{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:LFD6O3MDTYFY4WKS2AKLLR3GJZ","short_pith_number":"pith:LFD6O3MD","canonical_record":{"source":{"id":"1605.07284","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-05-24T04:35:28Z","cross_cats_sorted":["cs.CR","math.IT","stat.AP"],"title_canon_sha256":"3fa5ccc06dbd90abbb3b8f1e89e2e9a38f334ce47e14722fbc8226a2b51d3bd1","abstract_canon_sha256":"a57ba958a4c435c8addf8f00f8419fed4e8efec00e5b09cb053d73965be23100"},"schema_version":"1.0"},"canonical_sha256":"5947e76d839e0b8e5952d014b5c7664e78ebba24710409e2c742300aae4c781f","source":{"kind":"arxiv","id":"1605.07284","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1605.07284","created_at":"2026-05-18T00:54:36Z"},{"alias_kind":"arxiv_version","alias_value":"1605.07284v2","created_at":"2026-05-18T00:54:36Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1605.07284","created_at":"2026-05-18T00:54:36Z"},{"alias_kind":"pith_short_12","alias_value":"LFD6O3MDTYFY","created_at":"2026-05-18T12:30:29Z"},{"alias_kind":"pith_short_16","alias_value":"LFD6O3MDTYFY4WKS","created_at":"2026-05-18T12:30:29Z"},{"alias_kind":"pith_short_8","alias_value":"LFD6O3MD","created_at":"2026-05-18T12:30:29Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:LFD6O3MDTYFY4WKS2AKLLR3GJZ","target":"record","payload":{"canonical_record":{"source":{"id":"1605.07284","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-05-24T04:35:28Z","cross_cats_sorted":["cs.CR","math.IT","stat.AP"],"title_canon_sha256":"3fa5ccc06dbd90abbb3b8f1e89e2e9a38f334ce47e14722fbc8226a2b51d3bd1","abstract_canon_sha256":"a57ba958a4c435c8addf8f00f8419fed4e8efec00e5b09cb053d73965be23100"},"schema_version":"1.0"},"canonical_sha256":"5947e76d839e0b8e5952d014b5c7664e78ebba24710409e2c742300aae4c781f","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:54:36.430172Z","signature_b64":"mtwYQrBy5EvEfvMbe+5AKhzb7nxtnCmhu+gjdTj4HqiCqupWYeRmGWqRaAlCIAGpLmB1CcmmkFXBBBIp1HHCDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"5947e76d839e0b8e5952d014b5c7664e78ebba24710409e2c742300aae4c781f","last_reissued_at":"2026-05-18T00:54:36.429672Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:54:36.429672Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1605.07284","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:54:36Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"kd0ACTbPGESakb/L34muE8vratMv0cQCZlUgK26n39FnE/KotU77PzxXDyv53tW2NnmSOLDYnHRQmH6ECwZZBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T09:19:38.893853Z"},"content_sha256":"3f700b301cbc2aabcc4753ee21b5857699f266f5262ba8e0019f558157402271","schema_version":"1.0","event_id":"sha256:3f700b301cbc2aabcc4753ee21b5857699f266f5262ba8e0019f558157402271"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:LFD6O3MDTYFY4WKS2AKLLR3GJZ","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","math.IT","stat.AP"],"primary_cat":"cs.IT","authors_text":"Jiangfan Zhang, Lance Kaplan, Rick S. Blum, Xuanxuan Lu","submitted_at":"2016-05-24T04:35:28Z","abstract_excerpt":"Estimation of an unknown deterministic vector from quantized sensor data is considered in the presence of spoofing attacks which alter the data presented to several sensors. Contrary to previous work, a generalized attack model is employed which manipulates the data using transformations with arbitrary functional forms determined by some attack parameters whose values are unknown to the attacked system. For the first time, necessary and sufficient conditions are provided under which the transformations provide a guaranteed attack performance in terms of Cramer-Rao Bound (CRB) regardless of the"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1605.07284","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:54:36Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ooFL1c93M6P56UaWrtYqWx5U2gFcZRgpZetAq3s8YT9W+iplj75sTxENNNwChdWl9hg1pFdCXahj8c95V1D9DQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T09:19:38.894552Z"},"content_sha256":"f27fc3e7189abcbbb4d62cff5f5f66453955b9b0d77a2f206f02ec607b5c8b25","schema_version":"1.0","event_id":"sha256:f27fc3e7189abcbbb4d62cff5f5f66453955b9b0d77a2f206f02ec607b5c8b25"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/LFD6O3MDTYFY4WKS2AKLLR3GJZ/bundle.json","state_url":"https://pith.science/pith/LFD6O3MDTYFY4WKS2AKLLR3GJZ/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/LFD6O3MDTYFY4WKS2AKLLR3GJZ/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T09:19:38Z","links":{"resolver":"https://pith.science/pith/LFD6O3MDTYFY4WKS2AKLLR3GJZ","bundle":"https://pith.science/pith/LFD6O3MDTYFY4WKS2AKLLR3GJZ/bundle.json","state":"https://pith.science/pith/LFD6O3MDTYFY4WKS2AKLLR3GJZ/state.json","well_known_bundle":"https://pith.science/.well-known/pith/LFD6O3MDTYFY4WKS2AKLLR3GJZ/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:LFD6O3MDTYFY4WKS2AKLLR3GJZ","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"a57ba958a4c435c8addf8f00f8419fed4e8efec00e5b09cb053d73965be23100","cross_cats_sorted":["cs.CR","math.IT","stat.AP"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-05-24T04:35:28Z","title_canon_sha256":"3fa5ccc06dbd90abbb3b8f1e89e2e9a38f334ce47e14722fbc8226a2b51d3bd1"},"schema_version":"1.0","source":{"id":"1605.07284","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1605.07284","created_at":"2026-05-18T00:54:36Z"},{"alias_kind":"arxiv_version","alias_value":"1605.07284v2","created_at":"2026-05-18T00:54:36Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1605.07284","created_at":"2026-05-18T00:54:36Z"},{"alias_kind":"pith_short_12","alias_value":"LFD6O3MDTYFY","created_at":"2026-05-18T12:30:29Z"},{"alias_kind":"pith_short_16","alias_value":"LFD6O3MDTYFY4WKS","created_at":"2026-05-18T12:30:29Z"},{"alias_kind":"pith_short_8","alias_value":"LFD6O3MD","created_at":"2026-05-18T12:30:29Z"}],"graph_snapshots":[{"event_id":"sha256:f27fc3e7189abcbbb4d62cff5f5f66453955b9b0d77a2f206f02ec607b5c8b25","target":"graph","created_at":"2026-05-18T00:54:36Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Estimation of an unknown deterministic vector from quantized sensor data is considered in the presence of spoofing attacks which alter the data presented to several sensors. Contrary to previous work, a generalized attack model is employed which manipulates the data using transformations with arbitrary functional forms determined by some attack parameters whose values are unknown to the attacked system. For the first time, necessary and sufficient conditions are provided under which the transformations provide a guaranteed attack performance in terms of Cramer-Rao Bound (CRB) regardless of the","authors_text":"Jiangfan Zhang, Lance Kaplan, Rick S. Blum, Xuanxuan Lu","cross_cats":["cs.CR","math.IT","stat.AP"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-05-24T04:35:28Z","title":"Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1605.07284","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:3f700b301cbc2aabcc4753ee21b5857699f266f5262ba8e0019f558157402271","target":"record","created_at":"2026-05-18T00:54:36Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"a57ba958a4c435c8addf8f00f8419fed4e8efec00e5b09cb053d73965be23100","cross_cats_sorted":["cs.CR","math.IT","stat.AP"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-05-24T04:35:28Z","title_canon_sha256":"3fa5ccc06dbd90abbb3b8f1e89e2e9a38f334ce47e14722fbc8226a2b51d3bd1"},"schema_version":"1.0","source":{"id":"1605.07284","kind":"arxiv","version":2}},"canonical_sha256":"5947e76d839e0b8e5952d014b5c7664e78ebba24710409e2c742300aae4c781f","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"5947e76d839e0b8e5952d014b5c7664e78ebba24710409e2c742300aae4c781f","first_computed_at":"2026-05-18T00:54:36.429672Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:54:36.429672Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"mtwYQrBy5EvEfvMbe+5AKhzb7nxtnCmhu+gjdTj4HqiCqupWYeRmGWqRaAlCIAGpLmB1CcmmkFXBBBIp1HHCDg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:54:36.430172Z","signed_message":"canonical_sha256_bytes"},"source_id":"1605.07284","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:3f700b301cbc2aabcc4753ee21b5857699f266f5262ba8e0019f558157402271","sha256:f27fc3e7189abcbbb4d62cff5f5f66453955b9b0d77a2f206f02ec607b5c8b25"],"state_sha256":"7fd814c96f8e0bf6b197bf569a87c76cc7766c218092b07aa7f091be688ff87f"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Glj3+LLzMOx0IUwimJXzA9Qf2Lvk18bus8DyjfnLcw7r/PAwx4jxueo5JRVV8nxFi2KBw13ym3Jo3gX/n4fQAg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T09:19:38.897790Z","bundle_sha256":"ad2d937f80f1e714530e76f57d4f82afd774491e6323fe2066b043803e9fc7e4"}}