{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2018:TPYJ2YHYOGEX7NL42CCT3WAM46","short_pith_number":"pith:TPYJ2YHY","schema_version":"1.0","canonical_sha256":"9bf09d60f871897fb57cd0853dd80ce7a915ad143096c299490cc6dc3ffc0f90","source":{"kind":"arxiv","id":"1809.10875","version":2},"attestation_state":"computed","paper":{"title":"Characterizing Audio Adversarial Examples Using Temporal Dependency","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.AI","cs.CR","cs.SD","eess.AS","stat.ML"],"primary_cat":"cs.LG","authors_text":"Bo Li, Dawn Song, Pin-Yu Chen, Zhuolin Yang","submitted_at":"2018-09-28T06:39:42Z","abstract_excerpt":"Recent studies have highlighted adversarial examples as a ubiquitous threat to different neural network models and many downstream applications. Nonetheless, as unique data properties have inspired distinct and powerful learning principles, this paper aims to explore their potentials towards mitigating adversarial inputs. In particular, our results reveal the importance of using the temporal dependency in audio data to gain discriminate power against adversarial examples. Tested on the automatic speech recognition (ASR) tasks and three recent audio adversarial attacks, we find that (i) input t"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1809.10875","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-09-28T06:39:42Z","cross_cats_sorted":["cs.AI","cs.CR","cs.SD","eess.AS","stat.ML"],"title_canon_sha256":"deeef0556a3ccaf096f2f44e9e7a2d0297d5bc0f7d3f66929a813cb84c1e167d","abstract_canon_sha256":"c1bb097ef9fec526bcc822f65af178f17ca76df6365ce31dd9aa511457cca2e0"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:44:07.598979Z","signature_b64":"6ja0/Ox7ePXuD39pOsAJw185QD7AfzGib0HrFvzYKZqRX3fIHcvlFstkdDQ3XT2/Qv9mDVvt5U3q9TLbKJBUDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"9bf09d60f871897fb57cd0853dd80ce7a915ad143096c299490cc6dc3ffc0f90","last_reissued_at":"2026-05-17T23:44:07.598342Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:44:07.598342Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Characterizing Audio Adversarial Examples Using Temporal Dependency","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.AI","cs.CR","cs.SD","eess.AS","stat.ML"],"primary_cat":"cs.LG","authors_text":"Bo Li, Dawn Song, Pin-Yu Chen, Zhuolin Yang","submitted_at":"2018-09-28T06:39:42Z","abstract_excerpt":"Recent studies have highlighted adversarial examples as a ubiquitous threat to different neural network models and many downstream applications. Nonetheless, as unique data properties have inspired distinct and powerful learning principles, this paper aims to explore their potentials towards mitigating adversarial inputs. In particular, our results reveal the importance of using the temporal dependency in audio data to gain discriminate power against adversarial examples. Tested on the automatic speech recognition (ASR) tasks and three recent audio adversarial attacks, we find that (i) input t"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1809.10875","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1809.10875","created_at":"2026-05-17T23:44:07.598448+00:00"},{"alias_kind":"arxiv_version","alias_value":"1809.10875v2","created_at":"2026-05-17T23:44:07.598448+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1809.10875","created_at":"2026-05-17T23:44:07.598448+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/TPYJ2YHYOGEX7NL42CCT3WAM46","json":"https://pith.science/pith/TPYJ2YHYOGEX7NL42CCT3WAM46.json","graph_json":"https://pith.science/api/pith-number/TPYJ2YHYOGEX7NL42CCT3WAM46/graph.json","events_json":"https://pith.science/api/pith-number/TPYJ2YHYOGEX7NL42CCT3WAM46/events.json","paper":"https://pith.science/paper/TPYJ2YHY"},"agent_actions":{"view_html":"https://pith.science/pith/TPYJ2YHYOGEX7NL42CCT3WAM46","download_json":"https://pith.science/pith/TPYJ2YHYOGEX7NL42CCT3WAM46.json","view_paper":"https://pith.science/paper/TPYJ2YHY","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1809.10875&json=true","fetch_graph":"https://pith.science/api/pith-number/TPYJ2YHYOGEX7NL42CCT3WAM46/graph.json","fetch_events":"https://pith.science/api/pith-number/TPYJ2YHYOGEX7NL42CCT3WAM46/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/TPYJ2YHYOGEX7NL42CCT3WAM46/action/timestamp_anchor","attest_storage":"https://pith.science/pith/TPYJ2YHYOGEX7NL42CCT3WAM46/action/storage_attestation","attest_author":"https://pith.science/pith/TPYJ2YHYOGEX7NL42CCT3WAM46/action/author_attestation","sign_citation":"https://pith.science/pith/TPYJ2YHYOGEX7NL42CCT3WAM46/action/citation_signature","submit_replication":"https://pith.science/pith/TPYJ2YHYOGEX7NL42CCT3WAM46/action/replication_record"}},"created_at":"2026-05-17T23:44:07.598448+00:00","updated_at":"2026-05-17T23:44:07.598448+00:00"}