{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:MDWUWYGNCZNSFJBCV3BNXNLBEX","short_pith_number":"pith:MDWUWYGN","canonical_record":{"source":{"id":"1802.04528","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-02-13T09:51:41Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"fede9e351baecfbf47715e349bf22f0b1ac82284421f3dd9f9c9b7671f2f6a96","abstract_canon_sha256":"dbf987c3b3ab364746615804d0317561eaabcbf6faf52c0d5fbd9d3e4ff0cb6f"},"schema_version":"1.0"},"canonical_sha256":"60ed4b60cd165b22a422aec2dbb56125d78e18d8c8ea7dee54170e99218b18ad","source":{"kind":"arxiv","id":"1802.04528","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1802.04528","created_at":"2026-05-17T23:56:38Z"},{"alias_kind":"arxiv_version","alias_value":"1802.04528v3","created_at":"2026-05-17T23:56:38Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1802.04528","created_at":"2026-05-17T23:56:38Z"},{"alias_kind":"pith_short_12","alias_value":"MDWUWYGNCZNS","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_16","alias_value":"MDWUWYGNCZNSFJBC","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_8","alias_value":"MDWUWYGN","created_at":"2026-05-18T12:32:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:MDWUWYGNCZNSFJBCV3BNXNLBEX","target":"record","payload":{"canonical_record":{"source":{"id":"1802.04528","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-02-13T09:51:41Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"fede9e351baecfbf47715e349bf22f0b1ac82284421f3dd9f9c9b7671f2f6a96","abstract_canon_sha256":"dbf987c3b3ab364746615804d0317561eaabcbf6faf52c0d5fbd9d3e4ff0cb6f"},"schema_version":"1.0"},"canonical_sha256":"60ed4b60cd165b22a422aec2dbb56125d78e18d8c8ea7dee54170e99218b18ad","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:56:38.783445Z","signature_b64":"JqHGwm1Mm5ooqaqPCzjdn6307O1Qvm58wAPALuh610Sld+s5dFof12RxePmsTdPRF4UJcqrU89+cTBChZIGQCQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"60ed4b60cd165b22a422aec2dbb56125d78e18d8c8ea7dee54170e99218b18ad","last_reissued_at":"2026-05-17T23:56:38.783018Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:56:38.783018Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1802.04528","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:56:38Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Dt5YzOFNo8+rU7QOmz8lHYIf1K6MCy2rdTbvNMP/WUY02g3VqDQDRXT8D/2qZCVETAcs0rvSviEYc+bYTyhJDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T12:59:35.252421Z"},"content_sha256":"f5d19d36efb234349ff09faf595386afece47ead9a7ac27d4011973ea394723a","schema_version":"1.0","event_id":"sha256:f5d19d36efb234349ff09faf595386afece47ead9a7ac27d4011973ea394723a"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:MDWUWYGNCZNSFJBCV3BNXNLBEX","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Deceiving End-to-End Deep Learning Malware Detectors using Adversarial Examples","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.LG","authors_text":"Assi Barak, Benny Pinkas, Felix Kreuk, Joseph Keshet, Moran Baruch, Shir Aviv-Reuven","submitted_at":"2018-02-13T09:51:41Z","abstract_excerpt":"In recent years, deep learning has shown performance breakthroughs in many applications, such as image detection, image segmentation, pose estimation, and speech recognition. However, this comes with a major concern: deep networks have been found to be vulnerable to adversarial examples. Adversarial examples are slightly modified inputs that are intentionally designed to cause a misclassification by the model. In the domains of images and speech, the modifications are so small that they are not seen or heard by humans, but nevertheless greatly affect the classification of the model.\n  Deep lea"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1802.04528","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:56:38Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"/+ezgvHOgR8wWN8Mr88VlISY2owPdXaJgvhwQoR+hG2Wo7CMQVl152Ecqmhr+xCeQ5G9IPfOZrO65qt9oT9WAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T12:59:35.253072Z"},"content_sha256":"5f046183f918d25d80b93bfcac95d063e8d417d44d9bd4f70d7e5819f371a902","schema_version":"1.0","event_id":"sha256:5f046183f918d25d80b93bfcac95d063e8d417d44d9bd4f70d7e5819f371a902"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/MDWUWYGNCZNSFJBCV3BNXNLBEX/bundle.json","state_url":"https://pith.science/pith/MDWUWYGNCZNSFJBCV3BNXNLBEX/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/MDWUWYGNCZNSFJBCV3BNXNLBEX/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T12:59:35Z","links":{"resolver":"https://pith.science/pith/MDWUWYGNCZNSFJBCV3BNXNLBEX","bundle":"https://pith.science/pith/MDWUWYGNCZNSFJBCV3BNXNLBEX/bundle.json","state":"https://pith.science/pith/MDWUWYGNCZNSFJBCV3BNXNLBEX/state.json","well_known_bundle":"https://pith.science/.well-known/pith/MDWUWYGNCZNSFJBCV3BNXNLBEX/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:MDWUWYGNCZNSFJBCV3BNXNLBEX","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"dbf987c3b3ab364746615804d0317561eaabcbf6faf52c0d5fbd9d3e4ff0cb6f","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-02-13T09:51:41Z","title_canon_sha256":"fede9e351baecfbf47715e349bf22f0b1ac82284421f3dd9f9c9b7671f2f6a96"},"schema_version":"1.0","source":{"id":"1802.04528","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1802.04528","created_at":"2026-05-17T23:56:38Z"},{"alias_kind":"arxiv_version","alias_value":"1802.04528v3","created_at":"2026-05-17T23:56:38Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1802.04528","created_at":"2026-05-17T23:56:38Z"},{"alias_kind":"pith_short_12","alias_value":"MDWUWYGNCZNS","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_16","alias_value":"MDWUWYGNCZNSFJBC","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_8","alias_value":"MDWUWYGN","created_at":"2026-05-18T12:32:37Z"}],"graph_snapshots":[{"event_id":"sha256:5f046183f918d25d80b93bfcac95d063e8d417d44d9bd4f70d7e5819f371a902","target":"graph","created_at":"2026-05-17T23:56:38Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In recent years, deep learning has shown performance breakthroughs in many applications, such as image detection, image segmentation, pose estimation, and speech recognition. However, this comes with a major concern: deep networks have been found to be vulnerable to adversarial examples. Adversarial examples are slightly modified inputs that are intentionally designed to cause a misclassification by the model. In the domains of images and speech, the modifications are so small that they are not seen or heard by humans, but nevertheless greatly affect the classification of the model.\n  Deep lea","authors_text":"Assi Barak, Benny Pinkas, Felix Kreuk, Joseph Keshet, Moran Baruch, Shir Aviv-Reuven","cross_cats":["cs.CR"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-02-13T09:51:41Z","title":"Deceiving End-to-End Deep Learning Malware Detectors using Adversarial Examples"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1802.04528","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:f5d19d36efb234349ff09faf595386afece47ead9a7ac27d4011973ea394723a","target":"record","created_at":"2026-05-17T23:56:38Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"dbf987c3b3ab364746615804d0317561eaabcbf6faf52c0d5fbd9d3e4ff0cb6f","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-02-13T09:51:41Z","title_canon_sha256":"fede9e351baecfbf47715e349bf22f0b1ac82284421f3dd9f9c9b7671f2f6a96"},"schema_version":"1.0","source":{"id":"1802.04528","kind":"arxiv","version":3}},"canonical_sha256":"60ed4b60cd165b22a422aec2dbb56125d78e18d8c8ea7dee54170e99218b18ad","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"60ed4b60cd165b22a422aec2dbb56125d78e18d8c8ea7dee54170e99218b18ad","first_computed_at":"2026-05-17T23:56:38.783018Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:56:38.783018Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"JqHGwm1Mm5ooqaqPCzjdn6307O1Qvm58wAPALuh610Sld+s5dFof12RxePmsTdPRF4UJcqrU89+cTBChZIGQCQ==","signature_status":"signed_v1","signed_at":"2026-05-17T23:56:38.783445Z","signed_message":"canonical_sha256_bytes"},"source_id":"1802.04528","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:f5d19d36efb234349ff09faf595386afece47ead9a7ac27d4011973ea394723a","sha256:5f046183f918d25d80b93bfcac95d063e8d417d44d9bd4f70d7e5819f371a902"],"state_sha256":"ba9d807ce6114e9008c3f5df1a63aac9dd7cf6f4c6ee751a53e2fe942ddada47"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"YkR2dFe/dAG877mnjoNRUzvH1BQrlMbDK7vAwudi/U6lUxLSw34L/XJrY7sjBvahXr7uUDCZmRJ1U3mncpjPDw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T12:59:35.256459Z","bundle_sha256":"04ecd68e189a457aa54618295d877cef8de6dd8832a8d9891bcb9a6e1e679673"}}