{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:V5H6HMFLFXCTG6RNBMV52KKPOS","short_pith_number":"pith:V5H6HMFL","canonical_record":{"source":{"id":"1803.09353","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-03-25T21:48:53Z","cross_cats_sorted":["cs.DS","cs.GT","stat.ML"],"title_canon_sha256":"2f6b9b816c81fd9d81beefe33fe3495f387da88c07adef2c9f8d028d0f42d4e6","abstract_canon_sha256":"02e9b218e215ecac42ce0c270c8c8024f93f94ad9ea9e0c697da25f502be9310"},"schema_version":"1.0"},"canonical_sha256":"af4fe3b0ab2dc5337a2d0b2bdd294f74bdebe6e41e99c62a40e92aa7805da7c4","source":{"kind":"arxiv","id":"1803.09353","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.09353","created_at":"2026-05-18T00:20:11Z"},{"alias_kind":"arxiv_version","alias_value":"1803.09353v1","created_at":"2026-05-18T00:20:11Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.09353","created_at":"2026-05-18T00:20:11Z"},{"alias_kind":"pith_short_12","alias_value":"V5H6HMFLFXCT","created_at":"2026-05-18T12:32:59Z"},{"alias_kind":"pith_short_16","alias_value":"V5H6HMFLFXCTG6RN","created_at":"2026-05-18T12:32:59Z"},{"alias_kind":"pith_short_8","alias_value":"V5H6HMFL","created_at":"2026-05-18T12:32:59Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:V5H6HMFLFXCTG6RNBMV52KKPOS","target":"record","payload":{"canonical_record":{"source":{"id":"1803.09353","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-03-25T21:48:53Z","cross_cats_sorted":["cs.DS","cs.GT","stat.ML"],"title_canon_sha256":"2f6b9b816c81fd9d81beefe33fe3495f387da88c07adef2c9f8d028d0f42d4e6","abstract_canon_sha256":"02e9b218e215ecac42ce0c270c8c8024f93f94ad9ea9e0c697da25f502be9310"},"schema_version":"1.0"},"canonical_sha256":"af4fe3b0ab2dc5337a2d0b2bdd294f74bdebe6e41e99c62a40e92aa7805da7c4","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:20:11.900523Z","signature_b64":"FXg/jOo0T+cXgM9xI1pyrT5fJqZgqk+fl1Xl+IJMPx8EwQVB75Dxyg/nM4in3IIPX/tz/eX93Ts9WRq5tZ8NCw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"af4fe3b0ab2dc5337a2d0b2bdd294f74bdebe6e41e99c62a40e92aa7805da7c4","last_reissued_at":"2026-05-18T00:20:11.899900Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:20:11.899900Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1803.09353","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:20:11Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"0KziNpD641oc5qqPo7sCl1Jcs3CP/f0p+L1pHMN7bIwf9qmNN1J8E/Jsj+yq3sAoDRmdW7+rMRGM1Td+sFuyCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T22:06:25.445133Z"},"content_sha256":"33ac1da4bfc4aae7be8cf0902ac48875083e477485db54741d9c717ec478e1a5","schema_version":"1.0","event_id":"sha256:33ac1da4bfc4aae7be8cf0902ac48875083e477485db54741d9c717ec478e1a5"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:V5H6HMFLFXCTG6RNBMV52KKPOS","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Stochastic bandits robust to adversarial corruptions","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.DS","cs.GT","stat.ML"],"primary_cat":"cs.LG","authors_text":"Renato Paes Leme, Thodoris Lykouris, Vahab Mirrokni","submitted_at":"2018-03-25T21:48:53Z","abstract_excerpt":"We introduce a new model of stochastic bandits with adversarial corruptions which aims to capture settings where most of the input follows a stochastic pattern but some fraction of it can be adversarially changed to trick the algorithm, e.g., click fraud, fake reviews and email spam. The goal of this model is to encourage the design of bandit algorithms that (i) work well in mixed adversarial and stochastic models, and (ii) whose performance deteriorates gracefully as we move from fully stochastic to fully adversarial models.\n  In our model, the rewards for all arms are initially drawn from a "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.09353","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:20:11Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"0IInbAi7NyF+EuJQysjpNADkGlQWl1A6xLHxOzsAaQSQrSwhU8UlI4k7iPGwykgWW/SsfzHfUJp+JTI+N148AA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T22:06:25.445758Z"},"content_sha256":"636eaf27bec8acdffa3e2434ee4014e6ca22f520eac795ad1cfecfdf1a7fa0d6","schema_version":"1.0","event_id":"sha256:636eaf27bec8acdffa3e2434ee4014e6ca22f520eac795ad1cfecfdf1a7fa0d6"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/V5H6HMFLFXCTG6RNBMV52KKPOS/bundle.json","state_url":"https://pith.science/pith/V5H6HMFLFXCTG6RNBMV52KKPOS/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/V5H6HMFLFXCTG6RNBMV52KKPOS/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T22:06:25Z","links":{"resolver":"https://pith.science/pith/V5H6HMFLFXCTG6RNBMV52KKPOS","bundle":"https://pith.science/pith/V5H6HMFLFXCTG6RNBMV52KKPOS/bundle.json","state":"https://pith.science/pith/V5H6HMFLFXCTG6RNBMV52KKPOS/state.json","well_known_bundle":"https://pith.science/.well-known/pith/V5H6HMFLFXCTG6RNBMV52KKPOS/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:V5H6HMFLFXCTG6RNBMV52KKPOS","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"02e9b218e215ecac42ce0c270c8c8024f93f94ad9ea9e0c697da25f502be9310","cross_cats_sorted":["cs.DS","cs.GT","stat.ML"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-03-25T21:48:53Z","title_canon_sha256":"2f6b9b816c81fd9d81beefe33fe3495f387da88c07adef2c9f8d028d0f42d4e6"},"schema_version":"1.0","source":{"id":"1803.09353","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.09353","created_at":"2026-05-18T00:20:11Z"},{"alias_kind":"arxiv_version","alias_value":"1803.09353v1","created_at":"2026-05-18T00:20:11Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.09353","created_at":"2026-05-18T00:20:11Z"},{"alias_kind":"pith_short_12","alias_value":"V5H6HMFLFXCT","created_at":"2026-05-18T12:32:59Z"},{"alias_kind":"pith_short_16","alias_value":"V5H6HMFLFXCTG6RN","created_at":"2026-05-18T12:32:59Z"},{"alias_kind":"pith_short_8","alias_value":"V5H6HMFL","created_at":"2026-05-18T12:32:59Z"}],"graph_snapshots":[{"event_id":"sha256:636eaf27bec8acdffa3e2434ee4014e6ca22f520eac795ad1cfecfdf1a7fa0d6","target":"graph","created_at":"2026-05-18T00:20:11Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We introduce a new model of stochastic bandits with adversarial corruptions which aims to capture settings where most of the input follows a stochastic pattern but some fraction of it can be adversarially changed to trick the algorithm, e.g., click fraud, fake reviews and email spam. The goal of this model is to encourage the design of bandit algorithms that (i) work well in mixed adversarial and stochastic models, and (ii) whose performance deteriorates gracefully as we move from fully stochastic to fully adversarial models.\n  In our model, the rewards for all arms are initially drawn from a ","authors_text":"Renato Paes Leme, Thodoris Lykouris, Vahab Mirrokni","cross_cats":["cs.DS","cs.GT","stat.ML"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-03-25T21:48:53Z","title":"Stochastic bandits robust to adversarial corruptions"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.09353","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:33ac1da4bfc4aae7be8cf0902ac48875083e477485db54741d9c717ec478e1a5","target":"record","created_at":"2026-05-18T00:20:11Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"02e9b218e215ecac42ce0c270c8c8024f93f94ad9ea9e0c697da25f502be9310","cross_cats_sorted":["cs.DS","cs.GT","stat.ML"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-03-25T21:48:53Z","title_canon_sha256":"2f6b9b816c81fd9d81beefe33fe3495f387da88c07adef2c9f8d028d0f42d4e6"},"schema_version":"1.0","source":{"id":"1803.09353","kind":"arxiv","version":1}},"canonical_sha256":"af4fe3b0ab2dc5337a2d0b2bdd294f74bdebe6e41e99c62a40e92aa7805da7c4","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"af4fe3b0ab2dc5337a2d0b2bdd294f74bdebe6e41e99c62a40e92aa7805da7c4","first_computed_at":"2026-05-18T00:20:11.899900Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:20:11.899900Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"FXg/jOo0T+cXgM9xI1pyrT5fJqZgqk+fl1Xl+IJMPx8EwQVB75Dxyg/nM4in3IIPX/tz/eX93Ts9WRq5tZ8NCw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:20:11.900523Z","signed_message":"canonical_sha256_bytes"},"source_id":"1803.09353","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:33ac1da4bfc4aae7be8cf0902ac48875083e477485db54741d9c717ec478e1a5","sha256:636eaf27bec8acdffa3e2434ee4014e6ca22f520eac795ad1cfecfdf1a7fa0d6"],"state_sha256":"ed6c2640cc0db666224ab474e2d66d104b57937684c7e6f0f4c651b5c1e0d3d8"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"T1Rl6XTilAj9a5SqZJAOWt1nNp4+KXwgdPsSeFhfBvWQRGLcYeIQxbCPtxo1NaENyUrXP+SIWK+V9ht4LqTPCw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T22:06:25.449292Z","bundle_sha256":"21148285e9d5cfc6cf50798c55145a0be4f47cafdda021201e06a3d48a1fdfb3"}}