{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:7GHT3VCQPCOYO6LGLAFDFGJUMW","short_pith_number":"pith:7GHT3VCQ","canonical_record":{"source":{"id":"1703.09387","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NE","submitted_at":"2017-03-28T03:24:33Z","cross_cats_sorted":["cs.AI","cs.CV"],"title_canon_sha256":"8ae26dd09f4d6c011a2ea83912679e7aa24abdb46e9099803c063968ad58a36e","abstract_canon_sha256":"b8502dbdab1061f4b7cd9bf515fb3940d17794679ab46fccf229422e63b6d411"},"schema_version":"1.0"},"canonical_sha256":"f98f3dd450789d877966580a329934658aa066f3bfea69fde1f1a152d0921c17","source":{"kind":"arxiv","id":"1703.09387","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1703.09387","created_at":"2026-05-18T00:47:44Z"},{"alias_kind":"arxiv_version","alias_value":"1703.09387v1","created_at":"2026-05-18T00:47:44Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1703.09387","created_at":"2026-05-18T00:47:44Z"},{"alias_kind":"pith_short_12","alias_value":"7GHT3VCQPCOY","created_at":"2026-05-18T12:31:05Z"},{"alias_kind":"pith_short_16","alias_value":"7GHT3VCQPCOYO6LG","created_at":"2026-05-18T12:31:05Z"},{"alias_kind":"pith_short_8","alias_value":"7GHT3VCQ","created_at":"2026-05-18T12:31:05Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:7GHT3VCQPCOYO6LGLAFDFGJUMW","target":"record","payload":{"canonical_record":{"source":{"id":"1703.09387","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NE","submitted_at":"2017-03-28T03:24:33Z","cross_cats_sorted":["cs.AI","cs.CV"],"title_canon_sha256":"8ae26dd09f4d6c011a2ea83912679e7aa24abdb46e9099803c063968ad58a36e","abstract_canon_sha256":"b8502dbdab1061f4b7cd9bf515fb3940d17794679ab46fccf229422e63b6d411"},"schema_version":"1.0"},"canonical_sha256":"f98f3dd450789d877966580a329934658aa066f3bfea69fde1f1a152d0921c17","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:47:44.720984Z","signature_b64":"iWRBxP6nYb3lS4IzCIty1iqgY0EvcGPFb4iphpzB9FdPkk3kqyU+iYGmwdn4Wc1vrksAd0pG7YgoXLBQBcunBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"f98f3dd450789d877966580a329934658aa066f3bfea69fde1f1a152d0921c17","last_reissued_at":"2026-05-18T00:47:44.720223Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:47:44.720223Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1703.09387","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:47:44Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"DHj1fqXvQVO2ByNUJb+zrYCOop6kYRmLww6PIVfAsUWnltxw787sS+7jzF5aOlwXn8pXZfDPAVnow8R1piDDBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-18T21:16:40.408207Z"},"content_sha256":"a83a48f11db55275eb95ecbcd7c2a135352aaf9e7d77108d487d36a521c5f336","schema_version":"1.0","event_id":"sha256:a83a48f11db55275eb95ecbcd7c2a135352aaf9e7d77108d487d36a521c5f336"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:7GHT3VCQPCOYO6LGLAFDFGJUMW","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Adversarial Transformation Networks: Learning to Generate Adversarial Examples","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.AI","cs.CV"],"primary_cat":"cs.NE","authors_text":"Ian Fischer, Shumeet Baluja","submitted_at":"2017-03-28T03:24:33Z","abstract_excerpt":"Multiple different approaches of generating adversarial examples have been proposed to attack deep neural networks. These approaches involve either directly computing gradients with respect to the image pixels, or directly solving an optimization on the image pixels. In this work, we present a fundamentally new method for generating adversarial examples that is fast to execute and provides exceptional diversity of output. We efficiently train feed-forward neural networks in a self-supervised manner to generate adversarial examples against a target network or set of networks. We call such a net"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1703.09387","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:47:44Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ltgmLNPCOZrFF9CMFwXnhepYzF6ndiqf7zGqFYgZ4JAX+edVRyuYmBT4evm9PX0vJYRb7Zj+J5mhzwKtYunyBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-18T21:16:40.408822Z"},"content_sha256":"b868769466a01c49d850d3aa5f7907d7e8e670198a3d78729e4186ff95178de4","schema_version":"1.0","event_id":"sha256:b868769466a01c49d850d3aa5f7907d7e8e670198a3d78729e4186ff95178de4"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW/bundle.json","state_url":"https://pith.science/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-18T21:16:40Z","links":{"resolver":"https://pith.science/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW","bundle":"https://pith.science/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW/bundle.json","state":"https://pith.science/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW/state.json","well_known_bundle":"https://pith.science/.well-known/pith/7GHT3VCQPCOYO6LGLAFDFGJUMW/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:7GHT3VCQPCOYO6LGLAFDFGJUMW","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"b8502dbdab1061f4b7cd9bf515fb3940d17794679ab46fccf229422e63b6d411","cross_cats_sorted":["cs.AI","cs.CV"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NE","submitted_at":"2017-03-28T03:24:33Z","title_canon_sha256":"8ae26dd09f4d6c011a2ea83912679e7aa24abdb46e9099803c063968ad58a36e"},"schema_version":"1.0","source":{"id":"1703.09387","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1703.09387","created_at":"2026-05-18T00:47:44Z"},{"alias_kind":"arxiv_version","alias_value":"1703.09387v1","created_at":"2026-05-18T00:47:44Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1703.09387","created_at":"2026-05-18T00:47:44Z"},{"alias_kind":"pith_short_12","alias_value":"7GHT3VCQPCOY","created_at":"2026-05-18T12:31:05Z"},{"alias_kind":"pith_short_16","alias_value":"7GHT3VCQPCOYO6LG","created_at":"2026-05-18T12:31:05Z"},{"alias_kind":"pith_short_8","alias_value":"7GHT3VCQ","created_at":"2026-05-18T12:31:05Z"}],"graph_snapshots":[{"event_id":"sha256:b868769466a01c49d850d3aa5f7907d7e8e670198a3d78729e4186ff95178de4","target":"graph","created_at":"2026-05-18T00:47:44Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Multiple different approaches of generating adversarial examples have been proposed to attack deep neural networks. These approaches involve either directly computing gradients with respect to the image pixels, or directly solving an optimization on the image pixels. In this work, we present a fundamentally new method for generating adversarial examples that is fast to execute and provides exceptional diversity of output. We efficiently train feed-forward neural networks in a self-supervised manner to generate adversarial examples against a target network or set of networks. We call such a net","authors_text":"Ian Fischer, Shumeet Baluja","cross_cats":["cs.AI","cs.CV"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NE","submitted_at":"2017-03-28T03:24:33Z","title":"Adversarial Transformation Networks: Learning to Generate Adversarial Examples"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1703.09387","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:a83a48f11db55275eb95ecbcd7c2a135352aaf9e7d77108d487d36a521c5f336","target":"record","created_at":"2026-05-18T00:47:44Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"b8502dbdab1061f4b7cd9bf515fb3940d17794679ab46fccf229422e63b6d411","cross_cats_sorted":["cs.AI","cs.CV"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NE","submitted_at":"2017-03-28T03:24:33Z","title_canon_sha256":"8ae26dd09f4d6c011a2ea83912679e7aa24abdb46e9099803c063968ad58a36e"},"schema_version":"1.0","source":{"id":"1703.09387","kind":"arxiv","version":1}},"canonical_sha256":"f98f3dd450789d877966580a329934658aa066f3bfea69fde1f1a152d0921c17","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"f98f3dd450789d877966580a329934658aa066f3bfea69fde1f1a152d0921c17","first_computed_at":"2026-05-18T00:47:44.720223Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:47:44.720223Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"iWRBxP6nYb3lS4IzCIty1iqgY0EvcGPFb4iphpzB9FdPkk3kqyU+iYGmwdn4Wc1vrksAd0pG7YgoXLBQBcunBQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:47:44.720984Z","signed_message":"canonical_sha256_bytes"},"source_id":"1703.09387","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:a83a48f11db55275eb95ecbcd7c2a135352aaf9e7d77108d487d36a521c5f336","sha256:b868769466a01c49d850d3aa5f7907d7e8e670198a3d78729e4186ff95178de4"],"state_sha256":"63a783851479eb8c5be5d1f955f32bbf967a338b2f4ed7e7755623832bb326ee"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"iXD5G6CyXEUegncEWvmLc5rJSkXbqqqOjHrGqY8BvFXgp1eNJ4ysVcJJL/5uDYmCSyPTProsmU1TBLA5xHSlBg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-18T21:16:40.411074Z","bundle_sha256":"28683abc364ec8f26e9b05a668e8318e57f012c1b15bdbb76f6da910d1eef547"}}