PrunaAI / microsoft-phi-2-GGUF-smashed
Last scanned: Mar 22, 2025 at 2:25 PM UTC
Versions
Version | Commit message | Commit author | Last scanned | ||
---|---|---|---|---|---|
Upload microsoft/phi-2.Q5_K_S.gguf with huggingface_hub | sharpenb | Apr 2, 2025 | |||
Upload microsoft/phi-2.Q5_K_M.gguf with huggingface_hub | sharpenb | Apr 2, 2025 | |||
Upload microsoft/phi-2.Q5_1.gguf with huggingface_hub | sharpenb | Apr 2, 2025 | |||
Upload microsoft/phi-2.Q5_0.gguf with huggingface_hub | sharpenb | Apr 2, 2025 | |||
Upload microsoft/phi-2.Q4_K_S.gguf with huggingface_hub | sharpenb | Never scanned | |||
Upload microsoft/phi-2.Q4_K_M.gguf with huggingface_hub | sharpenb | Apr 2, 2025 | |||
Upload microsoft/phi-2.Q4_1.gguf with huggingface_hub | sharpenb | Never scanned | |||
Upload microsoft/phi-2.Q4_0.gguf with huggingface_hub | sharpenb | Never scanned | |||
Upload microsoft/phi-2.Q3_K_S.gguf with huggingface_hub | sharpenb | Never scanned | |||
Upload microsoft/phi-2.Q3_K_M.gguf with huggingface_hub | sharpenb | Apr 2, 2025 | |||
Upload microsoft/phi-2.Q3_K_L.gguf with huggingface_hub | sharpenb | Apr 2, 2025 | |||
Upload microsoft/phi-2.Q2_K.gguf with huggingface_hub | sharpenb | Never scanned | |||
Upload microsoft/phi-2.fp16.bin with huggingface_hub | sharpenb | Never scanned | |||
Upload microsoft/phi-2.Q5_K_S.gguf with huggingface_hub | sharpenb | Mar 15, 2025 | |||
Upload microsoft/phi-2.Q5_K_M.gguf with huggingface_hub | sharpenb | Mar 22, 2025 | |||
Upload microsoft/phi-2.Q5_1.gguf with huggingface_hub | sharpenb | Mar 22, 2025 | |||
Upload microsoft/phi-2.Q5_0.gguf with huggingface_hub | sharpenb | Mar 22, 2025 | |||
Upload microsoft/phi-2.Q4_K_S.gguf with huggingface_hub | sharpenb | Mar 22, 2025 | |||
Upload microsoft/phi-2.Q4_K_M.gguf with huggingface_hub | sharpenb | Mar 22, 2025 | |||
Upload microsoft/phi-2.Q4_1.gguf with huggingface_hub | sharpenb | Mar 22, 2025 |
Protect AI's security scanner detects threats in model files
With Protect AI's Guardian you can scan models for threats before ML developers download them for use, and apply policies based on your risk tolerance.
Found a new threat?
Earn bounties and get recognition for your discoveries by submitting them through Huntr.