|
--- |
|
license: apache-2.0 |
|
language: |
|
- en |
|
--- |
|
|
|
# HardwarePhi 30k Iteration Result |
|
(have a upload issue, we would repair soon) |
|
## Overview |
|
|
|
This document presents the results of the HardwarePhi model after 30,000 iterations. The model is based on the Phi1.5B architecture (old version) and has been trained using a specific dataset. |
|
|
|
**Author:** |
|
- Weimin Fu from [Kansas State University's Hardware Security Group](https://ece.k-state.edu/research/hardware-security/) |
|
|
|
**Corresponding Author:** |
|
- Xiaolong Guo |
|
- E-mail: [email protected] |
|
|
|
**Acknowledgments:** |
|
- Common Crawl, CAD4Assurance, Trust-Hub, and open-source designers on GitHub and OpenCore support the data collection efforts. Their commitment to knowledge sharing is greatly appreciated. |
|
- Special thanks to Shijie Li and Yifang Zhao from the University of Science and Technology of China for their assistance in data collection. |
|
- Gratitude is extended to Kaichen Yang from the Electrical and Computer Engineering Department at Michigan Technological University for providing the training platform support. |
|
|
|
|
|
## Dataset |
|
|
|
The training was performed using the following dataset: |
|
- [Hardware Code and Security Median Dataset](https://huggingface.co/datasets/KSU-HW-SEC/hardware_code_and_sec_median) |
|
|
|
## Model Architecture |
|
|
|
The base model architecture used for this iteration is Phi1.5B (old version). This architecture provides the foundational structure and parameters for the HardwarePhi model. |
|
|
|
## Iteration Details |
|
|
|
- **Iteration Count**: 30,000 |
|
|
|
## Citation Information |
|
Please cite the following paper |
|
``` |
|
@article{fuhardware, |
|
title={Hardware Phi-1.5 B: A Large Language Model Encodes Hardware Domain Specific Knowledge}, |
|
author={Fu, Weimin and Li, Shijie and Zhao, Yifang and Ma, Haocheng and Dutta, Raj and Zhang, Xuan and Yang, Kaichen and Jin, Yier and Guo, Xiaolong}, |
|
journal={29th IEEE/ACM Asia and South Pacific Design Automation Conference (ASP-DAC)}, |
|
year={2024} |
|
} |
|
``` |
|
You can view the paper from arxiv: arxiv.org/abs/2402.01728 |
|
### Update from our group for Hardware domain-specific LLM: |
|
|
|
Blog: [Large Language Model for Hardware Security](https://ece.k-state.edu/research/hardware-security/llm.html) |
|
|
|
HomePage: [Hardware Security Lab](https://ece.k-state.edu/research/hardware-security/) |
|
|
|
|
|
## Acknowledgment |
|
Portions of this work were supported by the National Science Foundation (CCF-2019310, First Award Program of ARISE in EPSCoR 2148878). |
|
|
|
|
|
|