{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:EZHPVBUOFZFGWYWQUW2GWVC3LW","short_pith_number":"pith:EZHPVBUO","canonical_record":{"source":{"id":"1807.08671","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"eess.SP","submitted_at":"2018-07-23T15:19:23Z","cross_cats_sorted":[],"title_canon_sha256":"133c4b1272324a95af5d370487408589dbadad133c845e6a190316036551d062","abstract_canon_sha256":"bd3668cb52f1510f6f6fc8bc5338911f8863a8824e947096b973bdfe2ed8626c"},"schema_version":"1.0"},"canonical_sha256":"264efa868e2e4a6b62d0a5b46b545b5d9db169469a9d678d8bf6e10d473be470","source":{"kind":"arxiv","id":"1807.08671","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1807.08671","created_at":"2026-05-18T00:10:05Z"},{"alias_kind":"arxiv_version","alias_value":"1807.08671v1","created_at":"2026-05-18T00:10:05Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1807.08671","created_at":"2026-05-18T00:10:05Z"},{"alias_kind":"pith_short_12","alias_value":"EZHPVBUOFZFG","created_at":"2026-05-18T12:32:22Z"},{"alias_kind":"pith_short_16","alias_value":"EZHPVBUOFZFGWYWQ","created_at":"2026-05-18T12:32:22Z"},{"alias_kind":"pith_short_8","alias_value":"EZHPVBUO","created_at":"2026-05-18T12:32:22Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:EZHPVBUOFZFGWYWQUW2GWVC3LW","target":"record","payload":{"canonical_record":{"source":{"id":"1807.08671","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"eess.SP","submitted_at":"2018-07-23T15:19:23Z","cross_cats_sorted":[],"title_canon_sha256":"133c4b1272324a95af5d370487408589dbadad133c845e6a190316036551d062","abstract_canon_sha256":"bd3668cb52f1510f6f6fc8bc5338911f8863a8824e947096b973bdfe2ed8626c"},"schema_version":"1.0"},"canonical_sha256":"264efa868e2e4a6b62d0a5b46b545b5d9db169469a9d678d8bf6e10d473be470","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:10:05.070125Z","signature_b64":"yOAH8Y7sW2QzbQ4rGj7KLCHe8pyX9VIirgEqTHk0mt+lSq13It+ug9MRq0iXwdUCtdm46oxC3K7m2pSUgu3kCA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"264efa868e2e4a6b62d0a5b46b545b5d9db169469a9d678d8bf6e10d473be470","last_reissued_at":"2026-05-18T00:10:05.069336Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:10:05.069336Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1807.08671","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:10:05Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"F7a7O6Ac75IM5huUqgh+V7W8TVmBBZyG4fTxIZ3mpDEmvLmX6jY4qfAhaR6cqglZorTfIw4nKX8rNkMllVpGAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T11:49:37.051993Z"},"content_sha256":"7f4eb1bb3a4e5b4e47fe2f173f0e8241aa7aed29b5387486a36c580442222a4e","schema_version":"1.0","event_id":"sha256:7f4eb1bb3a4e5b4e47fe2f173f0e8241aa7aed29b5387486a36c580442222a4e"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:EZHPVBUOFZFGWYWQUW2GWVC3LW","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"AI for 5G: Research Directions and Paradigms","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"eess.SP","authors_text":"(2) Chinese Academy of Engineering, China, China), Chuan Zhang (1), Hequan Wu (2) ((1) National Mobile Communications Research Laboratory, Shi Jin (1), Southeast University, Xiaohu You (1), Xiaosi Tan (1)","submitted_at":"2018-07-23T15:19:23Z","abstract_excerpt":"The 5th wireless communication (5G) techniques not only fulfil the requirement of $1,000$ times increase of internet traffic in the next decade, but also offer the underlying technologies to the entire industry and ecology for internet of everything. Compared to the existing mobile communication techniques, 5G techniques are more-widely applicable and the corresponding system design is more complicated. The resurgence of artificial intelligence (AI) techniques offers as an alternative option, which is possibly superior over traditional ideas and performance. Typical and potential research dire"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1807.08671","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:10:05Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"BNa+qbymj7UR5TgFvDHaFv7eJPCR5XnnBiHME6pQmFfAXbA3pBLHrz8Re7sDNbw0Yi9Fofn0F3QuEd3L70E0DQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T11:49:37.052353Z"},"content_sha256":"f1965d6916a3a76c9c93c02dd089bfc160b254b8080e6eb8481281d3be29dfa4","schema_version":"1.0","event_id":"sha256:f1965d6916a3a76c9c93c02dd089bfc160b254b8080e6eb8481281d3be29dfa4"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/EZHPVBUOFZFGWYWQUW2GWVC3LW/bundle.json","state_url":"https://pith.science/pith/EZHPVBUOFZFGWYWQUW2GWVC3LW/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/EZHPVBUOFZFGWYWQUW2GWVC3LW/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T11:49:37Z","links":{"resolver":"https://pith.science/pith/EZHPVBUOFZFGWYWQUW2GWVC3LW","bundle":"https://pith.science/pith/EZHPVBUOFZFGWYWQUW2GWVC3LW/bundle.json","state":"https://pith.science/pith/EZHPVBUOFZFGWYWQUW2GWVC3LW/state.json","well_known_bundle":"https://pith.science/.well-known/pith/EZHPVBUOFZFGWYWQUW2GWVC3LW/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:EZHPVBUOFZFGWYWQUW2GWVC3LW","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"bd3668cb52f1510f6f6fc8bc5338911f8863a8824e947096b973bdfe2ed8626c","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"eess.SP","submitted_at":"2018-07-23T15:19:23Z","title_canon_sha256":"133c4b1272324a95af5d370487408589dbadad133c845e6a190316036551d062"},"schema_version":"1.0","source":{"id":"1807.08671","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1807.08671","created_at":"2026-05-18T00:10:05Z"},{"alias_kind":"arxiv_version","alias_value":"1807.08671v1","created_at":"2026-05-18T00:10:05Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1807.08671","created_at":"2026-05-18T00:10:05Z"},{"alias_kind":"pith_short_12","alias_value":"EZHPVBUOFZFG","created_at":"2026-05-18T12:32:22Z"},{"alias_kind":"pith_short_16","alias_value":"EZHPVBUOFZFGWYWQ","created_at":"2026-05-18T12:32:22Z"},{"alias_kind":"pith_short_8","alias_value":"EZHPVBUO","created_at":"2026-05-18T12:32:22Z"}],"graph_snapshots":[{"event_id":"sha256:f1965d6916a3a76c9c93c02dd089bfc160b254b8080e6eb8481281d3be29dfa4","target":"graph","created_at":"2026-05-18T00:10:05Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"The 5th wireless communication (5G) techniques not only fulfil the requirement of $1,000$ times increase of internet traffic in the next decade, but also offer the underlying technologies to the entire industry and ecology for internet of everything. Compared to the existing mobile communication techniques, 5G techniques are more-widely applicable and the corresponding system design is more complicated. The resurgence of artificial intelligence (AI) techniques offers as an alternative option, which is possibly superior over traditional ideas and performance. Typical and potential research dire","authors_text":"(2) Chinese Academy of Engineering, China, China), Chuan Zhang (1), Hequan Wu (2) ((1) National Mobile Communications Research Laboratory, Shi Jin (1), Southeast University, Xiaohu You (1), Xiaosi Tan (1)","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"eess.SP","submitted_at":"2018-07-23T15:19:23Z","title":"AI for 5G: Research Directions and Paradigms"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1807.08671","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:7f4eb1bb3a4e5b4e47fe2f173f0e8241aa7aed29b5387486a36c580442222a4e","target":"record","created_at":"2026-05-18T00:10:05Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"bd3668cb52f1510f6f6fc8bc5338911f8863a8824e947096b973bdfe2ed8626c","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"eess.SP","submitted_at":"2018-07-23T15:19:23Z","title_canon_sha256":"133c4b1272324a95af5d370487408589dbadad133c845e6a190316036551d062"},"schema_version":"1.0","source":{"id":"1807.08671","kind":"arxiv","version":1}},"canonical_sha256":"264efa868e2e4a6b62d0a5b46b545b5d9db169469a9d678d8bf6e10d473be470","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"264efa868e2e4a6b62d0a5b46b545b5d9db169469a9d678d8bf6e10d473be470","first_computed_at":"2026-05-18T00:10:05.069336Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:10:05.069336Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"yOAH8Y7sW2QzbQ4rGj7KLCHe8pyX9VIirgEqTHk0mt+lSq13It+ug9MRq0iXwdUCtdm46oxC3K7m2pSUgu3kCA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:10:05.070125Z","signed_message":"canonical_sha256_bytes"},"source_id":"1807.08671","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:7f4eb1bb3a4e5b4e47fe2f173f0e8241aa7aed29b5387486a36c580442222a4e","sha256:f1965d6916a3a76c9c93c02dd089bfc160b254b8080e6eb8481281d3be29dfa4"],"state_sha256":"a796d7b5e3e6f8ca229989620c664e305ca48354e36bd15a6ea410dc67c9d497"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"e4zti96Txs8ivWjEpDtt/z5uZMmv0Xe00zxYLCdOoOCbkzeGLCn40ib+Pp3K1lG5EbfvL19bnNXlZFht5dmBBg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T11:49:37.054282Z","bundle_sha256":"3ead98c4dfcc520d14d68b0f40e5c85babf407b57d8fc5af97e70f69e31a8506"}}