{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2019:HW3U2HSJ5EQERUHUILETXEHPRI","short_pith_number":"pith:HW3U2HSJ","canonical_record":{"source":{"id":"1903.02917","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2019-03-07T14:00:49Z","cross_cats_sorted":[],"title_canon_sha256":"4d6c3c6873112b71dba2f672690384bd43bd1abe3f59acc6e5bd7630ecf84870","abstract_canon_sha256":"73ab19191571c532798b6aa4e79ee36a4da7b7d056eada8a1836c27e71f43626"},"schema_version":"1.0"},"canonical_sha256":"3db74d1e49e92048d0f442c93b90ef8a01f94c67aab2e7fa4b63664e6681b0ff","source":{"kind":"arxiv","id":"1903.02917","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1903.02917","created_at":"2026-05-17T23:45:51Z"},{"alias_kind":"arxiv_version","alias_value":"1903.02917v2","created_at":"2026-05-17T23:45:51Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1903.02917","created_at":"2026-05-17T23:45:51Z"},{"alias_kind":"pith_short_12","alias_value":"HW3U2HSJ5EQE","created_at":"2026-05-18T12:33:18Z"},{"alias_kind":"pith_short_16","alias_value":"HW3U2HSJ5EQERUHU","created_at":"2026-05-18T12:33:18Z"},{"alias_kind":"pith_short_8","alias_value":"HW3U2HSJ","created_at":"2026-05-18T12:33:18Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2019:HW3U2HSJ5EQERUHUILETXEHPRI","target":"record","payload":{"canonical_record":{"source":{"id":"1903.02917","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2019-03-07T14:00:49Z","cross_cats_sorted":[],"title_canon_sha256":"4d6c3c6873112b71dba2f672690384bd43bd1abe3f59acc6e5bd7630ecf84870","abstract_canon_sha256":"73ab19191571c532798b6aa4e79ee36a4da7b7d056eada8a1836c27e71f43626"},"schema_version":"1.0"},"canonical_sha256":"3db74d1e49e92048d0f442c93b90ef8a01f94c67aab2e7fa4b63664e6681b0ff","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:45:51.881568Z","signature_b64":"vk7HSnFYhNmOJupCzlj989SgS6XBxv4vSny06FgtSs5noanUXrkshneCIL4GJQwWvC4YglQFqV40qbHeWATZCQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"3db74d1e49e92048d0f442c93b90ef8a01f94c67aab2e7fa4b63664e6681b0ff","last_reissued_at":"2026-05-17T23:45:51.881019Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:45:51.881019Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1903.02917","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:45:51Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"AI12HAqolvjbFytEuFv+RsQc39AXmMVql6jTzSVKinFOvVEb4CU1nBVBNGWouumN5dLxy2iCZoWBvAZycIsDBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T07:13:30.900471Z"},"content_sha256":"aa3996276e508ee685cd80cad374ff0cc8e0e942d8ec4656cefe74dd6cc14617","schema_version":"1.0","event_id":"sha256:aa3996276e508ee685cd80cad374ff0cc8e0e942d8ec4656cefe74dd6cc14617"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2019:HW3U2HSJ5EQERUHUILETXEHPRI","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Imitative Follower Deception in Stackelberg Games","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.GT","authors_text":"Haifeng Xu, Jiarui Gan, Long Tran-Thanh, Michael Wooldridge, Qingyu Guo, Zinovi Rabinovich","submitted_at":"2019-03-07T14:00:49Z","abstract_excerpt":"Information uncertainty is one of the major challenges facing applications of game theory. In the context of Stackelberg games, various approaches have been proposed to deal with the leader's incomplete knowledge about the follower's payoffs, typically by gathering information from the leader's interaction with the follower. Unfortunately, these approaches rely crucially on the assumption that the follower will not strategically exploit this information asymmetry, i.e., the follower behaves truthfully during the interaction according to their actual payoffs. As we show in this paper, the follo"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1903.02917","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:45:51Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"HjlzBEZqZ/Kwi+6PMS/wO7PmDwiLAQAvbJ+KhQLG/xzeZd4fRrLYsMvL/qQDtSHLw1WzmftcK+1TT1Ob5mrfCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T07:13:30.901141Z"},"content_sha256":"7e5667fff3d4de93d0a199126b3efa19d40fdeef5ad1c5d8d1babda40b74c3d4","schema_version":"1.0","event_id":"sha256:7e5667fff3d4de93d0a199126b3efa19d40fdeef5ad1c5d8d1babda40b74c3d4"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/HW3U2HSJ5EQERUHUILETXEHPRI/bundle.json","state_url":"https://pith.science/pith/HW3U2HSJ5EQERUHUILETXEHPRI/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/HW3U2HSJ5EQERUHUILETXEHPRI/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T07:13:30Z","links":{"resolver":"https://pith.science/pith/HW3U2HSJ5EQERUHUILETXEHPRI","bundle":"https://pith.science/pith/HW3U2HSJ5EQERUHUILETXEHPRI/bundle.json","state":"https://pith.science/pith/HW3U2HSJ5EQERUHUILETXEHPRI/state.json","well_known_bundle":"https://pith.science/.well-known/pith/HW3U2HSJ5EQERUHUILETXEHPRI/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2019:HW3U2HSJ5EQERUHUILETXEHPRI","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"73ab19191571c532798b6aa4e79ee36a4da7b7d056eada8a1836c27e71f43626","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2019-03-07T14:00:49Z","title_canon_sha256":"4d6c3c6873112b71dba2f672690384bd43bd1abe3f59acc6e5bd7630ecf84870"},"schema_version":"1.0","source":{"id":"1903.02917","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1903.02917","created_at":"2026-05-17T23:45:51Z"},{"alias_kind":"arxiv_version","alias_value":"1903.02917v2","created_at":"2026-05-17T23:45:51Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1903.02917","created_at":"2026-05-17T23:45:51Z"},{"alias_kind":"pith_short_12","alias_value":"HW3U2HSJ5EQE","created_at":"2026-05-18T12:33:18Z"},{"alias_kind":"pith_short_16","alias_value":"HW3U2HSJ5EQERUHU","created_at":"2026-05-18T12:33:18Z"},{"alias_kind":"pith_short_8","alias_value":"HW3U2HSJ","created_at":"2026-05-18T12:33:18Z"}],"graph_snapshots":[{"event_id":"sha256:7e5667fff3d4de93d0a199126b3efa19d40fdeef5ad1c5d8d1babda40b74c3d4","target":"graph","created_at":"2026-05-17T23:45:51Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Information uncertainty is one of the major challenges facing applications of game theory. In the context of Stackelberg games, various approaches have been proposed to deal with the leader's incomplete knowledge about the follower's payoffs, typically by gathering information from the leader's interaction with the follower. Unfortunately, these approaches rely crucially on the assumption that the follower will not strategically exploit this information asymmetry, i.e., the follower behaves truthfully during the interaction according to their actual payoffs. As we show in this paper, the follo","authors_text":"Haifeng Xu, Jiarui Gan, Long Tran-Thanh, Michael Wooldridge, Qingyu Guo, Zinovi Rabinovich","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2019-03-07T14:00:49Z","title":"Imitative Follower Deception in Stackelberg Games"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1903.02917","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:aa3996276e508ee685cd80cad374ff0cc8e0e942d8ec4656cefe74dd6cc14617","target":"record","created_at":"2026-05-17T23:45:51Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"73ab19191571c532798b6aa4e79ee36a4da7b7d056eada8a1836c27e71f43626","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2019-03-07T14:00:49Z","title_canon_sha256":"4d6c3c6873112b71dba2f672690384bd43bd1abe3f59acc6e5bd7630ecf84870"},"schema_version":"1.0","source":{"id":"1903.02917","kind":"arxiv","version":2}},"canonical_sha256":"3db74d1e49e92048d0f442c93b90ef8a01f94c67aab2e7fa4b63664e6681b0ff","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"3db74d1e49e92048d0f442c93b90ef8a01f94c67aab2e7fa4b63664e6681b0ff","first_computed_at":"2026-05-17T23:45:51.881019Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:45:51.881019Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"vk7HSnFYhNmOJupCzlj989SgS6XBxv4vSny06FgtSs5noanUXrkshneCIL4GJQwWvC4YglQFqV40qbHeWATZCQ==","signature_status":"signed_v1","signed_at":"2026-05-17T23:45:51.881568Z","signed_message":"canonical_sha256_bytes"},"source_id":"1903.02917","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:aa3996276e508ee685cd80cad374ff0cc8e0e942d8ec4656cefe74dd6cc14617","sha256:7e5667fff3d4de93d0a199126b3efa19d40fdeef5ad1c5d8d1babda40b74c3d4"],"state_sha256":"e75bd15b7e13252ed28871085a655a86af439b1c585bf03d267277fd7cb9be5d"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ddmmI8tWa1lNfCpckSsNkJN8lTFtbu9hAglRcw8pW8CENGJlErIfjs9vrNYLUODm8dnYFNMCBN5tZ+qjJomCAg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T07:13:30.904394Z","bundle_sha256":"5c1cfadcb0f1dd06a679c3509d17506b8c8304042ce8d8218b0fe25c42ebf236"}}