{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2018:OPRC2LAG3N24MOOKKXWS7CTRX5","short_pith_number":"pith:OPRC2LAG","schema_version":"1.0","canonical_sha256":"73e22d2c06db75c639ca55ed2f8a71bf78fa87012fc5c61b77fb550f37c8f9d2","source":{"kind":"arxiv","id":"1801.00553","version":3},"attestation_state":"computed","paper":{"title":"Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CV","authors_text":"Ajmal Mian, Naveed Akhtar","submitted_at":"2018-01-02T05:22:06Z","abstract_excerpt":"Deep learning is at the heart of the current rise of machine learning and artificial intelligence. In the field of Computer Vision, it has become the workhorse for applications ranging from self-driving cars to surveillance and security. Whereas deep neural networks have demonstrated phenomenal success (often beyond human capabilities) in solving complex problems, recent studies show that they are vulnerable to adversarial attacks in the form of subtle perturbations to inputs that lead a model to predict incorrect outputs. For images, such perturbations are often too small to be perceptible, y"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1801.00553","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-01-02T05:22:06Z","cross_cats_sorted":[],"title_canon_sha256":"23fc4ebd03408db9d28930797140ce000f3ae42b1e6c28aca2b0c5fa627f668d","abstract_canon_sha256":"83ebc43c9472fd6313ca243c9fa650da672b0f53d4909b56654b22e501c56d9c"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:22:38.987726Z","signature_b64":"pxsnQteyUFL3WxAvS9XK+cRMfo4IAye9cfh5+Ze49MMMi52J9gPcfdOIhUtMeatqyOBjcowiWp6FPX5DHI0xBA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"73e22d2c06db75c639ca55ed2f8a71bf78fa87012fc5c61b77fb550f37c8f9d2","last_reissued_at":"2026-05-18T00:22:38.987354Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:22:38.987354Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CV","authors_text":"Ajmal Mian, Naveed Akhtar","submitted_at":"2018-01-02T05:22:06Z","abstract_excerpt":"Deep learning is at the heart of the current rise of machine learning and artificial intelligence. In the field of Computer Vision, it has become the workhorse for applications ranging from self-driving cars to surveillance and security. Whereas deep neural networks have demonstrated phenomenal success (often beyond human capabilities) in solving complex problems, recent studies show that they are vulnerable to adversarial attacks in the form of subtle perturbations to inputs that lead a model to predict incorrect outputs. For images, such perturbations are often too small to be perceptible, y"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1801.00553","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1801.00553","created_at":"2026-05-18T00:22:38.987421+00:00"},{"alias_kind":"arxiv_version","alias_value":"1801.00553v3","created_at":"2026-05-18T00:22:38.987421+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1801.00553","created_at":"2026-05-18T00:22:38.987421+00:00"},{"alias_kind":"pith_short_12","alias_value":"OPRC2LAG3N24","created_at":"2026-05-18T12:32:43.782077+00:00"},{"alias_kind":"pith_short_16","alias_value":"OPRC2LAG3N24MOOK","created_at":"2026-05-18T12:32:43.782077+00:00"},{"alias_kind":"pith_short_8","alias_value":"OPRC2LAG","created_at":"2026-05-18T12:32:43.782077+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":2,"internal_anchor_count":2,"sample":[{"citing_arxiv_id":"2507.04227","citing_title":"Mobile GUI Agents under Real-world Threats: Are We There Yet?","ref_index":1,"is_internal_anchor":true},{"citing_arxiv_id":"2605.12937","citing_title":"AuraMask: An Extensible Pipeline for Developing Aesthetic Anti-Facial Recognition Image Filters","ref_index":3,"is_internal_anchor":true}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/OPRC2LAG3N24MOOKKXWS7CTRX5","json":"https://pith.science/pith/OPRC2LAG3N24MOOKKXWS7CTRX5.json","graph_json":"https://pith.science/api/pith-number/OPRC2LAG3N24MOOKKXWS7CTRX5/graph.json","events_json":"https://pith.science/api/pith-number/OPRC2LAG3N24MOOKKXWS7CTRX5/events.json","paper":"https://pith.science/paper/OPRC2LAG"},"agent_actions":{"view_html":"https://pith.science/pith/OPRC2LAG3N24MOOKKXWS7CTRX5","download_json":"https://pith.science/pith/OPRC2LAG3N24MOOKKXWS7CTRX5.json","view_paper":"https://pith.science/paper/OPRC2LAG","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1801.00553&json=true","fetch_graph":"https://pith.science/api/pith-number/OPRC2LAG3N24MOOKKXWS7CTRX5/graph.json","fetch_events":"https://pith.science/api/pith-number/OPRC2LAG3N24MOOKKXWS7CTRX5/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/OPRC2LAG3N24MOOKKXWS7CTRX5/action/timestamp_anchor","attest_storage":"https://pith.science/pith/OPRC2LAG3N24MOOKKXWS7CTRX5/action/storage_attestation","attest_author":"https://pith.science/pith/OPRC2LAG3N24MOOKKXWS7CTRX5/action/author_attestation","sign_citation":"https://pith.science/pith/OPRC2LAG3N24MOOKKXWS7CTRX5/action/citation_signature","submit_replication":"https://pith.science/pith/OPRC2LAG3N24MOOKKXWS7CTRX5/action/replication_record"}},"created_at":"2026-05-18T00:22:38.987421+00:00","updated_at":"2026-05-18T00:22:38.987421+00:00"}