{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:23CFEZRS4XH5DMKWGRFCWCIYPX","short_pith_number":"pith:23CFEZRS","canonical_record":{"source":{"id":"2605.20032","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2026-05-19T15:54:09Z","cross_cats_sorted":["cs.MM"],"title_canon_sha256":"cd6cd58800f4d563b8ece27cac87c724ff9e376aff58c387aa52e21d089eccd7","abstract_canon_sha256":"0822401bba4b0e68268de18d4f2d2891c8ca16063cc29c0ea27cc28baa86989b"},"schema_version":"1.0"},"canonical_sha256":"d6c4526632e5cfd1b156344a2b09187dd8a52ddc19dde7869c6b73aa53cffc01","source":{"kind":"arxiv","id":"2605.20032","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.20032","created_at":"2026-05-20T02:05:59Z"},{"alias_kind":"arxiv_version","alias_value":"2605.20032v1","created_at":"2026-05-20T02:05:59Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.20032","created_at":"2026-05-20T02:05:59Z"},{"alias_kind":"pith_short_12","alias_value":"23CFEZRS4XH5","created_at":"2026-05-20T02:05:59Z"},{"alias_kind":"pith_short_16","alias_value":"23CFEZRS4XH5DMKW","created_at":"2026-05-20T02:05:59Z"},{"alias_kind":"pith_short_8","alias_value":"23CFEZRS","created_at":"2026-05-20T02:05:59Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:23CFEZRS4XH5DMKWGRFCWCIYPX","target":"record","payload":{"canonical_record":{"source":{"id":"2605.20032","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2026-05-19T15:54:09Z","cross_cats_sorted":["cs.MM"],"title_canon_sha256":"cd6cd58800f4d563b8ece27cac87c724ff9e376aff58c387aa52e21d089eccd7","abstract_canon_sha256":"0822401bba4b0e68268de18d4f2d2891c8ca16063cc29c0ea27cc28baa86989b"},"schema_version":"1.0"},"canonical_sha256":"d6c4526632e5cfd1b156344a2b09187dd8a52ddc19dde7869c6b73aa53cffc01","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-20T02:05:59.602807Z","signature_b64":"OW5fXgAqoZc/MKRa+v+WGiOMdacIygMqExhqvlOWTq5Zy6QluCs8QrtKAFdW7FE4tMla1Cl/6PxM27RUqGUkDA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"d6c4526632e5cfd1b156344a2b09187dd8a52ddc19dde7869c6b73aa53cffc01","last_reissued_at":"2026-05-20T02:05:59.602306Z","signature_status":"signed_v1","first_computed_at":"2026-05-20T02:05:59.602306Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.20032","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T02:05:59Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"RIJReKMaGH1oJFNuUw/vWkW9em4TLfaNNXNdA+AgCoY/9EDb6eBFzSiWA2P/39Q6HU2DVYydrshx5R3NIWfTBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T23:12:29.694793Z"},"content_sha256":"d90eeb590c48223c70323b894931065b0d9f8519702e01bbfe22649924bcff23","schema_version":"1.0","event_id":"sha256:d90eeb590c48223c70323b894931065b0d9f8519702e01bbfe22649924bcff23"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:23CFEZRS4XH5DMKWGRFCWCIYPX","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"CAMERA: Adapting to Semantic Camouflage in Unsupervised Text-Attributed Graph Fraud Detection","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.MM"],"primary_cat":"cs.LG","authors_text":"Alan Wee-Chung Liew, Junjun Pan, Lianhua Chi, Shirui Pan, Yixin Liu, Yu Zheng","submitted_at":"2026-05-19T15:54:09Z","abstract_excerpt":"Text-attributed graph fraud detection (TAGFD) plays a critical role in preventing fraudulent activities on online social and e-commerce platforms. However, to evade detection, fraudsters continuously evolve their camouflaging strategies by deliberately mimicking textual responses of benign users, thereby concealing their malicious purposes. This phenomenon, referred to as semantic camouflage, fundamentally undermines commonly relied assumptions on how structural and attribute cues can be exploited to identify fraudsters, and makes it difficult to spot fraudsters with unsupervised TAGFD. To bri"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.20032","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.20032/integrity.json","findings":[],"available":true,"detectors_run":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T02:05:59Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"12cwymAZvvtWiqwMbXToIIpVuFQLDnvpfj4m9yPiKFJeKInG6zyIRO6wfCQRsKqIphs0otvfJ8WlCvuyVziQBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T23:12:29.695517Z"},"content_sha256":"077d299a2247ef2803e6592fd94380274fbf7d7d00b0ae48d0eb6a58dad5ab70","schema_version":"1.0","event_id":"sha256:077d299a2247ef2803e6592fd94380274fbf7d7d00b0ae48d0eb6a58dad5ab70"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/23CFEZRS4XH5DMKWGRFCWCIYPX/bundle.json","state_url":"https://pith.science/pith/23CFEZRS4XH5DMKWGRFCWCIYPX/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/23CFEZRS4XH5DMKWGRFCWCIYPX/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T23:12:29Z","links":{"resolver":"https://pith.science/pith/23CFEZRS4XH5DMKWGRFCWCIYPX","bundle":"https://pith.science/pith/23CFEZRS4XH5DMKWGRFCWCIYPX/bundle.json","state":"https://pith.science/pith/23CFEZRS4XH5DMKWGRFCWCIYPX/state.json","well_known_bundle":"https://pith.science/.well-known/pith/23CFEZRS4XH5DMKWGRFCWCIYPX/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:23CFEZRS4XH5DMKWGRFCWCIYPX","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"0822401bba4b0e68268de18d4f2d2891c8ca16063cc29c0ea27cc28baa86989b","cross_cats_sorted":["cs.MM"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2026-05-19T15:54:09Z","title_canon_sha256":"cd6cd58800f4d563b8ece27cac87c724ff9e376aff58c387aa52e21d089eccd7"},"schema_version":"1.0","source":{"id":"2605.20032","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.20032","created_at":"2026-05-20T02:05:59Z"},{"alias_kind":"arxiv_version","alias_value":"2605.20032v1","created_at":"2026-05-20T02:05:59Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.20032","created_at":"2026-05-20T02:05:59Z"},{"alias_kind":"pith_short_12","alias_value":"23CFEZRS4XH5","created_at":"2026-05-20T02:05:59Z"},{"alias_kind":"pith_short_16","alias_value":"23CFEZRS4XH5DMKW","created_at":"2026-05-20T02:05:59Z"},{"alias_kind":"pith_short_8","alias_value":"23CFEZRS","created_at":"2026-05-20T02:05:59Z"}],"graph_snapshots":[{"event_id":"sha256:077d299a2247ef2803e6592fd94380274fbf7d7d00b0ae48d0eb6a58dad5ab70","target":"graph","created_at":"2026-05-20T02:05:59Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[],"endpoint":"/pith/2605.20032/integrity.json","findings":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"Text-attributed graph fraud detection (TAGFD) plays a critical role in preventing fraudulent activities on online social and e-commerce platforms. However, to evade detection, fraudsters continuously evolve their camouflaging strategies by deliberately mimicking textual responses of benign users, thereby concealing their malicious purposes. This phenomenon, referred to as semantic camouflage, fundamentally undermines commonly relied assumptions on how structural and attribute cues can be exploited to identify fraudsters, and makes it difficult to spot fraudsters with unsupervised TAGFD. To bri","authors_text":"Alan Wee-Chung Liew, Junjun Pan, Lianhua Chi, Shirui Pan, Yixin Liu, Yu Zheng","cross_cats":["cs.MM"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2026-05-19T15:54:09Z","title":"CAMERA: Adapting to Semantic Camouflage in Unsupervised Text-Attributed Graph Fraud Detection"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.20032","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:d90eeb590c48223c70323b894931065b0d9f8519702e01bbfe22649924bcff23","target":"record","created_at":"2026-05-20T02:05:59Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"0822401bba4b0e68268de18d4f2d2891c8ca16063cc29c0ea27cc28baa86989b","cross_cats_sorted":["cs.MM"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2026-05-19T15:54:09Z","title_canon_sha256":"cd6cd58800f4d563b8ece27cac87c724ff9e376aff58c387aa52e21d089eccd7"},"schema_version":"1.0","source":{"id":"2605.20032","kind":"arxiv","version":1}},"canonical_sha256":"d6c4526632e5cfd1b156344a2b09187dd8a52ddc19dde7869c6b73aa53cffc01","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"d6c4526632e5cfd1b156344a2b09187dd8a52ddc19dde7869c6b73aa53cffc01","first_computed_at":"2026-05-20T02:05:59.602306Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-20T02:05:59.602306Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"OW5fXgAqoZc/MKRa+v+WGiOMdacIygMqExhqvlOWTq5Zy6QluCs8QrtKAFdW7FE4tMla1Cl/6PxM27RUqGUkDA==","signature_status":"signed_v1","signed_at":"2026-05-20T02:05:59.602807Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.20032","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:d90eeb590c48223c70323b894931065b0d9f8519702e01bbfe22649924bcff23","sha256:077d299a2247ef2803e6592fd94380274fbf7d7d00b0ae48d0eb6a58dad5ab70"],"state_sha256":"cebb7fae96594f298148926f94ec011e327e326e6f2a68bd5fcdb52aa2468907"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"3I72+Euz+pQkztcKqNYzrkGeXq/wu8l/ciS+79T5NjbNphL7Z2SOUi6HaKuRx7scVCM7jGrswlVzzf9DMEriAw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T23:12:29.699024Z","bundle_sha256":"668537dd18d6374358c2c9aa74e8c19a3195857f4ef57056e7177bece39a4a68"}}