{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:DRQIMYRDSQMPMBSEZGMOIJKODP","short_pith_number":"pith:DRQIMYRD","canonical_record":{"source":{"id":"1612.01401","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2016-12-05T15:46:21Z","cross_cats_sorted":[],"title_canon_sha256":"bf52191aa3e5db0b43841690a0b1a95892505288ba277cb9e9e219d1e8221b43","abstract_canon_sha256":"16283d1e47434ee2e400a22bff8cb0889e721da584dff5f818da3784046a14cc"},"schema_version":"1.0"},"canonical_sha256":"1c608662239418f60644c998e4254e1bcb4d06e9f45a4c072091a87b6c955c46","source":{"kind":"arxiv","id":"1612.01401","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1612.01401","created_at":"2026-05-18T00:37:48Z"},{"alias_kind":"arxiv_version","alias_value":"1612.01401v2","created_at":"2026-05-18T00:37:48Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1612.01401","created_at":"2026-05-18T00:37:48Z"},{"alias_kind":"pith_short_12","alias_value":"DRQIMYRDSQMP","created_at":"2026-05-18T12:30:12Z"},{"alias_kind":"pith_short_16","alias_value":"DRQIMYRDSQMPMBSE","created_at":"2026-05-18T12:30:12Z"},{"alias_kind":"pith_short_8","alias_value":"DRQIMYRD","created_at":"2026-05-18T12:30:12Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:DRQIMYRDSQMPMBSEZGMOIJKODP","target":"record","payload":{"canonical_record":{"source":{"id":"1612.01401","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2016-12-05T15:46:21Z","cross_cats_sorted":[],"title_canon_sha256":"bf52191aa3e5db0b43841690a0b1a95892505288ba277cb9e9e219d1e8221b43","abstract_canon_sha256":"16283d1e47434ee2e400a22bff8cb0889e721da584dff5f818da3784046a14cc"},"schema_version":"1.0"},"canonical_sha256":"1c608662239418f60644c998e4254e1bcb4d06e9f45a4c072091a87b6c955c46","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:37:48.137554Z","signature_b64":"SP9R+23v60UuJl0WM6EtsP9Y3ZAJ/HyCUbvJRMGCGVZEaDJQ7epldHB10nXGYLmhOWOEJEjq90BhqKZZ6CnaAg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"1c608662239418f60644c998e4254e1bcb4d06e9f45a4c072091a87b6c955c46","last_reissued_at":"2026-05-18T00:37:48.136752Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:37:48.136752Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1612.01401","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:37:48Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"uHad5SHBqYt1pDva2ICysjfUoI7F5fDkuUTSuV3/x1TXp47bJ1Zw8o5Wggf8p85T0vtQ9R2UCuplPqXIq2voCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T20:27:40.874820Z"},"content_sha256":"16582ff00b41f803906e7655783e43ebe0cf9892153f6476dcb2b42cc50f8e5d","schema_version":"1.0","event_id":"sha256:16582ff00b41f803906e7655783e43ebe0cf9892153f6476dcb2b42cc50f8e5d"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:DRQIMYRDSQMPMBSEZGMOIJKODP","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Learning Adversary-Resistant Deep Neural Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.LG","authors_text":"Alexander G. Ororbia II, C. Lee Giles, Kaixuan Zhang, Qinglong Wang, Wenbo Guo, Xinyu Xing, Xue Liu","submitted_at":"2016-12-05T15:46:21Z","abstract_excerpt":"Deep neural networks (DNNs) have proven to be quite effective in a vast array of machine learning tasks, with recent examples in cyber security and autonomous vehicles. Despite the superior performance of DNNs in these applications, it has been recently shown that these models are susceptible to a particular type of attack that exploits a fundamental flaw in their design. This attack consists of generating particular synthetic examples referred to as adversarial samples. These samples are constructed by slightly manipulating real data-points in order to \"fool\" the original DNN model, forcing i"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1612.01401","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:37:48Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"2kh0l43DflbIADPujdng0xDH4eA4PzVjyqv7rWF28QsYjlCm4RPPpSU14IDBaWHBP81zKRm0JvbEG6SysIxcAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T20:27:40.875558Z"},"content_sha256":"23666b8ef1d69c0b06ba56758449d6afcf274f3fd304610296bdf56379ff932e","schema_version":"1.0","event_id":"sha256:23666b8ef1d69c0b06ba56758449d6afcf274f3fd304610296bdf56379ff932e"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/DRQIMYRDSQMPMBSEZGMOIJKODP/bundle.json","state_url":"https://pith.science/pith/DRQIMYRDSQMPMBSEZGMOIJKODP/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/DRQIMYRDSQMPMBSEZGMOIJKODP/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T20:27:40Z","links":{"resolver":"https://pith.science/pith/DRQIMYRDSQMPMBSEZGMOIJKODP","bundle":"https://pith.science/pith/DRQIMYRDSQMPMBSEZGMOIJKODP/bundle.json","state":"https://pith.science/pith/DRQIMYRDSQMPMBSEZGMOIJKODP/state.json","well_known_bundle":"https://pith.science/.well-known/pith/DRQIMYRDSQMPMBSEZGMOIJKODP/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:DRQIMYRDSQMPMBSEZGMOIJKODP","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"16283d1e47434ee2e400a22bff8cb0889e721da584dff5f818da3784046a14cc","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2016-12-05T15:46:21Z","title_canon_sha256":"bf52191aa3e5db0b43841690a0b1a95892505288ba277cb9e9e219d1e8221b43"},"schema_version":"1.0","source":{"id":"1612.01401","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1612.01401","created_at":"2026-05-18T00:37:48Z"},{"alias_kind":"arxiv_version","alias_value":"1612.01401v2","created_at":"2026-05-18T00:37:48Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1612.01401","created_at":"2026-05-18T00:37:48Z"},{"alias_kind":"pith_short_12","alias_value":"DRQIMYRDSQMP","created_at":"2026-05-18T12:30:12Z"},{"alias_kind":"pith_short_16","alias_value":"DRQIMYRDSQMPMBSE","created_at":"2026-05-18T12:30:12Z"},{"alias_kind":"pith_short_8","alias_value":"DRQIMYRD","created_at":"2026-05-18T12:30:12Z"}],"graph_snapshots":[{"event_id":"sha256:23666b8ef1d69c0b06ba56758449d6afcf274f3fd304610296bdf56379ff932e","target":"graph","created_at":"2026-05-18T00:37:48Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Deep neural networks (DNNs) have proven to be quite effective in a vast array of machine learning tasks, with recent examples in cyber security and autonomous vehicles. Despite the superior performance of DNNs in these applications, it has been recently shown that these models are susceptible to a particular type of attack that exploits a fundamental flaw in their design. This attack consists of generating particular synthetic examples referred to as adversarial samples. These samples are constructed by slightly manipulating real data-points in order to \"fool\" the original DNN model, forcing i","authors_text":"Alexander G. Ororbia II, C. Lee Giles, Kaixuan Zhang, Qinglong Wang, Wenbo Guo, Xinyu Xing, Xue Liu","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2016-12-05T15:46:21Z","title":"Learning Adversary-Resistant Deep Neural Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1612.01401","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:16582ff00b41f803906e7655783e43ebe0cf9892153f6476dcb2b42cc50f8e5d","target":"record","created_at":"2026-05-18T00:37:48Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"16283d1e47434ee2e400a22bff8cb0889e721da584dff5f818da3784046a14cc","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2016-12-05T15:46:21Z","title_canon_sha256":"bf52191aa3e5db0b43841690a0b1a95892505288ba277cb9e9e219d1e8221b43"},"schema_version":"1.0","source":{"id":"1612.01401","kind":"arxiv","version":2}},"canonical_sha256":"1c608662239418f60644c998e4254e1bcb4d06e9f45a4c072091a87b6c955c46","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"1c608662239418f60644c998e4254e1bcb4d06e9f45a4c072091a87b6c955c46","first_computed_at":"2026-05-18T00:37:48.136752Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:37:48.136752Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"SP9R+23v60UuJl0WM6EtsP9Y3ZAJ/HyCUbvJRMGCGVZEaDJQ7epldHB10nXGYLmhOWOEJEjq90BhqKZZ6CnaAg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:37:48.137554Z","signed_message":"canonical_sha256_bytes"},"source_id":"1612.01401","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:16582ff00b41f803906e7655783e43ebe0cf9892153f6476dcb2b42cc50f8e5d","sha256:23666b8ef1d69c0b06ba56758449d6afcf274f3fd304610296bdf56379ff932e"],"state_sha256":"38e41ce38b61ab21690a48c36926d8d7f341ad1b4860db89ce8467bb6f8acbbd"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ZiKQEgZEzTa8D56mKx1VHc/8wytfFNEM5Ytho91bJZ7HJJjUY4PlEJqBtLC/Mz+SkT6yyVvCIZ5IG+d81fHOBQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T20:27:40.879517Z","bundle_sha256":"d9d602f5e0008c2976dcb2787aa6743d9d180c66dd9143f32ca7dccc979b2c32"}}