{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:A5X4VEONMPNET7MHK3Y6HKF4VB","short_pith_number":"pith:A5X4VEON","canonical_record":{"source":{"id":"1805.00310","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-04-14T05:44:51Z","cross_cats_sorted":["cs.CR","cs.LG","stat.ML"],"title_canon_sha256":"b8eb641a00fc122b4021eb351688fa98540074ca49ba6596b48e32eb1bcd80f2","abstract_canon_sha256":"c846d4b8e09a26ec5c8b3e6876d80568576bc65d04288aa7f9de0a59531d5aa5"},"schema_version":"1.0"},"canonical_sha256":"076fca91cd63da49fd8756f1e3a8bca87e75c4e3a4a45e4419a322af090e3bfd","source":{"kind":"arxiv","id":"1805.00310","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1805.00310","created_at":"2026-05-18T00:16:20Z"},{"alias_kind":"arxiv_version","alias_value":"1805.00310v2","created_at":"2026-05-18T00:16:20Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1805.00310","created_at":"2026-05-18T00:16:20Z"},{"alias_kind":"pith_short_12","alias_value":"A5X4VEONMPNE","created_at":"2026-05-18T12:32:13Z"},{"alias_kind":"pith_short_16","alias_value":"A5X4VEONMPNET7MH","created_at":"2026-05-18T12:32:13Z"},{"alias_kind":"pith_short_8","alias_value":"A5X4VEON","created_at":"2026-05-18T12:32:13Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:A5X4VEONMPNET7MHK3Y6HKF4VB","target":"record","payload":{"canonical_record":{"source":{"id":"1805.00310","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-04-14T05:44:51Z","cross_cats_sorted":["cs.CR","cs.LG","stat.ML"],"title_canon_sha256":"b8eb641a00fc122b4021eb351688fa98540074ca49ba6596b48e32eb1bcd80f2","abstract_canon_sha256":"c846d4b8e09a26ec5c8b3e6876d80568576bc65d04288aa7f9de0a59531d5aa5"},"schema_version":"1.0"},"canonical_sha256":"076fca91cd63da49fd8756f1e3a8bca87e75c4e3a4a45e4419a322af090e3bfd","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:16:20.893808Z","signature_b64":"oZd3xzhyQYNOdJmPfHCl354/mj2AlmNUsHNST9t3pIodfTsV6HrSJ3ATpfDLsgHUHGMhy8lZ1uacJ+nPdQcmCg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"076fca91cd63da49fd8756f1e3a8bca87e75c4e3a4a45e4419a322af090e3bfd","last_reissued_at":"2026-05-18T00:16:20.893305Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:16:20.893305Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1805.00310","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:16:20Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"uNCDtGVRM13Uf3KjLW9QF4beES2JAMuwKrFmEIGMzbSNpQfMfKJ0k5lkBVXahsovkLWBPggzsgdoblyTLwzFAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T05:58:12.225485Z"},"content_sha256":"0adaaa877e9249925a5dec04c9c5b06cfdf64c181a902c6ed32efe34e689835a","schema_version":"1.0","event_id":"sha256:0adaaa877e9249925a5dec04c9c5b06cfdf64c181a902c6ed32efe34e689835a"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:A5X4VEONMPNET7MHK3Y6HKF4VB","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","cs.LG","stat.ML"],"primary_cat":"cs.CV","authors_text":"Chia-Mu Yu, Kang-Cheng Chen, Pei-Hsuan Lu, Pin-Yu Chen","submitted_at":"2018-04-14T05:44:51Z","abstract_excerpt":"In recent years, defending adversarial perturbations to natural examples in order to build robust machine learning models trained by deep neural networks (DNNs) has become an emerging research field in the conjunction of deep learning and security. In particular, MagNet consisting of an adversary detector and a data reformer is by far one of the strongest defenses in the black-box oblivious attack setting, where the attacker aims to craft transferable adversarial examples from an undefended DNN model to bypass an unknown defense module deployed on the same DNN model. Under this setting, MagNet"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1805.00310","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:16:20Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"95efKnOITQOhXmG3aOQWIbhU3IuFlM39QujMe9YsIJI73CrlgeeijCYhY8ikD7VeaPAgBG4M0O76oYv3r+QcBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T05:58:12.225904Z"},"content_sha256":"e14e1c53dbbe328df5457f2503a7d9e2369b93a77d36ab4de1e684a43217039a","schema_version":"1.0","event_id":"sha256:e14e1c53dbbe328df5457f2503a7d9e2369b93a77d36ab4de1e684a43217039a"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/A5X4VEONMPNET7MHK3Y6HKF4VB/bundle.json","state_url":"https://pith.science/pith/A5X4VEONMPNET7MHK3Y6HKF4VB/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/A5X4VEONMPNET7MHK3Y6HKF4VB/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T05:58:12Z","links":{"resolver":"https://pith.science/pith/A5X4VEONMPNET7MHK3Y6HKF4VB","bundle":"https://pith.science/pith/A5X4VEONMPNET7MHK3Y6HKF4VB/bundle.json","state":"https://pith.science/pith/A5X4VEONMPNET7MHK3Y6HKF4VB/state.json","well_known_bundle":"https://pith.science/.well-known/pith/A5X4VEONMPNET7MHK3Y6HKF4VB/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:A5X4VEONMPNET7MHK3Y6HKF4VB","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"c846d4b8e09a26ec5c8b3e6876d80568576bc65d04288aa7f9de0a59531d5aa5","cross_cats_sorted":["cs.CR","cs.LG","stat.ML"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-04-14T05:44:51Z","title_canon_sha256":"b8eb641a00fc122b4021eb351688fa98540074ca49ba6596b48e32eb1bcd80f2"},"schema_version":"1.0","source":{"id":"1805.00310","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1805.00310","created_at":"2026-05-18T00:16:20Z"},{"alias_kind":"arxiv_version","alias_value":"1805.00310v2","created_at":"2026-05-18T00:16:20Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1805.00310","created_at":"2026-05-18T00:16:20Z"},{"alias_kind":"pith_short_12","alias_value":"A5X4VEONMPNE","created_at":"2026-05-18T12:32:13Z"},{"alias_kind":"pith_short_16","alias_value":"A5X4VEONMPNET7MH","created_at":"2026-05-18T12:32:13Z"},{"alias_kind":"pith_short_8","alias_value":"A5X4VEON","created_at":"2026-05-18T12:32:13Z"}],"graph_snapshots":[{"event_id":"sha256:e14e1c53dbbe328df5457f2503a7d9e2369b93a77d36ab4de1e684a43217039a","target":"graph","created_at":"2026-05-18T00:16:20Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In recent years, defending adversarial perturbations to natural examples in order to build robust machine learning models trained by deep neural networks (DNNs) has become an emerging research field in the conjunction of deep learning and security. In particular, MagNet consisting of an adversary detector and a data reformer is by far one of the strongest defenses in the black-box oblivious attack setting, where the attacker aims to craft transferable adversarial examples from an undefended DNN model to bypass an unknown defense module deployed on the same DNN model. Under this setting, MagNet","authors_text":"Chia-Mu Yu, Kang-Cheng Chen, Pei-Hsuan Lu, Pin-Yu Chen","cross_cats":["cs.CR","cs.LG","stat.ML"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-04-14T05:44:51Z","title":"On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1805.00310","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:0adaaa877e9249925a5dec04c9c5b06cfdf64c181a902c6ed32efe34e689835a","target":"record","created_at":"2026-05-18T00:16:20Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"c846d4b8e09a26ec5c8b3e6876d80568576bc65d04288aa7f9de0a59531d5aa5","cross_cats_sorted":["cs.CR","cs.LG","stat.ML"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-04-14T05:44:51Z","title_canon_sha256":"b8eb641a00fc122b4021eb351688fa98540074ca49ba6596b48e32eb1bcd80f2"},"schema_version":"1.0","source":{"id":"1805.00310","kind":"arxiv","version":2}},"canonical_sha256":"076fca91cd63da49fd8756f1e3a8bca87e75c4e3a4a45e4419a322af090e3bfd","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"076fca91cd63da49fd8756f1e3a8bca87e75c4e3a4a45e4419a322af090e3bfd","first_computed_at":"2026-05-18T00:16:20.893305Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:16:20.893305Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"oZd3xzhyQYNOdJmPfHCl354/mj2AlmNUsHNST9t3pIodfTsV6HrSJ3ATpfDLsgHUHGMhy8lZ1uacJ+nPdQcmCg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:16:20.893808Z","signed_message":"canonical_sha256_bytes"},"source_id":"1805.00310","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:0adaaa877e9249925a5dec04c9c5b06cfdf64c181a902c6ed32efe34e689835a","sha256:e14e1c53dbbe328df5457f2503a7d9e2369b93a77d36ab4de1e684a43217039a"],"state_sha256":"18ee1752c2943797d092be95c9e5e728930b3078f1224c925a760b726e13735c"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"8Z6uG+6p14Se3S2xBEOsm17BEg1YnTuz403tZYBmmVOLMbqnLbLqNBnVVIXNy8+8z5ZQc6rO15SjtCQd6ktDBg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T05:58:12.231822Z","bundle_sha256":"a27e67029400a8d6f6c7466ea14db31157469f321a7e16f8ba5298e975a4e714"}}