1. SIFT10M: In SIFT10M, each data point is a SIFT feature which is extracted from Caltech-256 by the open source VLFeat library. The corresponding patches of the SIFT features are provided.
2. Deepfakes: Medical Image Tamper Detection: Medical deepfakes: CT scans of human lungs, where some have been tampered with cancer added/removed. Can you find them?
3. Swarm Behaviour: This dataset achieved from an online survey, which is run by UNSW, Australia. It contains three data of ' Flocking - Not Flocking', 'Aligned - Not Aligned', and 'Grouped - Not Grouped'.
4. Crop mapping using fused optical-radar data set: Combining optical and PolSAR remote sensing images offers a complementary data set with a significant number of temporal, spectral, textural, and polarimetric features for cropland classification.
5. Facebook Large Page-Page Network: This webgraph is a page-page graph of verified Facebook sites. Nodes represent official Facebook pages while the links are mutual likes between sites.
6. Weight Lifting Exercises monitored with Inertial Measurement Units: Six young health subjects were asked to perform 5 variations of the biceps curl weight lifting exercise. One of the variations is the one predicted by the health professional.
7. Malware static and dynamic features VxHeaven and Virus Total: 3 datasets: staDynBenignLab.csv, features extracted from 595 files (Win 7 and 8); staDynVxHeaven2698Lab.csv, from 2698 files of VxHeaven and staDynVt2955Lab.csv,from 2955 files of Virus Total.
8. Activity recognition using wearable physiological measurements: This dataset contains features from Electrocardiogram (ECG), Thoracic Electrical Bioimpedance (TEB) and the Electrodermal Activity (EDA) for activity recognition.
9. REALDISP Activity Recognition Dataset: The REALDISP dataset is devised to evaluate techniques dealing with the effects of sensor displacement in wearable activity recognition as well as to benchmark general activity recognition algorithms
10. Internet Advertisements: This dataset represents a set of possible advertisements on Internet pages.
11. ISOLET: Goal: Predict which letter-name was spoken--a simple classification task.
12. sEMG for Basic Hand movements: The sEMG for Basic Hand movements includes 2 databases of surface electromyographic signals of 6 hand movements using Delsys' EMG System. Healthy subjects conducted six daily life grasps.
13. Myocardial infarction complications: Prediction of myocardial infarction complications
14. Multiple Features: This dataset consists of features of handwritten numerals (`0'--`9') extracted from a collection of Dutch utility maps
15. Musk (Version 2): The goal is to learn to predict whether new molecules will be musks or non-musks
16. LastFM Asia Social Network: A social network of LastFM users from Asian countries. The related task is predicting the country of origin based on social relations and artists liked.
17. Smartphone-Based Recognition of Human Activities and Postural Transitions: Activity recognition data set built from the recordings of 30 subjects performing basic activities and postural transitions while carrying a waist-mounted smartphone with embedded inertial sensors.
18. LastFM Asia Social Network: A social network of LastFM users which was collected from the public API in March 2020.
19. Smartphone Dataset for Human Activity Recognition (HAR) in Ambient Assisted Living (AAL): This data is an addition to an existing dataset on UCI. We collected more data to improve the accuracy of our human activity recognition algorithms applied in the domain of Ambient Assisted Living.
20. TUANDROMD ( Tezpur University Android Malware Dataset): TUNADROMD dataset contains 4465 instances and 241 attributes. The target attribute for classification is a category (malware vs goodware). (N.B. This is the preprocessed version of TUANDROMD)
21. Dota2 Games Results: Dota 2 is a popular computer game with two teams of 5 players. At the start of the game each player chooses a unique hero with different strengths and weaknesses.
22. REWEMA: REWEMA (Retrieval of 32-bit Windows Architecture Executables Applied to Malware Analysis) can be used in Artificial intelligence-based antivirus.
23. REJAFADA : REJAFADA (Retrieval of Jar Files Applied to Dynamic Analysis) aims to be used, as benchmark, to check the quality of the detection of Jar malware.
24. Influenza outbreak event prediction via Twitter data: By identifying influenza-related tweets, the goal is to forecast the spatiotemporal patterns of influenza outbreaks for different locations and dates.
25. IDA2016Challenge: The dataset consists of data collected from heavy Scania trucks in everyday usage.
26. Character Font Images: Character images from scanned and computer generated fonts.
27. Dexter: DEXTER is a text classification problem in a bag-of-word representation. This is a two-class classification problem with sparse continuous input variables. This dataset is one of five datasets of the NIPS 2003 feature selection challenge.
28. Dorothea: DOROTHEA is a drug discovery dataset. Chemical compounds represented by structural molecular features must be classified as active (binding to thrombin) or inactive. This is one of 5 datasets of the NIPS 2003 feature selection challenge.
29. Gisette: GISETTE is a handwritten digit recognition problem. The problem is to separate the highly confusible digits '4' and '9'. This dataset is one of five datasets of the NIPS 2003 feature selection challenge.
30. Madelon: MADELON is an artificial dataset, which was part of the NIPS 2003 feature selection challenge. This is a two-class classification problem with continuous input variables. The difficulty is that the problem is multivariate and highly non-linear.
31. Semeion Handwritten Digit: 1593 handwritten digits from around 80 persons were scanned, stretched in a rectangular box 16x16 in a gray scale of 256 values.
32. URL Reputation: Anonymized 120-day subset of the ICML-09 URL data containing 2.4 million examples and 3.2 million features.
33. p53 Mutants: The goal is to model mutant p53 transcriptional activity (active vs inactive) based on data extracted from biophysical simulations.
34. Physical Unclonable Functions: The dataset is generated from Physical Unclonable Functions (PUFs) simulation, specifically XOR Arbiter PUFs. PUFs are used for authentication purposes. For more info, refer to our paper below.
35. Gas Sensor Array Drift Dataset: This archive contains 13910 measurements from 16 chemical sensors utilized in simulations for drift compensation in a discrimination task of 6 gases at various levels of concentrations.
36. OPPORTUNITY Activity Recognition: The OPPORTUNITY Dataset for Human Activity Recognition from Wearable, Object, and Ambient Sensors is a dataset devised to benchmark human activity recognition algorithms (classification, automatic data segmentation, sensor fusion, feature extraction, etc).
37. Nomao: Nomao collects data about places (name, phone, localization...) from many sources.
Deduplication consists in detecting what data refer to the same place.
Instances in the dataset compare 2 spots.
38. CNAE-9: This is a data set containing 1080 documents of free text business descriptions of Brazilian companies categorized into a
subset of 9 categories
39. Opinion Corpus for Lebanese Arabic Reviews (OCLAR): Opinion Corpus for Lebanese Arabic Reviews (OCLAR) corpus is utilizable for Arabic sentiment classification on services’ reviews, including hotels, restaurants, shops, and others.
40. QSAR oral toxicity: Data set containing values for 1024 binary attributes (molecular fingerprints) used to classify 8992 chemicals into 2 classes (very toxic/positive, not very toxic/negative)
41. QSAR androgen receptor: 1024 binary attributes (molecular fingerprints) used to classify 1687 chemicals into 2 classes (binder to androgen receptor/positive, non-binder to androgen receptor /negative)
42. SECOM: Data from a semi-conductor manufacturing process
43. Daily and Sports Activities: The dataset comprises motion sensor data of 19 daily and sports activities each performed by 8 subjects in their own style for 5 minutes. Five Xsens MTx units are used on the torso, arms, and legs.
44. YouTube Multiview Video Games Dataset: This dataset contains about 120k instances, each described by 13 feature types, with class information, specially useful for exploring multiview topics (cotraining, ensembles, clustering,..).
45. FMA: A Dataset For Music Analysis: FMA features 106,574 tracks and includes song title, album, artist, genres; play counts, favorites, comments; description, biography, tags; together with audio (343 days, 917 GiB) and features.
46. Epileptic Seizure Recognition: This dataset is a pre-processed and re-structured/reshaped version of a very commonly used dataset featuring epileptic seizure detection.
47. TTC-3600: Benchmark dataset for Turkish text categorization: The TTC-3600 data set is a collection of Turkish news and articles including categorized 3,600 documents from 6 well-known portals in Turkey. It has 4 different forms in ARFF Weka format.
48. detection_of_IoT_botnet_attacks_N_BaIoT: This dataset addresses the lack of public botnet datasets, especially for the IoT. It suggests *real* traffic data, gathered from 9 commercial IoT devices authentically infected by Mirai and BASHLITE.
49. Reuter_50_50: The dataset is used for authorship identification in online Writeprint which is a new research field of pattern recognition.
50. Human Activity Recognition Using Smartphones: Human Activity Recognition database built from the recordings of 30 subjects performing activities of daily living (ADL) while carrying a waist-mounted smartphone with embedded inertial sensors.
51. MEx: The MEx Multi-modal Exercise dataset contains data of 7 different
physiotherapy exercises, performed by 30 subjects recorded with 2 accelerometers,
a pressure mat and a depth camera.
52. Kitsune Network Attack Dataset: A cybersecurity dataset containing nine different network attacks on a commercial IP-based surveillance system and an IoT network. The dataset includes reconnaissance, MitM, DoS, and botnet attacks.
53. UJIIndoorLoc: The UJIIndoorLoc is a Multi-Building Multi-Floor indoor localization database to test Indoor Positioning System that rely on WLAN/WiFi fingerprint.
54. Condition monitoring of hydraulic systems: The data set addresses the condition assessment of a hydraulic test rig based on multi sensor data. Four fault types are superimposed with several severity grades impeding selective quantification.
55. Gas Sensor Array Drift Dataset at Different Concentrations: This archive contains 13910 measurements from 16 chemical sensors exposed to 6 different gases at various concentration levels.
56. NIPS Conference Papers 1987-2015: This data set contains the distribution of words in the full text of the NIPS conference papers published from 1987 to 2015.
57. Bag of Words: This data set contains five text collections in the form of bags-of-words.
58. Repeat Consumption Matrices: The dataset contains 7 datasets of User - Item matrices, where each entry represents how many times a user consumed an item. Item is used as an umbrella term for various categories.
59. Anonymous Microsoft Web Data: Log of anonymous users of www.microsoft.com; predict areas of the web site a user visited based on data on other areas the user visited.
60. BlogFeedback: Instances in this dataset contain features extracted from blog posts. The task associated with the data is to predict how many comments the post will receive.
61. KDD Cup 1998 Data: This is the data set used for The Second International Knowledge Discovery and Data Mining Tools Competition, which was held in conjunction with KDD-98
62. Communities and Crime: Communities within the United States. The data combines socio-economic data from the 1990 US Census, law enforcement data from the 1990 US LEMAS survey, and crime data from the 1995 FBI UCR.
63. Communities and Crime Unnormalized: Communities in the US. Data combines socio-economic data from the '90 Census, law enforcement data from the 1990 Law Enforcement Management and Admin Stats survey, and crime data from the 1995 FBI UCR
64. Amazon Access Samples: Amazon's InfoSec is getting smarter about the way Access data is leveraged. This is an anonymized sample of access provisioned within the company.