vishva0 commited on
Commit
e1e721f
·
verified ·
1 Parent(s): 5eb14cb

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +72 -9
README.md CHANGED
@@ -1,22 +1,85 @@
1
  ---
2
  base_model: unsloth/qwen2.5-0.5b-instruct-unsloth-bnb-4bit
 
 
 
3
  tags:
4
  - text-generation-inference
5
  - transformers
6
  - unsloth
7
  - qwen2
8
  - trl
9
- license: apache-2.0
10
- language:
11
- - en
 
12
  ---
13
 
14
- # Uploaded model
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
15
 
16
- - **Developed by:** vishva0
17
- - **License:** apache-2.0
18
- - **Finetuned from model :** unsloth/qwen2.5-0.5b-instruct-unsloth-bnb-4bit
19
 
20
- This qwen2 model was trained 2x faster with [Unsloth](https://github.com/unslothai/unsloth)
 
21
 
22
- [<img src="https://raw.githubusercontent.com/unslothai/unsloth/main/images/unsloth%20made%20with%20love.png" width="200"/>](https://github.com/unslothai/unsloth)
 
 
1
  ---
2
  base_model: unsloth/qwen2.5-0.5b-instruct-unsloth-bnb-4bit
3
+ language:
4
+ - en
5
+ license: apache-2.0
6
  tags:
7
  - text-generation-inference
8
  - transformers
9
  - unsloth
10
  - qwen2
11
  - trl
12
+ - safetensors
13
+ - security
14
+ - red-teaming
15
+ - adversarial-testing
16
  ---
17
 
18
+ # coliseum034/coliseum-attacker-dan
19
+
20
+ This model is a fine-tuned version of `unsloth/qwen2.5-0.5b-instruct-unsloth-bnb-4bit`. It was trained up to 2x faster utilizing [Unsloth](https://github.com/unslothai/unsloth) and Hugging Face's TRL library.
21
+
22
+ Developed by Vishva Patel (`vishva0`), this model is optimized for adversarial interactions, red-teaming, and generating edge-case scenarios for testing multi-agent security systems.
23
+
24
+ ## ⚙️ Model Details
25
+
26
+ * **Developed by:** Vishva Patel (`vishva0`)
27
+ * **License:** Apache 2.0
28
+ * **Base Model:** `unsloth/qwen2.5-0.5b-instruct-unsloth-bnb-4bit`
29
+ * **Architecture:** Qwen2 (0.5B parameters)
30
+ * **Language:** English
31
+ * **Quantization:** 4-bit (bitsandbytes)
32
+
33
+ ## 📊 Training & Evaluation Metrics
34
+
35
+ The model was trained over 4 epochs for a total of 276 global steps, with smart gradient offloading to optimize VRAM. The training procedure achieved a final validation perplexity of ~7.380.
36
+
37
+ ### Per-Epoch Results
38
+
39
+ | Epoch | Training Loss | Validation Loss | Perplexity (PPL) |
40
+ | :---: | :---: | :---: | :---: |
41
+ | **1.0** | 2.3769 | 2.2334 | 9.332 |
42
+ | **2.0** | 2.0010 | 2.0595 | 7.842 |
43
+ | **3.0** | 1.8116 | 1.9976 | 7.371 |
44
+ | **4.0** | 1.7036 | 1.9987 | 7.380 |
45
+
46
+ ### Final Held-Out Metrics
47
+
48
+ * **Final Training Loss:** `1.7036`
49
+ * **Final Evaluation Loss:** `1.9987`
50
+ * **Final Perplexity:** `7.380`
51
+
52
+ ### Training Hyperparameters & Performance
53
+
54
+ * **Global Steps:** 276
55
+ * **Total Training Runtime:** ~26 minutes, 8 seconds (1568.302 seconds)
56
+ * **Training Samples per Second:** 2.778
57
+ * **Training Steps per Second:** 0.176
58
+ * **Total FLOPs:** 4.179 x 10^15
59
+
60
+ ## 💻 Framework Versions
61
+
62
+ * PEFT
63
+ * Transformers
64
+ * Unsloth
65
+ * TRL
66
+ * Safetensors
67
+ * PyTorch
68
+
69
+ ## 🚀 Usage
70
+
71
+ This model uses the standard `transformers` library pipeline or `text-generation-inference`.
72
+
73
+ ```python
74
+ from transformers import AutoModelForCausalLM, AutoTokenizer
75
+
76
+ model_id = "coliseum034/coliseum-attacker-dan"
77
 
78
+ tokenizer = AutoTokenizer.from_pretrained(model_id)
79
+ model = AutoModelForCausalLM.from_pretrained(model_id)
 
80
 
81
+ prompt = "Initiate testing parameters for potential authorization bypasses:"
82
+ inputs = tokenizer(prompt, return_tensors="pt")
83
 
84
+ outputs = model.generate(**inputs, max_new_tokens=100)
85
+ print(tokenizer.decode(outputs[0], skip_special_tokens=True))