Text Generation
Transformers
Safetensors
qwen3
cybersecurity
cti
cwe-classification
vulnerability-analysis
awq
4-bit precision
quantized
conversational
text-generation-inference
Instructions to use ree2raz/CyberSecQwen-4B-AWQ with libraries, inference providers, notebooks, and local apps. Follow these links to get started.
- Libraries
- Transformers
How to use ree2raz/CyberSecQwen-4B-AWQ with Transformers:
# Use a pipeline as a high-level helper from transformers import pipeline pipe = pipeline("text-generation", model="ree2raz/CyberSecQwen-4B-AWQ") messages = [ {"role": "user", "content": "Who are you?"}, ] pipe(messages)# Load model directly from transformers import AutoTokenizer, AutoModelForCausalLM tokenizer = AutoTokenizer.from_pretrained("ree2raz/CyberSecQwen-4B-AWQ") model = AutoModelForCausalLM.from_pretrained("ree2raz/CyberSecQwen-4B-AWQ") messages = [ {"role": "user", "content": "Who are you?"}, ] inputs = tokenizer.apply_chat_template( messages, add_generation_prompt=True, tokenize=True, return_dict=True, return_tensors="pt", ).to(model.device) outputs = model.generate(**inputs, max_new_tokens=40) print(tokenizer.decode(outputs[0][inputs["input_ids"].shape[-1]:])) - Notebooks
- Google Colab
- Kaggle
- Local Apps
- vLLM
How to use ree2raz/CyberSecQwen-4B-AWQ with vLLM:
Install from pip and serve model
# Install vLLM from pip: pip install vllm # Start the vLLM server: vllm serve "ree2raz/CyberSecQwen-4B-AWQ" # Call the server using curl (OpenAI-compatible API): curl -X POST "http://localhost:8000/v1/chat/completions" \ -H "Content-Type: application/json" \ --data '{ "model": "ree2raz/CyberSecQwen-4B-AWQ", "messages": [ { "role": "user", "content": "What is the capital of France?" } ] }'Use Docker
docker model run hf.co/ree2raz/CyberSecQwen-4B-AWQ
- SGLang
How to use ree2raz/CyberSecQwen-4B-AWQ with SGLang:
Install from pip and serve model
# Install SGLang from pip: pip install sglang # Start the SGLang server: python3 -m sglang.launch_server \ --model-path "ree2raz/CyberSecQwen-4B-AWQ" \ --host 0.0.0.0 \ --port 30000 # Call the server using curl (OpenAI-compatible API): curl -X POST "http://localhost:30000/v1/chat/completions" \ -H "Content-Type: application/json" \ --data '{ "model": "ree2raz/CyberSecQwen-4B-AWQ", "messages": [ { "role": "user", "content": "What is the capital of France?" } ] }'Use Docker images
docker run --gpus all \ --shm-size 32g \ -p 30000:30000 \ -v ~/.cache/huggingface:/root/.cache/huggingface \ --env "HF_TOKEN=<secret>" \ --ipc=host \ lmsysorg/sglang:latest \ python3 -m sglang.launch_server \ --model-path "ree2raz/CyberSecQwen-4B-AWQ" \ --host 0.0.0.0 \ --port 30000 # Call the server using curl (OpenAI-compatible API): curl -X POST "http://localhost:30000/v1/chat/completions" \ -H "Content-Type: application/json" \ --data '{ "model": "ree2raz/CyberSecQwen-4B-AWQ", "messages": [ { "role": "user", "content": "What is the capital of France?" } ] }' - Docker Model Runner
How to use ree2raz/CyberSecQwen-4B-AWQ with Docker Model Runner:
docker model run hf.co/ree2raz/CyberSecQwen-4B-AWQ
Update README.md
Browse files
README.md
CHANGED
|
@@ -18,6 +18,10 @@ pipeline_tag: text-generation
|
|
| 18 |
|
| 19 |
4-bit AWQ quantized version of [CyberSecQwen-4B](https://huggingface.co/lablab-ai-amd-developer-hackathon/CyberSecQwen-4B).
|
| 20 |
|
|
|
|
|
|
|
|
|
|
|
|
|
| 21 |
## Quantization
|
| 22 |
|
| 23 |
| Parameter | Value |
|
|
@@ -89,7 +93,3 @@ vllm serve ree2raz/CyberSecQwen-4B-AWQ --quantization awq_marlin --dtype float16
|
|
| 89 |
url = {https://huggingface.co/athena129/CyberSecQwen-4B}
|
| 90 |
}
|
| 91 |
```
|
| 92 |
-
|
| 93 |
-
## Evaluation Infrastructure
|
| 94 |
-
|
| 95 |
-
[GitHub repository](https://github.com/ree2raz/cyberSecQwen_4b_4bit) — Modal scripts for AWQ quantization + vLLM CTI-Bench evaluation.
|
|
|
|
| 18 |
|
| 19 |
4-bit AWQ quantized version of [CyberSecQwen-4B](https://huggingface.co/lablab-ai-amd-developer-hackathon/CyberSecQwen-4B).
|
| 20 |
|
| 21 |
+
## Evaluation Infrastructure
|
| 22 |
+
|
| 23 |
+
[GitHub repository](https://github.com/ree2raz/cyberSecQwen_4b_4bit) — Modal scripts for AWQ quantization + vLLM CTI-Bench evaluation.
|
| 24 |
+
|
| 25 |
## Quantization
|
| 26 |
|
| 27 |
| Parameter | Value |
|
|
|
|
| 93 |
url = {https://huggingface.co/athena129/CyberSecQwen-4B}
|
| 94 |
}
|
| 95 |
```
|
|
|
|
|
|
|
|
|
|
|
|