{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:5MGIJDUHCUGL27CRMHZQEZFNIO","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"dbd6b8279379446923b513dedbd34693122d250d63e5d2f6998fa04e1dde64f7","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2016-10-05T00:46:03Z","title_canon_sha256":"f6da789a598b372aef9854898ab1da965f2e8f2dbc2fe6b4e758eba5ef1f6e7b"},"schema_version":"1.0","source":{"id":"1610.01239","kind":"arxiv","version":4}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1610.01239","created_at":"2026-05-18T00:45:30Z"},{"alias_kind":"arxiv_version","alias_value":"1610.01239v4","created_at":"2026-05-18T00:45:30Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1610.01239","created_at":"2026-05-18T00:45:30Z"},{"alias_kind":"pith_short_12","alias_value":"5MGIJDUHCUGL","created_at":"2026-05-18T12:30:01Z"},{"alias_kind":"pith_short_16","alias_value":"5MGIJDUHCUGL27CR","created_at":"2026-05-18T12:30:01Z"},{"alias_kind":"pith_short_8","alias_value":"5MGIJDUH","created_at":"2026-05-18T12:30:01Z"}],"graph_snapshots":[{"event_id":"sha256:21f7f8c6eba537d179caa91af06264706b31eb6f9726f37f1112c96827179683","target":"graph","created_at":"2026-05-18T00:45:30Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Beyond its highly publicized victories in Go, there have been numerous successful applications of deep learning in information retrieval, computer vision and speech recognition. In cybersecurity, an increasing number of companies have become excited about the potential of deep learning, and have started to use it for various security incidents, the most popular being malware detection. These companies assert that deep learning (DL) could help turn the tide in the battle against malware infections. However, deep neural networks (DNNs) are vulnerable to adversarial samples, a flaw that plagues m","authors_text":"Alexander G. Ororbia II, C. Lee Giles, Kaixuan Zhang, Qinglong Wang, Wenbo Guo, Xinyu Xing, Xue Liu","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2016-10-05T00:46:03Z","title":"Adversary Resistant Deep Neural Networks with an Application to Malware Detection"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1610.01239","kind":"arxiv","version":4},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:77784af9d4e61b90fbef49ee0371194b04330b2c2d6acac7212324ad16ddda9d","target":"record","created_at":"2026-05-18T00:45:30Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"dbd6b8279379446923b513dedbd34693122d250d63e5d2f6998fa04e1dde64f7","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2016-10-05T00:46:03Z","title_canon_sha256":"f6da789a598b372aef9854898ab1da965f2e8f2dbc2fe6b4e758eba5ef1f6e7b"},"schema_version":"1.0","source":{"id":"1610.01239","kind":"arxiv","version":4}},"canonical_sha256":"eb0c848e87150cbd7c5161f30264ad43aba772ab6f08c7ec859dc8785e40fc4a","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"eb0c848e87150cbd7c5161f30264ad43aba772ab6f08c7ec859dc8785e40fc4a","first_computed_at":"2026-05-18T00:45:30.351565Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:45:30.351565Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"ZKTtgKTR0nozcvUCoVCVMOBGMar3ykfIAoXSYrViq7LZ01jjTUTINrGuMQ5qW2FeIRis3uz1whaOcQusVcwJCA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:45:30.352049Z","signed_message":"canonical_sha256_bytes"},"source_id":"1610.01239","source_kind":"arxiv","source_version":4}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:77784af9d4e61b90fbef49ee0371194b04330b2c2d6acac7212324ad16ddda9d","sha256:21f7f8c6eba537d179caa91af06264706b31eb6f9726f37f1112c96827179683"],"state_sha256":"0f0850fe64cf17d90e53bc101c7a1b477fc26d6d936428d4ecaf37b2a4fcb407"}