{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:EMKIWSWA6PKINTZAG3E745XSND","short_pith_number":"pith:EMKIWSWA","canonical_record":{"source":{"id":"1812.02274","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-12-06T00:10:40Z","cross_cats_sorted":["cs.LG"],"title_canon_sha256":"79071ee063583bd9b16b36a11b7e6f6fe996e79b323d9f0f9845ac86b0f99b99","abstract_canon_sha256":"e92e0b13130e2aa124a85b7f0fa01df3a83a2a8fb066eef7eb27c0cac0cf66af"},"schema_version":"1.0"},"canonical_sha256":"23148b4ac0f3d486cf2036c9fe76f268ec9537bc007df614674f7d769c8046d8","source":{"kind":"arxiv","id":"1812.02274","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1812.02274","created_at":"2026-05-17T23:58:56Z"},{"alias_kind":"arxiv_version","alias_value":"1812.02274v1","created_at":"2026-05-17T23:58:56Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1812.02274","created_at":"2026-05-17T23:58:56Z"},{"alias_kind":"pith_short_12","alias_value":"EMKIWSWA6PKI","created_at":"2026-05-18T12:32:22Z"},{"alias_kind":"pith_short_16","alias_value":"EMKIWSWA6PKINTZA","created_at":"2026-05-18T12:32:22Z"},{"alias_kind":"pith_short_8","alias_value":"EMKIWSWA","created_at":"2026-05-18T12:32:22Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:EMKIWSWA6PKINTZAG3E745XSND","target":"record","payload":{"canonical_record":{"source":{"id":"1812.02274","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-12-06T00:10:40Z","cross_cats_sorted":["cs.LG"],"title_canon_sha256":"79071ee063583bd9b16b36a11b7e6f6fe996e79b323d9f0f9845ac86b0f99b99","abstract_canon_sha256":"e92e0b13130e2aa124a85b7f0fa01df3a83a2a8fb066eef7eb27c0cac0cf66af"},"schema_version":"1.0"},"canonical_sha256":"23148b4ac0f3d486cf2036c9fe76f268ec9537bc007df614674f7d769c8046d8","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:58:56.711431Z","signature_b64":"bKljqwrgEO9qr7Dte+Xbbk6XI9Oh+lWtoWhEYGL4Uhots1PwDEybAQQQ72lQjgVTmPyy+K8+19mskAhejM8DBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"23148b4ac0f3d486cf2036c9fe76f268ec9537bc007df614674f7d769c8046d8","last_reissued_at":"2026-05-17T23:58:56.710929Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:58:56.710929Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1812.02274","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:58:56Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"T8E5ugeOzKXOhcmGsR4lQIDZygv/bKOBPuhLalTYW9B/RMOeI6bd9foYWZ5cgoovLzGQRSgEW8tHWaKsYG+LDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T09:22:25.194426Z"},"content_sha256":"12669b99ab63f053cf367639efd145b04e5a8daf06c398af37cc9f285978f4a8","schema_version":"1.0","event_id":"sha256:12669b99ab63f053cf367639efd145b04e5a8daf06c398af37cc9f285978f4a8"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:EMKIWSWA6PKINTZAG3E745XSND","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Differentially Private Data Generative Models","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG"],"primary_cat":"cs.CR","authors_text":"Bo Li, Chong Xiang, Dali Kaarfar, Haojin Zhu, Minhui Xue, Nikita Borisov, Qingrong Chen","submitted_at":"2018-12-06T00:10:40Z","abstract_excerpt":"Deep neural networks (DNNs) have recently been widely adopted in various applications, and such success is largely due to a combination of algorithmic breakthroughs, computation resource improvements, and access to a large amount of data. However, the large-scale data collections required for deep learning often contain sensitive information, therefore raising many privacy concerns. Prior research has shown several successful attacks in inferring sensitive training data information, such as model inversion, membership inference, and generative adversarial networks (GAN) based leakage attacks a"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1812.02274","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:58:56Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Qe1vIE5xuguwzbvj41cazzi9IrpfN/e54UxQJIG3EJPN9lhhAeQHp356gzoC2LlsfRXEAsotY2zNNM17OgZ9Cg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T09:22:25.195165Z"},"content_sha256":"7bc194a2f4bbbd6804aee010e8c31470cd319f8282ff3e42278e4a1935616988","schema_version":"1.0","event_id":"sha256:7bc194a2f4bbbd6804aee010e8c31470cd319f8282ff3e42278e4a1935616988"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/EMKIWSWA6PKINTZAG3E745XSND/bundle.json","state_url":"https://pith.science/pith/EMKIWSWA6PKINTZAG3E745XSND/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/EMKIWSWA6PKINTZAG3E745XSND/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T09:22:25Z","links":{"resolver":"https://pith.science/pith/EMKIWSWA6PKINTZAG3E745XSND","bundle":"https://pith.science/pith/EMKIWSWA6PKINTZAG3E745XSND/bundle.json","state":"https://pith.science/pith/EMKIWSWA6PKINTZAG3E745XSND/state.json","well_known_bundle":"https://pith.science/.well-known/pith/EMKIWSWA6PKINTZAG3E745XSND/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:EMKIWSWA6PKINTZAG3E745XSND","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"e92e0b13130e2aa124a85b7f0fa01df3a83a2a8fb066eef7eb27c0cac0cf66af","cross_cats_sorted":["cs.LG"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-12-06T00:10:40Z","title_canon_sha256":"79071ee063583bd9b16b36a11b7e6f6fe996e79b323d9f0f9845ac86b0f99b99"},"schema_version":"1.0","source":{"id":"1812.02274","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1812.02274","created_at":"2026-05-17T23:58:56Z"},{"alias_kind":"arxiv_version","alias_value":"1812.02274v1","created_at":"2026-05-17T23:58:56Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1812.02274","created_at":"2026-05-17T23:58:56Z"},{"alias_kind":"pith_short_12","alias_value":"EMKIWSWA6PKI","created_at":"2026-05-18T12:32:22Z"},{"alias_kind":"pith_short_16","alias_value":"EMKIWSWA6PKINTZA","created_at":"2026-05-18T12:32:22Z"},{"alias_kind":"pith_short_8","alias_value":"EMKIWSWA","created_at":"2026-05-18T12:32:22Z"}],"graph_snapshots":[{"event_id":"sha256:7bc194a2f4bbbd6804aee010e8c31470cd319f8282ff3e42278e4a1935616988","target":"graph","created_at":"2026-05-17T23:58:56Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Deep neural networks (DNNs) have recently been widely adopted in various applications, and such success is largely due to a combination of algorithmic breakthroughs, computation resource improvements, and access to a large amount of data. However, the large-scale data collections required for deep learning often contain sensitive information, therefore raising many privacy concerns. Prior research has shown several successful attacks in inferring sensitive training data information, such as model inversion, membership inference, and generative adversarial networks (GAN) based leakage attacks a","authors_text":"Bo Li, Chong Xiang, Dali Kaarfar, Haojin Zhu, Minhui Xue, Nikita Borisov, Qingrong Chen","cross_cats":["cs.LG"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-12-06T00:10:40Z","title":"Differentially Private Data Generative Models"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1812.02274","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:12669b99ab63f053cf367639efd145b04e5a8daf06c398af37cc9f285978f4a8","target":"record","created_at":"2026-05-17T23:58:56Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"e92e0b13130e2aa124a85b7f0fa01df3a83a2a8fb066eef7eb27c0cac0cf66af","cross_cats_sorted":["cs.LG"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-12-06T00:10:40Z","title_canon_sha256":"79071ee063583bd9b16b36a11b7e6f6fe996e79b323d9f0f9845ac86b0f99b99"},"schema_version":"1.0","source":{"id":"1812.02274","kind":"arxiv","version":1}},"canonical_sha256":"23148b4ac0f3d486cf2036c9fe76f268ec9537bc007df614674f7d769c8046d8","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"23148b4ac0f3d486cf2036c9fe76f268ec9537bc007df614674f7d769c8046d8","first_computed_at":"2026-05-17T23:58:56.710929Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:58:56.710929Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"bKljqwrgEO9qr7Dte+Xbbk6XI9Oh+lWtoWhEYGL4Uhots1PwDEybAQQQ72lQjgVTmPyy+K8+19mskAhejM8DBQ==","signature_status":"signed_v1","signed_at":"2026-05-17T23:58:56.711431Z","signed_message":"canonical_sha256_bytes"},"source_id":"1812.02274","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:12669b99ab63f053cf367639efd145b04e5a8daf06c398af37cc9f285978f4a8","sha256:7bc194a2f4bbbd6804aee010e8c31470cd319f8282ff3e42278e4a1935616988"],"state_sha256":"d5bad091bfa1e523799216c19e351ab9a7dd153af64e02083c897b4e5b950c5c"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"6pqUe/h/zFFBC0lA3Z12hqIkN8d30MQUr+nv5NlGh9ouLsKruF4pcayNeb5dXcrHcIEEsmlQdDxtA6feUgSkAA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T09:22:25.198264Z","bundle_sha256":"fec8ac8c2370cf6ee9fe5c50a3a3a0a0691cb902a2d9f925aed76f8690d3a7e1"}}