| { | |
| "_name_or_path": "/mnt/data4/luyiheng/BARTfinetune/lr_5e-05/checkpoint-195", | |
| "_num_labels": 3, | |
| "activation_dropout": 0.0, | |
| "activation_function": "gelu", | |
| "add_final_layer_norm": false, | |
| "architectures": [ | |
| "BartForSequenceClassification" | |
| ], | |
| "attention_dropout": 0.0, | |
| "bos_token_id": 0, | |
| "classif_dropout": 0.0, | |
| "classifier_dropout": 0.0, | |
| "d_model": 1024, | |
| "decoder_attention_heads": 16, | |
| "decoder_ffn_dim": 4096, | |
| "decoder_layerdrop": 0.0, | |
| "decoder_layers": 12, | |
| "decoder_start_token_id": 2, | |
| "dropout": 0.1, | |
| "encoder_attention_heads": 16, | |
| "encoder_ffn_dim": 4096, | |
| "encoder_layerdrop": 0.0, | |
| "encoder_layers": 12, | |
| "eos_token_id": 2, | |
| "forced_eos_token_id": 2, | |
| "gradient_checkpointing": false, | |
| "id2label": { | |
| "0": "Accessibility", | |
| "1": "Architectures", | |
| "2": "Artificial intelligence", | |
| "3": "Arts and humanities", | |
| "4": "Collaborative and social computing", | |
| "5": "Communication hardware, interfaces and storage", | |
| "6": "Computational complexity and cryptography", | |
| "7": "Computers in other domains", | |
| "8": "Continuous mathematics", | |
| "9": "Cross-computing tools and techniques", | |
| "10": "Cryptography", | |
| "11": "Data management systems", | |
| "12": "Database and storage security", | |
| "13": "Dependable and fault-tolerant systems and networks", | |
| "14": "Design and analysis of algorithms", | |
| "15": "Discrete mathematics", | |
| "16": "Distributed computing methodologies", | |
| "17": "Document management and text processing", | |
| "18": "Document types", | |
| "19": "Education", | |
| "20": "Electronic commerce", | |
| "21": "Electronic design automation", | |
| "22": "Embedded and cyber-physical systems", | |
| "23": "Emerging technologies", | |
| "24": "Enterprise computing", | |
| "25": "Formal languages and automata theory", | |
| "26": "Formal methods and theory of security", | |
| "27": "Hardware test", | |
| "28": "Hardware validation", | |
| "29": "Human and societal aspects of security and privacy", | |
| "30": "Human computer interaction (HCI)", | |
| "31": "Information retrieval", | |
| "32": "Information storage systems", | |
| "33": "Information systems applications", | |
| "34": "Information theory", | |
| "35": "Integrated circuits", | |
| "36": "Interaction design", | |
| "37": "Intrusion/anomaly detection and malware mitigation", | |
| "38": "Logic", | |
| "39": "Machine learning", | |
| "40": "Mathematical analysis", | |
| "41": "Mathematical software", | |
| "42": "Modeling and simulation", | |
| "43": "Models of computation", | |
| "44": "Network algorithms", | |
| "45": "Network architectures", | |
| "46": "Network components", | |
| "47": "Network performance evaluation", | |
| "48": "Network properties", | |
| "49": "Network protocols", | |
| "50": "Network security", | |
| "51": "Network services", | |
| "52": "Network types", | |
| "53": "Parallel computing methodologies", | |
| "54": "Power and energy", | |
| "55": "Probability and statistics", | |
| "56": "Randomness, geometry and discrete structures", | |
| "57": "Real-time systems", | |
| "58": "Robustness", | |
| "59": "Security in hardware", | |
| "60": "Security services", | |
| "61": "Semantics and reasoning", | |
| "62": "Software and application security", | |
| "63": "Symbolic and algebraic manipulation", | |
| "64": "Systems security", | |
| "65": "Theory and algorithms for application domains", | |
| "66": "Ubiquitous and mobile computing", | |
| "67": "Very large scale integration design", | |
| "68": "Visualization", | |
| "69": "World Wide Web" | |
| }, | |
| "init_std": 0.02, | |
| "is_encoder_decoder": true, | |
| "label2id": { | |
| "Accessibility": 0, | |
| "Architectures": 1, | |
| "Artificial intelligence": 2, | |
| "Arts and humanities": 3, | |
| "Collaborative and social computing": 4, | |
| "Communication hardware, interfaces and storage": 5, | |
| "Computational complexity and cryptography": 6, | |
| "Computers in other domains": 7, | |
| "Continuous mathematics": 8, | |
| "Cross-computing tools and techniques": 9, | |
| "Cryptography": 10, | |
| "Data management systems": 11, | |
| "Database and storage security": 12, | |
| "Dependable and fault-tolerant systems and networks": 13, | |
| "Design and analysis of algorithms": 14, | |
| "Discrete mathematics": 15, | |
| "Distributed computing methodologies": 16, | |
| "Document management and text processing": 17, | |
| "Document types": 18, | |
| "Education": 19, | |
| "Electronic commerce": 20, | |
| "Electronic design automation": 21, | |
| "Embedded and cyber-physical systems": 22, | |
| "Emerging technologies": 23, | |
| "Enterprise computing": 24, | |
| "Formal languages and automata theory": 25, | |
| "Formal methods and theory of security": 26, | |
| "Hardware test": 27, | |
| "Hardware validation": 28, | |
| "Human and societal aspects of security and privacy": 29, | |
| "Human computer interaction (HCI)": 30, | |
| "Information retrieval": 31, | |
| "Information storage systems": 32, | |
| "Information systems applications": 33, | |
| "Information theory": 34, | |
| "Integrated circuits": 35, | |
| "Interaction design": 36, | |
| "Intrusion/anomaly detection and malware mitigation": 37, | |
| "Logic": 38, | |
| "Machine learning": 39, | |
| "Mathematical analysis": 40, | |
| "Mathematical software": 41, | |
| "Modeling and simulation": 42, | |
| "Models of computation": 43, | |
| "Network algorithms": 44, | |
| "Network architectures": 45, | |
| "Network components": 46, | |
| "Network performance evaluation": 47, | |
| "Network properties": 48, | |
| "Network protocols": 49, | |
| "Network security": 50, | |
| "Network services": 51, | |
| "Network types": 52, | |
| "Parallel computing methodologies": 53, | |
| "Power and energy": 54, | |
| "Probability and statistics": 55, | |
| "Randomness, geometry and discrete structures": 56, | |
| "Real-time systems": 57, | |
| "Robustness": 58, | |
| "Security in hardware": 59, | |
| "Security services": 60, | |
| "Semantics and reasoning": 61, | |
| "Software and application security": 62, | |
| "Symbolic and algebraic manipulation": 63, | |
| "Systems security": 64, | |
| "Theory and algorithms for application domains": 65, | |
| "Ubiquitous and mobile computing": 66, | |
| "Very large scale integration design": 67, | |
| "Visualization": 68, | |
| "World Wide Web": 69 | |
| }, | |
| "max_position_embeddings": 1024, | |
| "model_type": "bart", | |
| "normalize_before": false, | |
| "num_hidden_layers": 12, | |
| "output_past": false, | |
| "pad_token_id": 1, | |
| "problem_type": "single_label_classification", | |
| "scale_embedding": false, | |
| "torch_dtype": "float32", | |
| "transformers_version": "4.49.0", | |
| "use_cache": true, | |
| "vocab_size": 50265 | |
| } | |