Center for Machine Learning and Intelligent Systems
About  Citation Policy  Donate a Data Set  Contact


Repository Web            Google
View ALL Data Sets

Browse Through:

Default Task - Undo

Classification (11)
Regression (5)
Clustering (6)
Other (0)

Attribute Type

Categorical (0)
Numerical (6)
Mixed (0)

Data Type - Undo

Multivariate (18)
Univariate (1)
Sequential (6)
Time-Series (11)
Text (5)
Domain-Theory (1)
Other (0)

Area - Undo

Life Sciences (0)
Physical Sciences (0)
CS / Engineering (6)
Social Sciences (0)
Business (3)
Game (0)
Other (1)

# Attributes

Less than 10 (0)
10 to 100 (4)
Greater than 100 (2)

# Instances - Undo

Less than 100 (0)
100 to 1000 (0)
Greater than 1000 (6)

Format Type - Undo

Matrix (6)
Non-Matrix (6)

6 Data Sets

Table View  List View


1. BLE RSSI Dataset for Indoor localization and Navigation: This dataset contains RSSI readings gathered from an array of Bluetooth Low Energy (BLE) iBeacons in a real-world and operational indoor environment for localization and navigation purposes.

2. Grammatical Facial Expressions: This dataset supports the development of models that make possible to interpret Grammatical Facial Expressions from Brazilian Sign Language (Libras).

3. UJIIndoorLoc-Mag: The UJIIndoorLoc-Mag is an indoor localization database to test Indoor Positioning System that rely on Earth's magnetic field variations.

4. Educational Process Mining (EPM): A Learning Analytics Data Set: Educational Process Mining data set is built from the recordings of 115 subjects' activities through a logging application while learning with an educational simulator.

5. detection_of_IoT_botnet_attacks_N_BaIoT: This dataset addresses the lack of public botnet datasets, especially for the IoT. It suggests *real* traffic data, gathered from 9 commercial IoT devices authentically infected by Mirai and BASHLITE.

6. Kitsune Network Attack Dataset: A cybersecurity dataset containing nine different network attacks on a commercial IP-based surveillance system and an IoT network. The dataset includes reconnaissance, MitM, DoS, and botnet attacks.


Supported By:

 In Collaboration With:

About  ||  Citation Policy  ||  Donation Policy  ||  Contact  ||  CML