{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:EBQW5N6MAG2WOKBPQF7GLNWLAR","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"e56bf2d2a2552bed945f42a51ff6aae747327645fc11dfe6c625ba9ca4eb1bdf","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-10-18T14:17:12Z","title_canon_sha256":"a47997832dc9850c372f52f09fce632b81e1f8902bcf6a1cb43284d0195b7df0"},"schema_version":"1.0","source":{"id":"1810.08070","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1810.08070","created_at":"2026-05-18T00:02:50Z"},{"alias_kind":"arxiv_version","alias_value":"1810.08070v1","created_at":"2026-05-18T00:02:50Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1810.08070","created_at":"2026-05-18T00:02:50Z"},{"alias_kind":"pith_short_12","alias_value":"EBQW5N6MAG2W","created_at":"2026-05-18T12:32:22Z"},{"alias_kind":"pith_short_16","alias_value":"EBQW5N6MAG2WOKBP","created_at":"2026-05-18T12:32:22Z"},{"alias_kind":"pith_short_8","alias_value":"EBQW5N6M","created_at":"2026-05-18T12:32:22Z"}],"graph_snapshots":[{"event_id":"sha256:fc4ac852847f1a85a17294ccd456c181dbb447d3ffb7f72fd82c9e49db124c4a","target":"graph","created_at":"2026-05-18T00:02:50Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"With the rapid development of Artificial Intelligence (AI), the problem of AI security has gradually emerged. Most existing machine learning algorithms may be attacked by adversarial examples. An adversarial example is a slightly modified input sample that can lead to a false result of machine learning algorithms. The adversarial examples pose a potential security threat for many AI application areas, especially in the domain of robot path planning. In this field, the adversarial examples obstruct the algorithm by adding obstacles to the normal maps, resulting in multiple effects on the predic","authors_text":"Gang Li, Jingjing Liu, Jiqiang Liu, Tong Chen, Wenjia Niu, Yingdi Wang, Yingxiao Xiang","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-10-18T14:17:12Z","title":"A Training-based Identification Approach to VIN Adversarial Examples"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1810.08070","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:cdfb876f1e001c7cf6485ab24d23f385bef02c324bc0218f80a71a8817fe807a","target":"record","created_at":"2026-05-18T00:02:50Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"e56bf2d2a2552bed945f42a51ff6aae747327645fc11dfe6c625ba9ca4eb1bdf","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-10-18T14:17:12Z","title_canon_sha256":"a47997832dc9850c372f52f09fce632b81e1f8902bcf6a1cb43284d0195b7df0"},"schema_version":"1.0","source":{"id":"1810.08070","kind":"arxiv","version":1}},"canonical_sha256":"20616eb7cc01b567282f817e65b6cb047e160a5e7cb54d46345007bbeea86d33","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"20616eb7cc01b567282f817e65b6cb047e160a5e7cb54d46345007bbeea86d33","first_computed_at":"2026-05-18T00:02:50.651606Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:02:50.651606Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"ROtvbXVpJ2KiAOlPHkTGIBBt/UNi/9FRljt66DuR45K0g6HuJnOcM+7vaYgiaIBxMRyGBLUBzBjXXff4fX5kBg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:02:50.652074Z","signed_message":"canonical_sha256_bytes"},"source_id":"1810.08070","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:cdfb876f1e001c7cf6485ab24d23f385bef02c324bc0218f80a71a8817fe807a","sha256:fc4ac852847f1a85a17294ccd456c181dbb447d3ffb7f72fd82c9e49db124c4a"],"state_sha256":"611a922ad15b2416929cbf54d080989eac7605d7dedfe3454eb6c348c2e920a2"}