| { |
| "_name_or_path": "/mnt/data4/luyiheng/BARTfinetune/lr_5e-05/checkpoint-195", |
| "_num_labels": 3, |
| "activation_dropout": 0.0, |
| "activation_function": "gelu", |
| "add_final_layer_norm": false, |
| "architectures": [ |
| "BartForSequenceClassification" |
| ], |
| "attention_dropout": 0.0, |
| "bos_token_id": 0, |
| "classif_dropout": 0.0, |
| "classifier_dropout": 0.0, |
| "d_model": 1024, |
| "decoder_attention_heads": 16, |
| "decoder_ffn_dim": 4096, |
| "decoder_layerdrop": 0.0, |
| "decoder_layers": 12, |
| "decoder_start_token_id": 2, |
| "dropout": 0.1, |
| "encoder_attention_heads": 16, |
| "encoder_ffn_dim": 4096, |
| "encoder_layerdrop": 0.0, |
| "encoder_layers": 12, |
| "eos_token_id": 2, |
| "forced_eos_token_id": 2, |
| "gradient_checkpointing": false, |
| "id2label": { |
| "0": "Accessibility", |
| "1": "Architectures", |
| "2": "Artificial intelligence", |
| "3": "Arts and humanities", |
| "4": "Collaborative and social computing", |
| "5": "Communication hardware, interfaces and storage", |
| "6": "Computational complexity and cryptography", |
| "7": "Computers in other domains", |
| "8": "Continuous mathematics", |
| "9": "Cross-computing tools and techniques", |
| "10": "Cryptography", |
| "11": "Data management systems", |
| "12": "Database and storage security", |
| "13": "Dependable and fault-tolerant systems and networks", |
| "14": "Design and analysis of algorithms", |
| "15": "Discrete mathematics", |
| "16": "Distributed computing methodologies", |
| "17": "Document management and text processing", |
| "18": "Document types", |
| "19": "Education", |
| "20": "Electronic commerce", |
| "21": "Electronic design automation", |
| "22": "Embedded and cyber-physical systems", |
| "23": "Emerging technologies", |
| "24": "Enterprise computing", |
| "25": "Formal languages and automata theory", |
| "26": "Formal methods and theory of security", |
| "27": "Hardware test", |
| "28": "Hardware validation", |
| "29": "Human and societal aspects of security and privacy", |
| "30": "Human computer interaction (HCI)", |
| "31": "Information retrieval", |
| "32": "Information storage systems", |
| "33": "Information systems applications", |
| "34": "Information theory", |
| "35": "Integrated circuits", |
| "36": "Interaction design", |
| "37": "Intrusion/anomaly detection and malware mitigation", |
| "38": "Logic", |
| "39": "Machine learning", |
| "40": "Mathematical analysis", |
| "41": "Mathematical software", |
| "42": "Modeling and simulation", |
| "43": "Models of computation", |
| "44": "Network algorithms", |
| "45": "Network architectures", |
| "46": "Network components", |
| "47": "Network performance evaluation", |
| "48": "Network properties", |
| "49": "Network protocols", |
| "50": "Network security", |
| "51": "Network services", |
| "52": "Network types", |
| "53": "Parallel computing methodologies", |
| "54": "Power and energy", |
| "55": "Probability and statistics", |
| "56": "Randomness, geometry and discrete structures", |
| "57": "Real-time systems", |
| "58": "Robustness", |
| "59": "Security in hardware", |
| "60": "Security services", |
| "61": "Semantics and reasoning", |
| "62": "Software and application security", |
| "63": "Symbolic and algebraic manipulation", |
| "64": "Systems security", |
| "65": "Theory and algorithms for application domains", |
| "66": "Ubiquitous and mobile computing", |
| "67": "Very large scale integration design", |
| "68": "Visualization", |
| "69": "World Wide Web" |
| }, |
| "init_std": 0.02, |
| "is_encoder_decoder": true, |
| "label2id": { |
| "Accessibility": 0, |
| "Architectures": 1, |
| "Artificial intelligence": 2, |
| "Arts and humanities": 3, |
| "Collaborative and social computing": 4, |
| "Communication hardware, interfaces and storage": 5, |
| "Computational complexity and cryptography": 6, |
| "Computers in other domains": 7, |
| "Continuous mathematics": 8, |
| "Cross-computing tools and techniques": 9, |
| "Cryptography": 10, |
| "Data management systems": 11, |
| "Database and storage security": 12, |
| "Dependable and fault-tolerant systems and networks": 13, |
| "Design and analysis of algorithms": 14, |
| "Discrete mathematics": 15, |
| "Distributed computing methodologies": 16, |
| "Document management and text processing": 17, |
| "Document types": 18, |
| "Education": 19, |
| "Electronic commerce": 20, |
| "Electronic design automation": 21, |
| "Embedded and cyber-physical systems": 22, |
| "Emerging technologies": 23, |
| "Enterprise computing": 24, |
| "Formal languages and automata theory": 25, |
| "Formal methods and theory of security": 26, |
| "Hardware test": 27, |
| "Hardware validation": 28, |
| "Human and societal aspects of security and privacy": 29, |
| "Human computer interaction (HCI)": 30, |
| "Information retrieval": 31, |
| "Information storage systems": 32, |
| "Information systems applications": 33, |
| "Information theory": 34, |
| "Integrated circuits": 35, |
| "Interaction design": 36, |
| "Intrusion/anomaly detection and malware mitigation": 37, |
| "Logic": 38, |
| "Machine learning": 39, |
| "Mathematical analysis": 40, |
| "Mathematical software": 41, |
| "Modeling and simulation": 42, |
| "Models of computation": 43, |
| "Network algorithms": 44, |
| "Network architectures": 45, |
| "Network components": 46, |
| "Network performance evaluation": 47, |
| "Network properties": 48, |
| "Network protocols": 49, |
| "Network security": 50, |
| "Network services": 51, |
| "Network types": 52, |
| "Parallel computing methodologies": 53, |
| "Power and energy": 54, |
| "Probability and statistics": 55, |
| "Randomness, geometry and discrete structures": 56, |
| "Real-time systems": 57, |
| "Robustness": 58, |
| "Security in hardware": 59, |
| "Security services": 60, |
| "Semantics and reasoning": 61, |
| "Software and application security": 62, |
| "Symbolic and algebraic manipulation": 63, |
| "Systems security": 64, |
| "Theory and algorithms for application domains": 65, |
| "Ubiquitous and mobile computing": 66, |
| "Very large scale integration design": 67, |
| "Visualization": 68, |
| "World Wide Web": 69 |
| }, |
| "max_position_embeddings": 1024, |
| "model_type": "bart", |
| "normalize_before": false, |
| "num_hidden_layers": 12, |
| "output_past": false, |
| "pad_token_id": 1, |
| "problem_type": "single_label_classification", |
| "scale_embedding": false, |
| "torch_dtype": "float32", |
| "transformers_version": "4.49.0", |
| "use_cache": true, |
| "vocab_size": 50265 |
| } |
|
|