HardwarePhi 30k Iteration Result
(have a upload issue, we would repair soon)
Overview
This document presents the results of the HardwarePhi model after 30,000 iterations. The model is based on the Phi1.5B architecture (old version) and has been trained using a specific dataset.
Author:
- Weimin Fu from Kansas State University's Hardware Security Group
Corresponding Author:
- Xiaolong Guo
- E-mail: guoxiaolong@k-state.edu
Acknowledgments:
- Common Crawl, CAD4Assurance, Trust-Hub, and open-source designers on GitHub and OpenCore support the data collection efforts. Their commitment to knowledge sharing is greatly appreciated.
- Special thanks to Shijie Li and Yifang Zhao from the University of Science and Technology of China for their assistance in data collection.
- Gratitude is extended to Kaichen Yang from the Electrical and Computer Engineering Department at Michigan Technological University for providing the training platform support.
Dataset
The training was performed using the following dataset:
Model Architecture
The base model architecture used for this iteration is Phi1.5B (old version). This architecture provides the foundational structure and parameters for the HardwarePhi model.
Iteration Details
- Iteration Count: 30,000
Citation Information
Please cite the following paper
@article{fuhardware,
title={Hardware Phi-1.5 B: A Large Language Model Encodes Hardware Domain Specific Knowledge},
author={Fu, Weimin and Li, Shijie and Zhao, Yifang and Ma, Haocheng and Dutta, Raj and Zhang, Xuan and Yang, Kaichen and Jin, Yier and Guo, Xiaolong},
journal={29th IEEE/ACM Asia and South Pacific Design Automation Conference (ASP-DAC)},
year={2024}
}
You can view the paper from arxiv: arxiv.org/abs/2402.01728
Update from our group for Hardware domain-specific LLM:
Blog: Large Language Model for Hardware Security
HomePage: Hardware Security Lab
Acknowledgment
Portions of this work were supported by the National Science Foundation (CCF-2019310, First Award Program of ARISE in EPSCoR 2148878).
- Downloads last month
- 28