{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2019:3JXPRZINYGK6RRKA3M3C2VY4SL","short_pith_number":"pith:3JXPRZIN","canonical_record":{"source":{"id":"1906.01388","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2019-06-03T14:40:36Z","cross_cats_sorted":["cs.LG"],"title_canon_sha256":"3cdd5a6ac1268251685732b648b8afa1fe62d210374e4eaf153b27cdf9e53fa8","abstract_canon_sha256":"949453c31d2b360d1eacb6563465d3aa5fa0a93d2838af19de230af4780fe007"},"schema_version":"1.0"},"canonical_sha256":"da6ef8e50dc195e8c540db362d571c92dacf399c3fdfc63de29110b6d3a9e9fb","source":{"kind":"arxiv","id":"1906.01388","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1906.01388","created_at":"2026-05-17T23:44:16Z"},{"alias_kind":"arxiv_version","alias_value":"1906.01388v1","created_at":"2026-05-17T23:44:16Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1906.01388","created_at":"2026-05-17T23:44:16Z"},{"alias_kind":"pith_short_12","alias_value":"3JXPRZINYGK6","created_at":"2026-05-18T12:33:07Z"},{"alias_kind":"pith_short_16","alias_value":"3JXPRZINYGK6RRKA","created_at":"2026-05-18T12:33:07Z"},{"alias_kind":"pith_short_8","alias_value":"3JXPRZIN","created_at":"2026-05-18T12:33:07Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2019:3JXPRZINYGK6RRKA3M3C2VY4SL","target":"record","payload":{"canonical_record":{"source":{"id":"1906.01388","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2019-06-03T14:40:36Z","cross_cats_sorted":["cs.LG"],"title_canon_sha256":"3cdd5a6ac1268251685732b648b8afa1fe62d210374e4eaf153b27cdf9e53fa8","abstract_canon_sha256":"949453c31d2b360d1eacb6563465d3aa5fa0a93d2838af19de230af4780fe007"},"schema_version":"1.0"},"canonical_sha256":"da6ef8e50dc195e8c540db362d571c92dacf399c3fdfc63de29110b6d3a9e9fb","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:44:16.819531Z","signature_b64":"+AsFSTI+uOxqBSBkJtwUSc9BrGIpgAwAf25f6hF7k3Rak1FBd8ipo+lhXGeViyi+zvR+atkYcyFkyP95R4sXCw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"da6ef8e50dc195e8c540db362d571c92dacf399c3fdfc63de29110b6d3a9e9fb","last_reissued_at":"2026-05-17T23:44:16.818977Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:44:16.818977Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1906.01388","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:44:16Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"2cpLwuiO77IOWYUyjpqKyIdEXt4zaSFegWkkJoqu/6GJXS+MiuFmvovGvvb5LoRn/UHEfe8h/P0aUG23SZcLCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T19:09:04.684972Z"},"content_sha256":"34fbb49b3e23631b06db501a5480ab13ec837fff6741d56a74b33561c26d26a4","schema_version":"1.0","event_id":"sha256:34fbb49b3e23631b06db501a5480ab13ec837fff6741d56a74b33561c26d26a4"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2019:3JXPRZINYGK6RRKA3M3C2VY4SL","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"A Comprehensive Study on Deep Learning Bug Characteristics","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG"],"primary_cat":"cs.SE","authors_text":"Giang Nguyen, Hridesh Rajan, Md Johirul Islam, Rangeet Pan","submitted_at":"2019-06-03T14:40:36Z","abstract_excerpt":"Deep learning has gained substantial popularity in recent years. Developers mainly rely on libraries and tools to add deep learning capabilities to their software. What kinds of bugs are frequently found in such software? What are the root causes of such bugs? What impacts do such bugs have? Which stages of deep learning pipeline are more bug prone? Are there any antipatterns? Understanding such characteristics of bugs in deep learning software has the potential to foster the development of better deep learning platforms, debugging mechanisms, development practices, and encourage the developme"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1906.01388","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:44:16Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"4uUDJXkVdswKaSuGHdih75yIfrrNTlZYMSAVZ94t/7H47ro1/JXNupYBPjQB1zxpLdPivQVl/LQT60/xNzu3CQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T19:09:04.685675Z"},"content_sha256":"1d5312218d291e367e099a82cdc969bc5b90fcdddc4059f6cbae82a19d947782","schema_version":"1.0","event_id":"sha256:1d5312218d291e367e099a82cdc969bc5b90fcdddc4059f6cbae82a19d947782"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/3JXPRZINYGK6RRKA3M3C2VY4SL/bundle.json","state_url":"https://pith.science/pith/3JXPRZINYGK6RRKA3M3C2VY4SL/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/3JXPRZINYGK6RRKA3M3C2VY4SL/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T19:09:04Z","links":{"resolver":"https://pith.science/pith/3JXPRZINYGK6RRKA3M3C2VY4SL","bundle":"https://pith.science/pith/3JXPRZINYGK6RRKA3M3C2VY4SL/bundle.json","state":"https://pith.science/pith/3JXPRZINYGK6RRKA3M3C2VY4SL/state.json","well_known_bundle":"https://pith.science/.well-known/pith/3JXPRZINYGK6RRKA3M3C2VY4SL/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2019:3JXPRZINYGK6RRKA3M3C2VY4SL","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"949453c31d2b360d1eacb6563465d3aa5fa0a93d2838af19de230af4780fe007","cross_cats_sorted":["cs.LG"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2019-06-03T14:40:36Z","title_canon_sha256":"3cdd5a6ac1268251685732b648b8afa1fe62d210374e4eaf153b27cdf9e53fa8"},"schema_version":"1.0","source":{"id":"1906.01388","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1906.01388","created_at":"2026-05-17T23:44:16Z"},{"alias_kind":"arxiv_version","alias_value":"1906.01388v1","created_at":"2026-05-17T23:44:16Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1906.01388","created_at":"2026-05-17T23:44:16Z"},{"alias_kind":"pith_short_12","alias_value":"3JXPRZINYGK6","created_at":"2026-05-18T12:33:07Z"},{"alias_kind":"pith_short_16","alias_value":"3JXPRZINYGK6RRKA","created_at":"2026-05-18T12:33:07Z"},{"alias_kind":"pith_short_8","alias_value":"3JXPRZIN","created_at":"2026-05-18T12:33:07Z"}],"graph_snapshots":[{"event_id":"sha256:1d5312218d291e367e099a82cdc969bc5b90fcdddc4059f6cbae82a19d947782","target":"graph","created_at":"2026-05-17T23:44:16Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Deep learning has gained substantial popularity in recent years. Developers mainly rely on libraries and tools to add deep learning capabilities to their software. What kinds of bugs are frequently found in such software? What are the root causes of such bugs? What impacts do such bugs have? Which stages of deep learning pipeline are more bug prone? Are there any antipatterns? Understanding such characteristics of bugs in deep learning software has the potential to foster the development of better deep learning platforms, debugging mechanisms, development practices, and encourage the developme","authors_text":"Giang Nguyen, Hridesh Rajan, Md Johirul Islam, Rangeet Pan","cross_cats":["cs.LG"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2019-06-03T14:40:36Z","title":"A Comprehensive Study on Deep Learning Bug Characteristics"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1906.01388","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:34fbb49b3e23631b06db501a5480ab13ec837fff6741d56a74b33561c26d26a4","target":"record","created_at":"2026-05-17T23:44:16Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"949453c31d2b360d1eacb6563465d3aa5fa0a93d2838af19de230af4780fe007","cross_cats_sorted":["cs.LG"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2019-06-03T14:40:36Z","title_canon_sha256":"3cdd5a6ac1268251685732b648b8afa1fe62d210374e4eaf153b27cdf9e53fa8"},"schema_version":"1.0","source":{"id":"1906.01388","kind":"arxiv","version":1}},"canonical_sha256":"da6ef8e50dc195e8c540db362d571c92dacf399c3fdfc63de29110b6d3a9e9fb","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"da6ef8e50dc195e8c540db362d571c92dacf399c3fdfc63de29110b6d3a9e9fb","first_computed_at":"2026-05-17T23:44:16.818977Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:44:16.818977Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"+AsFSTI+uOxqBSBkJtwUSc9BrGIpgAwAf25f6hF7k3Rak1FBd8ipo+lhXGeViyi+zvR+atkYcyFkyP95R4sXCw==","signature_status":"signed_v1","signed_at":"2026-05-17T23:44:16.819531Z","signed_message":"canonical_sha256_bytes"},"source_id":"1906.01388","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:34fbb49b3e23631b06db501a5480ab13ec837fff6741d56a74b33561c26d26a4","sha256:1d5312218d291e367e099a82cdc969bc5b90fcdddc4059f6cbae82a19d947782"],"state_sha256":"7921864e23518cc95a1355614669b41f2ecb8e327568554ee7678b8d5abfea9c"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"VL3bFdvCmnRWNi6UZVhMCh/MABCJKk6w4GKe6wQ9aTDZgkRBlUkJTJTeNIS9qqHec145LLzQObYldPXv7ILMBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T19:09:04.689402Z","bundle_sha256":"fe8de7ac3202652d4df7438a7abe505e377a42c5fc2a0285405b2a33821c509f"}}