{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2019:QSS67LGB5JSTELC7MLSJYLRY3M","short_pith_number":"pith:QSS67LGB","canonical_record":{"source":{"id":"1903.11220","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2019-03-27T01:54:16Z","cross_cats_sorted":["cs.IT","cs.LG","math.IT","math.ST","stat.TH"],"title_canon_sha256":"5dfcb2d0de37ab687ceb20e4a8ef92376e94234b355e55d3636d4d1e7d0bd601","abstract_canon_sha256":"323cb3f6867e21880fd53805481d4699209431c2a22b879bab0389437d61e286"},"schema_version":"1.0"},"canonical_sha256":"84a5efacc1ea65322c5f62e49c2e38db21ad42432beac3835a68009f382c9282","source":{"kind":"arxiv","id":"1903.11220","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1903.11220","created_at":"2026-05-17T23:50:03Z"},{"alias_kind":"arxiv_version","alias_value":"1903.11220v1","created_at":"2026-05-17T23:50:03Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1903.11220","created_at":"2026-05-17T23:50:03Z"},{"alias_kind":"pith_short_12","alias_value":"QSS67LGB5JST","created_at":"2026-05-18T12:33:27Z"},{"alias_kind":"pith_short_16","alias_value":"QSS67LGB5JSTELC7","created_at":"2026-05-18T12:33:27Z"},{"alias_kind":"pith_short_8","alias_value":"QSS67LGB","created_at":"2026-05-18T12:33:27Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2019:QSS67LGB5JSTELC7MLSJYLRY3M","target":"record","payload":{"canonical_record":{"source":{"id":"1903.11220","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2019-03-27T01:54:16Z","cross_cats_sorted":["cs.IT","cs.LG","math.IT","math.ST","stat.TH"],"title_canon_sha256":"5dfcb2d0de37ab687ceb20e4a8ef92376e94234b355e55d3636d4d1e7d0bd601","abstract_canon_sha256":"323cb3f6867e21880fd53805481d4699209431c2a22b879bab0389437d61e286"},"schema_version":"1.0"},"canonical_sha256":"84a5efacc1ea65322c5f62e49c2e38db21ad42432beac3835a68009f382c9282","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:50:03.845945Z","signature_b64":"B14IDKf4dRpSYoRyxdMFtFHOpsMbs7u9bGB/2ZhtvM0mbaN+64JPlPCP/ZqXyehBqKHUIMIEm3bfhOU4KBqHAQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"84a5efacc1ea65322c5f62e49c2e38db21ad42432beac3835a68009f382c9282","last_reissued_at":"2026-05-17T23:50:03.845395Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:50:03.845395Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1903.11220","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:50:03Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"rxK6QuD+l3dzSjKutAC26U7yOOY6GxE4KiCnzCj6NVb9v58gPE5JkgjC08oWhytuxFLQM8JfD0QYH+jXxdeOAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:30:28.546402Z"},"content_sha256":"81ad1d44b937bd034fe7497a3d4f0246593c467ab0c51b5dfebb05965be18ab2","schema_version":"1.0","event_id":"sha256:81ad1d44b937bd034fe7497a3d4f0246593c467ab0c51b5dfebb05965be18ab2"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2019:QSS67LGB5JSTELC7MLSJYLRY3M","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"On the Adversarial Robustness of Multivariate Robust Estimation","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.IT","cs.LG","math.IT","math.ST","stat.TH"],"primary_cat":"stat.ML","authors_text":"Erhan Bayraktar, Lifeng Lai","submitted_at":"2019-03-27T01:54:16Z","abstract_excerpt":"In this paper, we investigate the adversarial robustness of multivariate $M$-Estimators. In the considered model, after observing the whole dataset, an adversary can modify all data points with the goal of maximizing inference errors. We use adversarial influence function (AIF) to measure the asymptotic rate at which the adversary can change the inference result. We first characterize the adversary's optimal modification strategy and its corresponding AIF. From the defender's perspective, we would like to design an estimator that has a small AIF. For the case of joint location and scale estima"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1903.11220","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:50:03Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Yk4C//d+iys7UvF3v/vpbhnq3ISQjgi1QwtZhxus1MGC794AzI8j9icDXZBSQRb4oQnQ0obEMbCyXUfGH5VNBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:30:28.546753Z"},"content_sha256":"1d865946ae93f78cd426f1843002e450c86d49515a179c69b399debd74aca359","schema_version":"1.0","event_id":"sha256:1d865946ae93f78cd426f1843002e450c86d49515a179c69b399debd74aca359"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/QSS67LGB5JSTELC7MLSJYLRY3M/bundle.json","state_url":"https://pith.science/pith/QSS67LGB5JSTELC7MLSJYLRY3M/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/QSS67LGB5JSTELC7MLSJYLRY3M/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T20:30:28Z","links":{"resolver":"https://pith.science/pith/QSS67LGB5JSTELC7MLSJYLRY3M","bundle":"https://pith.science/pith/QSS67LGB5JSTELC7MLSJYLRY3M/bundle.json","state":"https://pith.science/pith/QSS67LGB5JSTELC7MLSJYLRY3M/state.json","well_known_bundle":"https://pith.science/.well-known/pith/QSS67LGB5JSTELC7MLSJYLRY3M/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2019:QSS67LGB5JSTELC7MLSJYLRY3M","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"323cb3f6867e21880fd53805481d4699209431c2a22b879bab0389437d61e286","cross_cats_sorted":["cs.IT","cs.LG","math.IT","math.ST","stat.TH"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2019-03-27T01:54:16Z","title_canon_sha256":"5dfcb2d0de37ab687ceb20e4a8ef92376e94234b355e55d3636d4d1e7d0bd601"},"schema_version":"1.0","source":{"id":"1903.11220","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1903.11220","created_at":"2026-05-17T23:50:03Z"},{"alias_kind":"arxiv_version","alias_value":"1903.11220v1","created_at":"2026-05-17T23:50:03Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1903.11220","created_at":"2026-05-17T23:50:03Z"},{"alias_kind":"pith_short_12","alias_value":"QSS67LGB5JST","created_at":"2026-05-18T12:33:27Z"},{"alias_kind":"pith_short_16","alias_value":"QSS67LGB5JSTELC7","created_at":"2026-05-18T12:33:27Z"},{"alias_kind":"pith_short_8","alias_value":"QSS67LGB","created_at":"2026-05-18T12:33:27Z"}],"graph_snapshots":[{"event_id":"sha256:1d865946ae93f78cd426f1843002e450c86d49515a179c69b399debd74aca359","target":"graph","created_at":"2026-05-17T23:50:03Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In this paper, we investigate the adversarial robustness of multivariate $M$-Estimators. In the considered model, after observing the whole dataset, an adversary can modify all data points with the goal of maximizing inference errors. We use adversarial influence function (AIF) to measure the asymptotic rate at which the adversary can change the inference result. We first characterize the adversary's optimal modification strategy and its corresponding AIF. From the defender's perspective, we would like to design an estimator that has a small AIF. For the case of joint location and scale estima","authors_text":"Erhan Bayraktar, Lifeng Lai","cross_cats":["cs.IT","cs.LG","math.IT","math.ST","stat.TH"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2019-03-27T01:54:16Z","title":"On the Adversarial Robustness of Multivariate Robust Estimation"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1903.11220","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:81ad1d44b937bd034fe7497a3d4f0246593c467ab0c51b5dfebb05965be18ab2","target":"record","created_at":"2026-05-17T23:50:03Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"323cb3f6867e21880fd53805481d4699209431c2a22b879bab0389437d61e286","cross_cats_sorted":["cs.IT","cs.LG","math.IT","math.ST","stat.TH"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2019-03-27T01:54:16Z","title_canon_sha256":"5dfcb2d0de37ab687ceb20e4a8ef92376e94234b355e55d3636d4d1e7d0bd601"},"schema_version":"1.0","source":{"id":"1903.11220","kind":"arxiv","version":1}},"canonical_sha256":"84a5efacc1ea65322c5f62e49c2e38db21ad42432beac3835a68009f382c9282","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"84a5efacc1ea65322c5f62e49c2e38db21ad42432beac3835a68009f382c9282","first_computed_at":"2026-05-17T23:50:03.845395Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:50:03.845395Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"B14IDKf4dRpSYoRyxdMFtFHOpsMbs7u9bGB/2ZhtvM0mbaN+64JPlPCP/ZqXyehBqKHUIMIEm3bfhOU4KBqHAQ==","signature_status":"signed_v1","signed_at":"2026-05-17T23:50:03.845945Z","signed_message":"canonical_sha256_bytes"},"source_id":"1903.11220","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:81ad1d44b937bd034fe7497a3d4f0246593c467ab0c51b5dfebb05965be18ab2","sha256:1d865946ae93f78cd426f1843002e450c86d49515a179c69b399debd74aca359"],"state_sha256":"071cab4445ace2c7691ff4d0e1f7f4dc20178ac0e0bb2bb482ee3a3996094777"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"cCkQwI7Uut0qYHB0IT12yTeO3e8tHeOGMMCIbnR5QbjOqqrXXyacc1/IaZKqJu8dO7HoZVqucnJ1wFR81RkFCg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T20:30:28.548724Z","bundle_sha256":"e44a96180360cef18b3ae2730db872ffc3148f4ab18f27ecddc42039772350af"}}