{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2016:EDMCJCZ3X35NJR56BQM7STYBZ2","short_pith_number":"pith:EDMCJCZ3","schema_version":"1.0","canonical_sha256":"20d8248b3bbefad4c7be0c19f94f01ceba06453631b591c4fd4d8caa9cddba52","source":{"kind":"arxiv","id":"1611.01236","version":2},"attestation_state":"computed","paper":{"title":"Adversarial Machine Learning at Scale","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","cs.LG","stat.ML"],"primary_cat":"cs.CV","authors_text":"Alexey Kurakin, Ian Goodfellow, Samy Bengio","submitted_at":"2016-11-04T01:11:02Z","abstract_excerpt":"Adversarial examples are malicious inputs designed to fool machine learning models. They often transfer from one model to another, allowing attackers to mount black box attacks without knowledge of the target model's parameters. Adversarial training is the process of explicitly training a model on adversarial examples, in order to make it more robust to attack or to reduce its test error on clean inputs. So far, adversarial training has primarily been applied to small problems. In this research, we apply adversarial training to ImageNet. Our contributions include: (1) recommendations for how t"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1611.01236","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2016-11-04T01:11:02Z","cross_cats_sorted":["cs.CR","cs.LG","stat.ML"],"title_canon_sha256":"b29db9b466b4050f16d529f3e5f7a0840734f55080ba6ea688ec061b4fc75f70","abstract_canon_sha256":"984b46bfdc29c2c3ec5d218cc8a5cb58bdf791ed37ed96e33bc86881af55474e"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:50:56.425336Z","signature_b64":"1Tt7dWNuH/irIZPraRaR44wsDCZ5ua8CMtlpXjdM4L/Aj4YatpnljiD1sMfPXEM+pnvBvJ8WT7dthEjdU78sBg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"20d8248b3bbefad4c7be0c19f94f01ceba06453631b591c4fd4d8caa9cddba52","last_reissued_at":"2026-05-18T00:50:56.424594Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:50:56.424594Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Adversarial Machine Learning at Scale","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","cs.LG","stat.ML"],"primary_cat":"cs.CV","authors_text":"Alexey Kurakin, Ian Goodfellow, Samy Bengio","submitted_at":"2016-11-04T01:11:02Z","abstract_excerpt":"Adversarial examples are malicious inputs designed to fool machine learning models. They often transfer from one model to another, allowing attackers to mount black box attacks without knowledge of the target model's parameters. Adversarial training is the process of explicitly training a model on adversarial examples, in order to make it more robust to attack or to reduce its test error on clean inputs. So far, adversarial training has primarily been applied to small problems. In this research, we apply adversarial training to ImageNet. Our contributions include: (1) recommendations for how t"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1611.01236","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1611.01236","created_at":"2026-05-18T00:50:56.424724+00:00"},{"alias_kind":"arxiv_version","alias_value":"1611.01236v2","created_at":"2026-05-18T00:50:56.424724+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1611.01236","created_at":"2026-05-18T00:50:56.424724+00:00"},{"alias_kind":"pith_short_12","alias_value":"EDMCJCZ3X35N","created_at":"2026-05-18T12:30:12.583610+00:00"},{"alias_kind":"pith_short_16","alias_value":"EDMCJCZ3X35NJR56","created_at":"2026-05-18T12:30:12.583610+00:00"},{"alias_kind":"pith_short_8","alias_value":"EDMCJCZ3","created_at":"2026-05-18T12:30:12.583610+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":5,"internal_anchor_count":2,"sample":[{"citing_arxiv_id":"2411.15633","citing_title":"Orthogonal Subspace Decomposition for Generalizable AI-Generated Image Detection","ref_index":196,"is_internal_anchor":true},{"citing_arxiv_id":"2512.20677","citing_title":"Learning-Based Automated Adversarial Red-Teaming for Robustness Evaluation of Large Language Models","ref_index":4,"is_internal_anchor":true},{"citing_arxiv_id":"2604.23362","citing_title":"UniAda: Universal Adaptive Multi-objective Adversarial Attack for End-to-End Autonomous Driving Systems","ref_index":16,"is_internal_anchor":false},{"citing_arxiv_id":"2604.08827","citing_title":"Quantum Patches: Enhancing Robustness of Quantum Machine Learning Models","ref_index":14,"is_internal_anchor":false},{"citing_arxiv_id":"2604.16532","citing_title":"Beyond Attack Success Rate: A Multi-Metric Evaluation of Adversarial Transferability in Medical Imaging Models","ref_index":22,"is_internal_anchor":false}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/EDMCJCZ3X35NJR56BQM7STYBZ2","json":"https://pith.science/pith/EDMCJCZ3X35NJR56BQM7STYBZ2.json","graph_json":"https://pith.science/api/pith-number/EDMCJCZ3X35NJR56BQM7STYBZ2/graph.json","events_json":"https://pith.science/api/pith-number/EDMCJCZ3X35NJR56BQM7STYBZ2/events.json","paper":"https://pith.science/paper/EDMCJCZ3"},"agent_actions":{"view_html":"https://pith.science/pith/EDMCJCZ3X35NJR56BQM7STYBZ2","download_json":"https://pith.science/pith/EDMCJCZ3X35NJR56BQM7STYBZ2.json","view_paper":"https://pith.science/paper/EDMCJCZ3","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1611.01236&json=true","fetch_graph":"https://pith.science/api/pith-number/EDMCJCZ3X35NJR56BQM7STYBZ2/graph.json","fetch_events":"https://pith.science/api/pith-number/EDMCJCZ3X35NJR56BQM7STYBZ2/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/EDMCJCZ3X35NJR56BQM7STYBZ2/action/timestamp_anchor","attest_storage":"https://pith.science/pith/EDMCJCZ3X35NJR56BQM7STYBZ2/action/storage_attestation","attest_author":"https://pith.science/pith/EDMCJCZ3X35NJR56BQM7STYBZ2/action/author_attestation","sign_citation":"https://pith.science/pith/EDMCJCZ3X35NJR56BQM7STYBZ2/action/citation_signature","submit_replication":"https://pith.science/pith/EDMCJCZ3X35NJR56BQM7STYBZ2/action/replication_record"}},"created_at":"2026-05-18T00:50:56.424724+00:00","updated_at":"2026-05-18T00:50:56.424724+00:00"}