{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:OP55ED77COGHOMDSA4YEU67NMA","short_pith_number":"pith:OP55ED77","schema_version":"1.0","canonical_sha256":"73fbd20fff138c77307207304a7bed60340c6518ba566c7d3151a419eaa90925","source":{"kind":"arxiv","id":"1906.07148","version":1},"attestation_state":"computed","paper":{"title":"CheckNet: Secure Inference on Untrusted Devices","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","stat.ML"],"primary_cat":"cs.LG","authors_text":"H.T. Kung, Marcus Comiter, Surat Teerapittayanon","submitted_at":"2019-06-17T17:45:25Z","abstract_excerpt":"We introduce CheckNet, a method for secure inference with deep neural networks on untrusted devices. CheckNet is like a checksum for neural network inference: it verifies the integrity of the inference computation performed by untrusted devices to 1) ensure the inference has actually been performed, and 2) ensure the inference has not been manipulated by an attacker. CheckNet is completely transparent to the third party running the computation, applicable to all types of neural networks, does not require specialized hardware, adds little overhead, and has negligible impact on model performance"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1906.07148","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2019-06-17T17:45:25Z","cross_cats_sorted":["cs.CR","stat.ML"],"title_canon_sha256":"fe0c57a7cf2c22ca7f8de6bfd87d185fed8bf8f962bbd2237eecda8cc952cd03","abstract_canon_sha256":"de2af7837845708d46b85120f72350b40e84d0a54ff4d9e5049d88790360afef"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:43:11.733464Z","signature_b64":"NARwpbbdW5+lwMsr+nA9a33zaFt0KbXDwNf8CDQRNvNpGNrOQ8qfFSjZ3ooGJzV43FpgCoCjJ79C+PnwHQeTBA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"73fbd20fff138c77307207304a7bed60340c6518ba566c7d3151a419eaa90925","last_reissued_at":"2026-05-17T23:43:11.733055Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:43:11.733055Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"CheckNet: Secure Inference on Untrusted Devices","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","stat.ML"],"primary_cat":"cs.LG","authors_text":"H.T. Kung, Marcus Comiter, Surat Teerapittayanon","submitted_at":"2019-06-17T17:45:25Z","abstract_excerpt":"We introduce CheckNet, a method for secure inference with deep neural networks on untrusted devices. CheckNet is like a checksum for neural network inference: it verifies the integrity of the inference computation performed by untrusted devices to 1) ensure the inference has actually been performed, and 2) ensure the inference has not been manipulated by an attacker. CheckNet is completely transparent to the third party running the computation, applicable to all types of neural networks, does not require specialized hardware, adds little overhead, and has negligible impact on model performance"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1906.07148","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1906.07148","created_at":"2026-05-17T23:43:11.733116+00:00"},{"alias_kind":"arxiv_version","alias_value":"1906.07148v1","created_at":"2026-05-17T23:43:11.733116+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1906.07148","created_at":"2026-05-17T23:43:11.733116+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/OP55ED77COGHOMDSA4YEU67NMA","json":"https://pith.science/pith/OP55ED77COGHOMDSA4YEU67NMA.json","graph_json":"https://pith.science/api/pith-number/OP55ED77COGHOMDSA4YEU67NMA/graph.json","events_json":"https://pith.science/api/pith-number/OP55ED77COGHOMDSA4YEU67NMA/events.json","paper":"https://pith.science/paper/OP55ED77"},"agent_actions":{"view_html":"https://pith.science/pith/OP55ED77COGHOMDSA4YEU67NMA","download_json":"https://pith.science/pith/OP55ED77COGHOMDSA4YEU67NMA.json","view_paper":"https://pith.science/paper/OP55ED77","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1906.07148&json=true","fetch_graph":"https://pith.science/api/pith-number/OP55ED77COGHOMDSA4YEU67NMA/graph.json","fetch_events":"https://pith.science/api/pith-number/OP55ED77COGHOMDSA4YEU67NMA/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/OP55ED77COGHOMDSA4YEU67NMA/action/timestamp_anchor","attest_storage":"https://pith.science/pith/OP55ED77COGHOMDSA4YEU67NMA/action/storage_attestation","attest_author":"https://pith.science/pith/OP55ED77COGHOMDSA4YEU67NMA/action/author_attestation","sign_citation":"https://pith.science/pith/OP55ED77COGHOMDSA4YEU67NMA/action/citation_signature","submit_replication":"https://pith.science/pith/OP55ED77COGHOMDSA4YEU67NMA/action/replication_record"}},"created_at":"2026-05-17T23:43:11.733116+00:00","updated_at":"2026-05-17T23:43:11.733116+00:00"}