 7 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs...
-
Round 6 Train Dataset part2This is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP)...
-
Round 6 Test DatasetThis is the test data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs...
-
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of models trained to predict whether code from public git...
-
Data and programs to evaluate tools according to the SATE VI Ockham Sound Analysis Criteria. The Criteria recognizes static analyzers whose findings are always correct.
-
This dataset was an initial test harness infrastructure test for the TrojAI program. It should not be used for research. Please use the more refined datasets generated for the other rounds. The...
-
This dataset contains 42 individual images that are part of a single sample. The individual images can be combined into a single image via image stitching. These data are provided as an example...
-
NFRL registers two fingerprint images based on a pair of corresponding control-points. It uses this control-pointpair of pixel locations within the images to translate and rotate the Moving image...
-
Round 7 Test DatasetThis is the test data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs...
-
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of instruction fine tuned LLMs. A known percentage of these...
-
Individual user responsibility: working data, derived data Data must be backed up using a tested/automated process: working data, derived data; published data resource data Not available to the...
-
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of RL agents operating in the Safety Gymnasium environment. A...
-
OSCAL Deep Diff is a CLI application and library that can produce schema-agnostic comparisons of JSON artifacts. The purpose of this tool is to compare OSCAL artifacts.
-
nlp-question-answering-aug2023-trainThis is the train data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs...
-
Round 12 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of pdf malware classification AIs trained...
-
TrojAI cyber-network-c2-feb2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and...
-
The BBC Land Girls TV series is a 3 season series. Each season is 5 episodes of about 45mins each. The TRECVID group at NIST worked with the BBC Corp. to release the dataset to the research...