add minimal card template with citation info
#2
by
davanstrien
HF staff
- opened
README.md
CHANGED
@@ -2,8 +2,129 @@
|
|
2 |
license: other
|
3 |
license_name: cdla-permissive-2.0
|
4 |
license_link: https://cdla.dev/permissive-2-0/
|
|
|
|
|
|
|
|
|
|
|
5 |
---
|
6 |
|
7 |
# KVP10k
|
8 |
|
9 |
-
A Comprehensive Dataset for Key-Value Pair Extraction in Business Documents
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2 |
license: other
|
3 |
license_name: cdla-permissive-2.0
|
4 |
license_link: https://cdla.dev/permissive-2-0/
|
5 |
+
tags:
|
6 |
+
- document-ai
|
7 |
+
pretty_name: KVP10k
|
8 |
+
size_categories:
|
9 |
+
- 10K<n<100K
|
10 |
---
|
11 |
|
12 |
# KVP10k
|
13 |
|
14 |
+
A Comprehensive Dataset for Key-Value Pair Extraction in Business Documents.
|
15 |
+
|
16 |
+
Abstract for the [paper](https://huggingface.co/papers/2405.00505) describing this dataset:
|
17 |
+
|
18 |
+
> In recent years, the challenge of extracting information from business documents has emerged as a critical task, finding applications across numerous domains. This effort has attracted substantial interest from both industry and academy, highlighting its significance in the current technological landscape. Most datasets in this area are primarily focused on Key Information Extraction (KIE), where the extraction process revolves around extracting information using a specific, predefined set of keys. Unlike most existing datasets and benchmarks, our focus is on discovering key-value pairs (KVPs) without relying on predefined keys, navigating through an array of diverse templates and complex layouts. This task presents unique challenges, primarily due to the absence of comprehensive datasets and benchmarks tailored for non-predetermined KVP extraction. To address this gap, we introduce KVP10k , a new dataset and benchmark specifically designed for KVP extraction. The dataset contains 10707 richly annotated images. In our benchmark, we also introduce a new challenging task that combines elements of KIE as well as KVP in a single task. KVP10k sets itself apart with its extensive diversity in data and richly detailed annotations, paving the way for advancements in the field of information extraction from complex business documents.
|
19 |
+
|
20 |
+
## Dataset Details
|
21 |
+
|
22 |
+
### Dataset Description
|
23 |
+
|
24 |
+
<!-- Provide a longer summary of what this dataset is. -->
|
25 |
+
|
26 |
+
|
27 |
+
- **Curated by:** IBM
|
28 |
+
- **License:** [cdla-permissive-2.0](https://cdla.dev/permissive-2-0/)
|
29 |
+
|
30 |
+
### Dataset Sources [optional]
|
31 |
+
|
32 |
+
<!-- Provide the basic links for the dataset. -->
|
33 |
+
|
34 |
+
- **Repository:** [More Information Needed]
|
35 |
+
- **Paper [optional]:** [More Information Needed]
|
36 |
+
- **Demo [optional]:** [More Information Needed]
|
37 |
+
|
38 |
+
## Uses
|
39 |
+
|
40 |
+
<!-- Address questions around how the dataset is intended to be used. -->
|
41 |
+
|
42 |
+
### Direct Use
|
43 |
+
|
44 |
+
<!-- This section describes suitable use cases for the dataset. -->
|
45 |
+
|
46 |
+
[More Information Needed]
|
47 |
+
|
48 |
+
### Out-of-Scope Use
|
49 |
+
|
50 |
+
<!-- This section addresses misuse, malicious use, and uses that the dataset will not work well for. -->
|
51 |
+
|
52 |
+
[More Information Needed]
|
53 |
+
|
54 |
+
## Dataset Structure
|
55 |
+
|
56 |
+
<!-- This section provides a description of the dataset fields, and additional information about the dataset structure such as criteria used to create the splits, relationships between data points, etc. -->
|
57 |
+
|
58 |
+
[More Information Needed]
|
59 |
+
|
60 |
+
## Dataset Creation
|
61 |
+
|
62 |
+
### Curation Rationale
|
63 |
+
|
64 |
+
<!-- Motivation for the creation of this dataset. -->
|
65 |
+
|
66 |
+
[More Information Needed]
|
67 |
+
|
68 |
+
### Source Data
|
69 |
+
|
70 |
+
<!-- This section describes the source data (e.g. news text and headlines, social media posts, translated sentences, ...). -->
|
71 |
+
|
72 |
+
#### Data Collection and Processing
|
73 |
+
|
74 |
+
<!-- This section describes the data collection and processing process such as data selection criteria, filtering and normalization methods, tools and libraries used, etc. -->
|
75 |
+
|
76 |
+
[More Information Needed]
|
77 |
+
|
78 |
+
#### Who are the source data producers?
|
79 |
+
|
80 |
+
<!-- This section describes the people or systems who originally created the data. It should also include self-reported demographic or identity information for the source data creators if this information is available. -->
|
81 |
+
|
82 |
+
[More Information Needed]
|
83 |
+
|
84 |
+
### Annotations [optional]
|
85 |
+
|
86 |
+
<!-- If the dataset contains annotations which are not part of the initial data collection, use this section to describe them. -->
|
87 |
+
|
88 |
+
#### Annotation process
|
89 |
+
|
90 |
+
<!-- This section describes the annotation process such as annotation tools used in the process, the amount of data annotated, annotation guidelines provided to the annotators, interannotator statistics, annotation validation, etc. -->
|
91 |
+
|
92 |
+
[More Information Needed]
|
93 |
+
|
94 |
+
#### Who are the annotators?
|
95 |
+
|
96 |
+
<!-- This section describes the people or systems who created the annotations. -->
|
97 |
+
|
98 |
+
[More Information Needed]
|
99 |
+
|
100 |
+
#### Personal and Sensitive Information
|
101 |
+
|
102 |
+
<!-- State whether the dataset contains data that might be considered personal, sensitive, or private (e.g., data that reveals addresses, uniquely identifiable names or aliases, racial or ethnic origins, sexual orientations, religious beliefs, political opinions, financial or health data, etc.). If efforts were made to anonymize the data, describe the anonymization process. -->
|
103 |
+
|
104 |
+
[More Information Needed]
|
105 |
+
|
106 |
+
## Bias, Risks, and Limitations
|
107 |
+
|
108 |
+
<!-- This section is meant to convey both technical and sociotechnical limitations. -->
|
109 |
+
|
110 |
+
[More Information Needed]
|
111 |
+
|
112 |
+
### Recommendations
|
113 |
+
|
114 |
+
<!-- This section is meant to convey recommendations with respect to the bias, risk, and technical limitations. -->
|
115 |
+
|
116 |
+
|
117 |
+
## Citation
|
118 |
+
|
119 |
+
**BibTeX:**
|
120 |
+
|
121 |
+
```bibtext
|
122 |
+
@misc{naparstek2024kvp10k,
|
123 |
+
title={KVP10k : A Comprehensive Dataset for Key-Value Pair Extraction in Business Documents},
|
124 |
+
author={Oshri Naparstek and Roi Pony and Inbar Shapira and Foad Abo Dahood and Ophir Azulai and Yevgeny Yaroker and Nadav Rubinstein and Maksym Lysak and Peter Staar and Ahmed Nassar and Nikolaos Livathinos and Christoph Auer and Elad Amrani and Idan Friedman and Orit Prince and Yevgeny Burshtein and Adi Raz Goldfarb and Udi Barzelay},
|
125 |
+
year={2024},
|
126 |
+
eprint={2405.00505},
|
127 |
+
archivePrefix={arXiv},
|
128 |
+
primaryClass={cs.IR}
|
129 |
+
}
|
130 |
+
```
|