{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2019:TVK7EKNYHOOYVB36NPVNMUT67B","short_pith_number":"pith:TVK7EKNY","canonical_record":{"source":{"id":"1904.05586","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CV","submitted_at":"2019-04-11T09:02:30Z","cross_cats_sorted":[],"title_canon_sha256":"666c437eaa54dcae6e170bb3cb7789c3a2a50fa53cc4d272b1795e7a5ef31d71","abstract_canon_sha256":"effa821c400d359f04e12495bbdfe3a8038278293f2aeaf7c646e31fe9b7676e"},"schema_version":"1.0"},"canonical_sha256":"9d55f229b83b9d8a877e6bead6527ef87dd9b9d8249d13fe6aa609d52b2e463d","source":{"kind":"arxiv","id":"1904.05586","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1904.05586","created_at":"2026-05-17T23:48:49Z"},{"alias_kind":"arxiv_version","alias_value":"1904.05586v1","created_at":"2026-05-17T23:48:49Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1904.05586","created_at":"2026-05-17T23:48:49Z"},{"alias_kind":"pith_short_12","alias_value":"TVK7EKNYHOOY","created_at":"2026-05-18T12:33:30Z"},{"alias_kind":"pith_short_16","alias_value":"TVK7EKNYHOOYVB36","created_at":"2026-05-18T12:33:30Z"},{"alias_kind":"pith_short_8","alias_value":"TVK7EKNY","created_at":"2026-05-18T12:33:30Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2019:TVK7EKNYHOOYVB36NPVNMUT67B","target":"record","payload":{"canonical_record":{"source":{"id":"1904.05586","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CV","submitted_at":"2019-04-11T09:02:30Z","cross_cats_sorted":[],"title_canon_sha256":"666c437eaa54dcae6e170bb3cb7789c3a2a50fa53cc4d272b1795e7a5ef31d71","abstract_canon_sha256":"effa821c400d359f04e12495bbdfe3a8038278293f2aeaf7c646e31fe9b7676e"},"schema_version":"1.0"},"canonical_sha256":"9d55f229b83b9d8a877e6bead6527ef87dd9b9d8249d13fe6aa609d52b2e463d","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:48:49.039110Z","signature_b64":"msZqsv1HpciWL0yyzCCXfTJ6lLayi+gQig6RI3kjuI7tOUPx1VIm/JBGLpdyY80/22TLGQMLtT/EgbGgTboABA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"9d55f229b83b9d8a877e6bead6527ef87dd9b9d8249d13fe6aa609d52b2e463d","last_reissued_at":"2026-05-17T23:48:49.038641Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:48:49.038641Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1904.05586","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:48:49Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"O4kiavuNkfdiDIQXzNp/wQh0dO7tgsb9QppjyZ5S+8OI6HEhbd0xc21oOLjPks1iqrVW03hWpw4FBEgDgUjiAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T21:55:15.636353Z"},"content_sha256":"d6bfce64d7d1272eabf2c929ba1050c0ca9506d8ec3251f4905847e6b0e36d69","schema_version":"1.0","event_id":"sha256:d6bfce64d7d1272eabf2c929ba1050c0ca9506d8ec3251f4905847e6b0e36d69"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2019:TVK7EKNYHOOYVB36NPVNMUT67B","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Black-Box Decision based Adversarial Attack with Symmetric $\\alpha$-stable Distribution","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":[],"primary_cat":"cs.CV","authors_text":"Ercan E. Kuruoglu, Klaus-Robert M\\\"uller, Shinichi Nakajima, Vignesh Srinivasan, Wojciech Samek","submitted_at":"2019-04-11T09:02:30Z","abstract_excerpt":"Developing techniques for adversarial attack and defense is an important research field for establishing reliable machine learning and its applications. Many existing methods employ Gaussian random variables for exploring the data space to find the most adversarial (for attacking) or least adversarial (for defense) point. However, the Gaussian distribution is not necessarily the optimal choice when the exploration is required to follow the complicated structure that most real-world data distributions exhibit. In this paper, we investigate how statistics of random variables affect such random w"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1904.05586","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:48:49Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"i2PJxzplekOHyoGkZ/Q6w0/LLqcvZzirxU6pfv/FoJEz7SnppZPJmywkO4lhfllrmFQPk7BSekJcjUbnl3AyDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T21:55:15.637049Z"},"content_sha256":"e620c24f6feb26a46e86b6e6203e47ce7d29e5b52856b79952253228ff1343d6","schema_version":"1.0","event_id":"sha256:e620c24f6feb26a46e86b6e6203e47ce7d29e5b52856b79952253228ff1343d6"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/TVK7EKNYHOOYVB36NPVNMUT67B/bundle.json","state_url":"https://pith.science/pith/TVK7EKNYHOOYVB36NPVNMUT67B/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/TVK7EKNYHOOYVB36NPVNMUT67B/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T21:55:15Z","links":{"resolver":"https://pith.science/pith/TVK7EKNYHOOYVB36NPVNMUT67B","bundle":"https://pith.science/pith/TVK7EKNYHOOYVB36NPVNMUT67B/bundle.json","state":"https://pith.science/pith/TVK7EKNYHOOYVB36NPVNMUT67B/state.json","well_known_bundle":"https://pith.science/.well-known/pith/TVK7EKNYHOOYVB36NPVNMUT67B/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2019:TVK7EKNYHOOYVB36NPVNMUT67B","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"effa821c400d359f04e12495bbdfe3a8038278293f2aeaf7c646e31fe9b7676e","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CV","submitted_at":"2019-04-11T09:02:30Z","title_canon_sha256":"666c437eaa54dcae6e170bb3cb7789c3a2a50fa53cc4d272b1795e7a5ef31d71"},"schema_version":"1.0","source":{"id":"1904.05586","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1904.05586","created_at":"2026-05-17T23:48:49Z"},{"alias_kind":"arxiv_version","alias_value":"1904.05586v1","created_at":"2026-05-17T23:48:49Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1904.05586","created_at":"2026-05-17T23:48:49Z"},{"alias_kind":"pith_short_12","alias_value":"TVK7EKNYHOOY","created_at":"2026-05-18T12:33:30Z"},{"alias_kind":"pith_short_16","alias_value":"TVK7EKNYHOOYVB36","created_at":"2026-05-18T12:33:30Z"},{"alias_kind":"pith_short_8","alias_value":"TVK7EKNY","created_at":"2026-05-18T12:33:30Z"}],"graph_snapshots":[{"event_id":"sha256:e620c24f6feb26a46e86b6e6203e47ce7d29e5b52856b79952253228ff1343d6","target":"graph","created_at":"2026-05-17T23:48:49Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Developing techniques for adversarial attack and defense is an important research field for establishing reliable machine learning and its applications. Many existing methods employ Gaussian random variables for exploring the data space to find the most adversarial (for attacking) or least adversarial (for defense) point. However, the Gaussian distribution is not necessarily the optimal choice when the exploration is required to follow the complicated structure that most real-world data distributions exhibit. In this paper, we investigate how statistics of random variables affect such random w","authors_text":"Ercan E. Kuruoglu, Klaus-Robert M\\\"uller, Shinichi Nakajima, Vignesh Srinivasan, Wojciech Samek","cross_cats":[],"headline":"","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CV","submitted_at":"2019-04-11T09:02:30Z","title":"Black-Box Decision based Adversarial Attack with Symmetric $\\alpha$-stable Distribution"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1904.05586","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:d6bfce64d7d1272eabf2c929ba1050c0ca9506d8ec3251f4905847e6b0e36d69","target":"record","created_at":"2026-05-17T23:48:49Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"effa821c400d359f04e12495bbdfe3a8038278293f2aeaf7c646e31fe9b7676e","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CV","submitted_at":"2019-04-11T09:02:30Z","title_canon_sha256":"666c437eaa54dcae6e170bb3cb7789c3a2a50fa53cc4d272b1795e7a5ef31d71"},"schema_version":"1.0","source":{"id":"1904.05586","kind":"arxiv","version":1}},"canonical_sha256":"9d55f229b83b9d8a877e6bead6527ef87dd9b9d8249d13fe6aa609d52b2e463d","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"9d55f229b83b9d8a877e6bead6527ef87dd9b9d8249d13fe6aa609d52b2e463d","first_computed_at":"2026-05-17T23:48:49.038641Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:48:49.038641Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"msZqsv1HpciWL0yyzCCXfTJ6lLayi+gQig6RI3kjuI7tOUPx1VIm/JBGLpdyY80/22TLGQMLtT/EgbGgTboABA==","signature_status":"signed_v1","signed_at":"2026-05-17T23:48:49.039110Z","signed_message":"canonical_sha256_bytes"},"source_id":"1904.05586","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:d6bfce64d7d1272eabf2c929ba1050c0ca9506d8ec3251f4905847e6b0e36d69","sha256:e620c24f6feb26a46e86b6e6203e47ce7d29e5b52856b79952253228ff1343d6"],"state_sha256":"0861aea2d74d25d5275b48eef94de1672d1745e5cf15d1901a5e807dfb3a781f"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ns494e5qJSXuvpKe9l68dKOGSZl3AiR6+N2o1UYD7QnzWRfdzbTkpk7D0ecoLOCQoK9TyVIl98S99QZTu/R9CA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T21:55:15.640888Z","bundle_sha256":"85bb6047382ab87898c4b48a41a617d294b4af005aec4b6f05b8b8223c4b594a"}}