This contains the dataset for the Final Round of the Trojan Detection Challenge NeurIPS 2022 competition. To learn more, please see the competition website
Trojan attacks are the most common and serious threat to network users. It is a progr...
The data consists of a collection of ICPC programming competition results. It contains information a...
These datasets were used to perform experiments with machine learning models aimed to detect hacker ...
This contains the dataset for the detection track of the Trojan Detection Challenge NeurIPS 2022 com...
This contains the datasets for the Trojan Detection Challenge NeurIPS 2022 competition. To learn mor...
(Deprecated; models have been moved to Hugging Face) This contains data for the Trojan Detection Tr...
The dataset is used for research study for intelligent phishing detection based on 35 features of im...
This dataset includes all quantitative results of all metrics for challengers of the MICCAI MSSEG2 2...
This is the dataset for 2023 Cephalometric Landmark Detection Challenge (CL-Detection2023). Each tea...
The dataset comprises phishing and legitimate web pages, which have been used for experiments on ear...
Malware attack cases continue to rise in our current day. The Trojan attack, which may be extremely ...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
In the cyber domain, situational awareness of the critical assets is extremely important. For achiev...
In todays era the need of security is raising due to hike in security risks discovered every day. A ...
Vehicular Ad hoc Networks (VANETs) are the core of Intelligent Transportation Systems (ITS), allowin...
Trojan attacks are the most common and serious threat to network users. It is a progr...
The data consists of a collection of ICPC programming competition results. It contains information a...
These datasets were used to perform experiments with machine learning models aimed to detect hacker ...
This contains the dataset for the detection track of the Trojan Detection Challenge NeurIPS 2022 com...
This contains the datasets for the Trojan Detection Challenge NeurIPS 2022 competition. To learn mor...
(Deprecated; models have been moved to Hugging Face) This contains data for the Trojan Detection Tr...
The dataset is used for research study for intelligent phishing detection based on 35 features of im...
This dataset includes all quantitative results of all metrics for challengers of the MICCAI MSSEG2 2...
This is the dataset for 2023 Cephalometric Landmark Detection Challenge (CL-Detection2023). Each tea...
The dataset comprises phishing and legitimate web pages, which have been used for experiments on ear...
Malware attack cases continue to rise in our current day. The Trojan attack, which may be extremely ...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
In the cyber domain, situational awareness of the critical assets is extremely important. For achiev...
In todays era the need of security is raising due to hike in security risks discovered every day. A ...
Vehicular Ad hoc Networks (VANETs) are the core of Intelligent Transportation Systems (ITS), allowin...
Trojan attacks are the most common and serious threat to network users. It is a progr...
The data consists of a collection of ICPC programming competition results. It contains information a...
These datasets were used to perform experiments with machine learning models aimed to detect hacker ...