Update MMSearch-Plus dataset with encrypted data files
Browse files- README.md +4 -4
- data-00000-of-00003.arrow +2 -2
- data-00001-of-00003.arrow +2 -2
- data-00002-of-00003.arrow +2 -2
- dataset_info.json +29 -13
- mmsearch_plus.py +25 -8
- state.json +1 -1
README.md
CHANGED
|
@@ -71,7 +71,7 @@ Official repository for the paper "[MMSearch-Plus: Benchmarking Provenance-Aware
|
|
| 71 |
|
| 72 |
**⚠️ Important: This dataset is encrypted to prevent data contamination. However, decryption is handled transparently by the dataset loader.**
|
| 73 |
|
| 74 |
-
###
|
| 75 |
|
| 76 |
Load the dataset with automatic decryption using your canary string:
|
| 77 |
|
|
@@ -80,7 +80,7 @@ import os
|
|
| 80 |
from datasets import load_dataset
|
| 81 |
|
| 82 |
# Set the canary string (hint: it's the name of this repo)
|
| 83 |
-
os.environ['
|
| 84 |
|
| 85 |
# Load dataset with transparent decryption
|
| 86 |
dataset = load_dataset("Cie1/MMSearch-Plus", trust_remote_code=True)
|
|
@@ -129,14 +129,14 @@ Evaluation of closed- and open-source MLLMs shows:
|
|
| 129 |
- Models struggle with multi-step visual reasoning and cross-modal information integration
|
| 130 |
|
| 131 |
<p align="center">
|
| 132 |
-
<img src="https://raw.githubusercontent.com/mmsearch-plus/mmsearch-plus.github.io/main/static/images/teaser.png" width="
|
| 133 |
The overview of three paradigms for multimodal browsing tasks that demand fine-grained visual reasoning.
|
| 134 |
</p>
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
<p align="center">
|
| 139 |
-
<img src="https://raw.githubusercontent.com/mmsearch-plus/mmsearch-plus.github.io/main/static/images/real-teaser.jpg" width="
|
| 140 |
The overview of an example trajectory for a task in <b>MMSearch-Plus</b>.
|
| 141 |
</p>
|
| 142 |
|
|
|
|
| 71 |
|
| 72 |
**⚠️ Important: This dataset is encrypted to prevent data contamination. However, decryption is handled transparently by the dataset loader.**
|
| 73 |
|
| 74 |
+
### Dataset Usage
|
| 75 |
|
| 76 |
Load the dataset with automatic decryption using your canary string:
|
| 77 |
|
|
|
|
| 80 |
from datasets import load_dataset
|
| 81 |
|
| 82 |
# Set the canary string (hint: it's the name of this repo)
|
| 83 |
+
os.environ['MMSEARCH_PLUS'] = 'your_canary_string'
|
| 84 |
|
| 85 |
# Load dataset with transparent decryption
|
| 86 |
dataset = load_dataset("Cie1/MMSearch-Plus", trust_remote_code=True)
|
|
|
|
| 129 |
- Models struggle with multi-step visual reasoning and cross-modal information integration
|
| 130 |
|
| 131 |
<p align="center">
|
| 132 |
+
<img src="https://raw.githubusercontent.com/mmsearch-plus/mmsearch-plus.github.io/main/static/images/teaser.png" width="80%"> <br>
|
| 133 |
The overview of three paradigms for multimodal browsing tasks that demand fine-grained visual reasoning.
|
| 134 |
</p>
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
<p align="center">
|
| 139 |
+
<img src="https://raw.githubusercontent.com/mmsearch-plus/mmsearch-plus.github.io/main/static/images/real-teaser.jpg" width="80%"> <br>
|
| 140 |
The overview of an example trajectory for a task in <b>MMSearch-Plus</b>.
|
| 141 |
</p>
|
| 142 |
|
data-00000-of-00003.arrow
CHANGED
|
@@ -1,3 +1,3 @@
|
|
| 1 |
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:
|
| 3 |
-
size
|
|
|
|
| 1 |
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:5d37bfccc2c49668422470eddaccb1aa3abe8d022b6c36f8f5d3b5eb4a23c9b9
|
| 3 |
+
size 419741304
|
data-00001-of-00003.arrow
CHANGED
|
@@ -1,3 +1,3 @@
|
|
| 1 |
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:
|
| 3 |
-
size
|
|
|
|
| 1 |
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:731843bf222a4ab7e8facf9a468b5d84fb7b8af98d37dfb9b09bc877d278542a
|
| 3 |
+
size 466502312
|
data-00002-of-00003.arrow
CHANGED
|
@@ -1,3 +1,3 @@
|
|
| 1 |
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:
|
| 3 |
-
size
|
|
|
|
| 1 |
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:25e89cb48e883d9884e9dd2acc0498c89556987385fcb2c0badb8933a15a9f6b
|
| 3 |
+
size 345388808
|
dataset_info.json
CHANGED
|
@@ -2,10 +2,6 @@
|
|
| 2 |
"citation": "",
|
| 3 |
"description": "",
|
| 4 |
"features": {
|
| 5 |
-
"question": {
|
| 6 |
-
"dtype": "string",
|
| 7 |
-
"_type": "Value"
|
| 8 |
-
},
|
| 9 |
"answer": {
|
| 10 |
"feature": {
|
| 11 |
"dtype": "string",
|
|
@@ -13,15 +9,19 @@
|
|
| 13 |
},
|
| 14 |
"_type": "Sequence"
|
| 15 |
},
|
| 16 |
-
"
|
| 17 |
-
"dtype": "
|
|
|
|
|
|
|
|
|
|
|
|
|
| 18 |
"_type": "Value"
|
| 19 |
},
|
| 20 |
"arxiv_id": {
|
| 21 |
"dtype": "string",
|
| 22 |
"_type": "Value"
|
| 23 |
},
|
| 24 |
-
"
|
| 25 |
"dtype": "string",
|
| 26 |
"_type": "Value"
|
| 27 |
},
|
|
@@ -29,33 +29,49 @@
|
|
| 29 |
"dtype": "string",
|
| 30 |
"_type": "Value"
|
| 31 |
},
|
| 32 |
-
"
|
| 33 |
"dtype": "string",
|
| 34 |
"_type": "Value"
|
| 35 |
},
|
| 36 |
-
"
|
| 37 |
"dtype": "string",
|
| 38 |
"_type": "Value"
|
| 39 |
},
|
| 40 |
-
"
|
| 41 |
"dtype": "string",
|
| 42 |
"_type": "Value"
|
| 43 |
},
|
| 44 |
-
"
|
| 45 |
"dtype": "string",
|
| 46 |
"_type": "Value"
|
| 47 |
},
|
| 48 |
-
"
|
| 49 |
"dtype": "string",
|
| 50 |
"_type": "Value"
|
| 51 |
},
|
| 52 |
-
"
|
| 53 |
"dtype": "string",
|
| 54 |
"_type": "Value"
|
| 55 |
},
|
| 56 |
"img_3": {
|
| 57 |
"dtype": "string",
|
| 58 |
"_type": "Value"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 59 |
}
|
| 60 |
},
|
| 61 |
"homepage": "",
|
|
|
|
| 2 |
"citation": "",
|
| 3 |
"description": "",
|
| 4 |
"features": {
|
|
|
|
|
|
|
|
|
|
|
|
|
| 5 |
"answer": {
|
| 6 |
"feature": {
|
| 7 |
"dtype": "string",
|
|
|
|
| 9 |
},
|
| 10 |
"_type": "Sequence"
|
| 11 |
},
|
| 12 |
+
"encrypted_img_1": {
|
| 13 |
+
"dtype": "string",
|
| 14 |
+
"_type": "Value"
|
| 15 |
+
},
|
| 16 |
+
"encrypted_img_4": {
|
| 17 |
+
"dtype": "string",
|
| 18 |
"_type": "Value"
|
| 19 |
},
|
| 20 |
"arxiv_id": {
|
| 21 |
"dtype": "string",
|
| 22 |
"_type": "Value"
|
| 23 |
},
|
| 24 |
+
"question": {
|
| 25 |
"dtype": "string",
|
| 26 |
"_type": "Value"
|
| 27 |
},
|
|
|
|
| 29 |
"dtype": "string",
|
| 30 |
"_type": "Value"
|
| 31 |
},
|
| 32 |
+
"img_5": {
|
| 33 |
"dtype": "string",
|
| 34 |
"_type": "Value"
|
| 35 |
},
|
| 36 |
+
"encrypted_img_5": {
|
| 37 |
"dtype": "string",
|
| 38 |
"_type": "Value"
|
| 39 |
},
|
| 40 |
+
"difficulty": {
|
| 41 |
"dtype": "string",
|
| 42 |
"_type": "Value"
|
| 43 |
},
|
| 44 |
+
"img_4": {
|
| 45 |
"dtype": "string",
|
| 46 |
"_type": "Value"
|
| 47 |
},
|
| 48 |
+
"encrypted_img_2": {
|
| 49 |
"dtype": "string",
|
| 50 |
"_type": "Value"
|
| 51 |
},
|
| 52 |
+
"subtask": {
|
| 53 |
"dtype": "string",
|
| 54 |
"_type": "Value"
|
| 55 |
},
|
| 56 |
"img_3": {
|
| 57 |
"dtype": "string",
|
| 58 |
"_type": "Value"
|
| 59 |
+
},
|
| 60 |
+
"video_url": {
|
| 61 |
+
"dtype": "string",
|
| 62 |
+
"_type": "Value"
|
| 63 |
+
},
|
| 64 |
+
"num_images": {
|
| 65 |
+
"dtype": "int64",
|
| 66 |
+
"_type": "Value"
|
| 67 |
+
},
|
| 68 |
+
"encrypted_img_3": {
|
| 69 |
+
"dtype": "string",
|
| 70 |
+
"_type": "Value"
|
| 71 |
+
},
|
| 72 |
+
"img_2": {
|
| 73 |
+
"dtype": "string",
|
| 74 |
+
"_type": "Value"
|
| 75 |
}
|
| 76 |
},
|
| 77 |
"homepage": "",
|
mmsearch_plus.py
CHANGED
|
@@ -104,7 +104,7 @@ class MmsearchPlus(datasets.GeneratorBasedBuilder):
|
|
| 104 |
|
| 105 |
def _split_generators(self, dl_manager):
|
| 106 |
# Get canary from environment variable or kwargs
|
| 107 |
-
canary = os.environ.get("
|
| 108 |
|
| 109 |
# Check if passed in the builder's initialization
|
| 110 |
if hasattr(self, 'canary'):
|
|
@@ -112,10 +112,10 @@ class MmsearchPlus(datasets.GeneratorBasedBuilder):
|
|
| 112 |
|
| 113 |
if not canary:
|
| 114 |
raise ValueError(
|
| 115 |
-
"Canary string is required for decryption. Either set the
|
| 116 |
"environment variable or pass it via the dataset loading kwargs. "
|
| 117 |
"Example: load_dataset('path/to/dataset', trust_remote_code=True) after setting "
|
| 118 |
-
"os.environ['
|
| 119 |
)
|
| 120 |
|
| 121 |
# Download files
|
|
@@ -156,11 +156,28 @@ class MmsearchPlus(datasets.GeneratorBasedBuilder):
|
|
| 156 |
decrypted_answers.append(answer)
|
| 157 |
example["answer"] = decrypted_answers
|
| 158 |
|
| 159 |
-
# Decrypt image fields
|
| 160 |
-
|
| 161 |
-
|
| 162 |
-
|
| 163 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 164 |
|
| 165 |
yield key, example
|
| 166 |
key += 1
|
|
|
|
| 104 |
|
| 105 |
def _split_generators(self, dl_manager):
|
| 106 |
# Get canary from environment variable or kwargs
|
| 107 |
+
canary = os.environ.get("MMSEARCH_PLUS")
|
| 108 |
|
| 109 |
# Check if passed in the builder's initialization
|
| 110 |
if hasattr(self, 'canary'):
|
|
|
|
| 112 |
|
| 113 |
if not canary:
|
| 114 |
raise ValueError(
|
| 115 |
+
"Canary string is required for decryption. Either set the MMSEARCH_PLUS "
|
| 116 |
"environment variable or pass it via the dataset loading kwargs. "
|
| 117 |
"Example: load_dataset('path/to/dataset', trust_remote_code=True) after setting "
|
| 118 |
+
"os.environ['MMSEARCH_PLUS'] = 'your_canary_string'"
|
| 119 |
)
|
| 120 |
|
| 121 |
# Download files
|
|
|
|
| 156 |
decrypted_answers.append(answer)
|
| 157 |
example["answer"] = decrypted_answers
|
| 158 |
|
| 159 |
+
# Decrypt image fields - handle both original and renamed encrypted fields
|
| 160 |
+
image_field_mapping = {
|
| 161 |
+
"encrypted_img_1": "img_1",
|
| 162 |
+
"encrypted_img_2": "img_2",
|
| 163 |
+
"encrypted_img_3": "img_3",
|
| 164 |
+
"encrypted_img_4": "img_4",
|
| 165 |
+
"encrypted_img_5": "img_5",
|
| 166 |
+
# Also handle original field names for backward compatibility
|
| 167 |
+
"img_1": "img_1",
|
| 168 |
+
"img_2": "img_2",
|
| 169 |
+
"img_3": "img_3",
|
| 170 |
+
"img_4": "img_4",
|
| 171 |
+
"img_5": "img_5"
|
| 172 |
+
}
|
| 173 |
+
|
| 174 |
+
for encrypted_field, decrypted_field in image_field_mapping.items():
|
| 175 |
+
if example.get(encrypted_field):
|
| 176 |
+
decrypted_image = decrypt_image(example[encrypted_field], canary)
|
| 177 |
+
example[decrypted_field] = decrypted_image
|
| 178 |
+
# Remove the encrypted field if it's not the same as decrypted field
|
| 179 |
+
if encrypted_field != decrypted_field and encrypted_field in example:
|
| 180 |
+
del example[encrypted_field]
|
| 181 |
|
| 182 |
yield key, example
|
| 183 |
key += 1
|
state.json
CHANGED
|
@@ -10,7 +10,7 @@
|
|
| 10 |
"filename": "data-00002-of-00003.arrow"
|
| 11 |
}
|
| 12 |
],
|
| 13 |
-
"_fingerprint": "
|
| 14 |
"_format_columns": null,
|
| 15 |
"_format_kwargs": {},
|
| 16 |
"_format_type": null,
|
|
|
|
| 10 |
"filename": "data-00002-of-00003.arrow"
|
| 11 |
}
|
| 12 |
],
|
| 13 |
+
"_fingerprint": "c8f35004d8a5d590",
|
| 14 |
"_format_columns": null,
|
| 15 |
"_format_kwargs": {},
|
| 16 |
"_format_type": null,
|