×
模态框(Modal)标题
在这里添加一些文本
Close
Close
Submit
Cancel
Confirm
×
模态框(Modal)标题
×
Toggle navigation
Home
About Journal
Basic Information
Copyright Transfer Agreement
Open Access Policy
Copyright and Archive Policy
Journal Browsing
Table of Contents
Online First
Archived Issues
Editorial Board
Author Center
Author Guidelines
Publication Ethics
Policies on Academic Dishonesty
Editorial Policy
Download
Subscription
Contact Us
中文
Search
E-mail
RSS
×
Quice Search
Figure/Table detail
LEAD-Cyber:a local fine-tuned vertical domain LLMs for cybersecurity with open-source LLMs and full-cycle training datasets
GUAN Yongjian, PIAO Chengkai, WANG Buhong, ZHAO Bofu, LI Siqi, ZHAO Zhengyang
Journal of Cybersecurity
, DOI:
10.20172/j.issn.2097-3136.250116
种类
样本数
Tokens
平均Token
网络安全新闻
2610
8751002
3352.8
网络安全数据集
6166
2910124
471.9
网络安全网站
76832
65798151
856.3
网络安全维基百科
6127
765236
124.8
MITRE数据库
3432
2412114
702.8
Table 1
Pre-training Dataset statistics
Other figure/table from this article
Fig.1
The overview of LEAD-Cyber.
Table 2
Instruction Fine-tune Dataset statistics
Table 3
Reasoning Fine-tune Dataset statistics
Table 4
CTI-Bench Reasoning Task
Table 5
HackMentor Dataset statistics
Fig.2
Example of Q&A for Data Generation
Fig.3
Schematic diagram of LoRA
Fig.4
Experimental results the test dataset
Fig.5
Rouge-L experimental results
Fig.6
Qwen score diagram of LEAD
Fig.7
WinRate of each combination of models.
Fig.8
Experimental results on CTI-Bench
Fig.9
Rouge-L on experimental results on CTI-Bench
Fig.10
Qwen score diagram of CTI-Bench
Fig.11
WinRate of each combination of models.
Fig.12
Experimental results on HackMentor-eval
Fig.13
Rouge-L on experimental results
Fig.14
Qwen score diagram of HackMentor-eval
Fig.15
WinRate of each combination of models.