{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:4PZF3766P7W5CSCL65THP7UJEB","short_pith_number":"pith:4PZF3766","schema_version":"1.0","canonical_sha256":"e3f25dffde7fedd1484bf76677fe8920656a814073f9ce4550aebf410e1e79b4","source":{"kind":"arxiv","id":"1904.11454","version":1},"attestation_state":"computed","paper":{"title":"Reward-Based Deception with Cognitive Bias","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LO","math.OC"],"primary_cat":"cs.AI","authors_text":"Bo Wu, Murat Cubuktepe, Suda Bharadwaj, Ufuk Topcu","submitted_at":"2019-04-25T16:51:24Z","abstract_excerpt":"Deception plays a key role in adversarial or strategic interactions for the purpose of self-defence and survival. This paper introduces a general framework and solution to address deception. Most existing approaches for deception consider obfuscating crucial information to rational adversaries with abundant memory and computation resources. In this paper, we consider deceiving adversaries with bounded rationality and in terms of expected rewards. This problem is commonly encountered in many applications especially involving human adversaries. Leveraging the cognitive bias of humans in reward e"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1904.11454","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AI","submitted_at":"2019-04-25T16:51:24Z","cross_cats_sorted":["cs.LO","math.OC"],"title_canon_sha256":"4a933edde5207059873054ef7912a86ef45a2458b5db92bc386b3354525e25a8","abstract_canon_sha256":"a9d09ccf2f028a492d7ccf6c2e4e5d89b0c0746302f8bd2bacd996de64a3eb34"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:47:44.825138Z","signature_b64":"awmBDjoLDGqnEP5PlhMhAb6PgXDl3b+Cm3gKDWPg1FlUXWbqj6A59spNp6cz18OGlSOS0bThweUfWFQgZDUjBg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"e3f25dffde7fedd1484bf76677fe8920656a814073f9ce4550aebf410e1e79b4","last_reissued_at":"2026-05-17T23:47:44.824511Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:47:44.824511Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Reward-Based Deception with Cognitive Bias","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LO","math.OC"],"primary_cat":"cs.AI","authors_text":"Bo Wu, Murat Cubuktepe, Suda Bharadwaj, Ufuk Topcu","submitted_at":"2019-04-25T16:51:24Z","abstract_excerpt":"Deception plays a key role in adversarial or strategic interactions for the purpose of self-defence and survival. This paper introduces a general framework and solution to address deception. Most existing approaches for deception consider obfuscating crucial information to rational adversaries with abundant memory and computation resources. In this paper, we consider deceiving adversaries with bounded rationality and in terms of expected rewards. This problem is commonly encountered in many applications especially involving human adversaries. Leveraging the cognitive bias of humans in reward e"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1904.11454","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1904.11454","created_at":"2026-05-17T23:47:44.824637+00:00"},{"alias_kind":"arxiv_version","alias_value":"1904.11454v1","created_at":"2026-05-17T23:47:44.824637+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1904.11454","created_at":"2026-05-17T23:47:44.824637+00:00"},{"alias_kind":"pith_short_12","alias_value":"4PZF3766P7W5","created_at":"2026-05-18T12:33:10.108867+00:00"},{"alias_kind":"pith_short_16","alias_value":"4PZF3766P7W5CSCL","created_at":"2026-05-18T12:33:10.108867+00:00"},{"alias_kind":"pith_short_8","alias_value":"4PZF3766","created_at":"2026-05-18T12:33:10.108867+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/4PZF3766P7W5CSCL65THP7UJEB","json":"https://pith.science/pith/4PZF3766P7W5CSCL65THP7UJEB.json","graph_json":"https://pith.science/api/pith-number/4PZF3766P7W5CSCL65THP7UJEB/graph.json","events_json":"https://pith.science/api/pith-number/4PZF3766P7W5CSCL65THP7UJEB/events.json","paper":"https://pith.science/paper/4PZF3766"},"agent_actions":{"view_html":"https://pith.science/pith/4PZF3766P7W5CSCL65THP7UJEB","download_json":"https://pith.science/pith/4PZF3766P7W5CSCL65THP7UJEB.json","view_paper":"https://pith.science/paper/4PZF3766","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1904.11454&json=true","fetch_graph":"https://pith.science/api/pith-number/4PZF3766P7W5CSCL65THP7UJEB/graph.json","fetch_events":"https://pith.science/api/pith-number/4PZF3766P7W5CSCL65THP7UJEB/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/4PZF3766P7W5CSCL65THP7UJEB/action/timestamp_anchor","attest_storage":"https://pith.science/pith/4PZF3766P7W5CSCL65THP7UJEB/action/storage_attestation","attest_author":"https://pith.science/pith/4PZF3766P7W5CSCL65THP7UJEB/action/author_attestation","sign_citation":"https://pith.science/pith/4PZF3766P7W5CSCL65THP7UJEB/action/citation_signature","submit_replication":"https://pith.science/pith/4PZF3766P7W5CSCL65THP7UJEB/action/replication_record"}},"created_at":"2026-05-17T23:47:44.824637+00:00","updated_at":"2026-05-17T23:47:44.824637+00:00"}