wf8888884's picture
Update README.md
1f3cc50 verified
---
license: apache-2.0
language:
- en
---
# HardwarePhi 30k Iteration Result
(have a upload issue, we would repair soon)
## Overview
This document presents the results of the HardwarePhi model after 30,000 iterations. The model is based on the Phi1.5B architecture (old version) and has been trained using a specific dataset.
**Author:**
- Weimin Fu from [Kansas State University's Hardware Security Group](https://ece.k-state.edu/research/hardware-security/)
**Corresponding Author:**
- Xiaolong Guo
- E-mail: [email protected]
**Acknowledgments:**
- Common Crawl, CAD4Assurance, Trust-Hub, and open-source designers on GitHub and OpenCore support the data collection efforts. Their commitment to knowledge sharing is greatly appreciated.
- Special thanks to Shijie Li and Yifang Zhao from the University of Science and Technology of China for their assistance in data collection.
- Gratitude is extended to Kaichen Yang from the Electrical and Computer Engineering Department at Michigan Technological University for providing the training platform support.
## Dataset
The training was performed using the following dataset:
- [Hardware Code and Security Median Dataset](https://huggingface.co/datasets/KSU-HW-SEC/hardware_code_and_sec_median)
## Model Architecture
The base model architecture used for this iteration is Phi1.5B (old version). This architecture provides the foundational structure and parameters for the HardwarePhi model.
## Iteration Details
- **Iteration Count**: 30,000
## Citation Information
Please cite the following paper
```
@article{fuhardware,
title={Hardware Phi-1.5 B: A Large Language Model Encodes Hardware Domain Specific Knowledge},
author={Fu, Weimin and Li, Shijie and Zhao, Yifang and Ma, Haocheng and Dutta, Raj and Zhang, Xuan and Yang, Kaichen and Jin, Yier and Guo, Xiaolong},
journal={29th IEEE/ACM Asia and South Pacific Design Automation Conference (ASP-DAC)},
year={2024}
}
```
You can view the paper from arxiv: arxiv.org/abs/2402.01728
### Update from our group for Hardware domain-specific LLM:
Blog: [Large Language Model for Hardware Security](https://ece.k-state.edu/research/hardware-security/llm.html)
HomePage: [Hardware Security Lab](https://ece.k-state.edu/research/hardware-security/)
## Acknowledgment
Portions of this work were supported by the National Science Foundation (CCF-2019310, First Award Program of ARISE in EPSCoR 2148878).