{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2017:UP4KIHULV457U5V7ZVK6LTZX24","short_pith_number":"pith:UP4KIHUL","schema_version":"1.0","canonical_sha256":"a3f8a41e8baf3bfa76bfcd55e5cf37d71203781f6a0826c244b1fdd9a35af546","source":{"kind":"arxiv","id":"1710.11342","version":2},"attestation_state":"computed","paper":{"title":"Generating Natural Adversarial Examples","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.AI","cs.CL","cs.CV"],"primary_cat":"cs.LG","authors_text":"Dheeru Dua, Sameer Singh, Zhengli Zhao","submitted_at":"2017-10-31T06:22:26Z","abstract_excerpt":"Due to their complex nature, it is hard to characterize the ways in which machine learning models can misbehave or be exploited when deployed. Recent work on adversarial examples, i.e. inputs with minor perturbations that result in substantially different model predictions, is helpful in evaluating the robustness of these models by exposing the adversarial scenarios where they fail. However, these malicious perturbations are often unnatural, not semantically meaningful, and not applicable to complicated domains such as language. In this paper, we propose a framework to generate natural and leg"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1710.11342","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2017-10-31T06:22:26Z","cross_cats_sorted":["cs.AI","cs.CL","cs.CV"],"title_canon_sha256":"09fa16209273bb38a078038ef0403939387468d461ca5d328432d2f539155870","abstract_canon_sha256":"6413d1b63220f491297262cccd8dd2573f812ffd38c149e3350add03ab0fb1b4"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:22:39.303308Z","signature_b64":"ndpCMsmOBZggCZrUOs86UJCCnE9ikUJgCBlkro7Ce1g6yRQMuMkPWvsaU9Ou2KZp2mzOQDHbfDvIMmYZuHZiAQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"a3f8a41e8baf3bfa76bfcd55e5cf37d71203781f6a0826c244b1fdd9a35af546","last_reissued_at":"2026-05-18T00:22:39.302697Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:22:39.302697Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Generating Natural Adversarial Examples","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.AI","cs.CL","cs.CV"],"primary_cat":"cs.LG","authors_text":"Dheeru Dua, Sameer Singh, Zhengli Zhao","submitted_at":"2017-10-31T06:22:26Z","abstract_excerpt":"Due to their complex nature, it is hard to characterize the ways in which machine learning models can misbehave or be exploited when deployed. Recent work on adversarial examples, i.e. inputs with minor perturbations that result in substantially different model predictions, is helpful in evaluating the robustness of these models by exposing the adversarial scenarios where they fail. However, these malicious perturbations are often unnatural, not semantically meaningful, and not applicable to complicated domains such as language. In this paper, we propose a framework to generate natural and leg"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1710.11342","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1710.11342","created_at":"2026-05-18T00:22:39.302790+00:00"},{"alias_kind":"arxiv_version","alias_value":"1710.11342v2","created_at":"2026-05-18T00:22:39.302790+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1710.11342","created_at":"2026-05-18T00:22:39.302790+00:00"},{"alias_kind":"pith_short_12","alias_value":"UP4KIHULV457","created_at":"2026-05-18T12:31:46.661854+00:00"},{"alias_kind":"pith_short_16","alias_value":"UP4KIHULV457U5V7","created_at":"2026-05-18T12:31:46.661854+00:00"},{"alias_kind":"pith_short_8","alias_value":"UP4KIHUL","created_at":"2026-05-18T12:31:46.661854+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":2,"internal_anchor_count":1,"sample":[{"citing_arxiv_id":"2601.14505","citing_title":"Uncovering and Understanding FPR Manipulation Attack in Industrial IoT Networks","ref_index":25,"is_internal_anchor":true},{"citing_arxiv_id":"2605.08268","citing_title":"Insider Attacks in Multi-Agent LLM Consensus Systems","ref_index":127,"is_internal_anchor":false}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/UP4KIHULV457U5V7ZVK6LTZX24","json":"https://pith.science/pith/UP4KIHULV457U5V7ZVK6LTZX24.json","graph_json":"https://pith.science/api/pith-number/UP4KIHULV457U5V7ZVK6LTZX24/graph.json","events_json":"https://pith.science/api/pith-number/UP4KIHULV457U5V7ZVK6LTZX24/events.json","paper":"https://pith.science/paper/UP4KIHUL"},"agent_actions":{"view_html":"https://pith.science/pith/UP4KIHULV457U5V7ZVK6LTZX24","download_json":"https://pith.science/pith/UP4KIHULV457U5V7ZVK6LTZX24.json","view_paper":"https://pith.science/paper/UP4KIHUL","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1710.11342&json=true","fetch_graph":"https://pith.science/api/pith-number/UP4KIHULV457U5V7ZVK6LTZX24/graph.json","fetch_events":"https://pith.science/api/pith-number/UP4KIHULV457U5V7ZVK6LTZX24/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/UP4KIHULV457U5V7ZVK6LTZX24/action/timestamp_anchor","attest_storage":"https://pith.science/pith/UP4KIHULV457U5V7ZVK6LTZX24/action/storage_attestation","attest_author":"https://pith.science/pith/UP4KIHULV457U5V7ZVK6LTZX24/action/author_attestation","sign_citation":"https://pith.science/pith/UP4KIHULV457U5V7ZVK6LTZX24/action/citation_signature","submit_replication":"https://pith.science/pith/UP4KIHULV457U5V7ZVK6LTZX24/action/replication_record"}},"created_at":"2026-05-18T00:22:39.302790+00:00","updated_at":"2026-05-18T00:22:39.302790+00:00"}