{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:TPCKMZV3PBWGWVYB75BMVPJ6ES","short_pith_number":"pith:TPCKMZV3","canonical_record":{"source":{"id":"1611.09501","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-11-29T06:05:14Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"0c1f2226978f4a9165adb2a66e37314fc701aec1fc079407bd28d00c6c8fe0e7","abstract_canon_sha256":"a75590d40b4cf05742b846642ed413794a3af2f9d5324bb50a7c6b00db1d2b33"},"schema_version":"1.0"},"canonical_sha256":"9bc4a666bb786c6b5701ff42cabd3e24a5cfa4110d248951c69f9afb7d5ffe13","source":{"kind":"arxiv","id":"1611.09501","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1611.09501","created_at":"2026-05-18T00:56:18Z"},{"alias_kind":"arxiv_version","alias_value":"1611.09501v1","created_at":"2026-05-18T00:56:18Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1611.09501","created_at":"2026-05-18T00:56:18Z"},{"alias_kind":"pith_short_12","alias_value":"TPCKMZV3PBWG","created_at":"2026-05-18T12:30:46Z"},{"alias_kind":"pith_short_16","alias_value":"TPCKMZV3PBWGWVYB","created_at":"2026-05-18T12:30:46Z"},{"alias_kind":"pith_short_8","alias_value":"TPCKMZV3","created_at":"2026-05-18T12:30:46Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:TPCKMZV3PBWGWVYB75BMVPJ6ES","target":"record","payload":{"canonical_record":{"source":{"id":"1611.09501","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-11-29T06:05:14Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"0c1f2226978f4a9165adb2a66e37314fc701aec1fc079407bd28d00c6c8fe0e7","abstract_canon_sha256":"a75590d40b4cf05742b846642ed413794a3af2f9d5324bb50a7c6b00db1d2b33"},"schema_version":"1.0"},"canonical_sha256":"9bc4a666bb786c6b5701ff42cabd3e24a5cfa4110d248951c69f9afb7d5ffe13","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:56:18.272143Z","signature_b64":"w8O+qefHBRuCobYfRId4i0dJLZaJqrZgA7on5agabUVmIm4CG1/YSq638Yt2K1nZfBoLVgduz65RcHsAMUehDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"9bc4a666bb786c6b5701ff42cabd3e24a5cfa4110d248951c69f9afb7d5ffe13","last_reissued_at":"2026-05-18T00:56:18.271461Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:56:18.271461Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1611.09501","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:56:18Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"mDgntolfmc6bfKl0CJPVCh6Zu6XSk5bScNUgMu+UyfDDs2E3Ge94MHGsE1eRSGi/ZRNlc1Zb7Fpt2CY4ekkhAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T23:48:15.931239Z"},"content_sha256":"8e1053a9b269b69a1b320b8bbb0aa23fb5639eb351e3b9a94e4e5f1ebcc9f07e","schema_version":"1.0","event_id":"sha256:8e1053a9b269b69a1b320b8bbb0aa23fb5639eb351e3b9a94e4e5f1ebcc9f07e"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:TPCKMZV3PBWGWVYB75BMVPJ6ES","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Transmit design for MIMO wiretap channel with a malicious jammer","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Duo Zhang, Lingxiang Li, Weidong Mei, Zhi Chen","submitted_at":"2016-11-29T06:05:14Z","abstract_excerpt":"In this paper, we consider the transmit design for multi-input multi-output (MIMO) wiretap channel including a malicious jammer. We first transform the system model into the traditional three-node wiretap channel by whitening the interference at the legitimate user. Additionally, the eavesdropper channel state information (ECSI) may be fully or statistically known, even unknown to the transmitter. Hence, some strategies are proposed in terms of different levels of ECSI available to the transmitter in our paper. For the case of unknown ECSI, a target rate for the legitimate user is first specif"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1611.09501","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:56:18Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"V5G7am/f4f56q4mPE/NC2G2cGcv6m64N8hYGobR+nahvnZA/LlIBkLEG8hv74Wzw5pp8oxd7W5T1FfWw+eSCBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T23:48:15.931758Z"},"content_sha256":"4be178c889a3fd075c49acd6391ef2cfb24f8b85055f2cd7c24d71b352ebccdb","schema_version":"1.0","event_id":"sha256:4be178c889a3fd075c49acd6391ef2cfb24f8b85055f2cd7c24d71b352ebccdb"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/TPCKMZV3PBWGWVYB75BMVPJ6ES/bundle.json","state_url":"https://pith.science/pith/TPCKMZV3PBWGWVYB75BMVPJ6ES/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/TPCKMZV3PBWGWVYB75BMVPJ6ES/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T23:48:15Z","links":{"resolver":"https://pith.science/pith/TPCKMZV3PBWGWVYB75BMVPJ6ES","bundle":"https://pith.science/pith/TPCKMZV3PBWGWVYB75BMVPJ6ES/bundle.json","state":"https://pith.science/pith/TPCKMZV3PBWGWVYB75BMVPJ6ES/state.json","well_known_bundle":"https://pith.science/.well-known/pith/TPCKMZV3PBWGWVYB75BMVPJ6ES/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:TPCKMZV3PBWGWVYB75BMVPJ6ES","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"a75590d40b4cf05742b846642ed413794a3af2f9d5324bb50a7c6b00db1d2b33","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-11-29T06:05:14Z","title_canon_sha256":"0c1f2226978f4a9165adb2a66e37314fc701aec1fc079407bd28d00c6c8fe0e7"},"schema_version":"1.0","source":{"id":"1611.09501","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1611.09501","created_at":"2026-05-18T00:56:18Z"},{"alias_kind":"arxiv_version","alias_value":"1611.09501v1","created_at":"2026-05-18T00:56:18Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1611.09501","created_at":"2026-05-18T00:56:18Z"},{"alias_kind":"pith_short_12","alias_value":"TPCKMZV3PBWG","created_at":"2026-05-18T12:30:46Z"},{"alias_kind":"pith_short_16","alias_value":"TPCKMZV3PBWGWVYB","created_at":"2026-05-18T12:30:46Z"},{"alias_kind":"pith_short_8","alias_value":"TPCKMZV3","created_at":"2026-05-18T12:30:46Z"}],"graph_snapshots":[{"event_id":"sha256:4be178c889a3fd075c49acd6391ef2cfb24f8b85055f2cd7c24d71b352ebccdb","target":"graph","created_at":"2026-05-18T00:56:18Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In this paper, we consider the transmit design for multi-input multi-output (MIMO) wiretap channel including a malicious jammer. We first transform the system model into the traditional three-node wiretap channel by whitening the interference at the legitimate user. Additionally, the eavesdropper channel state information (ECSI) may be fully or statistically known, even unknown to the transmitter. Hence, some strategies are proposed in terms of different levels of ECSI available to the transmitter in our paper. For the case of unknown ECSI, a target rate for the legitimate user is first specif","authors_text":"Duo Zhang, Lingxiang Li, Weidong Mei, Zhi Chen","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-11-29T06:05:14Z","title":"Transmit design for MIMO wiretap channel with a malicious jammer"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1611.09501","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:8e1053a9b269b69a1b320b8bbb0aa23fb5639eb351e3b9a94e4e5f1ebcc9f07e","target":"record","created_at":"2026-05-18T00:56:18Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"a75590d40b4cf05742b846642ed413794a3af2f9d5324bb50a7c6b00db1d2b33","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-11-29T06:05:14Z","title_canon_sha256":"0c1f2226978f4a9165adb2a66e37314fc701aec1fc079407bd28d00c6c8fe0e7"},"schema_version":"1.0","source":{"id":"1611.09501","kind":"arxiv","version":1}},"canonical_sha256":"9bc4a666bb786c6b5701ff42cabd3e24a5cfa4110d248951c69f9afb7d5ffe13","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"9bc4a666bb786c6b5701ff42cabd3e24a5cfa4110d248951c69f9afb7d5ffe13","first_computed_at":"2026-05-18T00:56:18.271461Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:56:18.271461Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"w8O+qefHBRuCobYfRId4i0dJLZaJqrZgA7on5agabUVmIm4CG1/YSq638Yt2K1nZfBoLVgduz65RcHsAMUehDw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:56:18.272143Z","signed_message":"canonical_sha256_bytes"},"source_id":"1611.09501","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:8e1053a9b269b69a1b320b8bbb0aa23fb5639eb351e3b9a94e4e5f1ebcc9f07e","sha256:4be178c889a3fd075c49acd6391ef2cfb24f8b85055f2cd7c24d71b352ebccdb"],"state_sha256":"8bc67e7764e6d797f328ba50e38689ff4aac710c846c538f932974421c11ae61"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"PHRBW+4OQD9OARsyZdVMtPoPO2CTCaOXrJ9AbSZ4RfHK79rUowdjh0EHVmQ+n6oeVUdCxT/4xUB/DAaQCQMpCA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T23:48:15.934369Z","bundle_sha256":"2b62cb944f2932c7cd6711924ca623e205bc576a3604074eb05c8466ff8de48d"}}