Update README.md
Browse files
README.md
CHANGED
@@ -28,28 +28,13 @@ The Password Model is intended to be used with [Credential Digger](https://githu
|
|
28 |
|
29 |
|
30 |
## Direct Use
|
31 |
-
The model is directly integrated into Credential Digger and can be used to filter the false positive discoveries of a scan
|
32 |
-
|
33 |
-
## Downstream Use [Optional]
|
34 |
-
|
35 |
-
|
36 |
-
More information needed.
|
37 |
|
|
|
38 |
## Out-of-Scope Use
|
39 |
|
40 |
-
|
41 |
The model should not be used to intentionally create hostile or alienating environments for people.
|
42 |
|
43 |
-
# Bias, Risks, and Limitations
|
44 |
-
|
45 |
-
Significant research has explored bias and fairness issues with language models (see, e.g., [Sheng et al. (2021)](https://aclanthology.org/2021.acl-long.330.pdf) and [Bender et al. (2021)](https://dl.acm.org/doi/pdf/10.1145/3442188.3445922)). Predictions generated by the model may include disturbing and harmful stereotypes across protected classes; identity characteristics; and sensitive, social, and occupational groups.
|
46 |
-
|
47 |
-
|
48 |
-
## Recommendations
|
49 |
-
|
50 |
-
|
51 |
-
Users (both direct and downstream) should be made aware of the risks, biases and limitations of the model. More information needed for further recomendations.
|
52 |
-
|
53 |
|
54 |
# Training Details
|
55 |
|
@@ -128,24 +113,9 @@ More information needed
|
|
128 |
**BibTeX:**
|
129 |
|
130 |
```
|
131 |
-
|
132 |
-
author = {S. Lounici and M. Rosa and C. M. Negri and S. Trabelsi and M. Önen},
|
133 |
-
booktitle = {Proc. of the 8th The International Conference on Information Systems Security and Privacy (ICISSP)},
|
134 |
-
title = {Optimizing Leak Detection in Open-Source Platforms with Machine Learning Techniques},
|
135 |
-
month = {February},
|
136 |
-
day = {11-13},
|
137 |
-
year = {2021}
|
138 |
-
}
|
139 |
```
|
140 |
|
141 |
-
# Glossary [optional]
|
142 |
-
|
143 |
-
More information needed
|
144 |
-
|
145 |
-
# More Information [optional]
|
146 |
-
|
147 |
-
More information needed
|
148 |
-
|
149 |
# Model Card Authors [optional]
|
150 |
|
151 |
SAP OSS in collaboration with Ezi Ozoani and the Hugging Face team.
|
|
|
28 |
|
29 |
|
30 |
## Direct Use
|
31 |
+
The model is directly integrated into [Credential Digger]((https://github.com/SAP/credential-digger) and can be used to filter the false positive password discoveries of a scan.
|
|
|
|
|
|
|
|
|
|
|
32 |
|
33 |
+
|
34 |
## Out-of-Scope Use
|
35 |
|
|
|
36 |
The model should not be used to intentionally create hostile or alienating environments for people.
|
37 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
38 |
|
39 |
# Training Details
|
40 |
|
|
|
113 |
**BibTeX:**
|
114 |
|
115 |
```
|
116 |
+
TBD
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
117 |
```
|
118 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
119 |
# Model Card Authors [optional]
|
120 |
|
121 |
SAP OSS in collaboration with Ezi Ozoani and the Hugging Face team.
|