Commit
·
09b8946
verified
·
0
Parent(s):
Super-squash history to reclaim storage
Browse files- .gitattributes +51 -0
- README.md +448 -0
- gemma-3-12b-it-qat-q4_0-iq1_m.gguf +3 -0
- gemma-3-12b-it-qat-q4_0-iq1_s.gguf +3 -0
- gemma-3-12b-it-qat-q4_0-iq2_m.gguf +3 -0
- gemma-3-12b-it-qat-q4_0-iq2_s.gguf +3 -0
- gemma-3-12b-it-qat-q4_0-iq2_xs.gguf +3 -0
- gemma-3-12b-it-qat-q4_0-iq2_xxs.gguf +3 -0
- gemma-3-12b-it-qat-q4_0-iq3_m.gguf +3 -0
- gemma-3-12b-it-qat-q4_0-iq3_s.gguf +3 -0
- gemma-3-12b-it-qat-q4_0-iq3_xs.gguf +3 -0
- gemma-3-12b-it-qat-q4_0-iq3_xxs.gguf +3 -0
- gemma-3-12b-it-qat-q4_0-q2_k_s.gguf +3 -0
- gemma-3-12b-it-qat-q4_0-q3_k_m.gguf +3 -0
- gemma-3-12b-it-qat-q4_0-q3_k_s.gguf +3 -0
- gemma-3-12b-it-qat-q4_0.imatrix +3 -0
.gitattributes
ADDED
|
@@ -0,0 +1,51 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
*.7z filter=lfs diff=lfs merge=lfs -text
|
| 2 |
+
*.arrow filter=lfs diff=lfs merge=lfs -text
|
| 3 |
+
*.bin filter=lfs diff=lfs merge=lfs -text
|
| 4 |
+
*.bz2 filter=lfs diff=lfs merge=lfs -text
|
| 5 |
+
*.ckpt filter=lfs diff=lfs merge=lfs -text
|
| 6 |
+
*.ftz filter=lfs diff=lfs merge=lfs -text
|
| 7 |
+
*.gz filter=lfs diff=lfs merge=lfs -text
|
| 8 |
+
*.h5 filter=lfs diff=lfs merge=lfs -text
|
| 9 |
+
*.joblib filter=lfs diff=lfs merge=lfs -text
|
| 10 |
+
*.lfs.* filter=lfs diff=lfs merge=lfs -text
|
| 11 |
+
*.mlmodel filter=lfs diff=lfs merge=lfs -text
|
| 12 |
+
*.model filter=lfs diff=lfs merge=lfs -text
|
| 13 |
+
*.msgpack filter=lfs diff=lfs merge=lfs -text
|
| 14 |
+
*.npy filter=lfs diff=lfs merge=lfs -text
|
| 15 |
+
*.npz filter=lfs diff=lfs merge=lfs -text
|
| 16 |
+
*.onnx filter=lfs diff=lfs merge=lfs -text
|
| 17 |
+
*.ot filter=lfs diff=lfs merge=lfs -text
|
| 18 |
+
*.parquet filter=lfs diff=lfs merge=lfs -text
|
| 19 |
+
*.pb filter=lfs diff=lfs merge=lfs -text
|
| 20 |
+
*.pickle filter=lfs diff=lfs merge=lfs -text
|
| 21 |
+
*.pkl filter=lfs diff=lfs merge=lfs -text
|
| 22 |
+
*.pt filter=lfs diff=lfs merge=lfs -text
|
| 23 |
+
*.pth filter=lfs diff=lfs merge=lfs -text
|
| 24 |
+
*.rar filter=lfs diff=lfs merge=lfs -text
|
| 25 |
+
*.safetensors filter=lfs diff=lfs merge=lfs -text
|
| 26 |
+
saved_model/**/* filter=lfs diff=lfs merge=lfs -text
|
| 27 |
+
*.tar.* filter=lfs diff=lfs merge=lfs -text
|
| 28 |
+
*.tar filter=lfs diff=lfs merge=lfs -text
|
| 29 |
+
*.tflite filter=lfs diff=lfs merge=lfs -text
|
| 30 |
+
*.tgz filter=lfs diff=lfs merge=lfs -text
|
| 31 |
+
*.wasm filter=lfs diff=lfs merge=lfs -text
|
| 32 |
+
*.xz filter=lfs diff=lfs merge=lfs -text
|
| 33 |
+
*.zip filter=lfs diff=lfs merge=lfs -text
|
| 34 |
+
*.zst filter=lfs diff=lfs merge=lfs -text
|
| 35 |
+
*tfevents* filter=lfs diff=lfs merge=lfs -text
|
| 36 |
+
gemma-3-12b-it-qat-q4_0-q2_k_l.gguf filter=lfs diff=lfs merge=lfs -text
|
| 37 |
+
gemma-3-12b-it-qat-q4_0-q3_k_l.gguf filter=lfs diff=lfs merge=lfs -text
|
| 38 |
+
gemma-3-12b-it-qat-q4_0-q2_k_s.gguf filter=lfs diff=lfs merge=lfs -text
|
| 39 |
+
gemma-3-12b-it-qat-q4_0-q3_k_m.gguf filter=lfs diff=lfs merge=lfs -text
|
| 40 |
+
gemma-3-12b-it-qat-q4_0-q3_k_s.gguf filter=lfs diff=lfs merge=lfs -text
|
| 41 |
+
gemma-3-12b-it-qat-q4_0-iq1_s.gguf filter=lfs diff=lfs merge=lfs -text
|
| 42 |
+
gemma-3-12b-it-qat-q4_0-iq1_m.gguf filter=lfs diff=lfs merge=lfs -text
|
| 43 |
+
gemma-3-12b-it-qat-q4_0-iq2_xs.gguf filter=lfs diff=lfs merge=lfs -text
|
| 44 |
+
gemma-3-12b-it-qat-q4_0-iq2_xxs.gguf filter=lfs diff=lfs merge=lfs -text
|
| 45 |
+
gemma-3-12b-it-qat-q4_0-iq2_s.gguf filter=lfs diff=lfs merge=lfs -text
|
| 46 |
+
gemma-3-12b-it-qat-q4_0-iq2_m.gguf filter=lfs diff=lfs merge=lfs -text
|
| 47 |
+
gemma-3-12b-it-qat-q4_0-iq3_xs.gguf filter=lfs diff=lfs merge=lfs -text
|
| 48 |
+
gemma-3-12b-it-qat-q4_0-iq3_xxs.gguf filter=lfs diff=lfs merge=lfs -text
|
| 49 |
+
gemma-3-12b-it-qat-q4_0-iq3_s.gguf filter=lfs diff=lfs merge=lfs -text
|
| 50 |
+
gemma-3-12b-it-qat-q4_0-iq3_m.gguf filter=lfs diff=lfs merge=lfs -text
|
| 51 |
+
gemma-3-12b-it-qat-q4_0.imatrix filter=lfs diff=lfs merge=lfs -text
|
README.md
ADDED
|
@@ -0,0 +1,448 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
license: gemma
|
| 3 |
+
pipeline_tag: image-text-to-text
|
| 4 |
+
extra_gated_heading: Access Gemma on Hugging Face
|
| 5 |
+
extra_gated_prompt: >-
|
| 6 |
+
To access Gemma on Hugging Face, you’re required to review and agree to
|
| 7 |
+
Google’s usage license. To do this, please ensure you’re logged in to Hugging
|
| 8 |
+
Face and click below. Requests are processed immediately.
|
| 9 |
+
extra_gated_button_content: Acknowledge license
|
| 10 |
+
base_model: google/gemma-3-12b-it
|
| 11 |
+
tags:
|
| 12 |
+
- gemma
|
| 13 |
+
- gemma3
|
| 14 |
+
---
|
| 15 |
+
|
| 16 |
+
|
| 17 |
+
|
| 18 |
+
# <span style="color: #7FFF7F;">Gemma-3 12B Instruct GGUF Models</span>
|
| 19 |
+
> [!Note]
|
| 20 |
+
> Experimetal requantization!! I wanted to test if the QAT model requantized performs better than the bf16 model quantized to the same bit level.
|
| 21 |
+
>
|
| 22 |
+
> I have created a imatrix files from the google original QAT Q4_0 quantized model. This imatrix is then used to recompress the model to lower bit quants
|
| 23 |
+
>
|
| 24 |
+
> Please leave feedback.
|
| 25 |
+
>
|
| 26 |
+
> I tested with the 4b model quantized from bf16 and one requantized from the QAT Q4_0 model. Both quantized with same tensor quants
|
| 27 |
+
|
| 28 |
+
My results :
|
| 29 |
+
|
| 30 |
+
```
|
| 31 |
+
python3 ~/code/GGUFModelBuilder/perp_test_2_files.py ./gemma-3-4b-it-qat-q4_0-q3_k_l.gguf ./google_gemma-3-4b-it-q3_k_l.gguf
|
| 32 |
+
|
| 33 |
+
Testing model: gemma-3-4b-it-qat-q4_0-q3_k_l.gguf
|
| 34 |
+
Running: llama.cpp/llama-perplexity -m gemma-3-4b-it-qat-q4_0-q3_k_l.gguf -f perplexity_test_data.txt --ctx-size 256 --ppl-stride 32 --chunks 1 --threads 4
|
| 35 |
+
[✓] Perplexity: 4.0963 (Time: 284.70s)
|
| 36 |
+
|
| 37 |
+
Testing model: google_gemma-3-4b-it-q3_k_l.gguf
|
| 38 |
+
Running: llama.cpp/llama-perplexity -m google_gemma-3-4b-it-q3_k_l.gguf -f perplexity_test_data.txt --ctx-size 256 --ppl-stride 32 --chunks 1 --threads 4
|
| 39 |
+
[✓] Perplexity: 4.5557 (Time: 287.15s)
|
| 40 |
+
|
| 41 |
+
=== Comparison Results ===
|
| 42 |
+
Model 1: gemma-3-4b-it-qat-q4_0-q3_k_l.gguf - Perplexity: 4.10 (Time: 284.70s)
|
| 43 |
+
Model 2: google_gemma-3-4b-it-q3_k_l.gguf - Perplexity: 4.56 (Time: 287.15s)
|
| 44 |
+
|
| 45 |
+
Winner: gemma-3-4b-it-qat-q4_0-q3_k_l.gguf (Difference: 0.46)
|
| 46 |
+
```
|
| 47 |
+
|
| 48 |
+
A different test :
|
| 49 |
+
|
| 50 |
+
Asking both models to : write some .net code to test if a website is using quantum safe encryption
|
| 51 |
+
|
| 52 |
+
And then asking Deepseek-R1 to evaluate :
|
| 53 |
+
|
| 54 |
+
Evaluation of the Two Models' Outputs
|
| 55 |
+
|
| 56 |
+
Both models attempted to solve the problem of detecting quantum-safe encryption, but the QAT q4_0 model's code is significantly better for the following reasons:
|
| 57 |
+
1. Technical Accuracy
|
| 58 |
+
|
| 59 |
+
QAT q4_0 Model:
|
| 60 |
+
|
| 61 |
+
Checks both TLS version and cipher suites, which are critical for assessing quantum resistance. While the implementation has flaws (e.g., assuming TLS version is exposed in HTTP headers), the approach aligns with security best practices.
|
| 62 |
+
|
| 63 |
+
Explicitly acknowledges limitations (e.g., "not a definitive test") and avoids overpromising.
|
| 64 |
+
|
| 65 |
+
BF16 Model:
|
| 66 |
+
|
| 67 |
+
Relies on checking for a non-standard TLS/1.3 header, which does not exist in HTTP responses. TLS version is part of the SSL/TLS handshake and cannot be retrieved via HttpClient headers.
|
| 68 |
+
|
| 69 |
+
Contains incorrect logic (e.g., client.GetAwaiter().GetResult(null) is nonsensical and throws runtime errors).
|
| 70 |
+
|
| 71 |
+
2. Code Quality
|
| 72 |
+
|
| 73 |
+
QAT q4_0 Model:
|
| 74 |
+
|
| 75 |
+
Uses modern async/await patterns for non-blocking I/O.
|
| 76 |
+
|
| 77 |
+
Separates concerns into methods (CheckTLSVersionAsync, CheckCipherSuiteAsync).
|
| 78 |
+
|
| 79 |
+
Includes robust error handling and logging.
|
| 80 |
+
|
| 81 |
+
BF16 Model:
|
| 82 |
+
|
| 83 |
+
Uses blocking synchronous code (GetAwaiter().GetResult()), which violates .NET best practices and risks deadlocks.
|
| 84 |
+
|
| 85 |
+
Poorly structured (e.g., redundant using blocks, unclear variable names like result).
|
| 86 |
+
|
| 87 |
+
3. Security Relevance
|
| 88 |
+
|
| 89 |
+
QAT q4_0 Model:
|
| 90 |
+
|
| 91 |
+
Focuses on cipher suites, which are closer to the actual indicators of quantum resistance (e.g., AES-256-GCM). While not truly quantum-safe, these are stronger than outdated algorithms.
|
| 92 |
+
|
| 93 |
+
Mentions the need to update cipher lists based on NIST guidelines.
|
| 94 |
+
|
| 95 |
+
BF16 Model:
|
| 96 |
+
|
| 97 |
+
Misleadingly claims to check for "AES-256-CBC" (a deprecated cipher mode) but never implements it.
|
| 98 |
+
|
| 99 |
+
Fails to address cipher suites entirely, rendering the check meaningless.
|
| 100 |
+
|
| 101 |
+
4. Realism
|
| 102 |
+
|
| 103 |
+
QAT q4_0 Model:
|
| 104 |
+
|
| 105 |
+
Acknowledges the complexity of quantum-safe detection and clarifies that HTTP-based checks are insufficient. This aligns with real-world security practices.
|
| 106 |
+
|
| 107 |
+
BF16 Model:
|
| 108 |
+
|
| 109 |
+
Implies that checking for TLS 1.3 guarantees quantum safety, which is false. TLS 1.3 uses classical cryptography and is not inherently quantum-resistant.
|
| 110 |
+
|
| 111 |
+
5. Usability
|
| 112 |
+
|
| 113 |
+
QAT q4_0 Model:
|
| 114 |
+
|
| 115 |
+
Provides clear console output (e.g., "No quantum-resistant cipher suites detected").
|
| 116 |
+
|
| 117 |
+
Includes a working Main method with an example URL.
|
| 118 |
+
|
| 119 |
+
BF16 Model:
|
| 120 |
+
|
| 121 |
+
Fails to compile due to syntax errors (e.g., client.GetAwaiter().GetResult(null) is invalid).
|
| 122 |
+
|
| 123 |
+
Lacks meaningful output (e.g., no details about why a site is deemed insecure).
|
| 124 |
+
|
| 125 |
+
Critical Flaws in Both Models
|
| 126 |
+
|
| 127 |
+
Header Misuse: Both models incorrectly assume TLS version and cipher suites are exposed in HTTP headers (e.g., Sec-Cipher). In reality, this data is part of the SSL/TLS handshake and requires low-level inspection (e.g., using SslStream or libraries like BouncyCastle).
|
| 128 |
+
|
| 129 |
+
Quantum-Safe Misunderstanding: Neither code checks for post-quantum algorithms (e.g., CRYSTALS-Kyber). Current TLS 1.3 cipher suites are not quantum-safe, so both models provide false positives.
|
| 130 |
+
|
| 131 |
+
Final Verdict
|
| 132 |
+
|
| 133 |
+
The QAT q4_0 model's code is superior because it:
|
| 134 |
+
|
| 135 |
+
Follows better coding practices (async/await, error handling).
|
| 136 |
+
|
| 137 |
+
Attempts a more relevant security analysis (TLS + cipher suites).
|
| 138 |
+
|
| 139 |
+
Explicitly acknowledges limitations.
|
| 140 |
+
|
| 141 |
+
However, both models fail to solve the original problem due to fundamental misunderstandings of TLS/SSL mechanics. For a production-grade solution, direct inspection of the TLS handshake (e.g., via SslStream) and support for post-quantum algorithms would be required.
|
| 142 |
+
|
| 143 |
+
|
| 144 |
+
Overall the perp difference was small (my test set was also small) and running the Deepseek test produced different results on subsequent runs . So I can not come to a definite conclusion. But I would say is worth investigating further.
|
| 145 |
+
|
| 146 |
+
|
| 147 |
+
|
| 148 |
+
|
| 149 |
+
# Gemma 3 model card
|
| 150 |
+
|
| 151 |
+
**Model Page**: [Gemma](https://ai.google.dev/gemma/docs/core)
|
| 152 |
+
|
| 153 |
+
> [!Note]
|
| 154 |
+
> This repository corresponds to the 12 **instruction-tuned** version of the Gemma 3 model in GGUF format using Quantization Aware Training (QAT).
|
| 155 |
+
> The GGUF corresponds to Q4_0 quantization.
|
| 156 |
+
>
|
| 157 |
+
> Thanks to QAT, the model is able to preserve similar quality as `bfloat16` while significantly reducing the memory requirements
|
| 158 |
+
> to load the model.
|
| 159 |
+
>
|
| 160 |
+
> You can find the half-precision version [here](https://huggingface.co/google/gemma-3-12b-it).
|
| 161 |
+
|
| 162 |
+
|
| 163 |
+
**Resources and Technical Documentation**:
|
| 164 |
+
|
| 165 |
+
* [Gemma 3 Technical Report][g3-tech-report]
|
| 166 |
+
* [Responsible Generative AI Toolkit][rai-toolkit]
|
| 167 |
+
* [Gemma on Kaggle][kaggle-gemma]
|
| 168 |
+
* [Gemma on Vertex Model Garden][vertex-mg-gemma3]
|
| 169 |
+
|
| 170 |
+
**Terms of Use**: [Terms][terms]
|
| 171 |
+
|
| 172 |
+
**Authors**: Google DeepMind
|
| 173 |
+
|
| 174 |
+
## Model Information
|
| 175 |
+
|
| 176 |
+
Summary description and brief definition of inputs and outputs.
|
| 177 |
+
|
| 178 |
+
### Description
|
| 179 |
+
|
| 180 |
+
Gemma is a family of lightweight, state-of-the-art open models from Google,
|
| 181 |
+
built from the same research and technology used to create the Gemini models.
|
| 182 |
+
Gemma 3 models are multimodal, handling text and image input and generating text
|
| 183 |
+
output, with open weights for both pre-trained variants and instruction-tuned
|
| 184 |
+
variants. Gemma 3 has a large, 128K context window, multilingual support in over
|
| 185 |
+
140 languages, and is available in more sizes than previous versions. Gemma 3
|
| 186 |
+
models are well-suited for a variety of text generation and image understanding
|
| 187 |
+
tasks, including question answering, summarization, and reasoning. Their
|
| 188 |
+
relatively small size makes it possible to deploy them in environments with
|
| 189 |
+
limited resources such as laptops, desktops or your own cloud infrastructure,
|
| 190 |
+
democratizing access to state of the art AI models and helping foster innovation
|
| 191 |
+
for everyone.
|
| 192 |
+
|
| 193 |
+
### Inputs and outputs
|
| 194 |
+
|
| 195 |
+
- **Input:**
|
| 196 |
+
- Text string, such as a question, a prompt, or a document to be summarized
|
| 197 |
+
- Images, normalized to 896 x 896 resolution and encoded to 256 tokens
|
| 198 |
+
each
|
| 199 |
+
- Total input context of 128K tokens for the 4B, 12B, and 27B sizes, and
|
| 200 |
+
32K tokens for the 1B size
|
| 201 |
+
|
| 202 |
+
- **Output:**
|
| 203 |
+
- Generated text in response to the input, such as an answer to a
|
| 204 |
+
question, analysis of image content, or a summary of a document
|
| 205 |
+
- Total output context of 8192 tokens
|
| 206 |
+
|
| 207 |
+
### Usage
|
| 208 |
+
|
| 209 |
+
Below, there are some code snippets on how to get quickly started with running the model.
|
| 210 |
+
|
| 211 |
+
**llama.cpp (text-only)**
|
| 212 |
+
|
| 213 |
+
```sh
|
| 214 |
+
./llama-cli -hf google/gemma-3-27b-it-qat-q4_0-gguf -p "Write a poem about the Kraken."
|
| 215 |
+
```
|
| 216 |
+
|
| 217 |
+
**llama.cpp (image input)**
|
| 218 |
+
|
| 219 |
+
```sh
|
| 220 |
+
wget https://github.com/bebechien/gemma/blob/main/surprise.png?raw=true -O ~/Downloads/surprise.png
|
| 221 |
+
./llama-gemma3-cli -hf google/gemma-3-12b-it-qat-q4_0-gguf -p "Describe this image." --image ~/Downloads/surprise.png
|
| 222 |
+
```
|
| 223 |
+
|
| 224 |
+
**ollama (text only)**
|
| 225 |
+
|
| 226 |
+
Using GGUFs with Ollama via Hugging Face does not support image inputs at the moment. Please check the [docs on running gated repositories](https://huggingface.co/docs/hub/en/ollama#run-private-ggufs-from-the-hugging-face-hub).
|
| 227 |
+
|
| 228 |
+
|
| 229 |
+
```sh
|
| 230 |
+
ollama run hf.co/google/gemma-3-12b-it-qat-q4_0-gguf
|
| 231 |
+
```
|
| 232 |
+
|
| 233 |
+
### Citation
|
| 234 |
+
|
| 235 |
+
```none
|
| 236 |
+
@article{gemma_2025,
|
| 237 |
+
title={Gemma 3},
|
| 238 |
+
url={https://goo.gle/Gemma3Report},
|
| 239 |
+
publisher={Kaggle},
|
| 240 |
+
author={Gemma Team},
|
| 241 |
+
year={2025}
|
| 242 |
+
}
|
| 243 |
+
```
|
| 244 |
+
|
| 245 |
+
## Model Data
|
| 246 |
+
|
| 247 |
+
Data used for model training and how the data was processed.
|
| 248 |
+
|
| 249 |
+
### Training Dataset
|
| 250 |
+
|
| 251 |
+
These models were trained on a dataset of text data that includes a wide variety
|
| 252 |
+
of sources. the 12B model was
|
| 253 |
+
trained with 12 trillion tokens, 4B model was trained with 4 trillion tokens and
|
| 254 |
+
1B with 2 trillion tokens. Here are the key components:
|
| 255 |
+
|
| 256 |
+
- Web Documents: A diverse collection of web text ensures the model is
|
| 257 |
+
exposed to a broad range of linguistic styles, topics, and vocabulary. The
|
| 258 |
+
training dataset includes content in over 140 languages.
|
| 259 |
+
- Code: Exposing the model to code helps it to learn the syntax and
|
| 260 |
+
patterns of programming languages, which improves its ability to generate
|
| 261 |
+
code and understand code-related questions.
|
| 262 |
+
- Mathematics: Training on mathematical text helps the model learn logical
|
| 263 |
+
reasoning, symbolic representation, and to address mathematical queries.
|
| 264 |
+
- Images: A wide range of images enables the model to perform image
|
| 265 |
+
analysis and visual data extraction tasks.
|
| 266 |
+
|
| 267 |
+
The combination of these diverse data sources is crucial for training a powerful
|
| 268 |
+
multimodal model that can handle a wide variety of different tasks and data
|
| 269 |
+
formats.
|
| 270 |
+
|
| 271 |
+
### Data Preprocessing
|
| 272 |
+
|
| 273 |
+
Here are the key data cleaning and filtering methods applied to the training
|
| 274 |
+
data:
|
| 275 |
+
|
| 276 |
+
- CSAM Filtering: Rigorous CSAM (Child Sexual Abuse Material) filtering
|
| 277 |
+
was applied at multiple stages in the data preparation process to ensure
|
| 278 |
+
the exclusion of harmful and illegal content.
|
| 279 |
+
- Sensitive Data Filtering: As part of making Gemma pre-trained models
|
| 280 |
+
safe and reliable, automated techniques were used to filter out certain
|
| 281 |
+
personal information and other sensitive data from training sets.
|
| 282 |
+
- Additional methods: Filtering based on content quality and safety in
|
| 283 |
+
line with [our policies][safety-policies].
|
| 284 |
+
|
| 285 |
+
## Implementation Information
|
| 286 |
+
|
| 287 |
+
Details about the model internals.
|
| 288 |
+
|
| 289 |
+
### Hardware
|
| 290 |
+
|
| 291 |
+
Gemma was trained using [Tensor Processing Unit (TPU)][tpu] hardware (TPUv4p,
|
| 292 |
+
TPUv5p and TPUv5e). Training vision-language models (VLMS) requires significant
|
| 293 |
+
computational power. TPUs, designed specifically for matrix operations common in
|
| 294 |
+
machine learning, offer several advantages in this domain:
|
| 295 |
+
|
| 296 |
+
- Performance: TPUs are specifically designed to handle the massive
|
| 297 |
+
computations involved in training VLMs. They can speed up training
|
| 298 |
+
considerably compared to CPUs.
|
| 299 |
+
- Memory: TPUs often come with large amounts of high-bandwidth memory,
|
| 300 |
+
allowing for the handling of large models and batch sizes during training.
|
| 301 |
+
This can lead to better model quality.
|
| 302 |
+
- Scalability: TPU Pods (large clusters of TPUs) provide a scalable
|
| 303 |
+
solution for handling the growing complexity of large foundation models.
|
| 304 |
+
You can distribute training across multiple TPU devices for faster and more
|
| 305 |
+
efficient processing.
|
| 306 |
+
- Cost-effectiveness: In many scenarios, TPUs can provide a more
|
| 307 |
+
cost-effective solution for training large models compared to CPU-based
|
| 308 |
+
infrastructure, especially when considering the time and resources saved
|
| 309 |
+
due to faster training.
|
| 310 |
+
- These advantages are aligned with
|
| 311 |
+
[Google's commitments to operate sustainably][sustainability].
|
| 312 |
+
|
| 313 |
+
### Software
|
| 314 |
+
|
| 315 |
+
Training was done using [JAX][jax] and [ML Pathways][ml-pathways].
|
| 316 |
+
|
| 317 |
+
JAX allows researchers to take advantage of the latest generation of hardware,
|
| 318 |
+
including TPUs, for faster and more efficient training of large models. ML
|
| 319 |
+
Pathways is Google's latest effort to build artificially intelligent systems
|
| 320 |
+
capable of generalizing across multiple tasks. This is specially suitable for
|
| 321 |
+
foundation models, including large language models like these ones.
|
| 322 |
+
|
| 323 |
+
Together, JAX and ML Pathways are used as described in the
|
| 324 |
+
[paper about the Gemini family of models][gemini-2-paper]; *"the 'single
|
| 325 |
+
controller' programming model of Jax and Pathways allows a single Python
|
| 326 |
+
process to orchestrate the entire training run, dramatically simplifying the
|
| 327 |
+
development workflow."*
|
| 328 |
+
|
| 329 |
+
|
| 330 |
+
### Intended Usage
|
| 331 |
+
|
| 332 |
+
Open vision-language models (VLMs) models have a wide range of applications
|
| 333 |
+
across various industries and domains. The following list of potential uses is
|
| 334 |
+
not comprehensive. The purpose of this list is to provide contextual information
|
| 335 |
+
about the possible use-cases that the model creators considered as part of model
|
| 336 |
+
training and development.
|
| 337 |
+
|
| 338 |
+
- Content Creation and Communication
|
| 339 |
+
- Text Generation: These models can be used to generate creative text
|
| 340 |
+
formats such as poems, scripts, code, marketing copy, and email drafts.
|
| 341 |
+
- Chatbots and Conversational AI: Power conversational interfaces
|
| 342 |
+
for customer service, virtual assistants, or interactive applications.
|
| 343 |
+
- Text Summarization: Generate concise summaries of a text corpus,
|
| 344 |
+
research papers, or reports.
|
| 345 |
+
- Image Data Extraction: These models can be used to extract,
|
| 346 |
+
interpret, and summarize visual data for text communications.
|
| 347 |
+
- Research and Education
|
| 348 |
+
- Natural Language Processing (NLP) and VLM Research: These
|
| 349 |
+
models can serve as a foundation for researchers to experiment with VLM
|
| 350 |
+
and NLP techniques, develop algorithms, and contribute to the
|
| 351 |
+
advancement of the field.
|
| 352 |
+
- Language Learning Tools: Support interactive language learning
|
| 353 |
+
experiences, aiding in grammar correction or providing writing practice.
|
| 354 |
+
- Knowledge Exploration: Assist researchers in exploring large
|
| 355 |
+
bodies of text by generating summaries or answering questions about
|
| 356 |
+
specific topics.
|
| 357 |
+
|
| 358 |
+
### Limitations
|
| 359 |
+
|
| 360 |
+
- Training Data
|
| 361 |
+
- The quality and diversity of the training data significantly
|
| 362 |
+
influence the model's capabilities. Biases or gaps in the training data
|
| 363 |
+
can lead to limitations in the model's responses.
|
| 364 |
+
- The scope of the training dataset determines the subject areas
|
| 365 |
+
the model can handle effectively.
|
| 366 |
+
- Context and Task Complexity
|
| 367 |
+
- Models are better at tasks that can be framed with clear
|
| 368 |
+
prompts and instructions. Open-ended or highly complex tasks might be
|
| 369 |
+
challenging.
|
| 370 |
+
- A model's performance can be influenced by the amount of context
|
| 371 |
+
provided (longer context generally leads to better outputs, up to a
|
| 372 |
+
certain point).
|
| 373 |
+
- Language Ambiguity and Nuance
|
| 374 |
+
- Natural language is inherently complex. Models might struggle
|
| 375 |
+
to grasp subtle nuances, sarcasm, or figurative language.
|
| 376 |
+
- Factual Accuracy
|
| 377 |
+
- Models generate responses based on information they learned
|
| 378 |
+
from their training datasets, but they are not knowledge bases. They
|
| 379 |
+
may generate incorrect or outdated factual statements.
|
| 380 |
+
- Common Sense
|
| 381 |
+
- Models rely on statistical patterns in language. They might
|
| 382 |
+
lack the ability to apply common sense reasoning in certain situations.
|
| 383 |
+
|
| 384 |
+
### Ethical Considerations and Risks
|
| 385 |
+
|
| 386 |
+
The development of vision-language models (VLMs) raises several ethical
|
| 387 |
+
concerns. In creating an open model, we have carefully considered the following:
|
| 388 |
+
|
| 389 |
+
- Bias and Fairness
|
| 390 |
+
- VLMs trained on large-scale, real-world text and image data can
|
| 391 |
+
reflect socio-cultural biases embedded in the training material. These
|
| 392 |
+
models underwent careful scrutiny, input data pre-processing described
|
| 393 |
+
and posterior evaluations reported in this card.
|
| 394 |
+
- Misinformation and Misuse
|
| 395 |
+
- VLMs can be misused to generate text that is false, misleading,
|
| 396 |
+
or harmful.
|
| 397 |
+
- Guidelines are provided for responsible use with the model, see the
|
| 398 |
+
[Responsible Generative AI Toolkit][rai-toolkit].
|
| 399 |
+
- Transparency and Accountability:
|
| 400 |
+
- This model card summarizes details on the models' architecture,
|
| 401 |
+
capabilities, limitations, and evaluation processes.
|
| 402 |
+
- A responsibly developed open model offers the opportunity to
|
| 403 |
+
share innovation by making VLM technology accessible to developers and
|
| 404 |
+
researchers across the AI ecosystem.
|
| 405 |
+
|
| 406 |
+
Risks identified and mitigations:
|
| 407 |
+
|
| 408 |
+
- **Perpetuation of biases**: It's encouraged to perform continuous
|
| 409 |
+
monitoring (using evaluation metrics, human review) and the exploration of
|
| 410 |
+
de-biasing techniques during model training, fine-tuning, and other use
|
| 411 |
+
cases.
|
| 412 |
+
- **Generation of harmful content**: Mechanisms and guidelines for content
|
| 413 |
+
safety are essential. Developers are encouraged to exercise caution and
|
| 414 |
+
implement appropriate content safety safeguards based on their specific
|
| 415 |
+
product policies and application use cases.
|
| 416 |
+
- **Misuse for malicious purposes**: Technical limitations and developer
|
| 417 |
+
and end-user education can help mitigate against malicious applications of
|
| 418 |
+
VLMs. Educational resources and reporting mechanisms for users to flag
|
| 419 |
+
misuse are provided. Prohibited uses of Gemma models are outlined in the
|
| 420 |
+
[Gemma Prohibited Use Policy][prohibited-use].
|
| 421 |
+
- **Privacy violations**: Models were trained on data filtered for removal
|
| 422 |
+
of certain personal information and other sensitive data. Developers are
|
| 423 |
+
encouraged to adhere to privacy regulations with privacy-preserving
|
| 424 |
+
techniques.
|
| 425 |
+
|
| 426 |
+
### Benefits
|
| 427 |
+
|
| 428 |
+
At the time of release, this family of models provides high-performance open
|
| 429 |
+
vision-language model implementations designed from the ground up for
|
| 430 |
+
responsible AI development compared to similarly sized models.
|
| 431 |
+
|
| 432 |
+
Using the benchmark evaluation metrics described in this document, these models
|
| 433 |
+
have shown to provide superior performance to other, comparably-sized open model
|
| 434 |
+
alternatives.
|
| 435 |
+
|
| 436 |
+
[g3-tech-report]: https://goo.gle/Gemma3Report
|
| 437 |
+
[rai-toolkit]: https://ai.google.dev/responsible
|
| 438 |
+
[kaggle-gemma]: https://www.kaggle.com/models/google/gemma-3
|
| 439 |
+
[vertex-mg-gemma3]: https://console.cloud.google.com/vertex-ai/publishers/google/model-garden/gemma3
|
| 440 |
+
[terms]: https://ai.google.dev/gemma/terms
|
| 441 |
+
[safety-policies]: https://ai.google/static/documents/ai-responsibility-update-published-february-2025.pdf
|
| 442 |
+
[prohibited-use]: https://ai.google.dev/gemma/prohibited_use_policy
|
| 443 |
+
[tpu]: https://cloud.google.com/tpu/docs/intro-to-tpu
|
| 444 |
+
[sustainability]: https://sustainability.google/operating-sustainably/
|
| 445 |
+
[jax]: https://github.com/jax-ml/jax
|
| 446 |
+
[ml-pathways]: https://blog.google/technology/ai/introducing-pathways-next-generation-ai-architecture/
|
| 447 |
+
[sustainability]: https://sustainability.google/operating-sustainably/
|
| 448 |
+
[gemini-2-paper]: https://arxiv.org/abs/2312.11805
|
gemma-3-12b-it-qat-q4_0-iq1_m.gguf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:2b9f5cf15302deeb24ae7fdc5a6333887c11fe8afca5a9ec285d620a851f0e2f
|
| 3 |
+
size 3613438688
|
gemma-3-12b-it-qat-q4_0-iq1_s.gguf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:f42431d0a2fc006dcc504a6e9c2c4b50c7c677d22e213270414cceff33dcb718
|
| 3 |
+
size 3454186208
|
gemma-3-12b-it-qat-q4_0-iq2_m.gguf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:b1d6688f374eade2fd3383117c38ce5698d86250c16e82fc871884d0531df8f2
|
| 3 |
+
size 4858704608
|
gemma-3-12b-it-qat-q4_0-iq2_s.gguf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:ced85007810538cfad8b21c47b01f2efdf3232e8c9e499a42938de09decc417a
|
| 3 |
+
size 4646367968
|
gemma-3-12b-it-qat-q4_0-iq2_xs.gguf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:d1c1055f3121b1191e4666aa3143795fc3455bc2912d2bf1faa7fd88ba75e46e
|
| 3 |
+
size 4114789088
|
gemma-3-12b-it-qat-q4_0-iq2_xxs.gguf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:4c077cf766bbaab2451b7d05ffda0e94fadb7e2bfd55dba1ed40389b19b66815
|
| 3 |
+
size 3878859488
|
gemma-3-12b-it-qat-q4_0-iq3_m.gguf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:f9d64f4d448663f1e42184fd85ea95da3387de79ad4565cdf67d74ef93075917
|
| 3 |
+
size 5655519968
|
gemma-3-12b-it-qat-q4_0-iq3_s.gguf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:dae1a6f1dd2b797ab95b7dd2b1f2a3f7491dc1525b1561f9e077d5e0bbec1996
|
| 3 |
+
size 5458113248
|
gemma-3-12b-it-qat-q4_0-iq3_xs.gguf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:9772bc0c90bd2337fec4d75cac2d4b77031f1836b1868c0795eb1c2763f8fe17
|
| 3 |
+
size 5205963488
|
gemma-3-12b-it-qat-q4_0-iq3_xxs.gguf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:ce0a1be735aabc4423ca586a606ac43e53748c1fbe46e6caf0449fb100c59680
|
| 3 |
+
size 4918424288
|
gemma-3-12b-it-qat-q4_0-q2_k_s.gguf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:0a238297c6b4bb016cfb751090d410529f572ec2e5ed4d72a7368cb36930d71f
|
| 3 |
+
size 4448408288
|
gemma-3-12b-it-qat-q4_0-q3_k_m.gguf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:a61126ab2f6dfdd0da1908f56b0df765b53d60bbeaa8d1e2421f457e216163de
|
| 3 |
+
size 6008615648
|
gemma-3-12b-it-qat-q4_0-q3_k_s.gguf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:9914658fb5ccebe3c2a872ee660b0f660030a85b397086bdd3696a39a59aa48c
|
| 3 |
+
size 5458113248
|
gemma-3-12b-it-qat-q4_0.imatrix
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:cc2966da9eda17ebf183aa04927ff04dbdf1a8076b9bfd8686e3a3116ae16f9b
|
| 3 |
+
size 7433132
|