{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:SI6JY5EUHWF54F7RZIDZCGASI4","short_pith_number":"pith:SI6JY5EU","canonical_record":{"source":{"id":"1602.02950","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2016-02-09T12:00:56Z","cross_cats_sorted":["cs.SD"],"title_canon_sha256":"fbd2930b39574c1f5bd0017ee512259444da2a6c923fee8a1ae908ee3faf05f8","abstract_canon_sha256":"7241326343e8551e841fc2c21e7cebbe66c346d24bfc93984aa725ed83822e8e"},"schema_version":"1.0"},"canonical_sha256":"923c9c74943d8bde17f1ca079118124706dded4f75a5ff296f7cb1f8bcadf657","source":{"kind":"arxiv","id":"1602.02950","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1602.02950","created_at":"2026-05-18T01:21:06Z"},{"alias_kind":"arxiv_version","alias_value":"1602.02950v1","created_at":"2026-05-18T01:21:06Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1602.02950","created_at":"2026-05-18T01:21:06Z"},{"alias_kind":"pith_short_12","alias_value":"SI6JY5EUHWF5","created_at":"2026-05-18T12:30:44Z"},{"alias_kind":"pith_short_16","alias_value":"SI6JY5EUHWF54F7R","created_at":"2026-05-18T12:30:44Z"},{"alias_kind":"pith_short_8","alias_value":"SI6JY5EU","created_at":"2026-05-18T12:30:44Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:SI6JY5EUHWF54F7RZIDZCGASI4","target":"record","payload":{"canonical_record":{"source":{"id":"1602.02950","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2016-02-09T12:00:56Z","cross_cats_sorted":["cs.SD"],"title_canon_sha256":"fbd2930b39574c1f5bd0017ee512259444da2a6c923fee8a1ae908ee3faf05f8","abstract_canon_sha256":"7241326343e8551e841fc2c21e7cebbe66c346d24bfc93984aa725ed83822e8e"},"schema_version":"1.0"},"canonical_sha256":"923c9c74943d8bde17f1ca079118124706dded4f75a5ff296f7cb1f8bcadf657","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:21:06.009959Z","signature_b64":"zgxwGkVFrpjTH0b0h8h9JTZwy36LSmjMCtsPnKE0XJbvJLwyaFEWtpx3Zv2rpe42/5tpN0rKW606J7LIdssTBA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"923c9c74943d8bde17f1ca079118124706dded4f75a5ff296f7cb1f8bcadf657","last_reissued_at":"2026-05-18T01:21:06.009216Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:21:06.009216Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1602.02950","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:21:06Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"WcrpFh3gFJIH7fgAEAA1dUikzjAck+gGGH9rhcyvjH1NXVDVV2CxVFvEc7lZ0F6sGAKuhfuovXAUMFmyBYsXBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T13:25:42.160265Z"},"content_sha256":"4f8db7f72517bc14a424582809841cdf0f0a7f0e6c0e49efd6f9fa63278a9430","schema_version":"1.0","event_id":"sha256:4f8db7f72517bc14a424582809841cdf0f0a7f0e6c0e49efd6f9fa63278a9430"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:SI6JY5EUHWF54F7RZIDZCGASI4","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Spoofing detection under noisy conditions: a preliminary investigation and an initial database","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":["cs.SD"],"primary_cat":"cs.LG","authors_text":"Eng Siong Chng, Haizhou Li, Xiaohai Tian, Xiong Xiao, Zhizheng Wu","submitted_at":"2016-02-09T12:00:56Z","abstract_excerpt":"Spoofing detection for automatic speaker verification (ASV), which is to discriminate between live speech and attacks, has received increasing attentions recently. However, all the previous studies have been done on the clean data without significant additive noise. To simulate the real-life scenarios, we perform a preliminary investigation of spoofing detection under additive noisy conditions, and also describe an initial database for this task. The noisy database is based on the ASVspoof challenge 2015 database and generated by artificially adding background noises at different signal-to-noi"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1602.02950","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:21:06Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"x5SmIQdvDggCfhUoeyGA/o2Jx1IpYPnT2HwxhI6WVed1ScyFO8wmw+5wTXyK2th/Ao2Wo4RG14rOn6TmOpSzBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T13:25:42.160631Z"},"content_sha256":"02303928b0af94abf8c428265198982de044c4f0927220f60f5ccb8ecaef1acb","schema_version":"1.0","event_id":"sha256:02303928b0af94abf8c428265198982de044c4f0927220f60f5ccb8ecaef1acb"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/SI6JY5EUHWF54F7RZIDZCGASI4/bundle.json","state_url":"https://pith.science/pith/SI6JY5EUHWF54F7RZIDZCGASI4/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/SI6JY5EUHWF54F7RZIDZCGASI4/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T13:25:42Z","links":{"resolver":"https://pith.science/pith/SI6JY5EUHWF54F7RZIDZCGASI4","bundle":"https://pith.science/pith/SI6JY5EUHWF54F7RZIDZCGASI4/bundle.json","state":"https://pith.science/pith/SI6JY5EUHWF54F7RZIDZCGASI4/state.json","well_known_bundle":"https://pith.science/.well-known/pith/SI6JY5EUHWF54F7RZIDZCGASI4/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:SI6JY5EUHWF54F7RZIDZCGASI4","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"7241326343e8551e841fc2c21e7cebbe66c346d24bfc93984aa725ed83822e8e","cross_cats_sorted":["cs.SD"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2016-02-09T12:00:56Z","title_canon_sha256":"fbd2930b39574c1f5bd0017ee512259444da2a6c923fee8a1ae908ee3faf05f8"},"schema_version":"1.0","source":{"id":"1602.02950","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1602.02950","created_at":"2026-05-18T01:21:06Z"},{"alias_kind":"arxiv_version","alias_value":"1602.02950v1","created_at":"2026-05-18T01:21:06Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1602.02950","created_at":"2026-05-18T01:21:06Z"},{"alias_kind":"pith_short_12","alias_value":"SI6JY5EUHWF5","created_at":"2026-05-18T12:30:44Z"},{"alias_kind":"pith_short_16","alias_value":"SI6JY5EUHWF54F7R","created_at":"2026-05-18T12:30:44Z"},{"alias_kind":"pith_short_8","alias_value":"SI6JY5EU","created_at":"2026-05-18T12:30:44Z"}],"graph_snapshots":[{"event_id":"sha256:02303928b0af94abf8c428265198982de044c4f0927220f60f5ccb8ecaef1acb","target":"graph","created_at":"2026-05-18T01:21:06Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Spoofing detection for automatic speaker verification (ASV), which is to discriminate between live speech and attacks, has received increasing attentions recently. However, all the previous studies have been done on the clean data without significant additive noise. To simulate the real-life scenarios, we perform a preliminary investigation of spoofing detection under additive noisy conditions, and also describe an initial database for this task. The noisy database is based on the ASVspoof challenge 2015 database and generated by artificially adding background noises at different signal-to-noi","authors_text":"Eng Siong Chng, Haizhou Li, Xiaohai Tian, Xiong Xiao, Zhizheng Wu","cross_cats":["cs.SD"],"headline":"","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2016-02-09T12:00:56Z","title":"Spoofing detection under noisy conditions: a preliminary investigation and an initial database"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1602.02950","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:4f8db7f72517bc14a424582809841cdf0f0a7f0e6c0e49efd6f9fa63278a9430","target":"record","created_at":"2026-05-18T01:21:06Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"7241326343e8551e841fc2c21e7cebbe66c346d24bfc93984aa725ed83822e8e","cross_cats_sorted":["cs.SD"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2016-02-09T12:00:56Z","title_canon_sha256":"fbd2930b39574c1f5bd0017ee512259444da2a6c923fee8a1ae908ee3faf05f8"},"schema_version":"1.0","source":{"id":"1602.02950","kind":"arxiv","version":1}},"canonical_sha256":"923c9c74943d8bde17f1ca079118124706dded4f75a5ff296f7cb1f8bcadf657","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"923c9c74943d8bde17f1ca079118124706dded4f75a5ff296f7cb1f8bcadf657","first_computed_at":"2026-05-18T01:21:06.009216Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:21:06.009216Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"zgxwGkVFrpjTH0b0h8h9JTZwy36LSmjMCtsPnKE0XJbvJLwyaFEWtpx3Zv2rpe42/5tpN0rKW606J7LIdssTBA==","signature_status":"signed_v1","signed_at":"2026-05-18T01:21:06.009959Z","signed_message":"canonical_sha256_bytes"},"source_id":"1602.02950","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:4f8db7f72517bc14a424582809841cdf0f0a7f0e6c0e49efd6f9fa63278a9430","sha256:02303928b0af94abf8c428265198982de044c4f0927220f60f5ccb8ecaef1acb"],"state_sha256":"e2e1cc436f6054de07a64a980c07adda1cc53175cba31e60f343b0385266d70e"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"NzA3N0AeHGek++rXbkMmJmH+h4RV+KmA07OlY3HxD3Bt/qP6aXxiG6Zc/LZr4i9pZ7yJqPVT8TjOop+7QDbhCA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T13:25:42.162619Z","bundle_sha256":"c02cc74eaa5a28239def4bfe6104503b73e9e077f307f6c5085aca0f49172c2d"}}