{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:LAUMCFFWFP4EQCYN4Z3OX3C4VO","short_pith_number":"pith:LAUMCFFW","canonical_record":{"source":{"id":"1703.08603","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-03-24T21:26:16Z","cross_cats_sorted":[],"title_canon_sha256":"2337636b870383736de64224c84789465f226be81e89955a4c91376a5c94466e","abstract_canon_sha256":"936d38d4e6615705af93867b37056ddb8db8e189af86c4240aebc44e23b3f08f"},"schema_version":"1.0"},"canonical_sha256":"5828c114b62bf8480b0de676ebec5cab8199beb27816a20a778edcaa8c06783a","source":{"kind":"arxiv","id":"1703.08603","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1703.08603","created_at":"2026-05-18T00:39:52Z"},{"alias_kind":"arxiv_version","alias_value":"1703.08603v3","created_at":"2026-05-18T00:39:52Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1703.08603","created_at":"2026-05-18T00:39:52Z"},{"alias_kind":"pith_short_12","alias_value":"LAUMCFFWFP4E","created_at":"2026-05-18T12:31:28Z"},{"alias_kind":"pith_short_16","alias_value":"LAUMCFFWFP4EQCYN","created_at":"2026-05-18T12:31:28Z"},{"alias_kind":"pith_short_8","alias_value":"LAUMCFFW","created_at":"2026-05-18T12:31:28Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:LAUMCFFWFP4EQCYN4Z3OX3C4VO","target":"record","payload":{"canonical_record":{"source":{"id":"1703.08603","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-03-24T21:26:16Z","cross_cats_sorted":[],"title_canon_sha256":"2337636b870383736de64224c84789465f226be81e89955a4c91376a5c94466e","abstract_canon_sha256":"936d38d4e6615705af93867b37056ddb8db8e189af86c4240aebc44e23b3f08f"},"schema_version":"1.0"},"canonical_sha256":"5828c114b62bf8480b0de676ebec5cab8199beb27816a20a778edcaa8c06783a","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:39:52.549910Z","signature_b64":"J0Nn0XVrF0uXnGxEtAjRVSTnNadKOiLoktDfhL2NGHJk+hTxc+guxQQvX7hD0IlmCzGvDGu2CFFtDmxOsrH3AQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"5828c114b62bf8480b0de676ebec5cab8199beb27816a20a778edcaa8c06783a","last_reissued_at":"2026-05-18T00:39:52.549256Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:39:52.549256Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1703.08603","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:39:52Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"5Euu6vRHSARG98vIfxdgsMh6ErM1Mr7OsDlBsHM4uCJqZnIc43mhcHVIb1mTs9YmlNrOIFvFxY26LLYJOABvAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T13:13:45.182755Z"},"content_sha256":"11b8228167aedccef0a9a077591cbf83da854a7804198b447d968d170311cfe4","schema_version":"1.0","event_id":"sha256:11b8228167aedccef0a9a077591cbf83da854a7804198b447d968d170311cfe4"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:LAUMCFFWFP4EQCYN4Z3OX3C4VO","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Adversarial Examples for Semantic Segmentation and Object Detection","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CV","authors_text":"Alan Yuille, Cihang Xie, Jianyu Wang, Lingxi Xie, Yuyin Zhou, Zhishuai Zhang","submitted_at":"2017-03-24T21:26:16Z","abstract_excerpt":"It has been well demonstrated that adversarial examples, i.e., natural images with visually imperceptible perturbations added, generally exist for deep networks to fail on image classification. In this paper, we extend adversarial examples to semantic segmentation and object detection which are much more difficult. Our observation is that both segmentation and detection are based on classifying multiple targets on an image (e.g., the basic target is a pixel or a receptive field in segmentation, and an object proposal in detection), which inspires us to optimize a loss function over a set of pi"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1703.08603","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:39:52Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Uy0AlZiRwia4k21mvXW48lunsnchj9osKTwH8/a4tn/3aalBwfKqFNq8O1Ubduyq3GMcDvle+h4QGW788En5BA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T13:13:45.183103Z"},"content_sha256":"509a9076aa42590c2206149d3cfc7251b724ef963027ca41b23c6fdea07b5d4a","schema_version":"1.0","event_id":"sha256:509a9076aa42590c2206149d3cfc7251b724ef963027ca41b23c6fdea07b5d4a"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/LAUMCFFWFP4EQCYN4Z3OX3C4VO/bundle.json","state_url":"https://pith.science/pith/LAUMCFFWFP4EQCYN4Z3OX3C4VO/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/LAUMCFFWFP4EQCYN4Z3OX3C4VO/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T13:13:45Z","links":{"resolver":"https://pith.science/pith/LAUMCFFWFP4EQCYN4Z3OX3C4VO","bundle":"https://pith.science/pith/LAUMCFFWFP4EQCYN4Z3OX3C4VO/bundle.json","state":"https://pith.science/pith/LAUMCFFWFP4EQCYN4Z3OX3C4VO/state.json","well_known_bundle":"https://pith.science/.well-known/pith/LAUMCFFWFP4EQCYN4Z3OX3C4VO/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:LAUMCFFWFP4EQCYN4Z3OX3C4VO","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"936d38d4e6615705af93867b37056ddb8db8e189af86c4240aebc44e23b3f08f","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-03-24T21:26:16Z","title_canon_sha256":"2337636b870383736de64224c84789465f226be81e89955a4c91376a5c94466e"},"schema_version":"1.0","source":{"id":"1703.08603","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1703.08603","created_at":"2026-05-18T00:39:52Z"},{"alias_kind":"arxiv_version","alias_value":"1703.08603v3","created_at":"2026-05-18T00:39:52Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1703.08603","created_at":"2026-05-18T00:39:52Z"},{"alias_kind":"pith_short_12","alias_value":"LAUMCFFWFP4E","created_at":"2026-05-18T12:31:28Z"},{"alias_kind":"pith_short_16","alias_value":"LAUMCFFWFP4EQCYN","created_at":"2026-05-18T12:31:28Z"},{"alias_kind":"pith_short_8","alias_value":"LAUMCFFW","created_at":"2026-05-18T12:31:28Z"}],"graph_snapshots":[{"event_id":"sha256:509a9076aa42590c2206149d3cfc7251b724ef963027ca41b23c6fdea07b5d4a","target":"graph","created_at":"2026-05-18T00:39:52Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"It has been well demonstrated that adversarial examples, i.e., natural images with visually imperceptible perturbations added, generally exist for deep networks to fail on image classification. In this paper, we extend adversarial examples to semantic segmentation and object detection which are much more difficult. Our observation is that both segmentation and detection are based on classifying multiple targets on an image (e.g., the basic target is a pixel or a receptive field in segmentation, and an object proposal in detection), which inspires us to optimize a loss function over a set of pi","authors_text":"Alan Yuille, Cihang Xie, Jianyu Wang, Lingxi Xie, Yuyin Zhou, Zhishuai Zhang","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-03-24T21:26:16Z","title":"Adversarial Examples for Semantic Segmentation and Object Detection"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1703.08603","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:11b8228167aedccef0a9a077591cbf83da854a7804198b447d968d170311cfe4","target":"record","created_at":"2026-05-18T00:39:52Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"936d38d4e6615705af93867b37056ddb8db8e189af86c4240aebc44e23b3f08f","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-03-24T21:26:16Z","title_canon_sha256":"2337636b870383736de64224c84789465f226be81e89955a4c91376a5c94466e"},"schema_version":"1.0","source":{"id":"1703.08603","kind":"arxiv","version":3}},"canonical_sha256":"5828c114b62bf8480b0de676ebec5cab8199beb27816a20a778edcaa8c06783a","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"5828c114b62bf8480b0de676ebec5cab8199beb27816a20a778edcaa8c06783a","first_computed_at":"2026-05-18T00:39:52.549256Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:39:52.549256Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"J0Nn0XVrF0uXnGxEtAjRVSTnNadKOiLoktDfhL2NGHJk+hTxc+guxQQvX7hD0IlmCzGvDGu2CFFtDmxOsrH3AQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:39:52.549910Z","signed_message":"canonical_sha256_bytes"},"source_id":"1703.08603","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:11b8228167aedccef0a9a077591cbf83da854a7804198b447d968d170311cfe4","sha256:509a9076aa42590c2206149d3cfc7251b724ef963027ca41b23c6fdea07b5d4a"],"state_sha256":"aca7db31e532aa1481847200b2960f1b8f3db4cba1a0c70cf8f290ed5312f024"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"tJNOOgPy9YVOBqkJkHOZ6HCoYRUHqN2lWeIsSecvsNU8eYOtP0HyE6yi8gQ1D3VXd+YTOLArJhqIjpC5s0bEBA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T13:13:45.185130Z","bundle_sha256":"a37b3d86e867729525dc0073e38f555534aeb923497009420a8b6e99e7121f5e"}}