{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:5MGIJDUHCUGL27CRMHZQEZFNIO","short_pith_number":"pith:5MGIJDUH","canonical_record":{"source":{"id":"1610.01239","kind":"arxiv","version":4},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2016-10-05T00:46:03Z","cross_cats_sorted":[],"title_canon_sha256":"f6da789a598b372aef9854898ab1da965f2e8f2dbc2fe6b4e758eba5ef1f6e7b","abstract_canon_sha256":"dbd6b8279379446923b513dedbd34693122d250d63e5d2f6998fa04e1dde64f7"},"schema_version":"1.0"},"canonical_sha256":"eb0c848e87150cbd7c5161f30264ad43aba772ab6f08c7ec859dc8785e40fc4a","source":{"kind":"arxiv","id":"1610.01239","version":4},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1610.01239","created_at":"2026-05-18T00:45:30Z"},{"alias_kind":"arxiv_version","alias_value":"1610.01239v4","created_at":"2026-05-18T00:45:30Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1610.01239","created_at":"2026-05-18T00:45:30Z"},{"alias_kind":"pith_short_12","alias_value":"5MGIJDUHCUGL","created_at":"2026-05-18T12:30:01Z"},{"alias_kind":"pith_short_16","alias_value":"5MGIJDUHCUGL27CR","created_at":"2026-05-18T12:30:01Z"},{"alias_kind":"pith_short_8","alias_value":"5MGIJDUH","created_at":"2026-05-18T12:30:01Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:5MGIJDUHCUGL27CRMHZQEZFNIO","target":"record","payload":{"canonical_record":{"source":{"id":"1610.01239","kind":"arxiv","version":4},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2016-10-05T00:46:03Z","cross_cats_sorted":[],"title_canon_sha256":"f6da789a598b372aef9854898ab1da965f2e8f2dbc2fe6b4e758eba5ef1f6e7b","abstract_canon_sha256":"dbd6b8279379446923b513dedbd34693122d250d63e5d2f6998fa04e1dde64f7"},"schema_version":"1.0"},"canonical_sha256":"eb0c848e87150cbd7c5161f30264ad43aba772ab6f08c7ec859dc8785e40fc4a","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:45:30.352049Z","signature_b64":"ZKTtgKTR0nozcvUCoVCVMOBGMar3ykfIAoXSYrViq7LZ01jjTUTINrGuMQ5qW2FeIRis3uz1whaOcQusVcwJCA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"eb0c848e87150cbd7c5161f30264ad43aba772ab6f08c7ec859dc8785e40fc4a","last_reissued_at":"2026-05-18T00:45:30.351565Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:45:30.351565Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1610.01239","source_version":4,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:45:30Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"8ltcFhbdASDqvOZdndqnF/VAyUAK8FAYcq+noOxdj5+3LUoVA2OEE0aX/mY1JxoZhfP/BnySH8HqctyFN+AlAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T14:09:29.669284Z"},"content_sha256":"77784af9d4e61b90fbef49ee0371194b04330b2c2d6acac7212324ad16ddda9d","schema_version":"1.0","event_id":"sha256:77784af9d4e61b90fbef49ee0371194b04330b2c2d6acac7212324ad16ddda9d"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:5MGIJDUHCUGL27CRMHZQEZFNIO","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Adversary Resistant Deep Neural Networks with an Application to Malware Detection","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.LG","authors_text":"Alexander G. Ororbia II, C. Lee Giles, Kaixuan Zhang, Qinglong Wang, Wenbo Guo, Xinyu Xing, Xue Liu","submitted_at":"2016-10-05T00:46:03Z","abstract_excerpt":"Beyond its highly publicized victories in Go, there have been numerous successful applications of deep learning in information retrieval, computer vision and speech recognition. In cybersecurity, an increasing number of companies have become excited about the potential of deep learning, and have started to use it for various security incidents, the most popular being malware detection. These companies assert that deep learning (DL) could help turn the tide in the battle against malware infections. However, deep neural networks (DNNs) are vulnerable to adversarial samples, a flaw that plagues m"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1610.01239","kind":"arxiv","version":4},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:45:30Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"s1XLuh5qGDLDcTfEA8UF3CSKseOUC/dTTC9D6eBwyCEEN9r6APG3LnbNiymxdOrEUWqHZGSjB1HQJI1Z9gbWCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T14:09:29.669913Z"},"content_sha256":"21f7f8c6eba537d179caa91af06264706b31eb6f9726f37f1112c96827179683","schema_version":"1.0","event_id":"sha256:21f7f8c6eba537d179caa91af06264706b31eb6f9726f37f1112c96827179683"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/5MGIJDUHCUGL27CRMHZQEZFNIO/bundle.json","state_url":"https://pith.science/pith/5MGIJDUHCUGL27CRMHZQEZFNIO/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/5MGIJDUHCUGL27CRMHZQEZFNIO/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T14:09:29Z","links":{"resolver":"https://pith.science/pith/5MGIJDUHCUGL27CRMHZQEZFNIO","bundle":"https://pith.science/pith/5MGIJDUHCUGL27CRMHZQEZFNIO/bundle.json","state":"https://pith.science/pith/5MGIJDUHCUGL27CRMHZQEZFNIO/state.json","well_known_bundle":"https://pith.science/.well-known/pith/5MGIJDUHCUGL27CRMHZQEZFNIO/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:5MGIJDUHCUGL27CRMHZQEZFNIO","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"dbd6b8279379446923b513dedbd34693122d250d63e5d2f6998fa04e1dde64f7","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2016-10-05T00:46:03Z","title_canon_sha256":"f6da789a598b372aef9854898ab1da965f2e8f2dbc2fe6b4e758eba5ef1f6e7b"},"schema_version":"1.0","source":{"id":"1610.01239","kind":"arxiv","version":4}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1610.01239","created_at":"2026-05-18T00:45:30Z"},{"alias_kind":"arxiv_version","alias_value":"1610.01239v4","created_at":"2026-05-18T00:45:30Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1610.01239","created_at":"2026-05-18T00:45:30Z"},{"alias_kind":"pith_short_12","alias_value":"5MGIJDUHCUGL","created_at":"2026-05-18T12:30:01Z"},{"alias_kind":"pith_short_16","alias_value":"5MGIJDUHCUGL27CR","created_at":"2026-05-18T12:30:01Z"},{"alias_kind":"pith_short_8","alias_value":"5MGIJDUH","created_at":"2026-05-18T12:30:01Z"}],"graph_snapshots":[{"event_id":"sha256:21f7f8c6eba537d179caa91af06264706b31eb6f9726f37f1112c96827179683","target":"graph","created_at":"2026-05-18T00:45:30Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Beyond its highly publicized victories in Go, there have been numerous successful applications of deep learning in information retrieval, computer vision and speech recognition. In cybersecurity, an increasing number of companies have become excited about the potential of deep learning, and have started to use it for various security incidents, the most popular being malware detection. These companies assert that deep learning (DL) could help turn the tide in the battle against malware infections. However, deep neural networks (DNNs) are vulnerable to adversarial samples, a flaw that plagues m","authors_text":"Alexander G. Ororbia II, C. Lee Giles, Kaixuan Zhang, Qinglong Wang, Wenbo Guo, Xinyu Xing, Xue Liu","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2016-10-05T00:46:03Z","title":"Adversary Resistant Deep Neural Networks with an Application to Malware Detection"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1610.01239","kind":"arxiv","version":4},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:77784af9d4e61b90fbef49ee0371194b04330b2c2d6acac7212324ad16ddda9d","target":"record","created_at":"2026-05-18T00:45:30Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"dbd6b8279379446923b513dedbd34693122d250d63e5d2f6998fa04e1dde64f7","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2016-10-05T00:46:03Z","title_canon_sha256":"f6da789a598b372aef9854898ab1da965f2e8f2dbc2fe6b4e758eba5ef1f6e7b"},"schema_version":"1.0","source":{"id":"1610.01239","kind":"arxiv","version":4}},"canonical_sha256":"eb0c848e87150cbd7c5161f30264ad43aba772ab6f08c7ec859dc8785e40fc4a","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"eb0c848e87150cbd7c5161f30264ad43aba772ab6f08c7ec859dc8785e40fc4a","first_computed_at":"2026-05-18T00:45:30.351565Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:45:30.351565Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"ZKTtgKTR0nozcvUCoVCVMOBGMar3ykfIAoXSYrViq7LZ01jjTUTINrGuMQ5qW2FeIRis3uz1whaOcQusVcwJCA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:45:30.352049Z","signed_message":"canonical_sha256_bytes"},"source_id":"1610.01239","source_kind":"arxiv","source_version":4}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:77784af9d4e61b90fbef49ee0371194b04330b2c2d6acac7212324ad16ddda9d","sha256:21f7f8c6eba537d179caa91af06264706b31eb6f9726f37f1112c96827179683"],"state_sha256":"0f0850fe64cf17d90e53bc101c7a1b477fc26d6d936428d4ecaf37b2a4fcb407"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"5FuCHK5sLvbXdrkfF1ule8PHF7NlZ6lWvWuUP4bzX3T6dWNWAm1efYXTZaENLvq8fHNsO5LpgdBkz2InHK+8Cw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T14:09:29.673329Z","bundle_sha256":"9f591c6df862c2f9ffb79c6e93cc0cfc92f0ab57d1d744db7dd97191596ffca8"}}