{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:MMEOVNUOFIFFEFAZ4BEEEAT357","short_pith_number":"pith:MMEOVNUO","canonical_record":{"source":{"id":"1812.02891","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-12-07T03:33:14Z","cross_cats_sorted":[],"title_canon_sha256":"eb89da2ec9d3c0b19dd287d8c9acbafb2d7affeb5f57f99bd17244501251e53f","abstract_canon_sha256":"d3f862ce7a98a72f8f89eee738917830162c6c6c4d9e1984ced313f3a0717954"},"schema_version":"1.0"},"canonical_sha256":"6308eab68e2a0a521419e04842027befc762850a33adce7d6692ddbab921901e","source":{"kind":"arxiv","id":"1812.02891","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1812.02891","created_at":"2026-05-17T23:58:51Z"},{"alias_kind":"arxiv_version","alias_value":"1812.02891v1","created_at":"2026-05-17T23:58:51Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1812.02891","created_at":"2026-05-17T23:58:51Z"},{"alias_kind":"pith_short_12","alias_value":"MMEOVNUOFIFF","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_16","alias_value":"MMEOVNUOFIFFEFAZ","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_8","alias_value":"MMEOVNUO","created_at":"2026-05-18T12:32:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:MMEOVNUOFIFFEFAZ4BEEEAT357","target":"record","payload":{"canonical_record":{"source":{"id":"1812.02891","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-12-07T03:33:14Z","cross_cats_sorted":[],"title_canon_sha256":"eb89da2ec9d3c0b19dd287d8c9acbafb2d7affeb5f57f99bd17244501251e53f","abstract_canon_sha256":"d3f862ce7a98a72f8f89eee738917830162c6c6c4d9e1984ced313f3a0717954"},"schema_version":"1.0"},"canonical_sha256":"6308eab68e2a0a521419e04842027befc762850a33adce7d6692ddbab921901e","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:58:51.515570Z","signature_b64":"Bt9x+wWNsXTR57NYqkwyIE6ATauEcuhlZlpvmW8/aTLT/X5jlVsFFWqNPuu7DsbLOt6YmzblaJVIVrEDiDGwBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"6308eab68e2a0a521419e04842027befc762850a33adce7d6692ddbab921901e","last_reissued_at":"2026-05-17T23:58:51.515087Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:58:51.515087Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1812.02891","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:58:51Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"xPqEh385b20CiP2ERQHycXzVs9ct53Lzal0bmXsR63ugD3KRr7xHGHbsMtjTD40QdPCx5zVdU1Uoj/z8GUCtBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T13:59:23.610751Z"},"content_sha256":"e05d10543685ee494dcaed2db26669ef3dac14925e3f93a9f9456e18e6bc735e","schema_version":"1.0","event_id":"sha256:e05d10543685ee494dcaed2db26669ef3dac14925e3f93a9f9456e18e6bc735e"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:MMEOVNUOFIFFEFAZ4BEEEAT357","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Adversarial Defense of Image Classification Using a Variational Auto-Encoder","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CV","authors_text":"Henry Pfister, Yi Luo","submitted_at":"2018-12-07T03:33:14Z","abstract_excerpt":"Deep neural networks are known to be vulnerable to adversarial attacks. This exposes them to potential exploits in security-sensitive applications and highlights their lack of robustness. This paper uses a variational auto-encoder (VAE) to defend against adversarial attacks for image classification tasks. This VAE defense has a few nice properties: (1) it is quite flexible and its use of randomness makes it harder to attack; (2) it can learn disentangled representations that prevent blurry reconstruction; and (3) a patch-wise VAE defense strategy is used that does not require retraining for di"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1812.02891","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:58:51Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"1kNESHHElY4tAzeI+y6wS8ZCZ0C7c41/m3h+1GuWp8bAWtOmCePGnETgL3Qyh/LcbKJcCMKN7XRiTyuMrT1ZAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T13:59:23.611100Z"},"content_sha256":"3fed3cbd8cd898a87ff5c58f32b1916ad15e29ddd8971974382a41e07fd78e81","schema_version":"1.0","event_id":"sha256:3fed3cbd8cd898a87ff5c58f32b1916ad15e29ddd8971974382a41e07fd78e81"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/MMEOVNUOFIFFEFAZ4BEEEAT357/bundle.json","state_url":"https://pith.science/pith/MMEOVNUOFIFFEFAZ4BEEEAT357/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/MMEOVNUOFIFFEFAZ4BEEEAT357/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T13:59:23Z","links":{"resolver":"https://pith.science/pith/MMEOVNUOFIFFEFAZ4BEEEAT357","bundle":"https://pith.science/pith/MMEOVNUOFIFFEFAZ4BEEEAT357/bundle.json","state":"https://pith.science/pith/MMEOVNUOFIFFEFAZ4BEEEAT357/state.json","well_known_bundle":"https://pith.science/.well-known/pith/MMEOVNUOFIFFEFAZ4BEEEAT357/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:MMEOVNUOFIFFEFAZ4BEEEAT357","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"d3f862ce7a98a72f8f89eee738917830162c6c6c4d9e1984ced313f3a0717954","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-12-07T03:33:14Z","title_canon_sha256":"eb89da2ec9d3c0b19dd287d8c9acbafb2d7affeb5f57f99bd17244501251e53f"},"schema_version":"1.0","source":{"id":"1812.02891","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1812.02891","created_at":"2026-05-17T23:58:51Z"},{"alias_kind":"arxiv_version","alias_value":"1812.02891v1","created_at":"2026-05-17T23:58:51Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1812.02891","created_at":"2026-05-17T23:58:51Z"},{"alias_kind":"pith_short_12","alias_value":"MMEOVNUOFIFF","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_16","alias_value":"MMEOVNUOFIFFEFAZ","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_8","alias_value":"MMEOVNUO","created_at":"2026-05-18T12:32:37Z"}],"graph_snapshots":[{"event_id":"sha256:3fed3cbd8cd898a87ff5c58f32b1916ad15e29ddd8971974382a41e07fd78e81","target":"graph","created_at":"2026-05-17T23:58:51Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Deep neural networks are known to be vulnerable to adversarial attacks. This exposes them to potential exploits in security-sensitive applications and highlights their lack of robustness. This paper uses a variational auto-encoder (VAE) to defend against adversarial attacks for image classification tasks. This VAE defense has a few nice properties: (1) it is quite flexible and its use of randomness makes it harder to attack; (2) it can learn disentangled representations that prevent blurry reconstruction; and (3) a patch-wise VAE defense strategy is used that does not require retraining for di","authors_text":"Henry Pfister, Yi Luo","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-12-07T03:33:14Z","title":"Adversarial Defense of Image Classification Using a Variational Auto-Encoder"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1812.02891","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:e05d10543685ee494dcaed2db26669ef3dac14925e3f93a9f9456e18e6bc735e","target":"record","created_at":"2026-05-17T23:58:51Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"d3f862ce7a98a72f8f89eee738917830162c6c6c4d9e1984ced313f3a0717954","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-12-07T03:33:14Z","title_canon_sha256":"eb89da2ec9d3c0b19dd287d8c9acbafb2d7affeb5f57f99bd17244501251e53f"},"schema_version":"1.0","source":{"id":"1812.02891","kind":"arxiv","version":1}},"canonical_sha256":"6308eab68e2a0a521419e04842027befc762850a33adce7d6692ddbab921901e","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"6308eab68e2a0a521419e04842027befc762850a33adce7d6692ddbab921901e","first_computed_at":"2026-05-17T23:58:51.515087Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:58:51.515087Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"Bt9x+wWNsXTR57NYqkwyIE6ATauEcuhlZlpvmW8/aTLT/X5jlVsFFWqNPuu7DsbLOt6YmzblaJVIVrEDiDGwBQ==","signature_status":"signed_v1","signed_at":"2026-05-17T23:58:51.515570Z","signed_message":"canonical_sha256_bytes"},"source_id":"1812.02891","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:e05d10543685ee494dcaed2db26669ef3dac14925e3f93a9f9456e18e6bc735e","sha256:3fed3cbd8cd898a87ff5c58f32b1916ad15e29ddd8971974382a41e07fd78e81"],"state_sha256":"b6abc77e725f9d1088c9b4c9cc6203cbe00c3c21ad7277a37db4c91d781cbb23"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"XjeCin0OFfZL/ymzwqcWyuKZdnPT2HJGl3R8ihlqDvL4d1zUAcGjgBFA3CDwDVCi3LwqxlCTK4ddG6Bik1z2DQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T13:59:23.613227Z","bundle_sha256":"d59e38b2bc500b31be2411b7f2d43b265e0fb441ecf5616f3caf707e10ead3dd"}}