Token Alteration as an Input Corruption Method
Token alteration is a method for corrupting input sequences in denoising autoencoder training where some tokens are replaced with different, often incorrect, tokens from the vocabulary. This forces the model to learn robust representations that are not dependent on the exact original tokens.
0
1
Tags
Ch.1 Pre-training - Foundations of Large Language Models
Foundations of Large Language Models
Foundations of Large Language Models Course
Computing Sciences
Related
Token Masking as an Input Corruption Method
Token Deletion as an Input Corruption Method
Combining Multiple Corruption Methods in Pre-training
Selecting Appropriate Input Corruption Methods
Token Alteration as an Input Corruption Method
Token Reordering as an Input Corruption Method
Input Corruption Methods for Multi-Sentence Sequences
Input Corruption Methods for Multi-Sentence Sequences
Corruption Methods for Multi-Sentence Sequences
A research team is pre-training an encoder-decoder model using a denoising objective. Their primary goal is to create a model that excels at summarizing long documents, which requires a deep understanding of the text's overall semantic content and logical flow, rather than its exact word-for-word structure. Which of the following input corruption strategies would be most aligned with this specific goal?
You are training an encoder-decoder model with a denoising objective. Match each input corruption method with the primary linguistic capability it is designed to teach the model.
Diagnosing Pre-training Deficiencies
Learn After
A language model developer is pre-training a model with the specific goal of improving its ability to identify and correct sentences containing incorrect word choices (e.g., distinguishing between 'your' and 'you're'). The model is trained to reconstruct the original, correct sentence from a deliberately damaged version. Which of the following input damage strategies would be most effective for this specific training objective?
Comparing Input Corruption Strategies
Evaluating Input Corruption Strategies for Typo Resilience