{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:GATVZOS5YJVDYGV56N2FZ75ZFH","short_pith_number":"pith:GATVZOS5","canonical_record":{"source":{"id":"1707.02812","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2017-07-10T11:58:08Z","cross_cats_sorted":["cs.AI","cs.CL","cs.CV"],"title_canon_sha256":"909a8e66692046ab935963fff770d527f415cc7777c945d5c5a1ff9d5b534919","abstract_canon_sha256":"16e3ae3ece4a1e82d488590f853831c5ba1b8452056328b792df096e1885d998"},"schema_version":"1.0"},"canonical_sha256":"30275cba5dc26a3c1abdf3745cffb929d9b25d52d74ddf900976a058b6b7e30c","source":{"kind":"arxiv","id":"1707.02812","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1707.02812","created_at":"2026-05-18T00:40:35Z"},{"alias_kind":"arxiv_version","alias_value":"1707.02812v1","created_at":"2026-05-18T00:40:35Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1707.02812","created_at":"2026-05-18T00:40:35Z"},{"alias_kind":"pith_short_12","alias_value":"GATVZOS5YJVD","created_at":"2026-05-18T12:31:15Z"},{"alias_kind":"pith_short_16","alias_value":"GATVZOS5YJVDYGV5","created_at":"2026-05-18T12:31:15Z"},{"alias_kind":"pith_short_8","alias_value":"GATVZOS5","created_at":"2026-05-18T12:31:15Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:GATVZOS5YJVDYGV56N2FZ75ZFH","target":"record","payload":{"canonical_record":{"source":{"id":"1707.02812","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2017-07-10T11:58:08Z","cross_cats_sorted":["cs.AI","cs.CL","cs.CV"],"title_canon_sha256":"909a8e66692046ab935963fff770d527f415cc7777c945d5c5a1ff9d5b534919","abstract_canon_sha256":"16e3ae3ece4a1e82d488590f853831c5ba1b8452056328b792df096e1885d998"},"schema_version":"1.0"},"canonical_sha256":"30275cba5dc26a3c1abdf3745cffb929d9b25d52d74ddf900976a058b6b7e30c","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:40:35.734459Z","signature_b64":"gtMG4+osxmR15ToY/YpiQFcrHfw7GnxIhNWz87Baw7SeGCU9BrLN4Kb0s48iwVQRCAjnG/fwaC41kXd2m/M6Cg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"30275cba5dc26a3c1abdf3745cffb929d9b25d52d74ddf900976a058b6b7e30c","last_reissued_at":"2026-05-18T00:40:35.733862Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:40:35.733862Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1707.02812","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:40:35Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"gUw7eqbTzHRZFA1WDg4HSWYaZFUQgXfxvMBWyJoRFVKA1rmb4dzRC48gMDbRu4WYfArxHBuUuZgCOUyZL9zGBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T17:26:53.234010Z"},"content_sha256":"624ceb10b938171ef6157df1727649292e56f52fb96ed96efc7d337f6bb558e7","schema_version":"1.0","event_id":"sha256:624ceb10b938171ef6157df1727649292e56f52fb96ed96efc7d337f6bb558e7"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:GATVZOS5YJVDYGV56N2FZ75ZFH","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Towards Crafting Text Adversarial Samples","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.AI","cs.CL","cs.CV"],"primary_cat":"cs.LG","authors_text":"Sameep Mehta, Suranjana Samanta","submitted_at":"2017-07-10T11:58:08Z","abstract_excerpt":"Adversarial samples are strategically modified samples, which are crafted with the purpose of fooling a classifier at hand. An attacker introduces specially crafted adversarial samples to a deployed classifier, which are being mis-classified by the classifier. However, the samples are perceived to be drawn from entirely different classes and thus it becomes hard to detect the adversarial samples. Most of the prior works have been focused on synthesizing adversarial samples in the image domain. In this paper, we propose a new method of crafting adversarial text samples by modification of the or"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1707.02812","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:40:35Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"FoQfPGERHz4pJMYKoFGWDV752B+gROy7kWi+QytG7vOClEeiFT6V8Lc4FaBRSva1Wj5FDOnspAkvGSz0xXWKCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T17:26:53.234470Z"},"content_sha256":"e6a2f0800fe482356ff7aea78ddfbf28320ee3b909a9c799f8bacb12627f36df","schema_version":"1.0","event_id":"sha256:e6a2f0800fe482356ff7aea78ddfbf28320ee3b909a9c799f8bacb12627f36df"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/GATVZOS5YJVDYGV56N2FZ75ZFH/bundle.json","state_url":"https://pith.science/pith/GATVZOS5YJVDYGV56N2FZ75ZFH/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/GATVZOS5YJVDYGV56N2FZ75ZFH/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T17:26:53Z","links":{"resolver":"https://pith.science/pith/GATVZOS5YJVDYGV56N2FZ75ZFH","bundle":"https://pith.science/pith/GATVZOS5YJVDYGV56N2FZ75ZFH/bundle.json","state":"https://pith.science/pith/GATVZOS5YJVDYGV56N2FZ75ZFH/state.json","well_known_bundle":"https://pith.science/.well-known/pith/GATVZOS5YJVDYGV56N2FZ75ZFH/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:GATVZOS5YJVDYGV56N2FZ75ZFH","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"16e3ae3ece4a1e82d488590f853831c5ba1b8452056328b792df096e1885d998","cross_cats_sorted":["cs.AI","cs.CL","cs.CV"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2017-07-10T11:58:08Z","title_canon_sha256":"909a8e66692046ab935963fff770d527f415cc7777c945d5c5a1ff9d5b534919"},"schema_version":"1.0","source":{"id":"1707.02812","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1707.02812","created_at":"2026-05-18T00:40:35Z"},{"alias_kind":"arxiv_version","alias_value":"1707.02812v1","created_at":"2026-05-18T00:40:35Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1707.02812","created_at":"2026-05-18T00:40:35Z"},{"alias_kind":"pith_short_12","alias_value":"GATVZOS5YJVD","created_at":"2026-05-18T12:31:15Z"},{"alias_kind":"pith_short_16","alias_value":"GATVZOS5YJVDYGV5","created_at":"2026-05-18T12:31:15Z"},{"alias_kind":"pith_short_8","alias_value":"GATVZOS5","created_at":"2026-05-18T12:31:15Z"}],"graph_snapshots":[{"event_id":"sha256:e6a2f0800fe482356ff7aea78ddfbf28320ee3b909a9c799f8bacb12627f36df","target":"graph","created_at":"2026-05-18T00:40:35Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Adversarial samples are strategically modified samples, which are crafted with the purpose of fooling a classifier at hand. An attacker introduces specially crafted adversarial samples to a deployed classifier, which are being mis-classified by the classifier. However, the samples are perceived to be drawn from entirely different classes and thus it becomes hard to detect the adversarial samples. Most of the prior works have been focused on synthesizing adversarial samples in the image domain. In this paper, we propose a new method of crafting adversarial text samples by modification of the or","authors_text":"Sameep Mehta, Suranjana Samanta","cross_cats":["cs.AI","cs.CL","cs.CV"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2017-07-10T11:58:08Z","title":"Towards Crafting Text Adversarial Samples"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1707.02812","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:624ceb10b938171ef6157df1727649292e56f52fb96ed96efc7d337f6bb558e7","target":"record","created_at":"2026-05-18T00:40:35Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"16e3ae3ece4a1e82d488590f853831c5ba1b8452056328b792df096e1885d998","cross_cats_sorted":["cs.AI","cs.CL","cs.CV"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2017-07-10T11:58:08Z","title_canon_sha256":"909a8e66692046ab935963fff770d527f415cc7777c945d5c5a1ff9d5b534919"},"schema_version":"1.0","source":{"id":"1707.02812","kind":"arxiv","version":1}},"canonical_sha256":"30275cba5dc26a3c1abdf3745cffb929d9b25d52d74ddf900976a058b6b7e30c","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"30275cba5dc26a3c1abdf3745cffb929d9b25d52d74ddf900976a058b6b7e30c","first_computed_at":"2026-05-18T00:40:35.733862Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:40:35.733862Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"gtMG4+osxmR15ToY/YpiQFcrHfw7GnxIhNWz87Baw7SeGCU9BrLN4Kb0s48iwVQRCAjnG/fwaC41kXd2m/M6Cg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:40:35.734459Z","signed_message":"canonical_sha256_bytes"},"source_id":"1707.02812","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:624ceb10b938171ef6157df1727649292e56f52fb96ed96efc7d337f6bb558e7","sha256:e6a2f0800fe482356ff7aea78ddfbf28320ee3b909a9c799f8bacb12627f36df"],"state_sha256":"24881dce52440a0c9cede8dc5aa982624311c099789075a47e4ec5006e7fbdfa"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"3LmOmzNQiAo37OVQRnMzqBHaKsubw9WyKXqFjWVWB7OA1SpHB28jULrnSoCt0+P5UZwPUbuY4s0ShUpygSV/Aw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T17:26:53.238196Z","bundle_sha256":"6384cd4cdef05b646fb4146a970f2d93ab009bcfcf47f750272a15c2e8e10d9e"}}