{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2017:7GHT3VCQPCOYO6LGLAFDFGJUMW","short_pith_number":"pith:7GHT3VCQ","schema_version":"1.0","canonical_sha256":"f98f3dd450789d877966580a329934658aa066f3bfea69fde1f1a152d0921c17","source":{"kind":"arxiv","id":"1703.09387","version":1},"attestation_state":"computed","paper":{"title":"Adversarial Transformation Networks: Learning to Generate Adversarial Examples","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.AI","cs.CV"],"primary_cat":"cs.NE","authors_text":"Ian Fischer, Shumeet Baluja","submitted_at":"2017-03-28T03:24:33Z","abstract_excerpt":"Multiple different approaches of generating adversarial examples have been proposed to attack deep neural networks. These approaches involve either directly computing gradients with respect to the image pixels, or directly solving an optimization on the image pixels. In this work, we present a fundamentally new method for generating adversarial examples that is fast to execute and provides exceptional diversity of output. We efficiently train feed-forward neural networks in a self-supervised manner to generate adversarial examples against a target network or set of networks. We call such a net"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1703.09387","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NE","submitted_at":"2017-03-28T03:24:33Z","cross_cats_sorted":["cs.AI","cs.CV"],"title_canon_sha256":"8ae26dd09f4d6c011a2ea83912679e7aa24abdb46e9099803c063968ad58a36e","abstract_canon_sha256":"b8502dbdab1061f4b7cd9bf515fb3940d17794679ab46fccf229422e63b6d411"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:47:44.720984Z","signature_b64":"iWRBxP6nYb3lS4IzCIty1iqgY0EvcGPFb4iphpzB9FdPkk3kqyU+iYGmwdn4Wc1vrksAd0pG7YgoXLBQBcunBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"f98f3dd450789d877966580a329934658aa066f3bfea69fde1f1a152d0921c17","last_reissued_at":"2026-05-18T00:47:44.720223Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:47:44.720223Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Adversarial Transformation Networks: Learning to Generate Adversarial Examples","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.AI","cs.CV"],"primary_cat":"cs.NE","authors_text":"Ian Fischer, Shumeet Baluja","submitted_at":"2017-03-28T03:24:33Z","abstract_excerpt":"Multiple different approaches of generating adversarial examples have been proposed to attack deep neural networks. These approaches involve either directly computing gradients with respect to the image pixels, or directly solving an optimization on the image pixels. In this work, we present a fundamentally new method for generating adversarial examples that is fast to execute and provides exceptional diversity of output. We efficiently train feed-forward neural networks in a self-supervised manner to generate adversarial examples against a target network or set of networks. We call such a net"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1703.09387","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1703.09387","created_at":"2026-05-18T00:47:44.720386+00:00"},{"alias_kind":"arxiv_version","alias_value":"1703.09387v1","created_at":"2026-05-18T00:47:44.720386+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1703.09387","created_at":"2026-05-18T00:47:44.720386+00:00"},{"alias_kind":"pith_short_12","alias_value":"7GHT3VCQPCOY","created_at":"2026-05-18T12:31:05.417338+00:00"},{"alias_kind":"pith_short_16","alias_value":"7GHT3VCQPCOYO6LG","created_at":"2026-05-18T12:31:05.417338+00:00"},{"alias_kind":"pith_short_8","alias_value":"7GHT3VCQ","created_at":"2026-05-18T12:31:05.417338+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":1,"internal_anchor_count":1,"sample":[{"citing_arxiv_id":"2605.12937","citing_title":"AuraMask: An Extensible Pipeline for Developing Aesthetic Anti-Facial Recognition Image Filters","ref_index":8,"is_internal_anchor":true}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW","json":"https://pith.science/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW.json","graph_json":"https://pith.science/api/pith-number/7GHT3VCQPCOYO6LGLAFDFGJUMW/graph.json","events_json":"https://pith.science/api/pith-number/7GHT3VCQPCOYO6LGLAFDFGJUMW/events.json","paper":"https://pith.science/paper/7GHT3VCQ"},"agent_actions":{"view_html":"https://pith.science/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW","download_json":"https://pith.science/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW.json","view_paper":"https://pith.science/paper/7GHT3VCQ","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1703.09387&json=true","fetch_graph":"https://pith.science/api/pith-number/7GHT3VCQPCOYO6LGLAFDFGJUMW/graph.json","fetch_events":"https://pith.science/api/pith-number/7GHT3VCQPCOYO6LGLAFDFGJUMW/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW/action/timestamp_anchor","attest_storage":"https://pith.science/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW/action/storage_attestation","attest_author":"https://pith.science/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW/action/author_attestation","sign_citation":"https://pith.science/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW/action/citation_signature","submit_replication":"https://pith.science/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW/action/replication_record"}},"created_at":"2026-05-18T00:47:44.720386+00:00","updated_at":"2026-05-18T00:47:44.720386+00:00"}