Upload Data to ArchivesΒΆ
Upload your test data to the archives linked to each phase of your challenge. Make sure to follow the input socket definitions for each phase to ensure compatibility with the evaluation system.
The Starter Pack, available from the Challenge Admin page, includes example scripts to help you upload your data correctly using the appropriate socket structure. If the algorithms should accept a single image input, it might be easiest to upload the data through our UI on the archive page itself. If your algorithms take complex inputs (e.g. an image together with a segmentation mask, or some metadata) you are best advised to use our API client for uploading.
The challenge phase Starter Kit contains an upload script you can use as starting point. Note that you only upload the secret test data to the archive, not the public training data and also not the ground truth.
Grand-Challenge is generally not the place where you provide training data. See the page on data-storage for suggestions for sharing your data.
π Note: Archives are created by the support team. If you haven't received them or if there's a delay, please contact us at support@grand-challenge.org.
Deadline: 5 weeks post-challenge acceptance
Keeping your data safe and secureΒΆ
Data stored on grand-challenge.org is safeguarded with robust security measures, ensuring confidentiality, integrity, and accessibility. All data is hosted in Amazon Web Services (AWS) S3 buckets, a highly secure and reliable storage service. Data is encrypted both in transit using secure communication protocols and at rest with advanced encryption standards. Access is strictly controlled, with permissions granted only to individuals explicitly authorized by the data owner. Additionally, AWS provides comprehensive compliance certifications, including GDPR, HIPAA, and ISO 27001, ensuring that all data handling adheres to industry-leading security and privacy standards. This layered approach guarantees that sensitive information, such as medical images, annotations, and associated files, remains protected against unauthorized access or breaches. For more information, visit the AWS compliance page.