jimmydzj2006
commited on
Commit
•
63ea6db
1
Parent(s):
eb8018a
Add new SentenceTransformer model
Browse files- 1_Pooling/config.json +10 -0
- README.md +843 -0
- config.json +26 -0
- config_sentence_transformers.json +12 -0
- model.safetensors +3 -0
- modules.json +20 -0
- sentence_bert_config.json +4 -0
- special_tokens_map.json +37 -0
- tokenizer.json +0 -0
- tokenizer_config.json +64 -0
- vocab.txt +0 -0
1_Pooling/config.json
ADDED
@@ -0,0 +1,10 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"word_embedding_dimension": 384,
|
3 |
+
"pooling_mode_cls_token": true,
|
4 |
+
"pooling_mode_mean_tokens": false,
|
5 |
+
"pooling_mode_max_tokens": false,
|
6 |
+
"pooling_mode_mean_sqrt_len_tokens": false,
|
7 |
+
"pooling_mode_weightedmean_tokens": false,
|
8 |
+
"pooling_mode_lasttoken": false,
|
9 |
+
"include_prompt": true
|
10 |
+
}
|
README.md
ADDED
@@ -0,0 +1,843 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
---
|
2 |
+
base_model: Snowflake/snowflake-arctic-embed-xs
|
3 |
+
library_name: sentence-transformers
|
4 |
+
metrics:
|
5 |
+
- cosine_accuracy@1
|
6 |
+
- cosine_accuracy@3
|
7 |
+
- cosine_accuracy@5
|
8 |
+
- cosine_accuracy@10
|
9 |
+
- cosine_precision@1
|
10 |
+
- cosine_precision@3
|
11 |
+
- cosine_precision@5
|
12 |
+
- cosine_precision@10
|
13 |
+
- cosine_recall@1
|
14 |
+
- cosine_recall@3
|
15 |
+
- cosine_recall@5
|
16 |
+
- cosine_recall@10
|
17 |
+
- cosine_ndcg@10
|
18 |
+
- cosine_mrr@10
|
19 |
+
- cosine_map@100
|
20 |
+
- dot_accuracy@1
|
21 |
+
- dot_accuracy@3
|
22 |
+
- dot_accuracy@5
|
23 |
+
- dot_accuracy@10
|
24 |
+
- dot_precision@1
|
25 |
+
- dot_precision@3
|
26 |
+
- dot_precision@5
|
27 |
+
- dot_precision@10
|
28 |
+
- dot_recall@1
|
29 |
+
- dot_recall@3
|
30 |
+
- dot_recall@5
|
31 |
+
- dot_recall@10
|
32 |
+
- dot_ndcg@10
|
33 |
+
- dot_mrr@10
|
34 |
+
- dot_map@100
|
35 |
+
pipeline_tag: sentence-similarity
|
36 |
+
tags:
|
37 |
+
- sentence-transformers
|
38 |
+
- sentence-similarity
|
39 |
+
- feature-extraction
|
40 |
+
- generated_from_trainer
|
41 |
+
- dataset_size:2730
|
42 |
+
- loss:MatryoshkaLoss
|
43 |
+
- loss:MultipleNegativesRankingLoss
|
44 |
+
widget:
|
45 |
+
- source_sentence: What steps can be taken to mitigate the risks associated with GAI
|
46 |
+
systems?
|
47 |
+
sentences:
|
48 |
+
- 'Action ID: GV-4.3-003
|
49 |
+
|
50 |
+
Suggested Action: Verify information sharing and feedback mechanisms among individuals
|
51 |
+
and
|
52 |
+
|
53 |
+
organizations regarding any negative impact from GAI systems.
|
54 |
+
|
55 |
+
GAI Risks: Information Integrity; Data
|
56 |
+
|
57 |
+
Privacy'
|
58 |
+
- '48. The definitions of ''equity'' and ''underserved communities'' can be found
|
59 |
+
in the Definitions section of this framework as well as in Section 2 of The Executive
|
60 |
+
Order On Advancing Racial Equity and Support [for Underserved Communities Through
|
61 |
+
the Federal Government. https://www.whitehouse.gov/](https://www.whitehouse.gov)
|
62 |
+
briefing-room/presidential-actions/2021/01/20/executive-order-advancing-racial-equity-and-support
|
63 |
+
for-underserved-communities-through-the-federal-government/
|
64 |
+
|
65 |
+
|
66 |
+
49. Id.'
|
67 |
+
- 'Action ID: GV-6.1-001
|
68 |
+
|
69 |
+
Suggested Action: Categorize different types of GAI content with associated third-party
|
70 |
+
rights (e.g.,
|
71 |
+
|
72 |
+
copyright, intellectual property, data privacy).
|
73 |
+
|
74 |
+
GAI Risks: Data Privacy; Intellectual
|
75 |
+
|
76 |
+
Property; Value Chain and
|
77 |
+
|
78 |
+
Component Integration'
|
79 |
+
- source_sentence: What tasks are associated with AI Actor governance and oversight?
|
80 |
+
sentences:
|
81 |
+
- 'GOVERN 1.1: Legal and regulatory requirements involving AI are understood, managed,
|
82 |
+
and documented.: MANAGE 4.2: Measurable activities for continual improvements
|
83 |
+
are integrated into AI system updates and include regular
|
84 |
+
|
85 |
+
engagement with interested parties, including relevant AI Actors.
|
86 |
+
|
87 |
+
AI Actor Tasks: Governance and Oversight: AI Actor Tasks: AI Deployment, AI Design,
|
88 |
+
AI Development, Affected Individuals and Communities, End-Users, Operation and
|
89 |
+
|
90 |
+
Monitoring, TEVV'
|
91 |
+
- "Beyond harms from information exposure (such as extortion or dignitary harm),\
|
92 |
+
\ wrong or inappropriate inferences of PII can contribute to downstream or secondary\
|
93 |
+
\ harmful impacts. For example, predictive inferences made by GAI models based\
|
94 |
+
\ on PII or protected attributes can contribute to adverse decisions, leading\
|
95 |
+
\ to representational or allocative harms to individuals or groups (see Harmful\
|
96 |
+
\ Bias and Homogenization below). #### Trustworthy AI Characteristics: Accountable\
|
97 |
+
\ and Transparent, Privacy Enhanced, Safe, Secure and Resilient\n\n 2.5. Environmental\
|
98 |
+
\ Impacts\n\n Training, maintaining, and operating (running inference on) GAI\
|
99 |
+
\ systems are resource-intensive activities, with potentially large energy and\
|
100 |
+
\ environmental footprints. Energy and carbon emissions vary based on what is\
|
101 |
+
\ being done with the GAI model (i.e., pre-training, fine-tuning, inference),\
|
102 |
+
\ the modality of the content, hardware used, and type of task or application.\n\
|
103 |
+
\n Current estimates suggest that training a single transformer LLM can emit as\
|
104 |
+
\ much carbon as 300 round- trip flights between San Francisco and New York. In\
|
105 |
+
\ a study comparing energy consumption and carbon emissions for LLM inference,\
|
106 |
+
\ generative tasks (e.g., text summarization) were found to be more energy- and\
|
107 |
+
\ carbon-intensive than discriminative or non-generative tasks (e.g., text classification).\
|
108 |
+
\ \n\n Methods for creating smaller versions of trained models, such as model\
|
109 |
+
\ distillation or compression, could reduce environmental impacts at inference\
|
110 |
+
\ time, but training and tuning such models may still contribute to their environmental\
|
111 |
+
\ impacts. Currently there is no agreed upon method to estimate environmental\
|
112 |
+
\ impacts from GAI. \n\n Trustworthy AI Characteristics: Accountable and Transparent,\
|
113 |
+
\ Safe\n\n 2.6. Harmful Bias and Homogenization"
|
114 |
+
- "#### • Accessibility and reasonable accommodations\n\n • AI actor credentials\
|
115 |
+
\ and qualifications • Alignment to organizational values\n\n#### • Auditing\
|
116 |
+
\ and assessment • Change-management controls • Commercial use • Data provenance\
|
117 |
+
\ #### • Data protection • Data retention • Consistency in use of defining key\
|
118 |
+
\ terms • Decommissioning • Discouraging anonymous use • Education • Impact\
|
119 |
+
\ assessments • Incident response • Monitoring • Opt-outs\n\n#### • Risk-based\
|
120 |
+
\ controls • Risk mapping and measurement • Science-backed TEVV practices •\
|
121 |
+
\ Secure software development practices • Stakeholder engagement • Synthetic\
|
122 |
+
\ content detection and labeling tools and techniques\n\n • Whistleblower protections\
|
123 |
+
\ • Workforce diversity and interdisciplinary teams\n\n#### Establishing acceptable\
|
124 |
+
\ use policies and guidance for the use of GAI in formal human-AI teaming settings\
|
125 |
+
\ as well as different levels of human-AI configurations can help to decrease\
|
126 |
+
\ risks arising from misuse, abuse, inappropriate repurpose, and misalignment\
|
127 |
+
\ between systems and users. These practices are just one example of adapting\
|
128 |
+
\ existing governance protocols for GAI contexts. \n\n A.1.3. Third-Party Considerations\n\
|
129 |
+
\n Organizations may seek to acquire, embed, incorporate, or use open-source or\
|
130 |
+
\ proprietary third-party GAI models, systems, or generated data for various applications\
|
131 |
+
\ across an enterprise. Use of these GAI tools and inputs has implications for\
|
132 |
+
\ all functions of the organization – including but not limited to acquisition,\
|
133 |
+
\ human resources, legal, compliance, and IT services – regardless of whether\
|
134 |
+
\ they are carried out by employees or third parties. Many of the actions cited\
|
135 |
+
\ above are relevant and options for addressing third-party considerations."
|
136 |
+
- source_sentence: What specific topic is covered in Chapter 3 of the AI Risk Management
|
137 |
+
Framework by NIST?
|
138 |
+
sentences:
|
139 |
+
- "Liang, W. et al. (2023) GPT detectors are biased against non-native English writers.\
|
140 |
+
\ arXiv. https://arxiv.org/abs/2304.02819\n\n Luccioni, A. et al. (2023) Power\
|
141 |
+
\ Hungry Processing: Watts Driving the Cost of AI Deployment? arXiv. https://arxiv.org/pdf/2311.16863\n\
|
142 |
+
\n Mouton, C. et al. (2024) The Operational Risks of AI in Large-Scale Biological\
|
143 |
+
\ Attacks. RAND. https://www.rand.org/pubs/research_reports/RRA2977-2.html.\n\n\
|
144 |
+
\ Nicoletti, L. et al. (2023) Humans Are Biased. Generative Ai Is Even Worse.\
|
145 |
+
\ Bloomberg. https://www.bloomberg.com/graphics/2023-generative-ai-bias/.\n\n\
|
146 |
+
\ National Institute of Standards and Technology (2024) Adversarial Machine Learning:\
|
147 |
+
\ A Taxonomy and Terminology of Attacks and Mitigations https://csrc.nist.gov/pubs/ai/100/2/e2023/final\n\
|
148 |
+
\n National Institute of Standards and Technology (2023) AI Risk Management Framework.\
|
149 |
+
\ https://www.nist.gov/itl/ai-risk-management-framework\n\n National Institute\
|
150 |
+
\ of Standards and Technology (2023) AI Risk Management Framework, Chapter 3:\
|
151 |
+
\ AI Risks and Trustworthiness. https://airc.nist.gov/AI_RMF_Knowledge_Base/AI_RMF/Foundational_Information/3-sec-characteristics\n\
|
152 |
+
\n National Institute of Standards and Technology (2023) AI Risk Management Framework,\
|
153 |
+
\ Chapter 6: AI RMF Profiles. https://airc.nist.gov/AI_RMF_Knowledge_Base/AI_RMF/Core_And_Profiles/6-sec-profile"
|
154 |
+
- "###### WHAT SHOULD BE EXPECTED OF AUTOMATED SYSTEMS\n\n The expectations for\
|
155 |
+
\ automated systems are meant to serve as a blueprint for the development of additional\
|
156 |
+
\ technical standards and practices that are tailored for particular sectors and\
|
157 |
+
\ contexts.\n\n**Equitable.** Consideration should be given to ensuring outcomes\
|
158 |
+
\ of the fallback and escalation system are equitable when compared to those of\
|
159 |
+
\ the automated system and such that the fallback and escalation system provides\
|
160 |
+
\ equitable access to underserved communities.[105]\n\n**Timely. Human consideration\
|
161 |
+
\ and fallback are only useful if they are conducted and concluded in a** timely\
|
162 |
+
\ manner. The determination of what is timely should be made relative to the specific\
|
163 |
+
\ automated system, and the review system should be staffed and regularly assessed\
|
164 |
+
\ to ensure it is providing timely consideration and fallback. In time-critical\
|
165 |
+
\ systems, this mechanism should be immediately available or, where possible,\
|
166 |
+
\ available before the harm occurs. Time-critical systems include, but are not\
|
167 |
+
\ limited to, voting-related systems, automated building access and other access\
|
168 |
+
\ systems, systems that form a critical component of healthcare, and systems that\
|
169 |
+
\ have the ability to withhold wages or otherwise cause immediate financial penalties.\n\
|
170 |
+
\n**Effective.** The organizational structure surrounding processes for consideration\
|
171 |
+
\ and fallback should be designed so that if the human decision-maker charged\
|
172 |
+
\ with reassessing a decision determines that it should be overruled, the new\
|
173 |
+
\ decision will be effectively enacted. This includes ensuring that the new decision\
|
174 |
+
\ is entered into the automated system throughout its components, any previous\
|
175 |
+
\ repercussions from the old decision are also overturned, and safeguards are\
|
176 |
+
\ put in place to help ensure that future decisions do not result in the same\
|
177 |
+
\ errors.\n\n**Maintained. The human consideration and fallback process and any\
|
178 |
+
\ associated automated processes** should be maintained and supported as long\
|
179 |
+
\ as the relevant automated system continues to be in use.\n\n**Institute training,\
|
180 |
+
\ assessment, and oversight to combat automation bias and ensure any** **human-based\
|
181 |
+
\ components of a system are effective.**"
|
182 |
+
- "**Institute training, assessment, and oversight to combat automation bias and\
|
183 |
+
\ ensure any** **human-based components of a system are effective.**\n\n**Training\
|
184 |
+
\ and assessment. Anyone administering, interacting with, or interpreting the\
|
185 |
+
\ outputs of an auto** mated system should receive training in that system, including\
|
186 |
+
\ how to properly interpret outputs of a system in light of its intended purpose\
|
187 |
+
\ and in how to mitigate the effects of automation bias. The training should reoc\
|
188 |
+
\ cur regularly to ensure it is up to date with the system and to ensure the system\
|
189 |
+
\ is used appropriately. Assess ment should be ongoing to ensure that the use\
|
190 |
+
\ of the system with human involvement provides for appropri ate results, i.e.,\
|
191 |
+
\ that the involvement of people does not invalidate the system's assessment as\
|
192 |
+
\ safe and effective or lead to algorithmic discrimination.\n\n**Oversight. Human-based\
|
193 |
+
\ systems have the potential for bias, including automation bias, as well as other**\
|
194 |
+
\ concerns that may limit their effectiveness. The results of assessments of the\
|
195 |
+
\ efficacy and potential bias of such human-based systems should be overseen by\
|
196 |
+
\ governance structures that have the potential to update the operation of the\
|
197 |
+
\ human-based system in order to mitigate these effects. **HUMAN ALTERNATIVES,**\
|
198 |
+
\ **CONSIDERATION, AND** **FALLBACK**\n\n###### WHAT SHOULD BE EXPECTED OF AUTOMATED\
|
199 |
+
\ SYSTEMS\n\n The expectations for automated systems are meant to serve as a blueprint\
|
200 |
+
\ for the development of additional technical standards and practices that are\
|
201 |
+
\ tailored for particular sectors and contexts.\n\n**Implement additional human\
|
202 |
+
\ oversight and safeguards for automated systems related to** **sensitive domains**\n\
|
203 |
+
\nAutomated systems used within sensitive domains, including criminal justice,\
|
204 |
+
\ employment, education, and health, should meet the expectations laid out throughout\
|
205 |
+
\ this framework, especially avoiding capricious, inappropriate, and discriminatory\
|
206 |
+
\ impacts of these technologies. Additionally, automated systems used within sensitive\
|
207 |
+
\ domains should meet these expectations:"
|
208 |
+
- source_sentence: What is the primary goal of protecting the public from algorithmic
|
209 |
+
discrimination?
|
210 |
+
sentences:
|
211 |
+
- 'Action ID: MS-1.3-001
|
212 |
+
|
213 |
+
Suggested Action: Define relevant groups of interest (e.g., demographic groups,
|
214 |
+
subject matter
|
215 |
+
|
216 |
+
experts, experience with GAI technology) within the context of use as part of
|
217 |
+
|
218 |
+
plans for gathering structured public feedback.
|
219 |
+
|
220 |
+
GAI Risks: Human-AI Configuration; Harmful
|
221 |
+
|
222 |
+
Bias and Homogenization; CBRN
|
223 |
+
|
224 |
+
Information or Capabilities'
|
225 |
+
- 'Action ID: GV-6.1-001
|
226 |
+
|
227 |
+
Suggested Action: Categorize different types of GAI content with associated third-party
|
228 |
+
rights (e.g.,
|
229 |
+
|
230 |
+
copyright, intellectual property, data privacy).
|
231 |
+
|
232 |
+
GAI Risks: Data Privacy; Intellectual
|
233 |
+
|
234 |
+
Property; Value Chain and
|
235 |
+
|
236 |
+
Component Integration'
|
237 |
+
- '**Protect the public from algorithmic discrimination in a proactive and ongoing
|
238 |
+
manner**
|
239 |
+
|
240 |
+
|
241 |
+
**Proactive assessment of equity in design. Those responsible for the development,
|
242 |
+
use, or oversight of** automated systems should conduct proactive equity assessments
|
243 |
+
in the design phase of the technology research and development or during its acquisition
|
244 |
+
to review potential input data, associated historical context, accessibility for
|
245 |
+
people with disabilities, and societal goals to identify potential discrimination
|
246 |
+
and effects on equity resulting from the introduction of the technology. The assessed
|
247 |
+
groups should be as inclusive as possible of the underserved communities mentioned
|
248 |
+
in the equity definition: Black, Latino, and Indigenous and Native American persons,
|
249 |
+
Asian Americans and Pacific Islanders and other persons of color; members of religious
|
250 |
+
minorities; women, girls, and non-binary people; lesbian, gay, bisexual, transgender,
|
251 |
+
queer, and intersex (LGBTQI+) persons; older adults; persons with disabilities;
|
252 |
+
persons who live in rural areas; and persons otherwise adversely affected by persistent
|
253 |
+
poverty or inequality. Assessment could include both qualitative and quantitative
|
254 |
+
evaluations of the system. This equity assessment should also be considered a
|
255 |
+
core part of the goals of the consultation conducted as part of the safety and
|
256 |
+
efficacy review.
|
257 |
+
|
258 |
+
|
259 |
+
**Representative and robust data. Any data used as part of system development
|
260 |
+
or assessment should be** representative of local communities based on the planned
|
261 |
+
deployment setting and should be reviewed for bias based on the historical and
|
262 |
+
societal context of the data. Such data should be sufficiently robust to identify
|
263 |
+
and help to mitigate biases and potential harms.'
|
264 |
+
- source_sentence: How can human subjects revoke their consent according to the suggested
|
265 |
+
action?
|
266 |
+
sentences:
|
267 |
+
- "Disinformation and misinformation – both of which may be facilitated by GAI –\
|
268 |
+
\ may erode public trust in true or valid evidence and information, with downstream\
|
269 |
+
\ effects. For example, a synthetic image of a Pentagon blast went viral and briefly\
|
270 |
+
\ caused a drop in the stock market. Generative AI models can also assist malicious\
|
271 |
+
\ actors in creating compelling imagery and propaganda to support disinformation\
|
272 |
+
\ campaigns, which may not be photorealistic, but could enable these campaigns\
|
273 |
+
\ to gain more reach and engagement on social media platforms. Additionally, generative\
|
274 |
+
\ AI models can assist malicious actors in creating fraudulent content intended\
|
275 |
+
\ to impersonate others.\n\n Trustworthy AI Characteristics: Accountable and Transparent,\
|
276 |
+
\ Safe, Valid and Reliable, Interpretable and Explainable\n\n 2.9. Information\
|
277 |
+
\ Security\n\n Information security for computer systems and data is a mature\
|
278 |
+
\ field with widely accepted and standardized practices for offensive and defensive\
|
279 |
+
\ cyber capabilities. GAI-based systems present two primary information security\
|
280 |
+
\ risks: GAI could potentially discover or enable new cybersecurity risks by lowering\
|
281 |
+
\ the barriers for or easing automated exercise of offensive capabilities; simultaneously,\
|
282 |
+
\ it expands the available attack surface, as GAI itself is vulnerable to attacks\
|
283 |
+
\ like prompt injection or data poisoning. \n\n Offensive cyber capabilities advanced\
|
284 |
+
\ by GAI systems may augment cybersecurity attacks such as hacking, malware, and\
|
285 |
+
\ phishing. Reports have indicated that LLMs are already able to discover some\
|
286 |
+
\ vulnerabilities in systems (hardware, software, data) and write code to exploit\
|
287 |
+
\ them. Sophisticated threat actors might further these risks by developing GAI-powered\
|
288 |
+
\ security co-pilots for use in several parts of the attack chain, including informing\
|
289 |
+
\ attackers on how to proactively evade threat detection and escalate privileges\
|
290 |
+
\ after gaining system access.\n\n Information security for GAI models and systems\
|
291 |
+
\ also includes maintaining availability of the GAI system and the integrity and\
|
292 |
+
\ (when applicable) the confidentiality of the GAI code, training data, and model\
|
293 |
+
\ weights. To identify and secure potential attack points in AI systems or specific\
|
294 |
+
\ components of the AI"
|
295 |
+
- 'Action ID: GV-4.2-003
|
296 |
+
|
297 |
+
Suggested Action: Verify that downstream GAI system impacts (such as the use of
|
298 |
+
third-party
|
299 |
+
|
300 |
+
plugins) are included in the impact documentation process.
|
301 |
+
|
302 |
+
GAI Risks: Value Chain and Component
|
303 |
+
|
304 |
+
Integration'
|
305 |
+
- 'Action ID: MS-2.2-003
|
306 |
+
|
307 |
+
Suggested Action: Provide human subjects with options to withdraw participation
|
308 |
+
or revoke their
|
309 |
+
|
310 |
+
consent for present or future use of their data in GAI applications.
|
311 |
+
|
312 |
+
GAI Risks: Data Privacy; Human-AI
|
313 |
+
|
314 |
+
Configuration; Information
|
315 |
+
|
316 |
+
Integrity'
|
317 |
+
model-index:
|
318 |
+
- name: SentenceTransformer based on Snowflake/snowflake-arctic-embed-xs
|
319 |
+
results:
|
320 |
+
- task:
|
321 |
+
type: information-retrieval
|
322 |
+
name: Information Retrieval
|
323 |
+
dataset:
|
324 |
+
name: Unknown
|
325 |
+
type: unknown
|
326 |
+
metrics:
|
327 |
+
- type: cosine_accuracy@1
|
328 |
+
value: 0.6483516483516484
|
329 |
+
name: Cosine Accuracy@1
|
330 |
+
- type: cosine_accuracy@3
|
331 |
+
value: 0.7362637362637363
|
332 |
+
name: Cosine Accuracy@3
|
333 |
+
- type: cosine_accuracy@5
|
334 |
+
value: 0.7802197802197802
|
335 |
+
name: Cosine Accuracy@5
|
336 |
+
- type: cosine_accuracy@10
|
337 |
+
value: 0.8571428571428571
|
338 |
+
name: Cosine Accuracy@10
|
339 |
+
- type: cosine_precision@1
|
340 |
+
value: 0.6483516483516484
|
341 |
+
name: Cosine Precision@1
|
342 |
+
- type: cosine_precision@3
|
343 |
+
value: 0.2454212454212454
|
344 |
+
name: Cosine Precision@3
|
345 |
+
- type: cosine_precision@5
|
346 |
+
value: 0.15604395604395602
|
347 |
+
name: Cosine Precision@5
|
348 |
+
- type: cosine_precision@10
|
349 |
+
value: 0.0857142857142857
|
350 |
+
name: Cosine Precision@10
|
351 |
+
- type: cosine_recall@1
|
352 |
+
value: 0.6483516483516484
|
353 |
+
name: Cosine Recall@1
|
354 |
+
- type: cosine_recall@3
|
355 |
+
value: 0.7362637362637363
|
356 |
+
name: Cosine Recall@3
|
357 |
+
- type: cosine_recall@5
|
358 |
+
value: 0.7802197802197802
|
359 |
+
name: Cosine Recall@5
|
360 |
+
- type: cosine_recall@10
|
361 |
+
value: 0.8571428571428571
|
362 |
+
name: Cosine Recall@10
|
363 |
+
- type: cosine_ndcg@10
|
364 |
+
value: 0.7433871430365133
|
365 |
+
name: Cosine Ndcg@10
|
366 |
+
- type: cosine_mrr@10
|
367 |
+
value: 0.7083235217163788
|
368 |
+
name: Cosine Mrr@10
|
369 |
+
- type: cosine_map@100
|
370 |
+
value: 0.71581044355863
|
371 |
+
name: Cosine Map@100
|
372 |
+
- type: dot_accuracy@1
|
373 |
+
value: 0.6483516483516484
|
374 |
+
name: Dot Accuracy@1
|
375 |
+
- type: dot_accuracy@3
|
376 |
+
value: 0.7362637362637363
|
377 |
+
name: Dot Accuracy@3
|
378 |
+
- type: dot_accuracy@5
|
379 |
+
value: 0.7802197802197802
|
380 |
+
name: Dot Accuracy@5
|
381 |
+
- type: dot_accuracy@10
|
382 |
+
value: 0.8571428571428571
|
383 |
+
name: Dot Accuracy@10
|
384 |
+
- type: dot_precision@1
|
385 |
+
value: 0.6483516483516484
|
386 |
+
name: Dot Precision@1
|
387 |
+
- type: dot_precision@3
|
388 |
+
value: 0.2454212454212454
|
389 |
+
name: Dot Precision@3
|
390 |
+
- type: dot_precision@5
|
391 |
+
value: 0.15604395604395602
|
392 |
+
name: Dot Precision@5
|
393 |
+
- type: dot_precision@10
|
394 |
+
value: 0.0857142857142857
|
395 |
+
name: Dot Precision@10
|
396 |
+
- type: dot_recall@1
|
397 |
+
value: 0.6483516483516484
|
398 |
+
name: Dot Recall@1
|
399 |
+
- type: dot_recall@3
|
400 |
+
value: 0.7362637362637363
|
401 |
+
name: Dot Recall@3
|
402 |
+
- type: dot_recall@5
|
403 |
+
value: 0.7802197802197802
|
404 |
+
name: Dot Recall@5
|
405 |
+
- type: dot_recall@10
|
406 |
+
value: 0.8571428571428571
|
407 |
+
name: Dot Recall@10
|
408 |
+
- type: dot_ndcg@10
|
409 |
+
value: 0.7433871430365133
|
410 |
+
name: Dot Ndcg@10
|
411 |
+
- type: dot_mrr@10
|
412 |
+
value: 0.7083235217163788
|
413 |
+
name: Dot Mrr@10
|
414 |
+
- type: dot_map@100
|
415 |
+
value: 0.71581044355863
|
416 |
+
name: Dot Map@100
|
417 |
+
---
|
418 |
+
|
419 |
+
# SentenceTransformer based on Snowflake/snowflake-arctic-embed-xs
|
420 |
+
|
421 |
+
This is a [sentence-transformers](https://www.SBERT.net) model finetuned from [Snowflake/snowflake-arctic-embed-xs](https://huggingface.co/Snowflake/snowflake-arctic-embed-xs). It maps sentences & paragraphs to a 384-dimensional dense vector space and can be used for semantic textual similarity, semantic search, paraphrase mining, text classification, clustering, and more.
|
422 |
+
|
423 |
+
## Model Details
|
424 |
+
|
425 |
+
### Model Description
|
426 |
+
- **Model Type:** Sentence Transformer
|
427 |
+
- **Base model:** [Snowflake/snowflake-arctic-embed-xs](https://huggingface.co/Snowflake/snowflake-arctic-embed-xs) <!-- at revision 742da4f66e1823b5b4dbe6c320a1375a1fd85f9e -->
|
428 |
+
- **Maximum Sequence Length:** 512 tokens
|
429 |
+
- **Output Dimensionality:** 384 tokens
|
430 |
+
- **Similarity Function:** Cosine Similarity
|
431 |
+
<!-- - **Training Dataset:** Unknown -->
|
432 |
+
<!-- - **Language:** Unknown -->
|
433 |
+
<!-- - **License:** Unknown -->
|
434 |
+
|
435 |
+
### Model Sources
|
436 |
+
|
437 |
+
- **Documentation:** [Sentence Transformers Documentation](https://sbert.net)
|
438 |
+
- **Repository:** [Sentence Transformers on GitHub](https://github.com/UKPLab/sentence-transformers)
|
439 |
+
- **Hugging Face:** [Sentence Transformers on Hugging Face](https://huggingface.co/models?library=sentence-transformers)
|
440 |
+
|
441 |
+
### Full Model Architecture
|
442 |
+
|
443 |
+
```
|
444 |
+
SentenceTransformer(
|
445 |
+
(0): Transformer({'max_seq_length': 512, 'do_lower_case': False}) with Transformer model: BertModel
|
446 |
+
(1): Pooling({'word_embedding_dimension': 384, 'pooling_mode_cls_token': True, 'pooling_mode_mean_tokens': False, 'pooling_mode_max_tokens': False, 'pooling_mode_mean_sqrt_len_tokens': False, 'pooling_mode_weightedmean_tokens': False, 'pooling_mode_lasttoken': False, 'include_prompt': True})
|
447 |
+
(2): Normalize()
|
448 |
+
)
|
449 |
+
```
|
450 |
+
|
451 |
+
## Usage
|
452 |
+
|
453 |
+
### Direct Usage (Sentence Transformers)
|
454 |
+
|
455 |
+
First install the Sentence Transformers library:
|
456 |
+
|
457 |
+
```bash
|
458 |
+
pip install -U sentence-transformers
|
459 |
+
```
|
460 |
+
|
461 |
+
Then you can load this model and run inference.
|
462 |
+
```python
|
463 |
+
from sentence_transformers import SentenceTransformer
|
464 |
+
|
465 |
+
# Download from the 🤗 Hub
|
466 |
+
model = SentenceTransformer("jimmydzj2006/snowflake-arctic-embed-xs_finetuned_aipolicy")
|
467 |
+
# Run inference
|
468 |
+
sentences = [
|
469 |
+
'How can human subjects revoke their consent according to the suggested action?',
|
470 |
+
'Action ID: MS-2.2-003\nSuggested Action: Provide human subjects with options to withdraw participation or revoke their\nconsent for present or future use of their data in GAI applications.\nGAI Risks: Data Privacy; Human-AI\nConfiguration; Information\nIntegrity',
|
471 |
+
'Disinformation and misinformation – both of which may be facilitated by GAI – may erode public trust in true or valid evidence and information, with downstream effects. For example, a synthetic image of a Pentagon blast went viral and briefly caused a drop in the stock market. Generative AI models can also assist malicious actors in creating compelling imagery and propaganda to support disinformation campaigns, which may not be photorealistic, but could enable these campaigns to gain more reach and engagement on social media platforms. Additionally, generative AI models can assist malicious actors in creating fraudulent content intended to impersonate others.\n\n Trustworthy AI Characteristics: Accountable and Transparent, Safe, Valid and Reliable, Interpretable and Explainable\n\n 2.9. Information Security\n\n Information security for computer systems and data is a mature field with widely accepted and standardized practices for offensive and defensive cyber capabilities. GAI-based systems present two primary information security risks: GAI could potentially discover or enable new cybersecurity risks by lowering the barriers for or easing automated exercise of offensive capabilities; simultaneously, it expands the available attack surface, as GAI itself is vulnerable to attacks like prompt injection or data poisoning. \n\n Offensive cyber capabilities advanced by GAI systems may augment cybersecurity attacks such as hacking, malware, and phishing. Reports have indicated that LLMs are already able to discover some vulnerabilities in systems (hardware, software, data) and write code to exploit them. Sophisticated threat actors might further these risks by developing GAI-powered security co-pilots for use in several parts of the attack chain, including informing attackers on how to proactively evade threat detection and escalate privileges after gaining system access.\n\n Information security for GAI models and systems also includes maintaining availability of the GAI system and the integrity and (when applicable) the confidentiality of the GAI code, training data, and model weights. To identify and secure potential attack points in AI systems or specific components of the AI',
|
472 |
+
]
|
473 |
+
embeddings = model.encode(sentences)
|
474 |
+
print(embeddings.shape)
|
475 |
+
# [3, 384]
|
476 |
+
|
477 |
+
# Get the similarity scores for the embeddings
|
478 |
+
similarities = model.similarity(embeddings, embeddings)
|
479 |
+
print(similarities.shape)
|
480 |
+
# [3, 3]
|
481 |
+
```
|
482 |
+
|
483 |
+
<!--
|
484 |
+
### Direct Usage (Transformers)
|
485 |
+
|
486 |
+
<details><summary>Click to see the direct usage in Transformers</summary>
|
487 |
+
|
488 |
+
</details>
|
489 |
+
-->
|
490 |
+
|
491 |
+
<!--
|
492 |
+
### Downstream Usage (Sentence Transformers)
|
493 |
+
|
494 |
+
You can finetune this model on your own dataset.
|
495 |
+
|
496 |
+
<details><summary>Click to expand</summary>
|
497 |
+
|
498 |
+
</details>
|
499 |
+
-->
|
500 |
+
|
501 |
+
<!--
|
502 |
+
### Out-of-Scope Use
|
503 |
+
|
504 |
+
*List how the model may foreseeably be misused and address what users ought not to do with the model.*
|
505 |
+
-->
|
506 |
+
|
507 |
+
## Evaluation
|
508 |
+
|
509 |
+
### Metrics
|
510 |
+
|
511 |
+
#### Information Retrieval
|
512 |
+
|
513 |
+
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator)
|
514 |
+
|
515 |
+
| Metric | Value |
|
516 |
+
|:--------------------|:-----------|
|
517 |
+
| cosine_accuracy@1 | 0.6484 |
|
518 |
+
| cosine_accuracy@3 | 0.7363 |
|
519 |
+
| cosine_accuracy@5 | 0.7802 |
|
520 |
+
| cosine_accuracy@10 | 0.8571 |
|
521 |
+
| cosine_precision@1 | 0.6484 |
|
522 |
+
| cosine_precision@3 | 0.2454 |
|
523 |
+
| cosine_precision@5 | 0.156 |
|
524 |
+
| cosine_precision@10 | 0.0857 |
|
525 |
+
| cosine_recall@1 | 0.6484 |
|
526 |
+
| cosine_recall@3 | 0.7363 |
|
527 |
+
| cosine_recall@5 | 0.7802 |
|
528 |
+
| cosine_recall@10 | 0.8571 |
|
529 |
+
| cosine_ndcg@10 | 0.7434 |
|
530 |
+
| cosine_mrr@10 | 0.7083 |
|
531 |
+
| **cosine_map@100** | **0.7158** |
|
532 |
+
| dot_accuracy@1 | 0.6484 |
|
533 |
+
| dot_accuracy@3 | 0.7363 |
|
534 |
+
| dot_accuracy@5 | 0.7802 |
|
535 |
+
| dot_accuracy@10 | 0.8571 |
|
536 |
+
| dot_precision@1 | 0.6484 |
|
537 |
+
| dot_precision@3 | 0.2454 |
|
538 |
+
| dot_precision@5 | 0.156 |
|
539 |
+
| dot_precision@10 | 0.0857 |
|
540 |
+
| dot_recall@1 | 0.6484 |
|
541 |
+
| dot_recall@3 | 0.7363 |
|
542 |
+
| dot_recall@5 | 0.7802 |
|
543 |
+
| dot_recall@10 | 0.8571 |
|
544 |
+
| dot_ndcg@10 | 0.7434 |
|
545 |
+
| dot_mrr@10 | 0.7083 |
|
546 |
+
| dot_map@100 | 0.7158 |
|
547 |
+
|
548 |
+
<!--
|
549 |
+
## Bias, Risks and Limitations
|
550 |
+
|
551 |
+
*What are the known or foreseeable issues stemming from this model? You could also flag here known failure cases or weaknesses of the model.*
|
552 |
+
-->
|
553 |
+
|
554 |
+
<!--
|
555 |
+
### Recommendations
|
556 |
+
|
557 |
+
*What are recommendations with respect to the foreseeable issues? For example, filtering explicit content.*
|
558 |
+
-->
|
559 |
+
|
560 |
+
## Training Details
|
561 |
+
|
562 |
+
### Training Dataset
|
563 |
+
|
564 |
+
#### Unnamed Dataset
|
565 |
+
|
566 |
+
|
567 |
+
* Size: 2,730 training samples
|
568 |
+
* Columns: <code>sentence_0</code> and <code>sentence_1</code>
|
569 |
+
* Approximate statistics based on the first 1000 samples:
|
570 |
+
| | sentence_0 | sentence_1 |
|
571 |
+
|:--------|:----------------------------------------------------------------------------------|:-------------------------------------------------------------------------------------|
|
572 |
+
| type | string | string |
|
573 |
+
| details | <ul><li>min: 8 tokens</li><li>mean: 15.71 tokens</li><li>max: 33 tokens</li></ul> | <ul><li>min: 19 tokens</li><li>mean: 183.25 tokens</li><li>max: 467 tokens</li></ul> |
|
574 |
+
* Samples:
|
575 |
+
| sentence_0 | sentence_1 |
|
576 |
+
|:------------------------------------------------------------------------------------------------|:-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
577 |
+
| <code>What is the Action ID associated with the suggested action?</code> | <code>Action ID: MS-2.12-004<br>Suggested Action: Verify effectiveness of carbon capture or offset programs for GAI training and<br>applications, and address green-washing concerns.<br>GAI Risks: Environmental</code> |
|
578 |
+
| <code>What is the suggested action regarding carbon capture or offset programs?</code> | <code>Action ID: MS-2.12-004<br>Suggested Action: Verify effectiveness of carbon capture or offset programs for GAI training and<br>applications, and address green-washing concerns.<br>GAI Risks: Environmental</code> |
|
579 |
+
| <code>What specific concerns should be addressed in relation to carbon capture programs?</code> | <code>Action ID: MS-2.12-004<br>Suggested Action: Verify effectiveness of carbon capture or offset programs for GAI training and<br>applications, and address green-washing concerns.<br>GAI Risks: Environmental</code> |
|
580 |
+
* Loss: [<code>MatryoshkaLoss</code>](https://sbert.net/docs/package_reference/sentence_transformer/losses.html#matryoshkaloss) with these parameters:
|
581 |
+
```json
|
582 |
+
{
|
583 |
+
"loss": "MultipleNegativesRankingLoss",
|
584 |
+
"matryoshka_dims": [
|
585 |
+
284,
|
586 |
+
256,
|
587 |
+
128,
|
588 |
+
64,
|
589 |
+
32
|
590 |
+
],
|
591 |
+
"matryoshka_weights": [
|
592 |
+
1,
|
593 |
+
1,
|
594 |
+
1,
|
595 |
+
1,
|
596 |
+
1
|
597 |
+
],
|
598 |
+
"n_dims_per_step": -1
|
599 |
+
}
|
600 |
+
```
|
601 |
+
|
602 |
+
### Training Hyperparameters
|
603 |
+
#### Non-Default Hyperparameters
|
604 |
+
|
605 |
+
- `eval_strategy`: steps
|
606 |
+
- `per_device_train_batch_size`: 16
|
607 |
+
- `per_device_eval_batch_size`: 16
|
608 |
+
- `num_train_epochs`: 10
|
609 |
+
- `multi_dataset_batch_sampler`: round_robin
|
610 |
+
|
611 |
+
#### All Hyperparameters
|
612 |
+
<details><summary>Click to expand</summary>
|
613 |
+
|
614 |
+
- `overwrite_output_dir`: False
|
615 |
+
- `do_predict`: False
|
616 |
+
- `eval_strategy`: steps
|
617 |
+
- `prediction_loss_only`: True
|
618 |
+
- `per_device_train_batch_size`: 16
|
619 |
+
- `per_device_eval_batch_size`: 16
|
620 |
+
- `per_gpu_train_batch_size`: None
|
621 |
+
- `per_gpu_eval_batch_size`: None
|
622 |
+
- `gradient_accumulation_steps`: 1
|
623 |
+
- `eval_accumulation_steps`: None
|
624 |
+
- `torch_empty_cache_steps`: None
|
625 |
+
- `learning_rate`: 5e-05
|
626 |
+
- `weight_decay`: 0.0
|
627 |
+
- `adam_beta1`: 0.9
|
628 |
+
- `adam_beta2`: 0.999
|
629 |
+
- `adam_epsilon`: 1e-08
|
630 |
+
- `max_grad_norm`: 1
|
631 |
+
- `num_train_epochs`: 10
|
632 |
+
- `max_steps`: -1
|
633 |
+
- `lr_scheduler_type`: linear
|
634 |
+
- `lr_scheduler_kwargs`: {}
|
635 |
+
- `warmup_ratio`: 0.0
|
636 |
+
- `warmup_steps`: 0
|
637 |
+
- `log_level`: passive
|
638 |
+
- `log_level_replica`: warning
|
639 |
+
- `log_on_each_node`: True
|
640 |
+
- `logging_nan_inf_filter`: True
|
641 |
+
- `save_safetensors`: True
|
642 |
+
- `save_on_each_node`: False
|
643 |
+
- `save_only_model`: False
|
644 |
+
- `restore_callback_states_from_checkpoint`: False
|
645 |
+
- `no_cuda`: False
|
646 |
+
- `use_cpu`: False
|
647 |
+
- `use_mps_device`: False
|
648 |
+
- `seed`: 42
|
649 |
+
- `data_seed`: None
|
650 |
+
- `jit_mode_eval`: False
|
651 |
+
- `use_ipex`: False
|
652 |
+
- `bf16`: False
|
653 |
+
- `fp16`: False
|
654 |
+
- `fp16_opt_level`: O1
|
655 |
+
- `half_precision_backend`: auto
|
656 |
+
- `bf16_full_eval`: False
|
657 |
+
- `fp16_full_eval`: False
|
658 |
+
- `tf32`: None
|
659 |
+
- `local_rank`: 0
|
660 |
+
- `ddp_backend`: None
|
661 |
+
- `tpu_num_cores`: None
|
662 |
+
- `tpu_metrics_debug`: False
|
663 |
+
- `debug`: []
|
664 |
+
- `dataloader_drop_last`: False
|
665 |
+
- `dataloader_num_workers`: 0
|
666 |
+
- `dataloader_prefetch_factor`: None
|
667 |
+
- `past_index`: -1
|
668 |
+
- `disable_tqdm`: False
|
669 |
+
- `remove_unused_columns`: True
|
670 |
+
- `label_names`: None
|
671 |
+
- `load_best_model_at_end`: False
|
672 |
+
- `ignore_data_skip`: False
|
673 |
+
- `fsdp`: []
|
674 |
+
- `fsdp_min_num_params`: 0
|
675 |
+
- `fsdp_config`: {'min_num_params': 0, 'xla': False, 'xla_fsdp_v2': False, 'xla_fsdp_grad_ckpt': False}
|
676 |
+
- `fsdp_transformer_layer_cls_to_wrap`: None
|
677 |
+
- `accelerator_config`: {'split_batches': False, 'dispatch_batches': None, 'even_batches': True, 'use_seedable_sampler': True, 'non_blocking': False, 'gradient_accumulation_kwargs': None}
|
678 |
+
- `deepspeed`: None
|
679 |
+
- `label_smoothing_factor`: 0.0
|
680 |
+
- `optim`: adamw_torch
|
681 |
+
- `optim_args`: None
|
682 |
+
- `adafactor`: False
|
683 |
+
- `group_by_length`: False
|
684 |
+
- `length_column_name`: length
|
685 |
+
- `ddp_find_unused_parameters`: None
|
686 |
+
- `ddp_bucket_cap_mb`: None
|
687 |
+
- `ddp_broadcast_buffers`: False
|
688 |
+
- `dataloader_pin_memory`: True
|
689 |
+
- `dataloader_persistent_workers`: False
|
690 |
+
- `skip_memory_metrics`: True
|
691 |
+
- `use_legacy_prediction_loop`: False
|
692 |
+
- `push_to_hub`: False
|
693 |
+
- `resume_from_checkpoint`: None
|
694 |
+
- `hub_model_id`: None
|
695 |
+
- `hub_strategy`: every_save
|
696 |
+
- `hub_private_repo`: False
|
697 |
+
- `hub_always_push`: False
|
698 |
+
- `gradient_checkpointing`: False
|
699 |
+
- `gradient_checkpointing_kwargs`: None
|
700 |
+
- `include_inputs_for_metrics`: False
|
701 |
+
- `eval_do_concat_batches`: True
|
702 |
+
- `fp16_backend`: auto
|
703 |
+
- `push_to_hub_model_id`: None
|
704 |
+
- `push_to_hub_organization`: None
|
705 |
+
- `mp_parameters`:
|
706 |
+
- `auto_find_batch_size`: False
|
707 |
+
- `full_determinism`: False
|
708 |
+
- `torchdynamo`: None
|
709 |
+
- `ray_scope`: last
|
710 |
+
- `ddp_timeout`: 1800
|
711 |
+
- `torch_compile`: False
|
712 |
+
- `torch_compile_backend`: None
|
713 |
+
- `torch_compile_mode`: None
|
714 |
+
- `dispatch_batches`: None
|
715 |
+
- `split_batches`: None
|
716 |
+
- `include_tokens_per_second`: False
|
717 |
+
- `include_num_input_tokens_seen`: False
|
718 |
+
- `neftune_noise_alpha`: None
|
719 |
+
- `optim_target_modules`: None
|
720 |
+
- `batch_eval_metrics`: False
|
721 |
+
- `eval_on_start`: False
|
722 |
+
- `eval_use_gather_object`: False
|
723 |
+
- `batch_sampler`: batch_sampler
|
724 |
+
- `multi_dataset_batch_sampler`: round_robin
|
725 |
+
|
726 |
+
</details>
|
727 |
+
|
728 |
+
### Training Logs
|
729 |
+
| Epoch | Step | Training Loss | cosine_map@100 |
|
730 |
+
|:------:|:----:|:-------------:|:--------------:|
|
731 |
+
| 0.2924 | 50 | - | 0.5949 |
|
732 |
+
| 0.5848 | 100 | - | 0.6455 |
|
733 |
+
| 0.8772 | 150 | - | 0.6680 |
|
734 |
+
| 1.0 | 171 | - | 0.6721 |
|
735 |
+
| 1.1696 | 200 | - | 0.6811 |
|
736 |
+
| 1.4620 | 250 | - | 0.6850 |
|
737 |
+
| 1.7544 | 300 | - | 0.6959 |
|
738 |
+
| 2.0 | 342 | - | 0.7021 |
|
739 |
+
| 2.0468 | 350 | - | 0.7008 |
|
740 |
+
| 2.3392 | 400 | - | 0.7043 |
|
741 |
+
| 2.6316 | 450 | - | 0.7017 |
|
742 |
+
| 2.9240 | 500 | 5.9671 | 0.7018 |
|
743 |
+
| 3.0 | 513 | - | 0.7039 |
|
744 |
+
| 3.2164 | 550 | - | 0.7014 |
|
745 |
+
| 3.5088 | 600 | - | 0.7039 |
|
746 |
+
| 3.8012 | 650 | - | 0.7022 |
|
747 |
+
| 4.0 | 684 | - | 0.7058 |
|
748 |
+
| 4.0936 | 700 | - | 0.7039 |
|
749 |
+
| 4.3860 | 750 | - | 0.7061 |
|
750 |
+
| 4.6784 | 800 | - | 0.7030 |
|
751 |
+
| 4.9708 | 850 | - | 0.7073 |
|
752 |
+
| 5.0 | 855 | - | 0.7073 |
|
753 |
+
| 5.2632 | 900 | - | 0.7071 |
|
754 |
+
| 5.5556 | 950 | - | 0.7095 |
|
755 |
+
| 5.8480 | 1000 | 3.5897 | 0.7103 |
|
756 |
+
| 6.0 | 1026 | - | 0.7080 |
|
757 |
+
| 6.1404 | 1050 | - | 0.7075 |
|
758 |
+
| 6.4327 | 1100 | - | 0.7089 |
|
759 |
+
| 6.7251 | 1150 | - | 0.7087 |
|
760 |
+
| 7.0 | 1197 | - | 0.7102 |
|
761 |
+
| 7.0175 | 1200 | - | 0.7101 |
|
762 |
+
| 7.3099 | 1250 | - | 0.7134 |
|
763 |
+
| 7.6023 | 1300 | - | 0.7130 |
|
764 |
+
| 7.8947 | 1350 | - | 0.7133 |
|
765 |
+
| 8.0 | 1368 | - | 0.7142 |
|
766 |
+
| 8.1871 | 1400 | - | 0.7125 |
|
767 |
+
| 8.4795 | 1450 | - | 0.7163 |
|
768 |
+
| 8.7719 | 1500 | 3.0206 | 0.7124 |
|
769 |
+
| 9.0 | 1539 | - | 0.7144 |
|
770 |
+
| 9.0643 | 1550 | - | 0.7158 |
|
771 |
+
| 9.3567 | 1600 | - | 0.7159 |
|
772 |
+
| 9.6491 | 1650 | - | 0.7158 |
|
773 |
+
| 9.9415 | 1700 | - | 0.7158 |
|
774 |
+
| 10.0 | 1710 | - | 0.7158 |
|
775 |
+
|
776 |
+
|
777 |
+
### Framework Versions
|
778 |
+
- Python: 3.11.9
|
779 |
+
- Sentence Transformers: 3.2.0
|
780 |
+
- Transformers: 4.44.1
|
781 |
+
- PyTorch: 2.4.0
|
782 |
+
- Accelerate: 0.34.2
|
783 |
+
- Datasets: 3.0.0
|
784 |
+
- Tokenizers: 0.19.1
|
785 |
+
|
786 |
+
## Citation
|
787 |
+
|
788 |
+
### BibTeX
|
789 |
+
|
790 |
+
#### Sentence Transformers
|
791 |
+
```bibtex
|
792 |
+
@inproceedings{reimers-2019-sentence-bert,
|
793 |
+
title = "Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks",
|
794 |
+
author = "Reimers, Nils and Gurevych, Iryna",
|
795 |
+
booktitle = "Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing",
|
796 |
+
month = "11",
|
797 |
+
year = "2019",
|
798 |
+
publisher = "Association for Computational Linguistics",
|
799 |
+
url = "https://arxiv.org/abs/1908.10084",
|
800 |
+
}
|
801 |
+
```
|
802 |
+
|
803 |
+
#### MatryoshkaLoss
|
804 |
+
```bibtex
|
805 |
+
@misc{kusupati2024matryoshka,
|
806 |
+
title={Matryoshka Representation Learning},
|
807 |
+
author={Aditya Kusupati and Gantavya Bhatt and Aniket Rege and Matthew Wallingford and Aditya Sinha and Vivek Ramanujan and William Howard-Snyder and Kaifeng Chen and Sham Kakade and Prateek Jain and Ali Farhadi},
|
808 |
+
year={2024},
|
809 |
+
eprint={2205.13147},
|
810 |
+
archivePrefix={arXiv},
|
811 |
+
primaryClass={cs.LG}
|
812 |
+
}
|
813 |
+
```
|
814 |
+
|
815 |
+
#### MultipleNegativesRankingLoss
|
816 |
+
```bibtex
|
817 |
+
@misc{henderson2017efficient,
|
818 |
+
title={Efficient Natural Language Response Suggestion for Smart Reply},
|
819 |
+
author={Matthew Henderson and Rami Al-Rfou and Brian Strope and Yun-hsuan Sung and Laszlo Lukacs and Ruiqi Guo and Sanjiv Kumar and Balint Miklos and Ray Kurzweil},
|
820 |
+
year={2017},
|
821 |
+
eprint={1705.00652},
|
822 |
+
archivePrefix={arXiv},
|
823 |
+
primaryClass={cs.CL}
|
824 |
+
}
|
825 |
+
```
|
826 |
+
|
827 |
+
<!--
|
828 |
+
## Glossary
|
829 |
+
|
830 |
+
*Clearly define terms in order to be accessible across audiences.*
|
831 |
+
-->
|
832 |
+
|
833 |
+
<!--
|
834 |
+
## Model Card Authors
|
835 |
+
|
836 |
+
*Lists the people who create the model card, providing recognition and accountability for the detailed work that goes into its construction.*
|
837 |
+
-->
|
838 |
+
|
839 |
+
<!--
|
840 |
+
## Model Card Contact
|
841 |
+
|
842 |
+
*Provides a way for people who have updates to the Model Card, suggestions, or questions, to contact the Model Card authors.*
|
843 |
+
-->
|
config.json
ADDED
@@ -0,0 +1,26 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"_name_or_path": "Snowflake/snowflake-arctic-embed-xs",
|
3 |
+
"architectures": [
|
4 |
+
"BertModel"
|
5 |
+
],
|
6 |
+
"attention_probs_dropout_prob": 0.1,
|
7 |
+
"classifier_dropout": null,
|
8 |
+
"gradient_checkpointing": false,
|
9 |
+
"hidden_act": "gelu",
|
10 |
+
"hidden_dropout_prob": 0.1,
|
11 |
+
"hidden_size": 384,
|
12 |
+
"initializer_range": 0.02,
|
13 |
+
"intermediate_size": 1536,
|
14 |
+
"layer_norm_eps": 1e-12,
|
15 |
+
"max_position_embeddings": 512,
|
16 |
+
"model_type": "bert",
|
17 |
+
"num_attention_heads": 12,
|
18 |
+
"num_hidden_layers": 6,
|
19 |
+
"pad_token_id": 0,
|
20 |
+
"position_embedding_type": "absolute",
|
21 |
+
"torch_dtype": "float32",
|
22 |
+
"transformers_version": "4.44.1",
|
23 |
+
"type_vocab_size": 2,
|
24 |
+
"use_cache": true,
|
25 |
+
"vocab_size": 30522
|
26 |
+
}
|
config_sentence_transformers.json
ADDED
@@ -0,0 +1,12 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"__version__": {
|
3 |
+
"sentence_transformers": "3.2.0",
|
4 |
+
"transformers": "4.44.1",
|
5 |
+
"pytorch": "2.4.0"
|
6 |
+
},
|
7 |
+
"prompts": {
|
8 |
+
"query": "Represent this sentence for searching relevant passages: "
|
9 |
+
},
|
10 |
+
"default_prompt_name": null,
|
11 |
+
"similarity_fn_name": null
|
12 |
+
}
|
model.safetensors
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:65ff04c91e23abe11a2471f64075652992e89b94026fcc034aa4ea091db513fa
|
3 |
+
size 90272656
|
modules.json
ADDED
@@ -0,0 +1,20 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
[
|
2 |
+
{
|
3 |
+
"idx": 0,
|
4 |
+
"name": "0",
|
5 |
+
"path": "",
|
6 |
+
"type": "sentence_transformers.models.Transformer"
|
7 |
+
},
|
8 |
+
{
|
9 |
+
"idx": 1,
|
10 |
+
"name": "1",
|
11 |
+
"path": "1_Pooling",
|
12 |
+
"type": "sentence_transformers.models.Pooling"
|
13 |
+
},
|
14 |
+
{
|
15 |
+
"idx": 2,
|
16 |
+
"name": "2",
|
17 |
+
"path": "2_Normalize",
|
18 |
+
"type": "sentence_transformers.models.Normalize"
|
19 |
+
}
|
20 |
+
]
|
sentence_bert_config.json
ADDED
@@ -0,0 +1,4 @@
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"max_seq_length": 512,
|
3 |
+
"do_lower_case": false
|
4 |
+
}
|
special_tokens_map.json
ADDED
@@ -0,0 +1,37 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"cls_token": {
|
3 |
+
"content": "[CLS]",
|
4 |
+
"lstrip": false,
|
5 |
+
"normalized": false,
|
6 |
+
"rstrip": false,
|
7 |
+
"single_word": false
|
8 |
+
},
|
9 |
+
"mask_token": {
|
10 |
+
"content": "[MASK]",
|
11 |
+
"lstrip": false,
|
12 |
+
"normalized": false,
|
13 |
+
"rstrip": false,
|
14 |
+
"single_word": false
|
15 |
+
},
|
16 |
+
"pad_token": {
|
17 |
+
"content": "[PAD]",
|
18 |
+
"lstrip": false,
|
19 |
+
"normalized": false,
|
20 |
+
"rstrip": false,
|
21 |
+
"single_word": false
|
22 |
+
},
|
23 |
+
"sep_token": {
|
24 |
+
"content": "[SEP]",
|
25 |
+
"lstrip": false,
|
26 |
+
"normalized": false,
|
27 |
+
"rstrip": false,
|
28 |
+
"single_word": false
|
29 |
+
},
|
30 |
+
"unk_token": {
|
31 |
+
"content": "[UNK]",
|
32 |
+
"lstrip": false,
|
33 |
+
"normalized": false,
|
34 |
+
"rstrip": false,
|
35 |
+
"single_word": false
|
36 |
+
}
|
37 |
+
}
|
tokenizer.json
ADDED
The diff for this file is too large to render.
See raw diff
|
|
tokenizer_config.json
ADDED
@@ -0,0 +1,64 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"added_tokens_decoder": {
|
3 |
+
"0": {
|
4 |
+
"content": "[PAD]",
|
5 |
+
"lstrip": false,
|
6 |
+
"normalized": false,
|
7 |
+
"rstrip": false,
|
8 |
+
"single_word": false,
|
9 |
+
"special": true
|
10 |
+
},
|
11 |
+
"100": {
|
12 |
+
"content": "[UNK]",
|
13 |
+
"lstrip": false,
|
14 |
+
"normalized": false,
|
15 |
+
"rstrip": false,
|
16 |
+
"single_word": false,
|
17 |
+
"special": true
|
18 |
+
},
|
19 |
+
"101": {
|
20 |
+
"content": "[CLS]",
|
21 |
+
"lstrip": false,
|
22 |
+
"normalized": false,
|
23 |
+
"rstrip": false,
|
24 |
+
"single_word": false,
|
25 |
+
"special": true
|
26 |
+
},
|
27 |
+
"102": {
|
28 |
+
"content": "[SEP]",
|
29 |
+
"lstrip": false,
|
30 |
+
"normalized": false,
|
31 |
+
"rstrip": false,
|
32 |
+
"single_word": false,
|
33 |
+
"special": true
|
34 |
+
},
|
35 |
+
"103": {
|
36 |
+
"content": "[MASK]",
|
37 |
+
"lstrip": false,
|
38 |
+
"normalized": false,
|
39 |
+
"rstrip": false,
|
40 |
+
"single_word": false,
|
41 |
+
"special": true
|
42 |
+
}
|
43 |
+
},
|
44 |
+
"clean_up_tokenization_spaces": true,
|
45 |
+
"cls_token": "[CLS]",
|
46 |
+
"do_basic_tokenize": true,
|
47 |
+
"do_lower_case": true,
|
48 |
+
"mask_token": "[MASK]",
|
49 |
+
"max_length": 512,
|
50 |
+
"model_max_length": 512,
|
51 |
+
"never_split": null,
|
52 |
+
"pad_to_multiple_of": null,
|
53 |
+
"pad_token": "[PAD]",
|
54 |
+
"pad_token_type_id": 0,
|
55 |
+
"padding_side": "right",
|
56 |
+
"sep_token": "[SEP]",
|
57 |
+
"stride": 0,
|
58 |
+
"strip_accents": null,
|
59 |
+
"tokenize_chinese_chars": true,
|
60 |
+
"tokenizer_class": "BertTokenizer",
|
61 |
+
"truncation_side": "right",
|
62 |
+
"truncation_strategy": "longest_first",
|
63 |
+
"unk_token": "[UNK]"
|
64 |
+
}
|
vocab.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|